PUBLICATIONS

Through its publications, INSS aims to provide expert insights, cutting-edge research, and innovative solutions that contribute to shaping the national security discourse and preparing the next generation of leaders in the field.

 

Publications

April 11, 2013

Indo-Chinese Relations & Border Issues in Northeast India: A View from India

Today in addition to the hot weather outside, it’s actually a hot agenda here at the National Defense University both in terms of activities as well as for those that work in the wider intellectual community thinking of issues that we are going to discuss today. I thank you all for being here in a timely fashion and make early apologies for those who will be arriving perhaps a little bit late --- principally from the other side of the river, the Defense Department and the wider Pentagon who will join in as we continue. But I’m delighted to have each of you here today and delighted to be sitting next to our guest speaker.

April 1, 2013

China’s Forbearance Has Limits: Chinese Threat and Retaliation Signaling and Its Implications for a Sino-American Military Confrontation

Since its founding in 1949, the People’s Republic of China (PRC) has employed military force in defense of China’s security and territorial integrity. In many such instances, Beijing implemented a calculus of threat and retaliation signals intended first to deter an adversary from taking actions contrary to Chinese interests by threatening the use of military force and, if deterrence failed, to explain and justify Beijing’s resort to military force.

April 1, 2013

Convergence: Illicit Networks and National Security in the Age of Globalization

Acceleration. Magnification. Diffusion. Entropy. Empowerment. The global environment and the international system are evolving at hypervelocity. A consensus is emerging among policymakers, scholars, and practitioners that recent sweeping developments in information technology, communication, transportation, demographics, and conflict are making global governance more challenging. Some argue these developments have transformed our international system, making it more vulnerable than ever to the predations of terrorists and criminals. Others argue that despite this significant evolution, organized crime, transnational terrorism, and nonstate networks have been endemic if unpleasant features of human society throughout history, that they represent nothing new, and that our traditional means of countering them—primarily conventional law enforcement—are adequate. Even among those who perceive substantial differences in the contemporary manifestations of these persistent maladies, they are viewed as major nuisances not adding up to a significant national or international security threat, much less an existential threat.

Feb. 1, 2013

The New NATO Policy Guidelines on Counterterrorism: Analysis, Assessments, and Actions

DOWNLOAD PDFExecutive Summary The history of the North Atlantic Treaty Organization (NATO) will say that the first, and so far only, time NATO has called upon its Article 5 collective defense clause was on September 12, 2001, following a terrorist attack on one of its members. Yet, until the agreement by NATO Heads of State and Government on the

Feb. 1, 2013

The New NATO Policy Guidelines on Counterterrorism: Analysis, Assessments, and Actions

DOWNLOAD PDFExecutive Summary The history of the North Atlantic Treaty Organization (NATO) will say that the first, and so far only, time NATO has called upon its Article 5 collective defense clause was on September 12, 2001, following a terrorist attack on one of its members. Yet, until the agreement by NATO Heads of State and Government on the

Dec. 1, 2012

The International Atomic Energy Agency's Decision to Find Iran in Non-Compliance, 2002-2006

On August 14, 2002, at a press conference in Washington, DC, the National Council of Resistance of Iran (NCRI), an exiled Iranian opposition group, drew worldwide attention when it publicly accused Iran of clandestinely developing nuclear weapons. Alireza Jafarzadeh, then-U.S. media spokesperson for the NCRI, described two “top secret” nuclear facilities being constructed in Iran at Natanz and Arak under the guise of front companies involved in the procurement of nuclear material and equipment. Noting that media attention had focused on Iran’s publicly declared civilian facilities, Jafarzadeh claimed that “in reality, there are many secret nuclear programs at work in Iran without knowledge of the International Atomic Energy Agency (IAEA),” the international body responsible for verifying and assuring compliance with safeguards obligations under the 1968 Nuclear Non-Proliferation Treaty (NPT).

Nov. 1, 2012

Strategic Reflections: Operation Iraqi Freedom, July 2014 - February 2007

Operations Enduring Freedom and Iraqi Freedom were the first major wars of the 21st century. They will not be the last. They have significantly impacted how the U.S. Government and military think about prosecuting wars. They will have a generational impact on the U.S. military, as its future leaders, particularly those in the ground forces, will for decades be men and women who served in Iraq and Afghanistan. It is imperative that leaders at all levels, both military and civilian, share their experiences to ensure that we, as a military and as a country, gain appropriate insights for the future.

Oct. 1, 2012

Japan-China Relations 2005–2010: Managing Between a Rock and a Hard Place An Interpretative Essay

DOWNLOAD PDFExecutive Summary Between China and Japan, the past is ever-present. Notwithstanding shared cultural and historic ties, throughout the past century and going back to the Sino-Japanese war at the end of the 19th century, a bitter legacy of history—the Boxer Rebellion; the Mukden Incident and Japan’s occupation of South Manchuria (1931);

Sept. 10, 2012

Countering Violent Terrorism & the Role of Military Special Operations: A View from India

On behalf of the National Defense University’s Institute for National Strategic Studies and the Program on Irregular Warfare and Special Operations, I wish to welcome you to this special event this afternoon. I’m Tom Lynch. I’m the research fellow for South Asia and the Near East at the Institute for National Strategic Studies and the Center for Strategic Research. It’s my distinct pleasure to work for NDU President MG Greg Martin, his Director of Research for the Institute for National Strategic Studies, COL Tim Vuono, and the Director for the Center for Strategic Research, Dr. Nick Rostow. None of these gentlemen are here with us this afternoon, but all sent along their greetings and best wishes to General Katoch and to all of you here today. It’s my pleasure to work closely with the Program on Irregular Warfare, an affiliate of the Institute for National Strategic Studies, and I’m indebted here and wish to acknowledge the hard work and support of that program’s leadership, specifically Dr. Joe Tonon and Mr. Matt Reid, and thank them for their instrumental role in making this presentation, by LTG Katoch, possible here today. Thank you, gentlemen. I’m also most pleased to be sitting here next to the General today, on this his first visit ever to Washington, DC as I understand it, and to hear him speak in person on today’s topic which is, “Countering Violent Extremism and the Role of Special Forces: a View from India.”

Sept. 1, 2012

Managing Sino-U.S. Air and Naval Interactions: Cold War Lessons and New Avenues of Approach

The United States and China have a complex, multifaceted, and ambiguous relationship where substantial areas of cooperation coexist with ongoing strategic tensions and suspicions. One manifestation involves disputes and incidents when U.S. and Chinese military forces interact within China’s Exclusive Economic Zone (EEZ). Three high-profile incidents over the last decade have involved aggressive maneuvers by Chinese military and/or paramilitary forces operating in close proximity to deter U.S. surveillance and military survey platforms from conducting their missions. Why do these incidents continue to occur despite mechanisms designed to prevent such dangerous encounters? Could new or different procedures or policies help avoid future incidents?