Challenges to U.S.-Russian Cooperation in the Manned Space Program
The U.S. and Russia agreed to merge their manned space program and to partner in a new international space station. This agreement took place in 1993 and politically symbolized the end of the Cold War and a new cooperative relationship between the two countries. Yet, the despite this enthusiastic agreement and the absence of the Cold War, there are still challenges both countries face that must be overcome if the joint space venture is to be successful. These challenges have little to do with space, but are imbedded and interwoven in the U.S. and Russia's political and economic systems. As Russia emerges as an emerging democracy it faces uncertainty politically and economically. This unstable situation, combined with the past and current political situations create new challenges for both the U.S. and Russia to overcome to be successful in the cooperative manned space program.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Comparison of the Security Strategies of the United States and the European Union
The comparison of both strategic documents shows that the analysis of the new threats of terrorism and proliferation of Weapons of Mass Destruction is similar, as well as the stated strategic goals/ ends. The great difference can be found in the ways/ concepts, how the United States on the one hand and the European Union on the other hand intend to counter these threats and to achieve the respective strategic goals/ends. The analyzed key differences are: Unilateralism versus multilateralism, preemption versus prevention and legitimacy of the use of force to achieve strategic objectives. The NSS tends to stress "hard power" and military solutions with the option of preemption and a unilateralist "go it alone approach," but is downplaying the role of the United Nations, the role of Islam, and possible options of civilian conflict prevention. While the ESS sees more the merit in effective multilateralism and "soft power" that combines economic, diplomatic as well as military assets. This approach will allow the European Union acting as "robust civilian power." But the EU credibility as a foreign policy actor will depend on translating its strategy into plans and operations. Despite all disagreements in the transatlantic relationship there is an urgent need, but also a common basis for cooperation in combating global terrorism. Complementarity, not conflict should be the new transatlantic watchword.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Dissent and Strategic Leadership of the Military Professions
One of the central difficulties to a right understanding of American civil-military relations is the nature of the U.S. military. Are our armed forces just obedient bureaucracies like most of the Executive branch, or are they vocational professions granted significant autonomy and a unique role in these relationships because of their expert knowledge and their expertise to apply it in the defense of America? To large measure, the answer to this question should determine the behavior of the strategic leaders of these professions, including the uncommon behavior of public dissent. Using the "Revolt of the Generals" in 2006 as stimulus, the author develops from the study of military professions the critical trust relationships that should have informed their individual decisions to dissent. After doing so, he makes recommendations for the restoration of the professions' ethic in this critical area of behavior by the senior officers who are the professions' strategic leaders.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Pure National Security Strategy
This study comprises a theoretical framework that is conducive to development and application of successful national security strategy. A national security strategy is the instrument which enables societies to partly influence and shape the conditions of the future in which they and their children will live. The national security strategy encompasses definitional underpinnings, characterization of strategy across levels of analysis, incorporating global trends, and understanding the basic goals of the state (security, prosperity and way of life) as all these factors span time from past, present, to future. Overall, the thesis reaches four major conclusions that have implications for national security strategy. First, national security strategy has no end but attempts to attain a continuing advantage across history. Second, strategy manages current and future change, which requires anticipation. Global trends fill this function. Third, national core values have great impact on national security strategy, both as boundaries for applied strategy and as historical enablers. Four, the strategy framework empowers national security with proactive potentials to reinforce opportunities and oppose and change threats before they come to full fruition.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Iran and the Arabian Gulf
The Arabian Gulf is of critical importance to the United States and our European and Asian allies. The region contains two-thirds of the world's known oil reserves, and the waterway itself is the key sea line of communication to this resource. As the world's only remaining superpower, the U.S. maintains a close watch on the Gulf and threats to its access. Following Iraq's defeat during DESERT STORM, the U.S. has refocused much of its attention on Iran and its growing military sea-denial capabilities. In light of the importance we place on the waterway, U.S. decision-makers must understand the extent of the Iranian threat to the free flow of commerce through the Gulf, and how best to counter it. Our thesis asserts that given the current geopolitical situation, the Iranian threat to the waterway is overstated; however, Gulf Cooperation Council members can and should take the lead in countering any attempt to deny its free access, and in the long term, the U.S. can join them and our other allies to help reduce Iranian incentives to threaten the Gulf.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Breaking News
This research project was undertaken to support the Assistant Secretary of Defense for Public Affairs' [ASD (PA)] in-depth audit and analysis of communication processes, procedures, staffing and resources for PA operations into the 21st Century. I was tasked to provide a chronology of DOD 's PA history and evaluate the documents developed by the military departments and Department of Defense (DOD) for their Public Affairs (PA) activities. The evaluation involved identifying duplications and redundancies, and if possible, to streamline the documents maintained by the PA communities. A later tasking brought the need to evaluate how joint doctrine affects PA activities. While reviewing the voluminous PA data and references to website sources provided by the four services, I became aware that all the services initiated guidance to their personnel based on directives levied by ASD (PA) but each service's written guidance reflected their service's culture - not a PA vision provided by DOD and service PA leaders. Further examination showed the DOD's PA activity was not originally designed along organizational lines but developed piecemeal over the years.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Separating Belligerent Populations
Ethnic and sectarian conflict is a prevalent form of conflict today. Most of the conflicts on-going today and in occurring the past twenty years have been internal wars between rival groups with ethnic or sectarian identities. Though its causes vary, the brutal nature of its conduct and its far-reaching consequences make it a threat that the international community cannot ignore. As result, the international community has debated the extent to which it should intervene, if ever, in such conflicts. By its actions, the international community has demonstrated its willingness to intervene, often with military force, to mitigate ethnic conflicts. The past twenty years has seen a series of military interventions that have varied in purpose from humanitarian assistance to nation building. Although many of the military interventions have been only marginally effective at best, there is every reason to believe that the international community will continue to intervene to mitigate future conflicts. United States'; military doctrine and tactics, techniques and procedures (TTP) does not specifically address ethnic and sectarian conflict like it has recently done with insurgencies. Its peace operations and subordinate peace enforcement operations doctrine and TTP form the basis for thinking about how to approach military interventions amid ethnic and sectarian conflict. Two relevant peace enforcement operations to consider are separating belligerents and establishing protected areas. Those two peace enforcement tasks are based on an underlying assumption of separation of populations in ethnic conflict. Amid such conflict, the rival populations separate as people flee or are forcibly expelled from their homes. Intervention occurring in such conditions can apply variations of the two peace enforcement operations to maintain the separation of the rival populations and thereby lessen the conflict. The approach an intervention force pursues is largely dependent on the degree and gThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Foreign Policy and a State's Hierarchy of Needs
The last 60 years saw a great change in United States involvement in the world. From an isolationist position before World War II, the United States moved to world leadership as underwriter of European security and balancer of Soviet expansionism. The reason this country bore the brunt of that huge undertaking was clear. It was in our "Vital National Interests." First, fascist aggression sought world domination, and war resulted. Then, the security of the United States was clearly tied to blocking the spread of communism through a national policy of containment. In November 1989, the Berlin Wall came tumbling down and with it Churchill's famous Iron Curtain. Just two years later, in December of 1991, the Union of Soviet Socialist Republics died. The rapid fall of the Soviet Communist regime did two drastic things to international politics. First, it ended the communist threat to the US and free world. Second, the fall ended the Cold War and with it, bipolarity. Now turbulence worldwide generates as ethnic and nationalistic sentiments surface and cause civil and regional conflicts. Previously, these sentiments were buried under the mantel of communism. These conflicts present new challenges for the world and those concerned with maintenance of its order. The United States has not determined how to define these problems and the interests of this country, nor what the proper response to these events should be. The old bipolar paradigm is inadequate and a new one must be developed. This paper proposes a new model for United States involvement around the world.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Recognizing and Adapting to Unrestricted Warfare Practices by China
In 1999, two Chinese Colonels published a concept paper which advocated that China adopt an #65533;Unrestricted Warfare#65533; (URW) strategy to respond to U.S. power and military superiority. Over the last 10 years, the Chinese government seems to have implemented elements of this strategy to erode U.S. world power and influence. Due to its cultural, doctrinal, and legal biases and constraints, the United States has experienced difficulty in recognizing and responding effectively to URW practices. If the U.S. hopes to deter, prevent, and/or respond to all forms of current and future URW threats, it must make policy and organizational changes within its government and the military. A primary reason why the U.S. is experiencing difficulty in adapting to URW practices is the difference in the thoughts and approach to warfare by the U.S. and the Chinese. The American way of conducting warfare has been greatly influenced by European authors and militaries that advocate that warfare as a physically violent action to compel an enemy to bend to your will and agree to your terms. Therefore, America fights wars of attrition and annihilation against its opponents and is best prepared for combat against symmetrical, regular enemy forces rather than asymmetrical ones. As with America and the West, the Chinese way of war is greatly influenced by its history and culture. The teachings of Confucius and Sun Zi, are of particular significance. These men taught obedience to the state, the primacy of relationships over law, and the importance of deception and surprise in warfare and the affairs of state. As a result, Chinese military and civilian leaders often prefer an indirect approach in warfare and in its dealings with other nations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Seasons of Change
The Arab Spring is an event that has radically shifted the geopolitical landscape in one of the most volatile regions of the world. Many experts and policy makers were caught off guard by the speed and organizational ability of disparate citizens that orchestrated and executed these revolutions. As the dust settles and the United States begins to reassess the new environment, this monograph asserts that certain indicators can assist planners in predicting both the nature of potential revolutions and the likelihood of stability following revolutions in North Africa and the Middle East. The purpose of this monograph is to analyze which variables played a significant role in the nature of the Arab Spring revolutions. This study hypothesizes that the civil-military relationship in the affected countries is that primary variable. This monograph uses the case study method by analyzing civil-military relationships, economics, and political pluralism in Tunisia, Egypt and Libya. In conclusion, the constant indicator for less violent revolutions, as well as the attainment of revolutionary goals, was a universally accepted civil-military relationship. The findings of this monograph support the hypothesis of the primary impact that the civil-military relationships had in the affected countries. Each of the countries had disparate economic conditions as well as vastly different levels of political pluralism amongst their populations. These findings do not support a uniform grievance of the people, be economic or in the form of civil society enfranchisement and these variables offer little in future analysis of potential problem areas for military planners. However, the data clearly demonstrated that the civil-military relationship amongst the elites, the military, and the population was a reliable indicator as to the nature and violence level that would be characteristic of each revolution. This monograph also provides a framework for planners to approach potentially unstableThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Relevance of the Open Skies Treaty Program in the Twenty-First Century
The Open Skies Treaty allows any signatory nation to fly specifically equipped reconnaissance aircraft anywhere over the territory of any other signatory nation. With its history stemming from the 1950s, all the way through its revival in 1989 and continuation today, the Open Skies Treaty has always been aimed at improving international relations. Whether it was arms control verification, as it was in the beginning, or openness and transparency, as it is today, the ultimate goal was to build confidence between nations. Now that the Treaty has been in force for six years, with positive outcomes for every nation involved, a look at what the future holds for the Treaty is in order. This paper will present the key historical facts involving the Open Skies Treaty and prove that it is still relevant in the twenty-first century, as well as make recommendations for the future of the program and usage in non-traditional roles.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Armed With Information
In light of the pervasive nature of real-time global news, the perceptions as delivered via the media and other emerging communication mediums are increasingly influencing foreign and domestic public opinion and the policymaking process.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Turkey and European Union Relations
The European Union is undoubtedly one of the major success stories to emerge from a violent century which saw millions of Europeans lose their lives in hostilities and conflict. The December 1999 European Council Meeting in Helsinki marked an uplifting ends to such a century. It not only set a vision for the future of the old continent in the new millennium. It also repositioned the horizons of Europe. The Helsinki Summit established the EU's ultimate southeastern borders will be with Syria, Iraq and Iran. Turkey's inclusion in the EU's enlargement thus has both a regional and global significance. The role it played in the Kosova Crisis underlined its importance to the EU in the Balkans. Turkey is equally important where the EU's reach to Eurasia and Middle East is concerned. Dr. Romano Prodi, the Commission President, has described the Helsinki Council as launching a "New European Order" to embrace "all of us the EU, the applicant countries and our neighbors in a wider Europe." In Turkey too, Helsinki has been hailed as a landmark event, both for the revival it gave to Turkish-EU relations and for launching the process leading to Turkey's eventual full membership of the EU. For Turkey, acceptance of its candidacy is a natural response to the sacrifices it made throughout the Cold War period. As the only NATO member with a land border with the Soviet Union, it bore a heavy share of the Alliance's burden. It finds it fitting that, having contributed to the creation of the new Europe, it should also be part of this Europe.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Security Force Assistance
The United States Military conducted numerous attempts to train Foreign Security Forces over the past 100 years. From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S. advisory missions in the Philippines, Vietnam and El Salvador contained positive elements, but none of these past operations contained the necessary framework to organize, train, equip, rebuild, and advise foreign security forces. As a result, the programs were haphazard at best, resulting in both the loss of national resources and delays in achieving foreign policy goals. Even today, when in conjunction with National Strategic Objectives, the United States Government has developed a host of programs to assist a host nation in bolstering their security forces, none of these programs has adequately addressed the threats found in the contemporary operating environment. The contemporary operating environment requires a more comprehensive framework to develop foreign security forces in conjunction with a host-nation. Rogue states, non-state actors, super empowered individuals, trans-national terrorist organizations, religious and ethnic strife, and disenfranchised elements of society all contribute to the difficulties of developing a functional and effective native security force. Today's security forces must possess the capability to defend their nation from both external and internal threats. While the United States Government has some programs available to assist in the security development of other nations, none address the multitude of problems common today. Additionally, the lack of a concise doctrine applicable for general purpose forces greatly hindered past security force assistance missions and remains the biggest obstacle to future mission success.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A More Active Neutrality
The United States has multiple discernable, but often times conflicting, interests in Asia. Focusing on the South China Sea territorial disputes, these conflicting interests become very clear and the importance of a coherent, long-term policy even clearer. First, the U.S. needs to promote peace in the region, ensuring access to commercial shipping upon which its allies in Northeast Asia depend, and affording passage for U.S. military deployments to the region and beyond. Next, the U.S. has strong interests in bolstering the security of its treaty partners in the region, such as the Republic of the Philippines. Finally, the U.S. needs to continue to engage China, to build a positive and productive relationship, and to do what it can to ensure China acts responsibly where its interests overlap those of the U.S.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Understanding the Form, Function, and Logic of Clandestine Cellular Networks
Since the events of September 11, 2001 the United States military counternetwork operations, theory, and doctrine have failed to account for the form, function, and logic of clandestine cellular networks used by both interstate insurgencies, such as those in Iraq and Afghanistan, as well as by global insurgencies, like al Qaeda and its associated movements. The failure to understand the form, function, and logic of clandestine cellular networks has led to the incorrect application of counternetwork theories. Counternetwork operations specifically targeting key leaders, facilitators, individuals with special skills, or highly connected individuals, intuitively seem to be the correct targets for disconnecting clandestine cellular networks. However, there has been little comparative analysis done to verify if these operations are in fact having the overall effect required to disrupt, neutralize, defeat, or ultimately destroy these networks. Understanding the form, function, and logic of clandestine cellular networks reveals that the removal of single individuals, regardless of function, is well within the tolerance of this type of organizational structure and thus has little long-term effect. At the same time, highly connected nodes violate the principles of clandestine operations since they are obviously highly visible when compared to a competent clandestine practitioner that does not want a discernable signature in order to remain hidden from the counterinsurgent. Thus, by focusing on the highly connected individuals as high priority targets, US efforts have effectively "culled the herd" of poor clandestine practitioners. These two examples provide the two most common errors in the current counternetwork theories and operations, and the errors are all due to a lack of a systemic understanding of clandestine cellular networks. This monograph uses a modified process-trace methodology to analyze the form, function, and logic of clandestine cellular networks in order tThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Evolution of the International System
This thesis presents a long-term, multi-disciplinary view of international relations that incorporates realism, liberalism, and constructivism into a distinct new theory. It focuses on the proposal that the international environment is a social system, driven by self-interest characterized by the larger evolutionary process. The analysis argues that human social evolution employs cooperation to fulfill self- interest. As cooperation increases, human social groups self-organize and amalgamate into larger groups and higher-order social constructs, creating the international system. Societies evolve and develop culture specifically to encourage and enforce cooperation. As evidenced by the spread of democracy, societies mimic and copy cultural aspects of more successful societies to reap the benefits of cooperation. Just as social constructs cooperate to meet the needs of the individual, states also cooperate to meet the needs of their own populations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Ensuring Relevancy
The world has changed dramatically since the Washington Treaty of 1949 established the North Atlantic Treaty Organization (NATO). The context of nontraditional threats, operational fatigue, increased membership, and fiscal austerity provides an opportune moment to assess Allied Command Transformation's (ACT) role in supporting Alliance-wide transformation. As one of NATO's two strategic commands, ACT has existed for eight years with the following three strategic goals: provide appropriate support to operations, lead NATO military transformation, and improve relationships, interaction, and practical cooperation with partners. Key successes include improved doctrine, better training methods, positive feedback from operational support, and an enhanced capability development process. Despite these gains, within the context of new threats and constrained resources, there is room for improvement. ACT can demonstrate its relevancy by doing four things. First, ACT should increase cooperation with Allied Command Operations to enhance NATO's mission effectiveness. Second, ACT should champion capability development by promoting interoperability, interdependence, and the comprehensive approach. Third, ACT should continue studying emerging issues like counterterrorism, failed states, global commons, energy, etc. as NATO's military think-tank. Finally, ACT should actively market its products to the nations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
NATO's New Strategic Concept
The evolution of the Strategic Concept, the North Atlantic Treaty Organization's (NATO) blueprint for its approach to the global security environment, has undergone substantial change during the last ten years. These changes reflect the vastly different international world order precipitated by the fall of the Berlin Wall and the collapse of the Soviet Union. The United States, as a member of NATO, has been equally involved with the developments of the post bi-polar world. It has begun to restructure its military in an attempt to better respond to the full-spectrum of conflict and higher tempo of contemporary operations. The potential for complex multinational operations, coupled with the unique military and strategic dynamics found within such an environment, will ultimately demand a higher level of understanding of such operations from members of the United States Army. Using a contemporary analytical strategy to explore the development of NATO's Strategic Concept, coupled with an examination of Army service specific doctrine, this monograph will answer the problem statement of this research: Is the United States Army aware of the operational ramifications contained within NATO's new strategic concept? The most visible evidence of alliance understanding and awareness rests within the cornerstone publications and service doctrine. This monograph concludes that there is insufficient attention paid to alliance and multinational operations within its doctrine and manuals and points to After Action Reviews from Kosovo and Bosnia to support these findings. The extensive experience accumulated by U.S. Army commanders since the signing of the Dayton Peace Accords must be cultivated and ultimately integrated into future doctrine development.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
From Humanitarian Intervention to the Responsibility to Protect
In 1999, NATO engaged in a humanitarian intervention without the authorization of the United Nations Security Council to stop ethnic cleansing by Serbians against ethnic Albanians in Kosovo. While the Serbian campaign against the Kosovars eventually ended, the NATO operation took longer than anticipated, caused hundreds of civilian deaths, and set the conditions that enabled the crisis to become worse before it ended. Following the intervention, the international commission established to review the operation deemed it legal, but unlawful, as it ended the crisis, but did so by the use of armed force against a sovereign state without the consent of the Security Council. In an attempt to reconcile the competing interests of sovereignty and protection of civilians, an international commission proposed the responsibility to protect, which it placed on the pillars of prevention of, reaction to, and rebuilding after crimes against the civilian population. States had the primary responsibility as sovereigns to protect civilians under their power.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
CTSS Transatlantic Perspectives 2
The Center for Transatlantic Security Studies (CTSS) serves as a national and international focal point and resource center for multidisciplinary research on issues relating to transatlantic security. The Center provides recommendations to senior U.S. and international government and North Atlantic Treaty Organization (NATO) officials, publishes its research, and conducts a broad range of outreach activities to inform the broader U.S. national and transatlantic security community.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Theater Ballistic Missile Defense
The proliferation of weapons of mass destruction and the ballistic missiles used to employ them pose the greatest security challenge to the U.S. and her allies. In the past, active defense measures taken to combat the ballistic missile threat were concentrated on launch platform destruction or use of ground-based ballistic missile defense assets. In an era of declining overseas bases, limited strategic lift capability, and the Army and Air Force operating in an expeditionary role, naval forces will usually be the first units to respond to a crisis. Therefore, sea-based ballistic missile defense is a necessity. This paper provides an overview of the Navy's theater ballistic missile defense program. Specifially, it addresses the relationship between ballistic missiles and developing nations. It provides some background on the Joint Ballistic Missile Defense framework and the active defense programs being developed to support that framework. Most of the paper discusses the advantages of sea-based ballistic missile defense along with the Navy's two solutions to the ballistic missile threat, Navy Area Defense and Navy Theater-Wide Defense.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Environmental Security
The objective of this paper is to determine how environmental degradation impacts U.S. National Security by researching the evolution of the concept of environmental security. Research was pursued via Internet and AU Library sources. Significant articles, papers, and books on population impacts, environmental degradation, violent conflict, and environmental security were reviewed and analyzed from 1960 till 1998. In the first chapter, I analyzed the research material investigating the causes and effects of environmental degradation in the 1960s and 1970s, focusing on the impact of population growth. This early material debated the potential, deadly environmental effects, swift decline in living conditions, and violent conflict for scarce renewable and nonrenewable resources that the impending "population bomb" would cause. Chapter Two looks at the growing debate during the 1970s and 1980s on the effects of environmental degradation on ecosystems, and the possible ramifications on international security. The first appearance of the concept of environmental security was seen during this phase. The third chapter deals with the connection between degradation of renewable resources, violent conflict, and environmental security. Finally, the last chapter introduces my conclusions, and gives suggestions for intervention by the U.S., our allies, and the United Nations into environmental security threats in the 21st century.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Eritrean and Ethiopian Conflict and the Impact on United States National Security Interests in the Horn of Africa
The Eritrean and Ethiopian Conflict and the Impact on United States National Security Interests in the Horn of Africa Have you ever wondered why the United States is so interested in resolving other countries' conflicts? Simply put, it affects our way of life. Conflict leads to chaos in the following ways: a democratic government is challenged to maintain its legitimacy, human rights are ignored leading to civil unrest to include refugees, and terrorists groups exploit conflict to recruit jihadists. This paper talks about this chaos and what impact it has on the region and to the United States. The Ethiopian and Eritrean conflict is already creating havoc in both countries and has spread to neighboring countries as well. This conflict can directly impact the United States' national security interests in the region. The United States is undoubtedly concerned with the democratic governance of all countries.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Defense of Taiwan
Recently, due to the growing economic power and political influence of China, many have speculated the threat of Chinese military action towards the reunification of China and Taiwan has diminished. As the largest developing nation in the world, China has sustained a growth rate of 7% or better since 1980.1 According to Richard Bush, Director of the Brookings Institute Northeast Asia Policy Studies, Taiwanese and Chinese economies are intertwined and becoming more so each day with Taiwanese products manufactured in China maintaining Taiwanese profitability while supporting Chinese industry.2 Indeed, the growing economic interdependence of the two governments substantially supports the premise of a peaceful resolution. Additionally, the People's Republic of China (PRC) evolution as an emerging world superpower dictates responsible behavior including supporting a peaceful solution to the "Taiwan issue." In April 2004, during his testimony to the U.S. House International Relations Committee, James A. Kelly, Assistant Secretary of State for East Asian and Pacific Affairs commented, "China would gain nothing from a conflict. It would undermine a historic transformation through which China has become a respected member of the international community."3 Yet, for the PRC, control of Taiwan runs deeper than mere economics.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Turkmenistan and Central Asia After Niyazov
President Sapirmurat Niyazov, the all-powerful leader of Turkmenistan, suddenly died on December 21, 2006. Because Central Asia is a cockpit of great power rivalry and a potential theater in the Global War on Terrorism, no sooner had Niyazov died than the great powers were all in Turkmenistan seeking to influence its future policies away from the neutrality that had been Niyazov's policy. Turkmenistan's importance lies almost exclusively in its large natural gas holdings and proximity to the Caspian Sea and Iran. Because energy is regarded as a strategic asset as much if not more than as a mere lubricant or commodity, Russia, Iran, China, and the United States have all been visibly engaged in competition for influence there. The outcome of this competition and of the domestic struggle for power will have repercussions throughout Central Asia, if not beyond. The author shows the linkage between energy and security policies in Central Asia and in the policies of the major powers towards Central Asia. Beyond this analysis, he provides recommendations for U.S. policymakers as to how they should conduct themselves in this complex situation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The China Syndrome in Latin America
Since the Monroe Doctrine of 1823, the US has regarded the Western Hemisphere as its own domain. Until the early 21st Century, Latin America was a low priority for China, which viewed the region as too geographically remote to be relevant to the international relationships that preoccupied China. Yet in just the past decade, the Chinese are winning over the hearts and minds of citizens of Latin American countries. Increased Chinese involvement in Latin America is undermining US hegemony, foreign policy and security concerns in the region by promoting better diplomatic relations, economic ties, trade, and military interoperability between China and Latin America. China's interest in Latin America is focused on two key areas; trade for raw materials and diplomatic relations to isolate Taiwan.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Erosion of US Nuclear Deterrence Credibility in the 21st Century
The US maintains nuclear weapons to 'deter, dissuade, and defeat' a range of immediate and potential conventional, nuclear, chemical, and biological weapons threats. No other weapon matches its physical and psychological power. While their emphasis in the US national security strategy has diminished since the end of the Cold War, nuclear weapons continue to serve as the ultimate deterrent. Looking forward, shifts in the strategic landscape are calling into question the value of nuclear weapons. Technology continues to advance exponentially, multiplying the number of threats and creating new domains such as cyberspace. When combined with political and social changes driven by globalization, the international relations system has become more complex by shifting the power balance between states; empowering small groups and individuals; and giving rise to new conceptions of conflict such as hybrid warfare.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The North Korean Ballistic Missile Program
North Korea's nuclear weapons and ballistic missile programs have drawn international attention for years. In the early 1960s, Pyongyang began to pursue the capability to produce advanced weapons systems, including rockets and missiles. However, foreign assistance and technology, particularly from China and the Soviet Union, were instrumental in the acquisition of these capabilities. The ballistic missile inventory now totals about 800 road-mobile missiles, including about 200 Nodong missiles that could strike Japan. In April 2007, North Korea for the first time displayed two new missiles: a short-range tactical missile that poses a threat to Seoul and U.S. Forces in South Korea, and an intermediate-range missile that could potentially strike Guam. Although North Korea has not demonstrated the ability to produce a nuclear warhead package for its missiles, its missiles are believed to be capable of delivering chemical and possibly biological munitions. North Korean media and government officials claim the country needs a nuclear deterrent to cope with the "hostile policy of the United States," but Pyongyang has never officially abandoned its objective of "completing the revolution in the south." Little is known about North Korean military doctrine and the role of its ballistic missiles, but National Defense Commission Chairman Kim Ch?ng-il has ultimate authority over their disposition.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
String of Pearls
China's rising maritime power is encountering American maritime power along the sea lines of communication (SLOCs) that connect China to vital energy resources in the Middle East and Africa. The String of Pearls describes the manifestation of China's rising geopolitical influence through efforts to increase access to ports and airfields, develop special diplomatic relationships, and modernize military forces that extend from the South China Sea through the Strait of Malacca, across the Indian Ocean, and on to the Arabian Gulf. A question posed by the String of Pearls is the uncertainty of whether China's growing influence is in accordance with Beijing's stated policy of peaceful development, or if China will one day make a bid for regional primacy. This is a complex strategic situation that could determine the future direction of U.S.-China relations. The purpose of this paper is to analyze the String of Pearls from within the context of the post-Cold War global security environment and propose informed recommendations for U.S. policy and strategy. Substantive, results-oriented engagement supported by pragmatic military hedging is the best strategy to influence and encourage China to participate in the international community as a responsible stakeholder. Bold leadership and prudent foresight will enable the United States and China to reap the rewards of strategic cooperation and avert the calamity of a hostile confrontation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
String of Pearls
China's rising maritime power is encountering American maritime power along the sea lines of communication (SLOCs) that connect China to vital energy resources in the Middle East and Africa. The "String of Pearls" describes the manifestation of China's rising geopolitical influence through efforts to increase access to ports and airfields, develop special diplomatic relationships, and modernize military forces that extend from the South China Sea through the Strait of Malacca, across the Indian Ocean, and on to the Arabian Gulf. A question posed by the "String of Pearls" is the uncertainty of whether China's growing influence is in accordance with Beijing's stated policy of "peaceful development," or if China one day will make a bid for regional primacy. This is a complex strategic situation that could determine the future direction of the China's relationship with the United States, as well as China's relationship with neighbors throughout the region. The purpose of this paper is to analyze the "String of Pearls" from within the context of the post-Cold War global security environment and propose informed recommendations for U.S. policy and strategy. Substantive, results-oriented engagement supported by pragmatic military hedging is the best strategy to influence and encourage China to participate in the international community as a responsible stakeholder. Bold leadership and prudent foresight will enable the United States and China to reap the rewards of strategic cooperation and avert the calamity of a hostile confrontation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Vetting the Forces We Train
The trainers and advisors of foreign forces routinely face the infiltration of insurgents and terrorists into security forces and must assist in removing those that are already operating from within these organizations. Using techniques employed by the British military and by civilian companies coupled with emerging techniques in biometrics and micro-expressions, military trainers in Iraq can adapt simple methods that will reduce the number of insurgents and terrorists operating in the Iraqi Security Forces and similar forces trained by the U.S. in the future. The method used to conduct this research included case studies of the Malayan Emergency, the civilian hiring and firing process, and the domestic police force use of micro expressions. The British experience during the Malaya Emergency demonstrated the use of wholesale firings of large numbers of security forces, transition programs, ethnic group incorporation, and high pay and benefits. The civilian sector also fires criminal employees. To do this, they normally conduct a detailed internal investigation. Civilian companies maintain good performance by providing feedback on the effects of the employee's performance, by retraining on little used tasks, and by changing the outcome for an employee if he or she attains the employers outcome. Biometrics provide a technological edge for improving vetting, but caution should be used to prevent future technologically empowered sectarian violence. Finally, micro expressions, the study of tiny facial movements, empower civilian police agencies and the FBI during interrogations by providing clues to potential lies and the emotions of suspects.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Prompt Global Strikes Through Space
The Air Force and U.S. Space Command have long-range plans to demonstrate the technologies necessary to execute prompt global strikes with precision conventional weapons through space launched from the U.S. homeland to any point on the globe in 90 minutes or less. While the Space Operations Vehicle concept is the postulated delivery vehicle early in the 2010 decade, long-range conventional ballistic missiles could provide an initial capability as early as 2005. In light of the potentially aggressive use of weapons of mass destruction by rogue adversaries in future wars, this paper explores the potential benefits and drawbacks of a capability to conduct prompt global strikes through space with conventional ballistic missiles and the Space Operations Vehicle. Political and military factors involved in the strategic decision to acquire, deploy, and employ such a capability are also examined, with emphasis on the Air Force's role.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Requirements and Challenges Facing the NATO Intelligence Fusion Center
Since September 11, 2001, both the United States (US) and North Atlantic Treaty Organization (NATO) have undergone transformation to improve intelligence collection, analysis, production and dissemination in support of the Global War on Terrorism (GWOT). The Intelligence Reform and Terrorism Prevention Act passed by Congress in 2004 provided guidance to the US Intelligence Community on the establishment of an integrated intelligence network.1 Similarly, NATO's Allied Command Transformation (ACT) determined that NATO's intelligence architecture must transform to meet future operational intelligence needs and proposed establishment of the NATO Intelligence Fusion Center (IFC). Officially opened by NATO on October 16, 2006, the IFC's ultimate goal is to provide a mechanism by which NATO's 26 member states can collaboratively develop and share information and intelligence in support of the common goal of winning the GWOT and promoting global peace and stability. NATO intends for the IFC "to provide the full spectrum of military production and analysis at the operational level." 2 Support to NATO's International Security Assistance Force (ISAF) in Afghanistan will be the IFC's first major test.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Coercing Iran
Iran's nuclear ambitions, rhetoric against Israel, and terrorism links make it a prime target of multiple US administrations. Marked as member of the Axis of Evil, Iran holds much political and religious influence in the Middle East. With its interest in becoming a regional power, Iran has assumed a strong defensive posture and is working to protect itself and its interests from US interference and hegemony in the region. Western powers appear to know very little about Iran culture and history and understand even less about the decision-making processes of an Islamic government.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Roles and Functions of Fire Support in Peace Operations
The collective security environment has changed dramatically in recent years. Ethnic conflict, traditional rivalries and religious disputes have increased the scope and frequency of peace operations for military forces. Instability is now the 'norm' which characterizes nearly all peace operations environments. UN and US forces are ostensibly committed to peace operations on a continual basis and must, therefore, extract the maximum contribution for each component element. Versatile application of all capabilities within the fire support Battle Operating System (BOS) will enhance the peace force's ability to implement the political mandate. This monograph analyzes the potential roles and functions for the fire support BOS during the conduct of peace operations. Recent peace operations suggest five methods that fire support can be used during peace operations: conventional use for force protection; psychological intimidation; command and control; agreement compliance; and other specified collateral missions. The four most recent peace operations involving significant US participation form the database for the analysis. Additionally, combat training center results from the limited number of peace operation rotations conducted form a fifth case study. This study concludes that there are important roles and functions for the fire support battle operating system during peace operations. Historical evidence supports each of the five categories of roles and functions proposed. Of these roles, force protection remains the highest priority for fire support use. Fire support units and elements are also well-designed for non-traditional missions common during peace operations. However, regardless of the role or function performed, fire support involvement in peace operations requires updated doctrine and a focused training approach. The complexity of even "simple" missions during peace operations demands comprehensive training in joint operations. "Skills fade" must also be guThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
New Great Game
This monograph focuses on a region of geopolitical and strategic importance to the United States. The region of Central Asia comprises five countries; Kazakhstan, Turkmenistan, Uzbekistan, Tajikistan, and Kyrgyzstan. Historically, this area of the Asian continent was the "mid-point" on the fabled Silk Road trade route between the East and the West. By 21st Century standards, the region straddles the Asian continent at its mid-point, between east and west - China and Europe and in particular Russia. Following the terror attacks on September 11, 2001 on the United States, Central Asia took on renewed strategic importance. Finally, proximity to the Taliban regime in Afghanistan necessitated staging bases and support structures to support coalition force combat operations as part of Operation Enduring Freedom. Following the collapse and break-up of the Soviet Union, the United States quickly recognized and then established diplomatic relations with the five newly independent Central Asian republics. Initial engagement was bilateral and mainly economic, based on development of energy resources and infrastructure to export energy resources to the west. Five years into the War on Terror, the United States continues to engage with the individual Central Asian nations on a bilateral basis. This methodology of engagement does not take into account the new and shared global realities of the 21st Century, nor common interest shared with the major powers that border the region, Russia and China. This monograph proposes a new approach, a Phase 0 (Zero, based on current joint doctrine) regional engagement framework based on the instruments of national power as addressed in the National Military Strategic Plan for the War on Terrorism. Also recommended are statutory changes to align resources and the regions of responsibility between U.S. governmental agencies, in particular Department of State and Department of Defense that support the directives contained in National Security PrThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Alliances and American National Security
One of the greatest challenges facing the United States today is the translation of its overwhelming might into effective influence. Traditionally, the United States has leveraged its power through bilateral and multilateral alliances. However, the end of the Cold War and the events of September 11, 2001, have led some policymakers and analysts to question the value of alliances in American foreign and defense policy. This monograph advocates that allies are more important than ever to the achievement of U.S. national security goals.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Surrogate Warfare for the 21st Century
This monograph seeks to determine the adequacy of national security strategies, policies, and doctrine for the use of surrogate forces in pursuit of U.S. strategic objectives. The insufficiency in the current guidance for waging warfare by, with, and through surrogate forces requires development of an updated approach to maximize the strategic options available to the United States. The methodology of this paper is to review the role of strategy, policy, and doctrine in light of the existing definitions relevant to the use of foreign forces in U.S. operations. This leads to a more detailed review of foreign internal defense (FID) and unconventional warfare (UW) doctrine. This doctrinal guidance is compared to the contemporary operations involving surrogate forces. A comprehensive concept for surrogate warfare is proposed as a more effective way to conduct operations with foreign partners of all types. The current tendency to categorize warfare as regular versus irregular, or conventional versus unconventional is of little value in developing guidance for U.S. military operations involving surrogate forces. Surrogate warfare provides a framework that encompasses all U.S. operations that involve non-U.S. forces. This framework also provides an analysis of the surrogate warfare environment to determine the appropriate role of both conventional and special operations forces in conducting surrogate warfare operations. The 21st Century operating environment will present diverse threats and increasingly complex strategic situations. A more effective use of surrogate forces greatly enhances both the capability and the capacity of the United States to protect its interests in this demanding environment.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Weakness of the Treaty on the Nonproliferation of Nuclear Weapons and Recommendations for Change
The end of World War II was the dawn of a new age, the nuclear age. The destructive power delivered by America upon Japan successfully brought an end to the Pacific campaign but a beginning to nuclear power and nations seeking it. Technological advances and the ability to harness nuclear energy spurred a new industry and a global desire for it. The ability to export such an advanced technology and potentially dangerous capability created serious international security concerns. Controlling fissile material and the technology for proliferation became the job of the Nuclear Nonproliferation Treaty (NPT) (full treaty in Appendix B). Despite valiant efforts of the treaty and numerous other checks and balances put in place, there currently exists a present danger of nuclear proliferation to terrorist organizations and rogue states.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Rise Of The Mexican Drug Cartels And U.S. National Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Test of Strength
This study comprises an analysis of the German nuclear policy and encompasses two major aspects. First, an attempt to explain Germany's reluctance towards nuclear weapons, and secondly, an analysis of the implications of the findings for Germany's nuclear posture in the future. The research begins with a look at Germany's recent history following WWII with particular emphasis on its politics and nuclear ambitions. The historic part is separated into three chapters, the phase when Germany was disarmed and carefully began to regain signs of political life, followed by the struggle to rearm, and finally Germany's way into the Western Alliance. The underlying argument points out the German government's persistent strife for nuclear ownership in order to regain political status beyond its initial goal of national sovereignty and reunification. Watching its neighbors gaining prestige and status through their independent nuclear weapons program the young Republic undertook several attempts to gain control over those weapons, but ultimately failed. As will be pointed out during this study, the German population did not entirely share its government's enthusiasm for nuclear weapons. This fact was never sufficiently appreciated by the authorities hence protests accompanied the political decision-making process from the start.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
La Familia Drug Cartel
La Familia Michoacana burst onto the national stage on September 6, 2006, when ruffians crashed into the seedy Sol y Sombra nightclub in Uruapan, Michoac獺n, and fired shots into the air. They screamed at the revelers to lie down, ripped open a plastic bag, and lobbed five human heads onto the beer-stained black and white dance floor. The day before these macabre pyrotechnics, the killers seized their prey from a mechanic's shop and hacked off their heads with bowie knives while the men writhed in pain. "You don't do something like that unless you want to send a big message," said a U.S. law-enforcement official, speaking on condition of anonymity about an act of human depravity that would "cast a pall over the darkest nooks of hell." The desperados left behind a note hailing their act as "divine justice," adding that: "The Family doesn't kill for money; it doesn't kill women; it doesn't kill innocent people; only those who deserve to die, die. Everyone should know . . . this is divine justice." While claiming to do the "Lord's work," the ruthless leaders of this syndicate have emerged as the dominant exporter of methamphetamines to the United States, even as they control scores of municipalities in Michoac獺n and neighboring states.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
CSWMD Case Study Series 5
Since its inception in 1994, the Center for the Study of Weapons of Mass Destruction (WMD Center) has been at the forefront of research on the implications of weapons of mass destruction for U.S. security. Originally focusing on threats to the military, the WMD Center now also applies its expertise and body of research to the challenges of homeland security. The center's mandate includes research, education, and outreach. Research focuses on understanding the security challenges posed by WMD and on fashioning effective responses thereto.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Turkmenistan and Central Asia After Niyazov
President Sapirmurat Niyazov, the all-powerful leader of Turkmenistan, suddenly died on December 21, 2006. Because Central Asia is a cockpit of great power rivalry and a potential theater in the Global War on Terrorism, no sooner had Niyazov died than the great powers were all in Turkmenistan seeking to influence its future policies away from the neutrality that had been Niyazov's policy. Turkmenistan's importance lies almost exclusively in its large natural gas holdings and proximity to the Caspian Sea and Iran. Because energy is regarded as a strategic asset as much if not more than as a mere lubricant or commodity, Russia, Iran, China, and the United States have all been visibly engaged in competition for influence there. The outcome of this competition and of the domestic struggle for power will have repercussions throughout Central Asia, if not beyond. The author shows the linkage between energy and security policies in Central Asia and in the policies of the major powers towards Central Asia. Beyond this analysis, he provides recommendations for U.S. policymakers as to how they should conduct themselves in this complex situation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
INSS China Strategic Perspectives 4
The Institute for National Strategic Studies (INSS) is National Defense University's (NDU's) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Dilemmas of Brazilian Grand Strategy
This monograph analyzes Brazilian grand strategy under President Luiz In獺cio Lula da Silva. During Lula's nearly 8 years in office, he has pursued a multi-tiered grand strategy aimed at hastening the transition from unipolarity to a multipolar order in which international rules, norms, and institutions are more favorable to Brazilian interests. Lula has done so by emphasizing three diplomatic strategies: soft-balancing, coalition-building, and seeking to position Brazil as the leader of a more united South America. This strategy has successfully raised Brazil's profile and increased its diplomatic flexibility, but it has also exposed the country to four potent strategic dilemmas that could complicate or undermine its ascent. These dilemmas touch on issues ranging from anemic macroeconomic performance to rising tensions in Brazil's relationship with the United States. In the future, the efficacy of Brazilian grand strategy-and its implications for U.S. interests and the global system-will be contingent on how Lula's successors address these dilemmas.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Security Force Assistance
The United States Military conducted numerous attempts to train Foreign Security Forces over the past 100 years. From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S. advisory missions in the Philippines, Vietnam and El Salvador contained positive elements, but none of these past operations contained the necessary framework to organize, train, equip, rebuild, and advise foreign security forces. As a result, the programs were haphazard at best, resulting in both the loss of national resources and delays in achieving foreign policy goals. Even today, when in conjunction with National Strategic Objectives, the United States Government has developed a host of programs to assist a host nation in bolstering their security forces, none of these programs has adequately addressed the threats found in the contemporary operating environment. The contemporary operating environment requires a more comprehensive framework to develop foreign security forces in conjunction with a host-nation. Rogue states, non-state actors, super empowered individuals, trans-national terrorist organizations, religious and ethnic strife, and disenfranchised elements of society all contribute to the difficulties of developing a functional and effective native security force. Today's security forces must possess the capability to defend their nation from both external and internal threats. While the United States Government has some programs available to assist in the security development of other nations, none address the multitude of problems common today. Additionally, the lack of a concise doctrine applicable for general purpose forces greatly hindered past security force assistance missions and remains the biggest obstacle to future mission success.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.