Recent Articles

 
  •  Should We Let the Bomb Spread?

    Should We Let the Bomb Spread?

    Should We Let the Bomb Spread? Mr Henry D Sokolski Book by the US Army War College, Strategic Studies Institute, US Army War College Press "In 1966, Leonard Beaton, a journalist and strategic scholar, published a short book that asked: Must the bomb spread? Mr. Beaton’s query reflected the profoundly alarm with which proliferation was viewed shortly after the Cuban Missile Crisis. Today that alarm is all but absent; now, not only is proliferation increasingly viewed as a given (more of a fact than a problem), but some security experts actually see advantages in nuclear weapons spreading or, at least, little harm."
    • Published On: 11/1/2016
  •  Strategic Insights: The "U.S. Factor" in China's Problems

    Strategic Insights: The "U.S. Factor" in China's Problems

    Strategic Insights: The "U.S. Factor" in China's Problems Dr David Lai Article by the US Army War College, Strategic Studies Institute, US Army War College Press
    • Published On: 10/25/2016
  •  Strategic Insights: The "U.S. Factor" in China's Problems

    Strategic Insights: The "U.S. Factor" in China's Problems

    Strategic Insights: The "U.S. Factor" in China's Problems David Lai Article by US Army War College, Strategic Studies Institute, US Army War College Press "There is a widely-shared view in China that the United States has ill will toward China and is always looking for opportunities to make trouble for China. The Chinese believe that this was the case when China was a poor developing nation; and they particularly believe it to be the case today as China is rapidly becoming a great power. The Chinese claim that U.S. influence on every aspect of Chinese foreign and domestic relations is so ubiquitous that they have a name for it: 'U.S. factor/shadow/specter' "
    • Published On: 10/25/2016
  •  AY17 National Security Policy and Strategy Course Directive

    AY17 National Security Policy and Strategy Course Directive

    AY17 National Security Policy and Strategy Course Directive COL Robert E Hamilton, Dr Richard A Lacquement Jr Course Directive by the US Army War College "The National Security Policy and Strategy (NSPS) course focuses on national security policies and the strategies that put them into operation. It examines the elements that underpin national security policy and strategy, including the international and domestic environments, the American political system, national security policy and strategy formulation, the instruments of national power, and the processes employed by the United States Government for integrating and synchronizing those instruments to formulate national security policies and strategies in the pursuit of national security objectives..."
    • Published On: 10/21/2016
  •  The Quest for Military Cooperation in North Africa: Prospects and Challenges

    The Quest for Military Cooperation in North Africa: Prospects and Challenges

    The Quest for Military Cooperation in North Africa: Prospects and Challenges Dr Mohammed El-Katiri Letort Paper by US Army War College, Strategic Studies Institute, US Army War College Press "In the aftermath of the ousting of dictatorial regimes in 2011, the fragile political and security situations in Tunisia and Libya have contributed to the emergence of new threats that menace the stability of both countries and of their neighbors. Severe terrorist incidents have become frequent throughout the region. To name but one incident, the borders that Algeria shares with those two countries exposed it to a major terrorist attack on the Tiguentourine gas facility in January 2013."
    • Published On: 10/1/2016
  •  AY 17 Strategic Leadership Course Directive

    AY 17 Strategic Leadership Course Directive

    AY 17 Strategic Leadership Course Directive Dr Richard A Lacquement Jr, Dr George J Woods III Course Directive by the US Army War College "The Strategic Leadership course of the U.S. Army War College (USAWC) resident core curriculum is designed to introduce you to the concepts to effectively leadwithin the national security environment through an examination of responsible command, leadership, and management practices. Although generally applicable to the broader national security environment, it focuses on the integration of the military instrument of national power with emphasis on challenges faced in the development, sustainment, and application of Landpower."
    • Published On: 9/22/2016
  •  Stability Operations in East Timor 1999-2000: A Case Study

    Stability Operations in East Timor 1999-2000: A Case Study

    Stability Operations in East Timor 1999-2000: A Case Study Andrew H Fowler PKSOI Paper US Army War College, Peacekeeping and Stability Operations Institute, US Army War College Press "The stability operation in East Timor from September 20, 1999 to February 23, 2000, demonstrated how the United States can support the leadership of a well-respected and capable regional partner to strengthen the legitimacy of international efforts and encourage burden sharing at a time of competing Joint Force demands. The East Timor action, known as Operation STABILISE, was a United Nations (U.N.) sanctioned, Australian-led, multinational peace enforcement operation. Its objective was to end the violence in East Timor, establish security, and set conditions for the transition to a U.N. peacekeeping force in what was then a province of Indonesia."
    • Published On: 9/19/2016
  •  Strategic Insights: Cyber (In)Security, the Americas, and U.S. National Security

    Strategic Insights: Cyber (In)Security, the Americas, and U.S. National Security

    Dr. Jose de Arimateia da Cruz Article by the US Army War College, Strategic Studies Institute, US Army War College Press According to the Organization of American States (OAS) in its report on “Latin American and Caribbean Cyber Security Trends” released in June 2014, Latin America and the Caribbean have the fastest growing Internet population in the world with 147 million users in 2013 and growing each year. While having more users and more network connections are great advancements for traditional developing nations, they also represent a potential threat. Audrey Kurth Cronin points out that “insurgents and terrorist groups have effectively used the Internet to support their operations for at least a decade. The tools of the global information age have helped them with administrative tasks, coordination of operations, recruitment of potential members, and communications among adherents.” While much of the discussion regarding potential enemy attacks on U.S. cyber critical infrastructure mainly focuses on China, Russia, and Iran, the Americas have been largely ignored in the literature. Why are the Americas important? Why should we be discussing its place within the U.S. national security strategic goals?
    • Published On: 9/12/2016
  •  An Arab NATO in the Making? Middle Eastern Military Cooperation Since 2011

    An Arab NATO in the Making? Middle Eastern Military Cooperation Since 2011

    An Arab NATO in the Making? Middle Eastern Military Cooperation Since 2011 Dr Florence Gaub Letort Paper by US Army War College, Strategic Studies Institute, US Army War College Press "Two features have been consistent in the Middle East and North Africa since the era of independence: ongoing violence of all sorts—and the absence of a collective security structure, which could tackle this violence. Since the end of World War II, the region has seen multiple attempts to organize collective and cooperative security, all of which failed."
    • Published On: 9/1/2016
Page 25 of 100