Role of the National Guard in Homeland Security
The purpose of this monograph is to determine what role the National Guard should perform in homeland security. The establishment of the Department of Homeland Security and the United States Northern Command has created new organizations to assist in homeland security, but neither has fully integrated the National Guard into it planning or fully assessed its capabilities. This topic is particularly pertinent after the attacks on 11 September 2001, and the aftermath of Hurricane Katrina. Both events exposed flaws in the planning and execution in the use of the National Guard for homeland operations. While organizational and legal changes have been made at the federal and state levels, there are still questions as to the role of the National Guard in homeland security. This monograph will evaluate the National Guard's possible integration in the context of the Department of Defense's contribution to homeland security: military missions overseas, homeland defense, and support to civil authorities. The evaluation will include the National Guard's unique legal capabilities in the military, its organization and relationship to the local populace, and its historical use in homeland security and as a reserve component of the military. The conclusion is that the National Guard's history, legal capabilities, and inherent ties with the local and state communities and government poise the National Guard to be the country's primary homeland security force. In order to enhance its capabilities, the National Guard Bureau must be integrated into both the United States Northern Command and the Department of Homeland Security and planning considerations must be discussed with governors and state National Guard officials, unity of command and unity of effort must be deconflicted during homeland operations, and mobilized National Guard units operating within the United States must not be federalized in order to ensure that it can still perform law enforcement operations while mobilizeThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Prompt Global Strikes Through Space
The Air Force and U.S. Space Command have long-range plans to demonstrate the technologies necessary to execute prompt global strikes with precision conventional weapons through space launched from the U.S. homeland to any point on the globe in 90 minutes or less. While the Space Operations Vehicle concept is the postulated delivery vehicle early in the 2010 decade, long-range conventional ballistic missiles could provide an initial capability as early as 2005. In light of the potentially aggressive use of weapons of mass destruction by rogue adversaries in future wars, this paper explores the potential benefits and drawbacks of a capability to conduct prompt global strikes through space with conventional ballistic missiles and the Space Operations Vehicle. Political and military factors involved in the strategic decision to acquire, deploy, and employ such a capability are also examined, with emphasis on the Air Force's role.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Saudi-Iranian Rivalry and the Future of Middle East Security
Saudi Arabia and Iran have often behaved as serious rivals for influence in the Middle East and especially the Gulf area since at least Iran's 1979 Islamic Revolution and the 1980-88 Iran-Iraq War. While both nations define themselves as Islamic, the differences between their foreign policies could hardly be more dramatic. In most respects, Saudi Arabia is a regional status quo power, while Iran often seeks revolutionary change throughout the Gulf area and the wider Middle East with varying degrees of intensity. Saudi Arabia also has strong ties with Western nations, while Iran views the United States as its most dangerous enemy. Perhaps the most important difference between the two nations is that Saudi Arabia is a conservative Sunni Muslim Arab state, while Iran is a Shi'ite state whose senior politicians often view their country as the defender and natural leader of Shi'ites throughout the region. The rivalry between Riyadh and Tehran has been reflected in the politics of a number of regional states where these two powers exercise influence including Iraq, Lebanon, Syria, Egypt, Bahrain and others. The 2011 wave of pro-democracy and anti-regime protests known as the "Arab Spring" introduced new concerns for both Saudi Arabia and Iran to consider within the framework of their regional priorities. The Saudi-Iranian rivalry is therefore likely to intensify as a central feature in the Middle Eastern security landscape that reaches into both the Gulf region and the Arab-Israeli theater. This is a reality that will touch upon the interests of the United States in a number of situations. In many instances, Saudi opposition to Iran will serve U.S. interests, but this will not occur under all circumstances. Saudi Arabia remains a deeply anti-revolutionary state with values and priorities which sometimes overlap with those of Washington on matters of strategic interest and often conflict over matters of reform and democracy for other Middle Eastern states. Additionally, in seeking to support Middle Eastern stability, the United States must be prepared to mediate between Riyadh and Baghdad, and thereby help to limit Iranian efforts to insert itself into Iraqi politics.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Requirements and Challenges Facing the NATO Intelligence Fusion Center
Since September 11, 2001, both the United States (US) and North Atlantic Treaty Organization (NATO) have undergone transformation to improve intelligence collection, analysis, production and dissemination in support of the Global War on Terrorism (GWOT). The Intelligence Reform and Terrorism Prevention Act passed by Congress in 2004 provided guidance to the US Intelligence Community on the establishment of an integrated intelligence network.1 Similarly, NATO's Allied Command Transformation (ACT) determined that NATO's intelligence architecture must transform to meet future operational intelligence needs and proposed establishment of the NATO Intelligence Fusion Center (IFC). Officially opened by NATO on October 16, 2006, the IFC's ultimate goal is to provide a mechanism by which NATO's 26 member states can collaboratively develop and share information and intelligence in support of the common goal of winning the GWOT and promoting global peace and stability. NATO intends for the IFC "to provide the full spectrum of military production and analysis at the operational level." 2 Support to NATO's International Security Assistance Force (ISAF) in Afghanistan will be the IFC's first major test.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Relevance of the Open Skies Treaty Program in the Twenty-First Century
The Open Skies Treaty allows any signatory nation to fly specifically equipped reconnaissance aircraft anywhere over the territory of any other signatory nation. With its history stemming from the 1950s, all the way through its revival in 1989 and continuation today, the Open Skies Treaty has always been aimed at improving international relations. Whether it was arms control verification, as it was in the beginning, or openness and transparency, as it is today, the ultimate goal was to build confidence between nations. Now that the Treaty has been in force for six years, with positive outcomes for every nation involved, a look at what the future holds for the Treaty is in order. This paper will present the key historical facts involving the Open Skies Treaty and prove that it is still relevant in the twenty-first century, as well as make recommendations for the future of the program and usage in non-traditional roles.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Third Temple's Holy of Holies
This paper is a history of the Israeli nuclear weapons program drawn from a review of unclassified sources. Israel began its search for nuclear weapons at the inception of the state in 1948. As payment for Israeli participation in the Suez Crisis of 1956, France provided nuclear expertise and constructed a reactor complex for Israel at Dimona capable of large-scale plutonium production and reprocessing. The United States discovered the facility by 1958 and it was a subject of continual discussions between American presidents and Israeli prime ministers. Israel used delay and deception to at first keep the United States at bay, and later used the nuclear option as a bargaining chip for a consistent American conventional arms supply. After French disengagement in the early 1960s, Israel progressed on its own, including through several covert operations, to project completion. Before the 1967 Six-Day War, they felt their nuclear facility threatened and reportedly assembled several nuclear devices. By the 1973 Yom Kippur War Israel had a number of sophisticated nuclear bombs, deployed them, and considered using them. The Arabs may have limited their war aims because of their knowledge of the Israeli nuclear weapons. Israel has most probably conducted several nuclear bomb tests. They have continued to modernize and vertically proliferate and are now one of the world's larger nuclear powers. Using "bomb in the basement" nuclear opacity, Israel has been able to use its arsenal as a deterrent to the Arab world while not technically violating American nonproliferation requirements.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Chinese Ambition
The Concept of this paper is to identify, analyze, and evaluate China's strategic ambition and national interests, and to generally understand China's regional position in Asia with specific regard to South Asia. China's place in world affairs has been a hot topic of the world's political scientist, statesmen, politicians, and military leaders. China's future, its growth, and its position as a world power are of great interest to China's neighbor states, the developed world, and especially the United States. The birth of Chinese leadership and of Chinese nation building was begun during the Spring and Autumn period (770 BC) and has grown with patience and revolution into the Communist era of today. China's national strategy and use of their instruments of power (IOP) in the past and present can be used to determine how China will implement their IOP's in the future. China's national and International relations agenda, issues, and interest reflect an aggressive and forceful state policy of engagement with most of the world while containing perceived US hegemony. The Chinese have opposed hegemonic activity in Asia by opposing the influence of the Soviet Union in South and Southeast Asia, and as well opposed the growth in strength of a regional challenger in India. The Chinese have supported Pakistan for the past 30 years as a testimony to how determined and patience the Chinese are in attaining their national objectives. China has launched a campaign of modernization, peace and stability through sovereignty and security. China is in the process of rebuilding its armed forces and its economy through slow growth and transformation, and at the same time China has claimed territories lost during the Qing Dynasty as well as territories that encompass the East and South China Sea's. China, in its opposition to perceived US hegemonism, has begun an asymmetric assault on US interest around the world and in the US.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Roles and Functions of Fire Support in Peace Operations
The collective security environment has changed dramatically in recent years. Ethnic conflict, traditional rivalries and religious disputes have increased the scope and frequency of peace operations for military forces. Instability is now the 'norm' which characterizes nearly all peace operations environments. UN and US forces are ostensibly committed to peace operations on a continual basis and must, therefore, extract the maximum contribution for each component element. Versatile application of all capabilities within the fire support Battle Operating System (BOS) will enhance the peace force's ability to implement the political mandate. This monograph analyzes the potential roles and functions for the fire support BOS during the conduct of peace operations. Recent peace operations suggest five methods that fire support can be used during peace operations: conventional use for force protection; psychological intimidation; command and control; agreement compliance; and other specified collateral missions. The four most recent peace operations involving significant US participation form the database for the analysis. Additionally, combat training center results from the limited number of peace operation rotations conducted form a fifth case study. This study concludes that there are important roles and functions for the fire support battle operating system during peace operations. Historical evidence supports each of the five categories of roles and functions proposed. Of these roles, force protection remains the highest priority for fire support use. Fire support units and elements are also well-designed for non-traditional missions common during peace operations. However, regardless of the role or function performed, fire support involvement in peace operations requires updated doctrine and a focused training approach. The complexity of even "simple" missions during peace operations demands comprehensive training in joint operations. "Skills fade" must also be guThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Maximizing Deterrence With Respect to a Nuclear Weapons Capable Iran
This study addresses U.S. policy options to maximize deterrence of a nuclear armed Iran. It explores the possible stages of an Iranian nuclear weapons program and lists the desired objectives of U.S. deterrence policy with respect to Iran. It further explores on whom deterrence policies should be focused for maximum effect and what diplomatic, military and economic strategies the U.S. could employ to achieve those objectives. The paper looks at cooperative security agreements in the Persian Gulf region to bolster deterrence and recognizes and explores some limitations and constraints on U.S. policies following Iran's development of nuclear weapons.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Russia, China, and the United States in Central Asia
Russia and China have been reacting to the pressures of changing U.S.-Central Asia policy over the past 5 years as has the United States. In response to the "color" revolutions, they achieved broad agreement on the priority of regime security and the need to limit the long-term military presence of the United States in Central Asia. These are also two key areas-defining the political path of Central Asian states and securing a strategic foothold in the region-where the United States finds itself in competition with Russia and China. The Russia-China partnership should not be seen as an anti-U.S. bloc, nor should the Shanghai Cooperation Organization (SCO) be viewed as entirely cohesive. Although there is considerable suspicion of U.S. designs on Central Asia, divergent interests within the SCO, among Central Asian states, and especially between Russia and China serve to limit any coordinated anti-U.S. activity. Despite the fissures within the SCO and the competitive tendencies within the Sino-Russian partnership, the United States will not have an easy time achieving its aims in Central Asia. The author documents how American policy goals-energy cooperation, regional security, and support for democracy and the rule of law-continue to run at cross-purposes with one another. In particular, she asserts that competition to secure basing arrangements and energy contracts only benefits authoritarian regimes at the expense of enduring regional security. She argues further that the rhetoric about a new Cold War in the aftermath of the Georgian crisis, and the more general tendency to view U.S.-Russia-China competition in the region with 19th century lenses, as some sort of "new great game," obscures the common interests the great powers share in addressing transnational problems in Central Asia.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Ensuring Relevancy
The world has changed dramatically since the Washington Treaty of 1949 established the North Atlantic Treaty Organization (NATO). The context of nontraditional threats, operational fatigue, increased membership, and fiscal austerity provides an opportune moment to assess Allied Command Transformation's (ACT) role in supporting Alliance-wide transformation. As one of NATO's two strategic commands, ACT has existed for eight years with the following three strategic goals: provide appropriate support to operations, lead NATO military transformation, and improve relationships, interaction, and practical cooperation with partners. Key successes include improved doctrine, better training methods, positive feedback from operational support, and an enhanced capability development process. Despite these gains, within the context of new threats and constrained resources, there is room for improvement. ACT can demonstrate its relevancy by doing four things. First, ACT should increase cooperation with Allied Command Operations to enhance NATO's mission effectiveness. Second, ACT should champion capability development by promoting interoperability, interdependence, and the comprehensive approach. Third, ACT should continue studying emerging issues like counterterrorism, failed states, global commons, energy, etc. as NATO's military think-tank. Finally, ACT should actively market its products to the nations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Military Diplomacy
The driving concept behind this monograph is the thesis that not only does the military conduct diplomacy, but military diplomacy, at the combatant command level, provides a theater strategic capability essential to the effective implementation of United States foreign policy. The monograph demonstrates that this capability arises from several organizational advantages. First, the authority vested in the combatant commander facilitates the development, resourcing and execution of military diplomacy programs within a unified chain of command. Second, the combatant command contains a highly capable staff founded on historically proven structures and doctrine. Third, an extensive network of personnel and organizations positioned to coordinate and liaise across multiple levels of authority facilitates the implementation of military diplomacy activities. Finally, an unmatched pool of resources, from which to execute military diplomacy, allows for great flexibility and responsiveness when adjusting to a complex environment. The intended end-state of the monograph is to elicit two primary responses from the reader. First, that indeed the military does conduct diplomacy as part of its day-to day mission set. Second, that military diplomacy is an essential tool in facilitating the achievement of United States strategic foreign policy aims and theater strategic objectives. The analytical methodology required to examine this topic is through qualitative analysis of primary and secondary source information. The theoretical, rather than technical, nature of the topic limits the ability to conduct a purely quantitative analysis. Theoretical and historical references provide the foundation of legitimacy for the monograph. The study of national strategic guidance, United States Pacific Command initiatives and doctrinal information establish the foreign policy development and implementation process of the United States. The examination of expert testimony and contemporary publicatiThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Theater Ballistic Missile Defense
The proliferation of weapons of mass destruction and the ballistic missiles used to employ them pose the greatest security challenge to the U.S. and her allies. In the past, active defense measures taken to combat the ballistic missile threat were concentrated on launch platform destruction or use of ground-based ballistic missile defense assets. In an era of declining overseas bases, limited strategic lift capability, and the Army and Air Force operating in an expeditionary role, naval forces will usually be the first units to respond to a crisis. Therefore, sea-based ballistic missile defense is a necessity. This paper provides an overview of the Navy's theater ballistic missile defense program. Specifially, it addresses the relationship between ballistic missiles and developing nations. It provides some background on the Joint Ballistic Missile Defense framework and the active defense programs being developed to support that framework. Most of the paper discusses the advantages of sea-based ballistic missile defense along with the Navy's two solutions to the ballistic missile threat, Navy Area Defense and Navy Theater-Wide Defense.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Transnational Insurgencies and the Escalation of Regional Conflict
Many insurgents groups benefit from sanctuaries in neighboring countries where they are relatively safe from state security forces. These transnational insurgencies complicate traditional counterinsurgency operations in significant ways. Most importantly, transnational insurgencies have the potential to spark conflicts between neighboring countries. This monograph examines several transnational insurgencies that have been active since the end of the Cold War. While many neighboring countries have experienced the escalation of conflict between them as the result of cross-border violence, other states have successfully cooperated in providing border security. In depth case studies of relations between Rwanda and the Democratic Republic of Congo as well as India and its eastern neighbors are explored. The lessons learned from this research are applied to contemporary issues facing Iraq and Afghanistan.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
United States Military Intelligence Support to Homeland Security
The terrorist attacks of September 11, 2001 identified a need for a better domestic intelligence capability. In order to prevent another attack on the homeland, one must first identify any failures in the current doctrine, theory, and practice regarding intelligence support to homeland security. This involves not only military intelligence, but also the various domestic and international intelligence organizations that maintain some degree of jurisdiction over intelligence collection, analysis, and dissemination. This monograph outlines how the new operational environment, current laws, regulations, and policies effecting domestic intelligence collection, and advocates establishing state level intelligence centers that rely heavily on the Reserve Component and which would enable better intelligence sharing between the law enforcement and intelligence communities at the local level.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Environmental Security
The objective of this paper is to determine how environmental degradation impacts U.S. National Security by researching the evolution of the concept of environmental security. Research was pursued via Internet and AU Library sources. Significant articles, papers, and books on population impacts, environmental degradation, violent conflict, and environmental security were reviewed and analyzed from 1960 till 1998. In the first chapter, I analyzed the research material investigating the causes and effects of environmental degradation in the 1960s and 1970s, focusing on the impact of population growth. This early material debated the potential, deadly environmental effects, swift decline in living conditions, and violent conflict for scarce renewable and nonrenewable resources that the impending "population bomb" would cause. Chapter Two looks at the growing debate during the 1970s and 1980s on the effects of environmental degradation on ecosystems, and the possible ramifications on international security. The first appearance of the concept of environmental security was seen during this phase. The third chapter deals with the connection between degradation of renewable resources, violent conflict, and environmental security. Finally, the last chapter introduces my conclusions, and gives suggestions for intervention by the U.S., our allies, and the United Nations into environmental security threats in the 21st century.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Decade of Venezuela's Hugo Chavez, Por Ahora
This research paper uses an expository methodology to examine the last ten years of Venezuela's Hugo Chavez presidency and the significant aspects in terms of US security. The paper contents highlight some of Chavez's notable changes, impacts on relations with the United States (US) and offers some suggestions for future strategies. The research focused on trying to understand Chavez's background, intentions and relevance through a relatively neutral lens. Despite President Hugo Chavez's anti-American rhetoric, the US has withstood the last ten years without significant security issues or real threats resulting from this ongoing tension. An analysis of Chavez's presidency reveals that Venezuela poses an ongoing challenge that warrants close attention but does not constitute a significant security threat to the United States. This paper addresses the significant aspects of Chavez and the US/Venezuela relationship up to this point in time (March 2009.) The majority of research reflects back over the past decade since December 1998.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
INSS China Strategic Perspectives 5
The Institute for National Strategic Studies (INSS) is National Defense University's (NDU's) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
NATO's New Strategic Concept
The evolution of the Strategic Concept, the North Atlantic Treaty Organization's (NATO) blueprint for its approach to the global security environment, has undergone substantial change during the last ten years. These changes reflect the vastly different international world order precipitated by the fall of the Berlin Wall and the collapse of the Soviet Union. The United States, as a member of NATO, has been equally involved with the developments of the post bi-polar world. It has begun to restructure its military in an attempt to better respond to the full-spectrum of conflict and higher tempo of contemporary operations. The potential for complex multinational operations, coupled with the unique military and strategic dynamics found within such an environment, will ultimately demand a higher level of understanding of such operations from members of the United States Army. Using a contemporary analytical strategy to explore the development of NATO's Strategic Concept, coupled with an examination of Army service specific doctrine, this monograph will answer the problem statement of this research: Is the United States Army aware of the operational ramifications contained within NATO's new strategic concept? The most visible evidence of alliance understanding and awareness rests within the cornerstone publications and service doctrine. This monograph concludes that there is insufficient attention paid to alliance and multinational operations within its doctrine and manuals and points to After Action Reviews from Kosovo and Bosnia to support these findings. The extensive experience accumulated by U.S. Army commanders since the signing of the Dayton Peace Accords must be cultivated and ultimately integrated into future doctrine development.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Functions and Structure of Nuclear Deterrence in the Post-Cold War World
The change reshaping the Soviet Union and other former members of the Communist bloc has also altered the strategic equation for the United States. Given that nuclear weapons and the intense superpower rivalry of 40 years of cold war have helped foster a certain air of predictability in international affairs, the present flux in the international system has created a number of possible security scenarios. The author explores these possibilities as they relate to the strategic future of the Soviet Union, the possible evolution of a new European system of collective security, and the challenges of regional conflict in a multipolar world. Of primary concern is the question of the continued validity of traditional concepts of deterrence in a system characterized by the profusion of advanced military capabilities, which no longer possesses many of the stabilizing strategic counterweights of the cold war.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
From Humanitarian Intervention to the Responsibility to Protect
In 1999, NATO engaged in a humanitarian intervention without the authorization of the United Nations Security Council to stop ethnic cleansing by Serbians against ethnic Albanians in Kosovo. While the Serbian campaign against the Kosovars eventually ended, the NATO operation took longer than anticipated, caused hundreds of civilian deaths, and set the conditions that enabled the crisis to become worse before it ended. Following the intervention, the international commission established to review the operation deemed it legal, but unlawful, as it ended the crisis, but did so by the use of armed force against a sovereign state without the consent of the Security Council. In an attempt to reconcile the competing interests of sovereignty and protection of civilians, an international commission proposed the responsibility to protect, which it placed on the pillars of prevention of, reaction to, and rebuilding after crimes against the civilian population. States had the primary responsibility as sovereigns to protect civilians under their power.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
United States
India is grappling with its current and future geostrategic role, which ranges from acting as a regional security provider in the Indian Ocean Region (IOR), to assuming the role of a world economic and military power. What role India pursues will affect the balance of power in the IOR and the greater Pacific theater, as the United States refocuses towards the Pacific and the Chinese navy deploys with regularity into the IOR to secure access to raw materials. By examining the significant national security events in India's history, from 1947 to the present, and looking at how these events have affected India's perception of itself and the creation of Indian national security strategy, the United States can better understand Indian intentions. The paper discusses some of the challenges inherent with this new strategic relationship between the United States and India and provides recommendations for enhancing the relationship.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Seasons of Change
The Arab Spring is an event that has radically shifted the geopolitical landscape in one of the most volatile regions of the world. Many experts and policy makers were caught off guard by the speed and organizational ability of disparate citizens that orchestrated and executed these revolutions. As the dust settles and the United States begins to reassess the new environment, this monograph asserts that certain indicators can assist planners in predicting both the nature of potential revolutions and the likelihood of stability following revolutions in North Africa and the Middle East. The purpose of this monograph is to analyze which variables played a significant role in the nature of the Arab Spring revolutions. This study hypothesizes that the civil-military relationship in the affected countries is that primary variable. This monograph uses the case study method by analyzing civil-military relationships, economics, and political pluralism in Tunisia, Egypt and Libya. In conclusion, the constant indicator for less violent revolutions, as well as the attainment of revolutionary goals, was a universally accepted civil-military relationship. The findings of this monograph support the hypothesis of the primary impact that the civil-military relationships had in the affected countries. Each of the countries had disparate economic conditions as well as vastly different levels of political pluralism amongst their populations. These findings do not support a uniform grievance of the people, be economic or in the form of civil society enfranchisement and these variables offer little in future analysis of potential problem areas for military planners. However, the data clearly demonstrated that the civil-military relationship amongst the elites, the military, and the population was a reliable indicator as to the nature and violence level that would be characteristic of each revolution. This monograph also provides a framework for planners to approach potentially unstableThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
South Asia in 2020
This volume consists of revised versions of papers presented at conference sponsored by the Asia/Pacific Research Center and the Center for International Security and Cooperation of Stanford University, and the U.S. Army War College's Strategic Studies Institute on January 4-5, 2002. While there are numerous ways to approach the question of "whither South Asia?" the conference organizers decided to focus on the future of strategic balances and alliances in the region, with 2020 as the target date. This choice of topic allowed the conference participants to talk not only about the patterns of amity and enmity within the region, but also about the role of extraregional powers and issues such as social and economic trends, domestic political conditions, strategic culture, and the role of nuclear weapons. These factors can affect the relative power of countries as well as their relations of friendship and hostility.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Turkey and European Union Relations
The European Union is undoubtedly one of the major success stories to emerge from a violent century which saw millions of Europeans lose their lives in hostilities and conflict. The December 1999 European Council Meeting in Helsinki marked an uplifting ends to such a century. It not only set a vision for the future of the old continent in the new millennium. It also repositioned the horizons of Europe. The Helsinki Summit established the EU's ultimate southeastern borders will be with Syria, Iraq and Iran. Turkey's inclusion in the EU's enlargement thus has both a regional and global significance. The role it played in the Kosova Crisis underlined its importance to the EU in the Balkans. Turkey is equally important where the EU's reach to Eurasia and Middle East is concerned. Dr. Romano Prodi, the Commission President, has described the Helsinki Council as launching a "New European Order" to embrace "all of us the EU, the applicant countries and our neighbors in a wider Europe." In Turkey too, Helsinki has been hailed as a landmark event, both for the revival it gave to Turkish-EU relations and for launching the process leading to Turkey's eventual full membership of the EU. For Turkey, acceptance of its candidacy is a natural response to the sacrifices it made throughout the Cold War period. As the only NATO member with a land border with the Soviet Union, it bore a heavy share of the Alliance's burden. It finds it fitting that, having contributed to the creation of the new Europe, it should also be part of this Europe.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Force and Restraint in Strategic Deterrence
A great power's use of its military forces may be rendered ineffective or even counterproductive when there are no clear internationally recognizable limits on this use of force. Professor Myerson derives this conclusion from the basic observation that our ability to influence potential rivals depends on a balanced mix of threats and promises. Potential adversaries should believe that aggression will be punished, but such threats will be useless unless they also believe our promises that good behavior will be better rewarded. A reputation for resolve makes threats credible, but a great power also needs a reputation for restraint, to make the promises credible as well. Thus, international restraints on a nation's use of military force may actually increase the effective influence of its military strength.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Chinese Defense Modernization and the Defense of Taiwan
This thesis analyzes the United States commitment to defend Taiwan from Chinese aggression. Taiwan can gain air superiority over Taiwan and defend itself from an amphibious invasion now, in Standard Form 298 (Rev. 8-98) Page 1 of 2 file: //E: \ffcs_backup\ffcs\final\Harris_200107061032.298.html 06/18/2001 1998. However, in the next twenty years as Chinese defense modernization continues, China will surpass Taiwan's ability to defend itself. Many US allies will not guarantee basing rights for during a conflict with China, so the United States military must be prepared to fight for Taiwan from locations in Taiwan and from US possessions. The ?one China? policy that the US currently backs limits the military options to preposition people and supplies on Taiwan. The long ranges inherent with Pacific operations, for both deployment and employment, require that we be ready to defend Taiwan from austere and distant locations such as Andersen AB, Guam. China's ability to produce and procure modern weapons forces US and Taiwanese assets to fight within Chinese threat rings, while still achieving accurate results. US aircraft must be able to operate in these threat envelopes and gain air superiority, while supporting Taiwan's amphibious defenses. The United States can defend Taiwan twenty years from now, by effectively addressing the implications of this thesis.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The China Syndrome in Latin America
Since the Monroe Doctrine of 1823, the US has regarded the Western Hemisphere as its own domain. Until the early 21st Century, Latin America was a low priority for China, which viewed the region as too geographically remote to be relevant to the international relationships that preoccupied China. Yet in just the past decade, the Chinese are winning over the hearts and minds of citizens of Latin American countries. Increased Chinese involvement in Latin America is undermining US hegemony, foreign policy and security concerns in the region by promoting better diplomatic relations, economic ties, trade, and military interoperability between China and Latin America. China's interest in Latin America is focused on two key areas; trade for raw materials and diplomatic relations to isolate Taiwan.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Iran and the Arabian Gulf
The Arabian Gulf is of critical importance to the United States and our European and Asian allies. The region contains two-thirds of the world's known oil reserves, and the waterway itself is the key sea line of communication to this resource. As the world's only remaining superpower, the U.S. maintains a close watch on the Gulf and threats to its access. Following Iraq's defeat during DESERT STORM, the U.S. has refocused much of its attention on Iran and its growing military sea-denial capabilities. In light of the importance we place on the waterway, U.S. decision-makers must understand the extent of the Iranian threat to the free flow of commerce through the Gulf, and how best to counter it. Our thesis asserts that given the current geopolitical situation, the Iranian threat to the waterway is overstated; however, Gulf Cooperation Council members can and should take the lead in countering any attempt to deny its free access, and in the long term, the U.S. can join them and our other allies to help reduce Iranian incentives to threaten the Gulf.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Evolution of the International System
This thesis presents a long-term, multi-disciplinary view of international relations that incorporates realism, liberalism, and constructivism into a distinct new theory. It focuses on the proposal that the international environment is a social system, driven by self-interest characterized by the larger evolutionary process. The analysis argues that human social evolution employs cooperation to fulfill self- interest. As cooperation increases, human social groups self-organize and amalgamate into larger groups and higher-order social constructs, creating the international system. Societies evolve and develop culture specifically to encourage and enforce cooperation. As evidenced by the spread of democracy, societies mimic and copy cultural aspects of more successful societies to reap the benefits of cooperation. Just as social constructs cooperate to meet the needs of the individual, states also cooperate to meet the needs of their own populations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
CTSS Transatlantic Perspectives 2
The Center for Transatlantic Security Studies (CTSS) serves as a national and international focal point and resource center for multidisciplinary research on issues relating to transatlantic security. The Center provides recommendations to senior U.S. and international government and North Atlantic Treaty Organization (NATO) officials, publishes its research, and conducts a broad range of outreach activities to inform the broader U.S. national and transatlantic security community.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
String of Pearls
China's rising maritime power is encountering American maritime power along the sea lines of communication (SLOCs) that connect China to vital energy resources in the Middle East and Africa. The String of Pearls describes the manifestation of China's rising geopolitical influence through efforts to increase access to ports and airfields, develop special diplomatic relationships, and modernize military forces that extend from the South China Sea through the Strait of Malacca, across the Indian Ocean, and on to the Arabian Gulf. A question posed by the String of Pearls is the uncertainty of whether China's growing influence is in accordance with Beijing's stated policy of peaceful development, or if China will one day make a bid for regional primacy. This is a complex strategic situation that could determine the future direction of U.S.-China relations. The purpose of this paper is to analyze the String of Pearls from within the context of the post-Cold War global security environment and propose informed recommendations for U.S. policy and strategy. Substantive, results-oriented engagement supported by pragmatic military hedging is the best strategy to influence and encourage China to participate in the international community as a responsible stakeholder. Bold leadership and prudent foresight will enable the United States and China to reap the rewards of strategic cooperation and avert the calamity of a hostile confrontation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
From the New Middle Ages to a New Dark Age
Security and stability in the 21st century have little to do with traditional power politics, military conflict between states, and issues of grand strategy. Instead they revolve around the disruptive consequences of globalization, declining governance, inequality, urbanization, and nonstate violent actors. The author explores the implications of these issues for the United States. He proposes a rejection of "stateocentric" assumptions and an embrace of the notion of the New Middle Ages characterized, among other things, by competing structures, fragmented authority, and the rise of "no-go" zones. He also suggests that the world could tip into a New Dark Age. He identifies three major options for the United States in responding to such a development. The author argues that for interventions to have any chance of success the United States will have to move to a trans-agency approach. But even this might not be sufficient to stanch the chaos and prevent the continuing decline of the Westphalian state.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Weakness of the Treaty on the Nonproliferation of Nuclear Weapons and Recommendations for Change
The end of World War II was the dawn of a new age, the nuclear age. The destructive power delivered by America upon Japan successfully brought an end to the Pacific campaign but a beginning to nuclear power and nations seeking it. Technological advances and the ability to harness nuclear energy spurred a new industry and a global desire for it. The ability to export such an advanced technology and potentially dangerous capability created serious international security concerns. Controlling fissile material and the technology for proliferation became the job of the Nuclear Nonproliferation Treaty (NPT) (full treaty in Appendix B). Despite valiant efforts of the treaty and numerous other checks and balances put in place, there currently exists a present danger of nuclear proliferation to terrorist organizations and rogue states.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Three Capitals for Two States
This study argues that there are historical reasons to focus on Jerusalem first and to use an international Holy Basin methodology to bring Israel and the Palestinian National Authority together towards a workable compromise. This analysis identifies the strategic compromises required to create two distinct capital zones that grants sovereignty and legitimacy over respective capitals for the State of Israel and a future State of Palestine. To address the Arab-Israeli conflict, there have been numerous Middle East peace processes, two intifada's, and six U.S. administrations with little demonstrated progress. In terms of religion and national identity, Jerusalem is a central factor for both Israelis and Palestinians, to the people of three world religions, and to the international community. The critical factors to achieve compromise are sovereignty over their respective capitals combined with international recognition and possible control over remaining contested Holy Places. Resolving the city's role as a national capital for two states can lead to resolving other critical Arab-Israeli issues. The international community has perpetuated the conflict by withholding Jerusalem sovereignty from Israel and the Arab population. When Britain ended their Palestine mandate in 1948, the UN failed to deliberately enforce their vision of a separate Jerusalem entity, or Corpus Separatum. The UN continued to withhold sovereignty while the city was divided for nineteen years between Jordan and Israel and when the city was reunited in 1967. The lack of an international mandate for sixty-four years, while fighting for utopian concepts has perpetuated the conflict by delaying the self-determination of the Palestinian population and withholding sovereignty over Israel's declared capital. Peace negotiations must recognize and incorporate the interests of both sides, but until each side is ready to strictly divide the Old City, an international Holy Basin zone has the potential to crThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Coercing Iran
Iran's nuclear ambitions, rhetoric against Israel, and terrorism links make it a prime target of multiple US administrations. Marked as member of the Axis of Evil, Iran holds much political and religious influence in the Middle East. With its interest in becoming a regional power, Iran has assumed a strong defensive posture and is working to protect itself and its interests from US interference and hegemony in the region. Western powers appear to know very little about Iran culture and history and understand even less about the decision-making processes of an Islamic government.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The United States and ASEAN-China Relations
While the overall security situation in Southeast Asia is something of a mixed bag, with grounds for both optimism and pessimism, one of the most encouraging trends in recent years has been the development of ASEAN's relations with major external powers. Relations between China and ASEAN in particular have demonstrated a marked improvement over the past decade, thanks to a combination of burgeoning economic ties, perceptions of China as a more constructive and responsible player in regional politics, and Beijing's "charm offensive" toward Southeast Asia. Overall, the development of ASEAN-China relations poses few security challenges to the United States today: good relations between China and ASEAN enhance regional stability, and a stable Southeast Asia is clearly in America's interests, especially with Washington focused on events in the Middle East. However, although ASEAN-China relations are very positive, this does not necessarily mean the United States is losing influence in Southeast Asia, or that ASEAN members are "bandwagoning" with China--in fact, they are hedging by keeping America engaged and facilitating a continued U.S. military presence. While ASEAN-China relations are relatively benign today, in the future several sources of potential friction could create problems in Sino-U.S. relations: these are Taiwan, Burma, and the South China Sea dispute. This monograph examines each of these scenarios in turn.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The North Korean Ballistic Missile Program
North Korea's nuclear weapons and ballistic missile programs have drawn international attention for years. In the early 1960s, Pyongyang began to pursue the capability to produce advanced weapons systems, including rockets and missiles. However, foreign assistance and technology, particularly from China and the Soviet Union, were instrumental in the acquisition of these capabilities. The ballistic missile inventory now totals about 800 road-mobile missiles, including about 200 Nodong missiles that could strike Japan. In April 2007, North Korea for the first time displayed two new missiles: a short-range tactical missile that poses a threat to Seoul and U.S. Forces in South Korea, and an intermediate-range missile that could potentially strike Guam. Although North Korea has not demonstrated the ability to produce a nuclear warhead package for its missiles, its missiles are believed to be capable of delivering chemical and possibly biological munitions. North Korean media and government officials claim the country needs a nuclear deterrent to cope with the "hostile policy of the United States," but Pyongyang has never officially abandoned its objective of "completing the revolution in the south." Little is known about North Korean military doctrine and the role of its ballistic missiles, but National Defense Commission Chairman Kim Ch?ng-il has ultimate authority over their disposition.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Understanding the Form, Function, and Logic of Clandestine Cellular Networks
Since the events of September 11, 2001 the United States military counternetwork operations, theory, and doctrine have failed to account for the form, function, and logic of clandestine cellular networks used by both interstate insurgencies, such as those in Iraq and Afghanistan, as well as by global insurgencies, like al Qaeda and its associated movements. The failure to understand the form, function, and logic of clandestine cellular networks has led to the incorrect application of counternetwork theories. Counternetwork operations specifically targeting key leaders, facilitators, individuals with special skills, or highly connected individuals, intuitively seem to be the correct targets for disconnecting clandestine cellular networks. However, there has been little comparative analysis done to verify if these operations are in fact having the overall effect required to disrupt, neutralize, defeat, or ultimately destroy these networks. Understanding the form, function, and logic of clandestine cellular networks reveals that the removal of single individuals, regardless of function, is well within the tolerance of this type of organizational structure and thus has little long-term effect. At the same time, highly connected nodes violate the principles of clandestine operations since they are obviously highly visible when compared to a competent clandestine practitioner that does not want a discernable signature in order to remain hidden from the counterinsurgent. Thus, by focusing on the highly connected individuals as high priority targets, US efforts have effectively "culled the herd" of poor clandestine practitioners. These two examples provide the two most common errors in the current counternetwork theories and operations, and the errors are all due to a lack of a systemic understanding of clandestine cellular networks. This monograph uses a modified process-trace methodology to analyze the form, function, and logic of clandestine cellular networks in order tThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Defense of Taiwan
Recently, due to the growing economic power and political influence of China, many have speculated the threat of Chinese military action towards the reunification of China and Taiwan has diminished. As the largest developing nation in the world, China has sustained a growth rate of 7% or better since 1980.1 According to Richard Bush, Director of the Brookings Institute Northeast Asia Policy Studies, Taiwanese and Chinese economies are intertwined and becoming more so each day with Taiwanese products manufactured in China maintaining Taiwanese profitability while supporting Chinese industry.2 Indeed, the growing economic interdependence of the two governments substantially supports the premise of a peaceful resolution. Additionally, the People's Republic of China (PRC) evolution as an emerging world superpower dictates responsible behavior including supporting a peaceful solution to the "Taiwan issue." In April 2004, during his testimony to the U.S. House International Relations Committee, James A. Kelly, Assistant Secretary of State for East Asian and Pacific Affairs commented, "China would gain nothing from a conflict. It would undermine a historic transformation through which China has become a respected member of the international community."3 Yet, for the PRC, control of Taiwan runs deeper than mere economics.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
NATO Expansion
This monograph examines the United States' position regarding further expansion of the North Atlantic Treaty Organization (NAT0) to include additional countries that were part of the former Warsaw Pact during the Cold War. This process has been evolving since the early 1990s and has already seen Poland, Hungary, and the Czech Republic join the ranks of the alliance in 1999. The purpose of this monograph is to recommend a position that the United States should favor at the 2002 Summit in Prague, where the allies will address further expansion. This monograph begins by analyzing the history of NATO, an alliance that many consider one of the most successful in history, concentrating on NATO's evolving strategy after the dissolution of the Soviet Union and the Warsaw Pact in 1991. This monograph also explains why the United States must stay involved in European affairs and keep Europe as a cornerstone of our national security strategy. This monograph next analyzes lessons learned from previous alliance expansions and how the alliance has helped solve historic differences between countries, as in the case of France and Germany, or perhaps helped them at least avoid war, as in the case of Greece and Turkey. This section also analyzes the impact of the first round of expansion on the alliance and concludes with a brief country overview of each of the nine NATO aspirant countries. This monograph next evaluates the suitability, feasibility, and acceptability of the nine aspirant countries wishing to join the alliance. It concludes that the United States should support an invitation for Slovakia, Slovenia, Romania, Bulgaria, and Macedonia (Former Yugoslav Republic of Macedonia) at the 2002 Summit in Prague. This monograph finds that Albania is not yet politically or economically ready to join the alliance. Additionally, this monograph finds that although the Baltic countries of Estonia, Latvia, and Lithuania are domestically ready to join the alliance, they should not be invThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Recognizing and Adapting to Unrestricted Warfare Practices by China
In 1999, two Chinese Colonels published a concept paper which advocated that China adopt an #65533;Unrestricted Warfare#65533; (URW) strategy to respond to U.S. power and military superiority. Over the last 10 years, the Chinese government seems to have implemented elements of this strategy to erode U.S. world power and influence. Due to its cultural, doctrinal, and legal biases and constraints, the United States has experienced difficulty in recognizing and responding effectively to URW practices. If the U.S. hopes to deter, prevent, and/or respond to all forms of current and future URW threats, it must make policy and organizational changes within its government and the military. A primary reason why the U.S. is experiencing difficulty in adapting to URW practices is the difference in the thoughts and approach to warfare by the U.S. and the Chinese. The American way of conducting warfare has been greatly influenced by European authors and militaries that advocate that warfare as a physically violent action to compel an enemy to bend to your will and agree to your terms. Therefore, America fights wars of attrition and annihilation against its opponents and is best prepared for combat against symmetrical, regular enemy forces rather than asymmetrical ones. As with America and the West, the Chinese way of war is greatly influenced by its history and culture. The teachings of Confucius and Sun Zi, are of particular significance. These men taught obedience to the state, the primacy of relationships over law, and the importance of deception and surprise in warfare and the affairs of state. As a result, Chinese military and civilian leaders often prefer an indirect approach in warfare and in its dealings with other nations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
USAF Message Development
The Air Force faces significant challenges in communicating for effect in today's information environment. The changing face of information technology, the increased flow of information, and lack of resources make it increasingly difficult to communicate the Air Force message to our key audiences of Congress, the media, and the general public. Compounding this brave new information environment is the historic reticence of Air Force officers to communicate frequently and openly. Although absolutely superior at our core mission, the cultural bias against communicating makes our service vulnerable to a lack of understanding which puts our Air Force priorities at risk.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Eritrean and Ethiopian Conflict and the Impact on United States National Security Interests in the Horn of Africa
The Eritrean and Ethiopian Conflict and the Impact on United States National Security Interests in the Horn of Africa Have you ever wondered why the United States is so interested in resolving other countries' conflicts? Simply put, it affects our way of life. Conflict leads to chaos in the following ways: a democratic government is challenged to maintain its legitimacy, human rights are ignored leading to civil unrest to include refugees, and terrorists groups exploit conflict to recruit jihadists. This paper talks about this chaos and what impact it has on the region and to the United States. The Ethiopian and Eritrean conflict is already creating havoc in both countries and has spread to neighboring countries as well. This conflict can directly impact the United States' national security interests in the region. The United States is undoubtedly concerned with the democratic governance of all countries.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Security Force Assistance
The United States Military conducted numerous attempts to train Foreign Security Forces over the past 100 years. From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S. advisory missions in the Philippines, Vietnam and El Salvador contained positive elements, but none of these past operations contained the necessary framework to organize, train, equip, rebuild, and advise foreign security forces. As a result, the programs were haphazard at best, resulting in both the loss of national resources and delays in achieving foreign policy goals. Even today, when in conjunction with National Strategic Objectives, the United States Government has developed a host of programs to assist a host nation in bolstering their security forces, none of these programs has adequately addressed the threats found in the contemporary operating environment. The contemporary operating environment requires a more comprehensive framework to develop foreign security forces in conjunction with a host-nation. Rogue states, non-state actors, super empowered individuals, trans-national terrorist organizations, religious and ethnic strife, and disenfranchised elements of society all contribute to the difficulties of developing a functional and effective native security force. Today's security forces must possess the capability to defend their nation from both external and internal threats. While the United States Government has some programs available to assist in the security development of other nations, none address the multitude of problems common today. Additionally, the lack of a concise doctrine applicable for general purpose forces greatly hindered past security force assistance missions and remains the biggest obstacle to future mission success.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
String of Pearls
China's rising maritime power is encountering American maritime power along the sea lines of communication (SLOCs) that connect China to vital energy resources in the Middle East and Africa. The "String of Pearls" describes the manifestation of China's rising geopolitical influence through efforts to increase access to ports and airfields, develop special diplomatic relationships, and modernize military forces that extend from the South China Sea through the Strait of Malacca, across the Indian Ocean, and on to the Arabian Gulf. A question posed by the "String of Pearls" is the uncertainty of whether China's growing influence is in accordance with Beijing's stated policy of "peaceful development," or if China one day will make a bid for regional primacy. This is a complex strategic situation that could determine the future direction of the China's relationship with the United States, as well as China's relationship with neighbors throughout the region. The purpose of this paper is to analyze the "String of Pearls" from within the context of the post-Cold War global security environment and propose informed recommendations for U.S. policy and strategy. Substantive, results-oriented engagement supported by pragmatic military hedging is the best strategy to influence and encourage China to participate in the international community as a responsible stakeholder. Bold leadership and prudent foresight will enable the United States and China to reap the rewards of strategic cooperation and avert the calamity of a hostile confrontation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Shaping China's Security Environment
This volume addresses the role of the Chinese military in shaping its country's security environment. The PLA itself is shaped and molded by both domestic and foreign influences. In the first decade of the 21st century, the PLA is not a central actor in China's foreign policy the way it was just a few decades ago. Nevertheless, the significance of the PLA should not be discounted. The military remains a player that seeks to play a role and influence China's policy towards the such countries and regions as United States, Japan, the Koreas, Southeast Asia, South Asia, and Taiwan. It is important not to overlook that, in times of crisis or conflict, the role and influence of the PLA rise significantly.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Political Trends in the New Eastern Europe
This monograph contains two individual reports: Belarus and Russia: Comradeship-in-Arms in Preempting Democracy by Dr. Vitali Silitski and Ukraine: Domestic Changes and Foreign Policy Reconfiguration by Dr. Arkady Moshes. Belarus remains the last true dictatorship in Europe, and as such, its internal and external security agenda is an abiding matter of concern to the European and Western communities. But its trajectory is of equal concern to Moscow, which has been the prime external supporter and subsidizer of the Belarussian government under President Alyaksandr' Lukashenka. But despite this support, tensions between Moscow and Minsk are growing. The brief energy cutoffs imposed by Moscow at the start of the year and Belarus' retaliation shows that not all is well in that relationship. Not surprisingly, Lukashenka has now turned back to the West for foreign support, but it will not be forthcoming without significant domestic reform which is quite unlikely. Ukraine presents a different series of puzzles and challenges to Western leaders and audiences. It too has suffered from Russian energy coercion, but its political system is utterly different from Belarus and in a state of profound turmoil. Therefore, precise analysis of what has occurred and what is currently happening in Ukraine is essential to a correct understanding of trends there that can then inform sound policymaking.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.