Recent Articles

 
  •  Strategic Insights: The "U.S. Factor" in China's Problems

    Strategic Insights: The "U.S. Factor" in China's Problems

    Strategic Insights: The "U.S. Factor" in China's Problems Dr David Lai Article by the US Army War College, Strategic Studies Institute, US Army War College Press
    • Published On: 10/25/2016
  •  Strategic Insights: The "U.S. Factor" in China's Problems

    Strategic Insights: The "U.S. Factor" in China's Problems

    Strategic Insights: The "U.S. Factor" in China's Problems David Lai Article by US Army War College, Strategic Studies Institute, US Army War College Press "There is a widely-shared view in China that the United States has ill will toward China and is always looking for opportunities to make trouble for China. The Chinese believe that this was the case when China was a poor developing nation; and they particularly believe it to be the case today as China is rapidly becoming a great power. The Chinese claim that U.S. influence on every aspect of Chinese foreign and domestic relations is so ubiquitous that they have a name for it: 'U.S. factor/shadow/specter' "
    • Published On: 10/25/2016
  •  The Quest for Military Cooperation in North Africa: Prospects and Challenges

    The Quest for Military Cooperation in North Africa: Prospects and Challenges

    The Quest for Military Cooperation in North Africa: Prospects and Challenges Dr Mohammed El-Katiri Letort Paper by US Army War College, Strategic Studies Institute, US Army War College Press "In the aftermath of the ousting of dictatorial regimes in 2011, the fragile political and security situations in Tunisia and Libya have contributed to the emergence of new threats that menace the stability of both countries and of their neighbors. Severe terrorist incidents have become frequent throughout the region. To name but one incident, the borders that Algeria shares with those two countries exposed it to a major terrorist attack on the Tiguentourine gas facility in January 2013."
    • Published On: 10/1/2016
  •  Stability Operations in East Timor 1999-2000: A Case Study

    Stability Operations in East Timor 1999-2000: A Case Study

    Stability Operations in East Timor 1999-2000: A Case Study Andrew H Fowler PKSOI Paper US Army War College, Peacekeeping and Stability Operations Institute, US Army War College Press "The stability operation in East Timor from September 20, 1999 to February 23, 2000, demonstrated how the United States can support the leadership of a well-respected and capable regional partner to strengthen the legitimacy of international efforts and encourage burden sharing at a time of competing Joint Force demands. The East Timor action, known as Operation STABILISE, was a United Nations (U.N.) sanctioned, Australian-led, multinational peace enforcement operation. Its objective was to end the violence in East Timor, establish security, and set conditions for the transition to a U.N. peacekeeping force in what was then a province of Indonesia."
    • Published On: 9/19/2016
  •  Strategic Insights: Cyber (In)Security, the Americas, and U.S. National Security

    Strategic Insights: Cyber (In)Security, the Americas, and U.S. National Security

    Dr. Jose de Arimateia da Cruz Article by the US Army War College, Strategic Studies Institute, US Army War College Press According to the Organization of American States (OAS) in its report on “Latin American and Caribbean Cyber Security Trends” released in June 2014, Latin America and the Caribbean have the fastest growing Internet population in the world with 147 million users in 2013 and growing each year. While having more users and more network connections are great advancements for traditional developing nations, they also represent a potential threat. Audrey Kurth Cronin points out that “insurgents and terrorist groups have effectively used the Internet to support their operations for at least a decade. The tools of the global information age have helped them with administrative tasks, coordination of operations, recruitment of potential members, and communications among adherents.” While much of the discussion regarding potential enemy attacks on U.S. cyber critical infrastructure mainly focuses on China, Russia, and Iran, the Americas have been largely ignored in the literature. Why are the Americas important? Why should we be discussing its place within the U.S. national security strategic goals?
    • Published On: 9/12/2016
  •  An Arab NATO in the Making? Middle Eastern Military Cooperation Since 2011

    An Arab NATO in the Making? Middle Eastern Military Cooperation Since 2011

    An Arab NATO in the Making? Middle Eastern Military Cooperation Since 2011 Dr Florence Gaub Letort Paper by US Army War College, Strategic Studies Institute, US Army War College Press "Two features have been consistent in the Middle East and North Africa since the era of independence: ongoing violence of all sorts—and the absence of a collective security structure, which could tackle this violence. Since the end of World War II, the region has seen multiple attempts to organize collective and cooperative security, all of which failed."
    • Published On: 9/1/2016
  •  Strategic Insights: The Post-Conflict and the Transformation of Colombia’s Armed Forces

    Strategic Insights: The Post-Conflict and the Transformation of Colombia’s Armed Forces

    Strategic Insights: The Post-Conflict and the Transformation of Colombia’s Armed Forces Dr R Evan Ellis Article by the US Army War College, Strategic Studies Institute, US Army War College Press
    • Published On: 8/17/2016
  •  Strategic Insights: The Mysterious Case of the Vanishing Taliban

    Strategic Insights: The Mysterious Case of the Vanishing Taliban

    Strategic Insights: The Mysterious Case of the Vanishing Taliban Dr M Chris Mason Article by the US Army War College, Strategic Studies Institute, US Army War College Press
    • Published On: 8/1/2016
  •  Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition

    Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition

    Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition Dr Dighton Fiddner, Dr Phil Williams Book by the US Army War College, Strategic Studies Institute, US Army War College Press "The following chapters raise major and enduring questions about the conceptual and analytic challenges posed by the unique nature of cyberspace; differences between cyberthreats and more traditional challenges to national security; the range of possible responses to cyberthreats, ranging from the development of codes of conduct in cyberspace to strategies of deterrence and denial, and even the development of offensive cyberwar capabilities; and the relevance of traditional concepts such as crisis management and escalation to potential confrontations in cyberspace."
    • Published On: 8/1/2016
Page 15 of 100