Debate over the Trump administration’s new Nuclear Posture Review (NPR) is now in full and predictable bloom. While many of its conclusions demonstrate continuity with the Obama administration’s modernization plans, controversy has centered on two of the review’s recommendations: to deploy new low-yield weapons on sea-launched ballistic and cruise missiles; and to signal the potential for nuclear retaliation against an adversary’s non-nuclear strikes on certain critical targets. Critics accuse the new policy of lowering the threshold for nuclear use. The policy’s authors and their defenders argue to the contrary that Russia’s tactical nuclear arsenal and strategies have lowered the threshold for nuclear use, and buttressing U.S. deterrence capabilities is the safest response.
Despite leaps in technological advancements made in computing system hardware and software areas, we still hear about massive cyberattacks that result in enormous data losses. Cyberattacks in 2015 included: sophisticated attacks that targeted Ashley Madison, the U.S. Office of Personnel Management (OPM), the White House, and Anthem; and in 2014, cyberattacks were directed at Sony Pictures Entertainment, Home Depot, J.P. Morgan Chase, a German steel factory, a South Korean nuclear plant, eBay, and others. These attacks and many others highlight the continued vulnerability of various cyber infrastructures and the critical need for strong cyber infrastructure protection (CIP). This book addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks.
Why does climate matter for the security of the nation and its citizens? A series of critical evaluations and recommendations focused on how current and deteriorating climate/weather conditions impact U.S. national security and U.S. military missions, domestically and internationally.
Perhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence—due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy—among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America’s borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.
Part I of the 2014-2015 Army War College’s Key Strategic Issues List (KSIL)—Army Priorities for Strategic Analysis—asks: “Given the growing importance of homeland defense, what would be the benefits and drawbacks of realigning the [National] Guard under the department of Homeland Security to enhance domestic security and disaster response, while retaining utility for overseas missions in support of the Department of Defense?” (pg. 10). This monograph details our efforts to research and evaluate the perceived benefits and drawbacks of realigning the National Guard under the Department of Homeland Security (DHS). We begin with a brief review of the relevant literature shaping the current policy and doctrinal approach to military civil support (CS) operations, including a summary of laws and strategic guidance relevant to the discussion. We then note the important distinctions between homeland security (HS) and homeland defense (HD) and the military role in each context. The seam between HS and HD provides a conceptual basis for discussing the roles and responsibilities of the National Guard, the DHS, and the Department of Defense (DoD) within domestic security and disaster response operations. After evaluating the National Guard’s role in each of the above contexts, we briefly discuss the realignment of the United States Coast Guard (USCG) within the DHS as a proxy for comparison of a similar realignment of a military-style entity under the DHS. The study concludes by listing and discussing the potential benefits and drawbacks of a National Guard realignment under the DHS and then makes five short recommendations in summary of the research effort.
Combatant Commanders (CCDR) should maximize every opportunity to enhance joint, interagency, intergovernmental, and multinational (JIIM) partnerships and improve strategic alliances. The U.S. Army Corps of Engineers (USACE) operates globally and integrates across the interagency, providing unique regional access, understanding and opportunity. Integrating USACE activities during all phases of planning synchronizes Combatant Command (CCMD) strategic effects with the planning efforts of the Department of State (DoS) and the US Agency for International Development (USAID). Formalizing the relationship of the aligned USACE Divisions with each CCMD enhances this process. Growing the capability of the USACE Liaison teams, improving the integration of engineer assets, and formalizing the USACE Division’s role on the CCDRs staff will enhance the strategic nexus of defense, diplomacy and development. To achieve the full potential for interagency support, the USACE and Army Engineer Regiment should pursue opportunities to refine and expand how engineer effects are integrated into security cooperation activities at all levels of planning from strategic to tactical.
The 2013-14 Army War College Key Strategic Issues List stated: “If Hurricane Sandy is seen as an archetype of a complex catastrophe, then a careful analysis of the effectiveness of the DoD response within the context of dual status commanders [DSCs], lead federal agencies, and state response capabilities needs to be conducted.” This monograph does exactly that as it carefully and comprehensively analyzes the DSC-led military response to Hurricane Sandy in New York. Through this lens, it illustrates and discusses the perspectives of the DSC construct and offers recommendations for leveraging existing capabilities and improving those deemed insufficient. Using a case study approach, this analysis addresses notable issues of constitutionality, legality, policy, financial considerations, and even politics, all uniquely situated between individual states’ interests and those of the federal government. To provide military and defense officials with a greater understanding of the benefits and limitations of the DSC arrangement during a no-notice/limited-notice incident, this monograph offers objective and systematic documentation of the Sandy response. It concludes by offering a series of actionable recommendations aimed at improving operational decisionmaking, policy, and legislation specifically related to DSCs during no-notice/limited-notice incidents.
The authors advocate the integration of process improvement methods into future Defense Support of Civil Authorities (DSCA) operations. They briefly discuss alternative process improvement strategies and their current state of employment in a variety of DoD programs. Methods discussed include Lean Six Sigma, Total Quality Management, and Capability Maturity Models, the utility of such methods is demonstrated, and the value in applying process improvement methods to DSCA operations is articulated. Three recommendations are given to demonstrate how a usable process maturity model can be built and employed for future operations. The monograph concludes by reaffirming the inherent utility of, and advocating for, process improvement techniques as a way to mature future DSCA operations using the dual status commander arrangement.
Visual images have been a central component of propaganda for as long as propaganda has been produced. But recent developments in communication and information technologies have given terrorist and extremist groups options and abilities they never would have been able to come close to even 5 or 10 years ago. There are terrorist groups who, with very little initial investment, are making videos that are coming so close to the quality of BBC or CNN broadcasts that the difference is meaningless, and with access to the web they have instantaneous access to a global audience. Given the broad social science consensus on the power of visual images relative to that of words, the strategic implications of these groups’ sophistication in the use of images in the online environment is carefully considered in a variety of contexts by the authors in this collection.
This edition of the U.S. Army War College Guide to National Security Issues continues to reflect the structure and approach of the core national security strategy and policy curriculum at the U.S. Army War College. The 5th Edition is published in two volumes that correspond roughly to the Department of National Security and Strategy’s core courses: “Theory of War and Strategy” and “National Security Policy and Strategy.” Like previous editions, this one is based on its predecessor, but contains both updates and new scholarship. Over a third of the chapters are new or have undergone significant rewrites. Many chapters, some of which appeared for years in this work, have been removed. Nevertheless, the book remains unchanged in intent and purpose. Although this is not primarily a textbook, it does reflect both the method and manner that the U.S. Army War College uses to teach strategy formulation to America’s future senior leaders. The book is not a comprehensive or exhaustive treatment of either strategic theory or the policymaking process. Both volumes are organized to proceed from the general to the specific. Thus, the first volume opens with general thoughts on the nature and theory of war and strategy, proceeds to look at the complex aspect of power, and concludes with specific theoretical issues. Similarly, the second volume begins by examining the policy/strategy process, moves to a look at the strategic environment, and concludes with some specific issues. This edition continues the effort begun in the 4th Edition to include several short case studies to illustrate the primary material in the volume.