Browse by

Publications

April 1, 2015

Global Knowledge Networking: Smart Strategies for Promoting Innovative Learning and Leader Development

Smart security builds on actionable knowledge. The North Atlantic Treaty Organization (NATO) Wales Summit in September 2014 highlighted the need to build on partnerships to prepare and operate together better. Building on the successes of past partnership initiatives and capabilities, this paper proposes new ways to embrace and extend techniques and relationships originally developed under successful Secretary of Defense (SECDEF)-level memoranda of understanding (MOUs) within NATO’s Partnership for Peace (PfP) program. The Global Knowledge Networking (GKN) initiative supports smart decisionmaking by educating and training tomorrow’s agile, resilient, and effective leaders. GKN is a network of people, ideas, and processes to make knowledge actionable and is focused on improving on U.S. and coalition interoperability through improvements in existing training and education capabilities. It has begun to convene strategic dialogues around key challenges and collectively owned opportunities. Its initial framing is globally relevant and focused on the Arabian Gulf region through a proposed test bed for collaboration with the member states of the Gulf Cooperation Council (GCC). This will allow new tools for interoperability to be explored and created together as enablers of joint capability. Drawing on the experiences of NATO’s Partnership for Peace, it will promote an innovative systems approach that could help cultivate and sustain more effective security partnerships around the globe.

March 1, 2015

Defense Partnerships: Documenting Trends and Emerging Topics for Action

Public-public and public-private and partnerships (P4s) are time-proven effective solutions for delivering public services at reasonable costs when deployed and managed properly. Various U.S. agencies and international organizations all have longstanding successful P4 initiatives and projects. Recently, Department of Defense (DOD) leaders have expressed increased interest in implementing P4s throughout their organizations. As DOD is faced with evolving roles and missions in an “unpredictable and complex world amid fiscal constraints, the expertise and involvement of the private sector and other public organizations will be essential.” P4s could be ideal tools intended to “further policy objectives, enhance U.S. operational capabilities, reduce costs, gain access to nonmilitary expertise or assets, or build greater capacity in partners.”

March 1, 2015

The U.S.-Japan Alliance: Review of the Guidelines for Defense Cooperation

DOWNLOAD PDFExecutive Summary This paper is focused on the U.S.-Japan alliance as reflected in the evolution of the U.S.- Japan Guidelines for Defense Cooperation. It begins with consideration of the October 3, 2013, 2+2 Statement released by Secretary of State John Kerry, Secretary of Defense Chuck Hagel, Foreign Minister Fumio Kishida, and

Jan. 1, 2015

Red China’s “Capitalist Bomb”: Inside the Chinese Neutron Bomb Program

This paper examines why China developed an enhanced radiation weapon (ERW) but did not deploy it. ERWs, better known as “neutron bombs,” are specialized nuclear weapons with reduced blast effects and enhanced radiation, making them ideal tactical and antipersonnel weapons. Declassified U.S. intelligence and Chinese press reports indicate the People’s Republic of China (PRC) was interested in an ERW in 1977 and successfully tested a device on September 29, 1988. To date, however, these sources provide no evidence of deployment. This study exploits primary source documents to reconstruct the ERW program’s history, assesses drivers behind decisions throughout the program, and considers broader implications for PRC decisionmaking on weapons development. This case study suggests a model of a “technology reserve” in which China develops a weapons technology to match the capabilities of another state but defers deployment. This paper presents an analytic framework for examining how the technology reserve model might apply to China’s decisionmaking on ballistic missile defense (BMD), antisatellite (ASAT), and hypersonic glide vehicle (HGV) systems.

Oct. 1, 2014

The Grand Strategy of the United States

From the earliest days of the Republic, the outlines of an evolving American grand strategy have been evident in our foreign and domestic policy. Much of that history continues to inform our strategic conduct, and therefore American grand strategy rests today on traditional foundations. Despite a welter of theory and debate, grand strategy as a practical matter is remarkably consistent from decade to decade, with its means altering as technology advances and institutions evolve but its ends and ways showing marked continuity.

Oct. 1, 2014

“Not an Idea We Have to Shun”: Chinese Overseas Basing Requirements in the 21st Century

China’s expanding international economic interests are likely to generate increasing demands for its navy, the People’s Liberation Army Navy (PLAN), to operate out of area to protect Chinese citizens, investments, and sea lines of communication. The frequency, intensity, type, and location of such operations will determine the associated logistics support requirements, with distance from China, size and duration, and combat intensity being especially important drivers.

Sept. 1, 2014

The Rising Terrorist Threat in Tanzania: Domestic Islamist Militancy and Regional Threats

Despite its reputation for peace and stability in a troubled region, the East African country of Tanzania is experiencing a rising number of militant Islamist attacks that have targeted local Christian leaders and foreign tourists, as well as popular bars and restaurants. These attacks, which began in 2012, rarely make the headlines of international media. However, they should serve as a wake-up call for U.S. policymakers to increase short-term engagement with Tanzanian officials and support for Tanzanian security agencies to preempt the emergence of a more significant threat to U.S. and international interests in East Africa.

Sept. 1, 2014

Asia's Evolving Security Environment: Policy Options for Japan

The following report reflects my 20-year experience as a government official, in particular my 3-year experience as Director of International Security Policy Office of the Japanese Ministry of Defense. During this time, I participated in several multilateral dialogues. This report reflects my personal views and does not, in any way, represent the official policy positions of the government of Japan.

July 1, 2014

The Indian Jihadist Movement: Evolution and Dynamics

The Indian jihadist movement remains motivated primarily by domestic grievances rather than India-Pakistan dynamics. However, it is far more lethal than it otherwise would have been without external support from the Pakistani state, Pakistani and Bangladeshi jihadist groups, and the ability to leverage Bangladesh, Nepal, and certain Persian Gulf countries for sanctuary and as staging grounds for attacks in India. External support for the Indian mujahideen (IM) from the Pakistani Inter-Services Intelligence and Pakistan-based militant groups such as Lashkar-e-Taiba (LeT) persists, but the question of command and control is more difficult to discern. The IM is best viewed as an LeT associate rather than an LeT affiliate.

June 1, 2014

The Future of Weapons of Mass Destruction: Their Nature and Role in 2030

The longstanding efforts of the international community writ large to exclude weapons of mass destruction (WMD) from international competition and conflict could be undermined in 2030. The proliferation of these weapons is likely to be harder to prevent and thus potentially more prevalent. Nuclear weapons are likely to play a more significant role in the international security environment, and current constraints on the proliferation and use of chemical and biological weapons could diminish. There will be greater scope for WMD terrorism, though it is not possible to predict the frequency or severity of any future employment of WMD. New forms of WMD—beyond chemical, biological, radiological, and nuclear weapons—are unlikely to emerge by 2030, but cyber weapons will probably be capable of inflicting such widespread disruption that the United States may become as reliant on the threat to impose unacceptable costs to deter large-scale cyber attack as it currently is to deter the use of WMD. The definition of weapons of mass destruction will remain uncertain and controversial in 2030, and its value as an analytic category will be increasingly open to question.