Options for U.S. Naval Force Posture in East Africa

Matt Hein is a U.S. Navy Surface Warfare Officer currently studying for his Masters in Security Studies at Georgetown University.  He can be found on Twitter @Matt_TB_Hein.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Low intensity maritime conflict and engagement in Eastern Africa.

Date Originally Written:  February 11, 2018.

Date Originally Published:  May 21, 2018.

Author and / or Article Point of View:  This article addresses U.S. naval force posture options in East Africa and the implications for a resource-constrained force.

Background:  Demands for counter-piracy operations, countering maritime human smuggling, countering the growth of violent extremism in Sub-Saharan African countries, and partner nation capacity building require the constant presence of U.S. naval forces in East African littoral zones.  Friction arises when high-end combatants such as aircraft carriers and destroyers divert from their East African littoral mission to the nearby Persian Gulf and Mediterranean Sea to conduct other missions.

Significance:  U.S. naval presence in East Africa has improved maritime security and facilitated operations on land.  Coalition efforts reduced piracy incidents from 237 attempted hijackings in 2011 to only three such attempts in 2017[1].  Joint exercises, such as Cutlass Express, have developed partner nation maritime law enforcement capacity[2].  Intelligence gathering from sea based platforms has enabled multiple U.S. military missions ashore[3].  Increasing demand for high-end combatants in the Persian Gulf and Mediterranean Sea leaves the East African littoral mission vulnerable to having its gains reversed and questions the utility of those ships for low intensity missions.  Enhanced naval presence from the People’s Republic of China (PRC) in the region, most notably the establishment of a port facility in Djibouti, further complicates force posture decision-making.   Despite the incredible gains realized for maritime security in the region, there is a demand signal for deliberate planning to match appropriate naval assets with a growing range of regional needs.

Option #1:  The U.S. maintains its current naval force posture for the East Africa littoral mission.

Risk:  Current naval force posture rotates multiple Expeditionary Strike Groups and Carrier Strike Groups through the region annually, in addition to several independent deployers dispatched for counter-piracy operations[4].  The opportunity cost of these deployments is enormous.  These ships were designed for much more complex operating environments and can often be better utilized in those environments.  Using multi-billion dollar warships for low intensity engagement not only limits the utility of these ship’s advanced combat systems but also inflates the likelihood they will be diverted to other specialized missions such as ballistic missile defense or integrated air defense.

Gain:  The existing force posture is responsible for enhanced maritime security already realized in the region.  While expanding threats may challenge the ability to maintain these gains, this hasn’t happened to the extent that a dramatic rise in piracy or a drop in partner nation capacity has occurred.  Further, the historical integration and corporate knowledge of U.S. ships deploying to the theater gives them an inherent advantage for conducting these types of operations.

Option #2:  The U.S. forward deploys two Littoral Combat Ships (LCS) to Djibouti Naval Base.

Risk:  Forward-deploying the LCS is expensive and would require a large logistics and maintenance footprint in Djibouti.  Maintenance issues have plagued the LCS and will be exacerbated by a remote maintenance infrastructure with little experience.  Maintenance issues are compounded by difficult crew rotation schedules that have already hampered a similar forward deployment of LCS to Singapore[5].  The probability that forward deployed LCS will provide a persistent capability for the East Africa littoral mission is limited significantly by these LCS-wide problems.

Gain:  The LCS surface warfare mission package is uniquely suited for the East Africa littoral mission.  The LCS uses a combination of high speeds and shallow draft to operate aviation facilities, dedicated boarding teams, and anti-surface capabilities in littoral environments[6].  These attributes make the LCS ideal for intelligence gathering, capacity building, and counter-piracy missions.  Additionally, the use of LCS allows the multi-billion dollar warships currently conducting these missions to operate in more contested environments and across a broader swath of missions in the Red Sea and Persian Gulf.   Option #2 also builds on the surge of LCS in similar mission sets from counter-drug operations in the Caribbean to fisheries patrols and bilateral engagements in Southeast Asia.

Option #3:  The U.S. decreases its naval presence in East Africa.

Risk:  The construction of the PRC naval base in Djibouti means the gap in activity from the U.S. Navy would likely be filled, at least in part, by a PRC presence.  The construction of a military docking facility, capable of berthing most People’s Liberation Army (Navy) ships, means previous PRC task forces deployed to the region could become a permanent fixture[7].  As foreign investment pours into East Africa, a reduced naval presence could cause countries such as Tanzania, Kenya, and Somalia to turn elsewhere for maritime security support of their burgeoning economies.  Option #3 could further challenge the efficacy of counter-extremist efforts on land that require logistical and intelligence support from offshore assets.

Gain:  Decreasing U.S. naval presence does not mean disavowing the East Africa littoral mission entirely.  A P-3 squadron forward-deployed to Djibouti naval base combined with transiting strike groups still leaves intermittent capacity in the region to continue to support the East Africa littoral mission.  Option #3 also eliminates the requirements of keeping ships off the coast of Djibouti.  Not having to keep ships off Djibouti would allow a refocus towards heightened Iranian tensions, threats from Houthi rebels in Yemen, or even relocation to the Pacific fleet operating area in support of growing requirements.

Other Comments:  The Surface Navy Strategic Readiness Review, released in December 2017, stated that increasing readiness “require(s) a variety of naval assets and capabilities tailored to best achieve desired results[8].”  Shifting from a “demand” to “supply” model for naval surface forces means capabilities must be optimized against the mission with which they are tasked.  The options presented in this paper are three examples, of many, for shifting to a supply-based model for naval assets without sacrificing the East Africa littoral mission.

Recommendation:   None.


Endnotes:

[1] Sow, M. (2017, April 12). Figures of the week: Piracy and Illegal Fishing in Somalia. Africa in Focus.Retrieved February 9, 2018. https://www.brookings.edu/blog/africa-in-focus/2017/04/12/figures-of-the-week-piracy-and-illegal-fishing-in-somalia/

[2] Williams, F. (2018, February 7), Exercise Cutlass Express 2018 Closes. Retrieved February 10, 2018. http://www.c6f.navy.mil/news/exercise-cutlass-express-2018-closes

[3] Eckstein, M. (2017, July 5).Textron’s Aerosonde Small Unmanned Aerial Vehicle Eligible for Navy Sea-Based ISR. United States Naval Institute News. Retrieved February 10, 2018. https://news.usni.org/2017/07/05/textrons-aerosonde-small-unmanned-aerial-vehicle-eligible-navy-sea-based-isr

[4] Defense Media Activity for U.S. Navy Office of Information. Navy Versus Piracy  #PresenceMatters. Retrieved February 10, 2018 from http://www.navy.mil/ah_online/antipiracy/index.html

[5] Lartner, D. (2017, February 20) LCS crew marooned in Singapore on open-ended
deployment. Navy Times. Retrieved February 9, 2018 from https://www.navytimes.com/news/your-navy/2017/02/20/lcs-crew-marooned-in-singapore-on-an-open-ended-deployment/

[6] United States Navy Chief of Information. Fact File: Littoral Combat Ships – Surface Warfare Mission Package. Retrieved February 10, 2018 from http://www.navy.mil/navydata/fact_display.asp?cid=2100&tid=437&ct=2.

[7] Chan, M (2017, September 17) China plans to build Djibouti facility to allow naval flotilla to dock at first overseas base. South China Morning Post. Retrieved February 9, 2018 from http://www.scmp.com/news/china/diplomacy-defence/article/2112926/china-plans-build-djibouti-facility-allow-naval

[8] Bayer, M. Roughead, G. (2017, December 4) United States Navy Strategic Readiness
Review. Pg.20. Retrieved February 11, 2018 from http://s3.amazonaws.com/CHINFO/
SRR+Final+12112017.pdf

Africa China (People's Republic of China) Djibouti East Africa Horn of Africa Maritime Matt Hein Option Papers United States

Options to Address Terrorism Financing in Australia

Ryan McWhirter has a master’s degree of Terrorism and Security Studies at Charles Sturt University.  He can be found on twitter at ryanmc__89.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The enforcement of terrorism financing for terror organisations such as the Islamic State (IS) within Australia.

Date Originally Written:  January 30, 2018.

Date Originally Published:  May 7, 2018.

Author and / or Article Point of View:  This article is written from the point of view of challenging the symbolism of investigating all terrorism financing with the effect of better employment of limited investigatory resources based upon an impact assessment of action or inaction.

Background:  Most terrorist organisations require vast amounts of external support to fund their operations.  At the height of its power, the Islamic State were vastly different in the way they funded their group, with an estimated valuation at $2 billion US dollars.  The group was almost entirely self-sufficient, relying on natural resources within their controlled territory, taxes and extortion[1].

Whilst the group is most certainly winding down due to being militarily defeated in the terrain they controlled, it is not unsound to assess that other groups will try to emulate them.  During their peak, only 5% of the group’s finances were obtained through foreign donation[2].

Significance:  The enforcement of all things terrorism has become a political hot point within Australia.  Governments profess to the public that they are doing all in their power to suppress the threat groups such as IS pose.  The financing of the group is no exception to this rule and many investigations have been squarely aimed at individuals funding terrorism.

However, when 95% of a groups finances come from internal resources, is the enforcement of external donations a cost-effective measure, particularly in a small nation such as Australia?  Whilst it is unknown the exact amount Australians contributed to IS at its peak, it can safely be measured to be a small amount of the 5% the group reaps from donations.

This situation is purely economic.  Counter terrorism operations are not cheap.  It would not be out of the realm of possibilities to estimate an operation may cost between $100,000 to $150,000 a day, given the amount of staff, resources and other intangibles required to thoroughly investigate.  If an operation runs for three months, the cost is $ 9 million.

Can these resources be put to better use?  A case in point occurred in 2016 when a young male and female were arrested in Sydney, Australia for sending $5,000 to IS[3].  This operation didn’t occur over night.  If for example it ran for two months, intelligence and security agencies spent an estimated $6 million dollars to investigate $5,000 going overseas.  The two offenders were refused bail and remanded in custody, with the male being sent to a supermax prison.  Is sending a young male to supermax for terror financing going to change his views or intensify them?

The key question is, for an almost entirely self-sufficient group, is enforcing this small amount of finance an efficient and productive measure?

Option #1:  The Australian government continues with total enforcement of laws regarding terror finance.

Risk:  This option maintains the status quo.  The continuation of the total enforcement of these offences may lead to effected communities feeling targeted and vilified by authorities.

A risk this option poses is that the resources and finances used in these investigations are not being used in more serious matters.  Whilst intelligence and security agencies are busy investigating small time terror financers, other serious offences are going unchecked, these offences include human trafficking, large-scale drug importations and actual terrorist activity being directed at citizens.

Gain:  This option allows political capital to be garnered, particularly with a government obsessed with giving the appearance of being tough on terror.  It also sets an example to other individuals who may be contemplating financing terror groups that their actions are unacceptable and will be investigated and prosecuted.

Option #2:  The Australian government conducts a cost and benefit analysis before investigating the financing of groups such as IS.

Risk:  The risks in this option are profound.  Individuals may use this loophole to contribute to their group of choice by only donating small amounts, knowing they won’t be investigated if the amount is small enough.  This small donation activity may be seen as a gateway to conducting further terrorist related activities and a key step in the radicalization process.

Politically, this option is problematic.  If this option became policy, it would be seized upon by the government’s opposition to imply they are soft on terrorism.

Gain:  Australian government terrorism-related resources and finances are diverted into more serious criminal offences and social programs.  Deradicalization programs in schools and community centers could be better funded, perhaps stopping individuals wanting to finance a terror group, or even help stop a terrorist attack before it happens.  The government could make the case that by saving resources in this area they are in fact showing a genuine attempt to stop terrorism before it happens, reducing the need to be tough on it.

Other Comments:  It should be noted that in cases of financing terror groups such as Al-Qa’ida who have a greater reliance on outside donation, option two would not be feasible.  As such, these incidents would be investigated as usual.

Recommendation:  None.


Endnotes:

[1]  Centre for the analysis of terrorism. (2015). ISIS Financing

[2]  Ibid.

[3]  Olding, Rachel. (2016) Texts between schoolgirl terror suspect and co-accused Milad Atai released in court. Sydney Morning Herald.

Australia Economic Factors Islamic State Variants Option Papers Ryan McWhirter

Episode 0003: Military Planning Constructs (The Smell of Victory Podcast by Divergent Options)

9M2vSSDs

image003

Screen Shot 2018-05-02 at 4.27.45 PM

 

 


 

 

In this episode of The Smell of Victory Podcast Bob Hein, Steve Leonard, and Phil Walter tackle the phases of military operations and the new Joint Concept for Integrated Campaigning.  The trio discusses the historic role of the phased planning construct and why the Joint Staff felt a need to change.  They also spend a lot of time examining war termination and the implications of not planning adequately for the transition to peace, using Operation Iraqi Freedom as the primary example while also exploring World War 2 and Operation Desert Storm.  Also mentioned on the podcast, and able to be downloaded here, is a July 2013 memo from U.S. Army General and Chairman of the Joint Chiefs of Staff Martin E. Dempsey to the Chairman of the Senate Armed Services Committee that discusses military options in Syria.

You can listen via Sticher by clicking here, or iTunes by clicking here.  You can also listen on our website by clicking play below or download The Smell of Victory to your favorite podcatcher via our RSS feed below.

Option Papers The Smell of Victory Podcast by Divergent Options

Options for Decentralized Local Defence Forces in Iraq & Afghanistan

Patrick Blannin (@PatrickBlannin) is a PhD Candidate, teaching fellow and research assistant at Bond University, Queensland, Australia.  The authors doctoral research focuses on the role and scope of defence diplomacy in contemporary counterinsurgency and counterterrorism.  The author has published a research monograph titled Defence Diplomacy in the Long War (Brill) as well as peer-reviewed journal articles on topics related to transnational terrorism (organisations, funding sources and counter measures).  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Can decentralized Local Defence Forces (LDF) reliably fill the security void in the Long War (Iraq and Afghanistan)?  Will LDFs such as the Tribal Mobilization Forces and the Afghan Local Police generate or maintain stability until the capability of state forces improves?  Or should such entities remain as a state sanctioned, locally drawn, semi-autonomous component of a formal security apparatus[1]?

Date Originally Written:  January 29, 2018.

Date Originally Published:  April 23, 2018.

Author and / or Article Point of View:  From an academic perspective, the author analyses national security issues, and the responses to them, through the lens of a whole-of-government approach.  This approach ensures all the U.S.’ tools of statecraft (DIMEFIL) are utilized pursuant of its national security strategic objectives[2].

Background:  In a perfect world, when the long-arm of the state is unable or unwilling to extend through the entirety of its sovereign territory, effectively filling the security vacuum by calling for a grass-roots approach to security and policing would represent a “compelling argument[2].”  However, the Long War theatres of Iraq and Afghanistan are far from perfect, and for over a decade numerous iterations of so-called Local Defence Forces (LDF, or Local Police Forces, Community Defence Units, Public Protection Force, etc.) have been stood up.  Results are mixed, with often short-term benefits yielding mid-term pain.  For example, the highly vaulted Sons of Iraq (’Sahawa al-Anbar’, the Sunni Awakening) constituted a number of strategically aligned LDFs which combined to facilitate the routing of Al Qa’ida from Western Iraq (primarily Anbar Province)[3].  At the time however, with stories of its recent successes reported around the world, some analysts were guarded in their praise, identifying the short-term security gains in at least some areas, while recognizing “[T]here is little guarantee that these gains will persist, and there is some chance that the strategy will backfire in the medium term[4].”  Similar conversations, and associated apprehension, regarding Afghanistan were occurring before, during and after the 2009 ‘Surge[5].’  The intoxicating aroma of tactical victory soon fades and is replaced by the lingering odour of arms races and power grabs between tribally aligned militias, and the often undermining influence and/or actions of the state.

Significance:  Over the past 16 years, the U.S. and its Coalition partners have encouraged the Iraq and Afghan governments, such as they were, to incorporate LDFs into their national security strategy.  LDFs are designed to contribute to clearing or holding missions as well as local law enforcement in broader stabilization efforts.  Although each theatre offers innumerable differences and associated challenges, one constant remains, that short-term tactical successes are followed by mid-term strategic losses.  A legacy of its Long War experience, U.S. and Coalition civilian and military decision-makers have a ‘better’ understanding of the social/cultural anthropology in Iraq and Afghanistan.  Although lessons have been learned and mistakes addressed, repeating the same flawed approach remains a primary strategic choice, and our expectations continually failed to be met[6].

Option #1:  Firstly, limit the size of LDFs.  Secondly, ensure U.S. and Coalition personnel play a role, clandestinely wherever possible, in the vetting and training process which would allow the U.S. and its partners to identify recruits and influence the operating culture of the LDF.  Additional constraints could include the amount, and type of weaponry supplied, limit or equalize the political influence/politicization of all LDF leadership as well as introducing an enforceable set of operating parameters[7].

Risk:  Attempts to constrain LDFs by limiting their size, political influence, or access to weapons risks undermining the capacity of the LDF to fulfill their objective.  Moreover, a constrained and disempowered force can leverage traditional community relations to operate a shadow or parallel security apparatus which effectively monopolizes the use of violence within their respective area of operations which would undermine broader stabilization efforts[8].

Gain:  Limiting the size and capability of the LDF makes it more able to be managed by the government.  Additionally, introducing a personnel cap in conjunction with more rigorous vetting would create a more effective and perhaps malleable security force.  Standing up an effective LDF may mitigate the role/presence/agenda of existing militias affording tribal leadership the ability to pursue legitimate, non-violent, political activities[9].

Option #2:  Firstly, acknowledge, accept and plan for the inherent challenges and limitations of LDFs[10].  Secondly, increase the tempo of the current, centrally controlled train, advise, assist, accompany, and enable and police force capacity building programs, leveraging the arrival of the nascent U.S. Army Security Force Assistance Brigades and private sector trainers/advisors.  Centrally controlled, locally drawn LDFs can be generated through the existing security, stabilization and capacity building framework[11].

Risk:  Convincing/guaranteeing local militia and populations that their acquiescence to a degree of central government control and/or oversight will not prove detrimental to their local security objectives will be a challenge.  Lack of progress in establishing security creates a security vacuum which nefarious actors will exploit rendering the situation worse than prior to implementing this option.

Gain:  Using the existing capacity building framework expedites implementation of this option.  Moreover, generating requisite personnel should not represent a barrier, with existing militiae and a willing local population providing significant pool to draw from.

Other Comments:  For many, a situation in which locals (including LDFs) governed locals would significantly reduce tensions.  However, this local-for-local governance does not equate with the preferred central government model.  Both options are based on realities on the ground rather than a theoretical construct, thus LDFs such as the Tribal Mobilization Forces and the Afghan Local Police represent a rare triptych.  This triptych is an opportunity to empower in situ populations, reduce the anxiety of the central government, and achieve the stabilization objectives of the U.S./Coalition Long War strategy.  The objectives and concerns of all stakeholders are legitimate, yet they are diverse and need to be addressed in a comprehensive manner.  LDFs do deliver short-term tactical benefits and can positively contribute to the strategic objective of sustainable stabilization in Iraq and Afghanistan[12].

Recommendation:  None.


Endnotes: 

[1] Clark, K. (2017). ‘Update on Afghan Local Police: Making Sure they are armed, trained, paid and exist’, Afghan Analysts Network at https://www.afghanistan-analysts.org/update-on-the-afghan-local-police-making-sure-they-are-armed-trained-paid-and-exist/; Gaston, E. (2017). ‘Sunni Tribal Forces’, Global Public Policy Institute Report at http://www.gppi.net/publications/sunni-tribal-forces/ ; For a comprehensive list of Article about the Afghan Local Police from Afghan War News see: http://www.afghanwarnews.info/police/ALPnews.htm

[2] Field Manual (FM) 3-0, Operations, defines the “instruments of national power” as Diplomatic, Informational, Military, and Economic, normally referred to as the DIME.  The DIMEFIL acronym encapsulates: Diplomacy, Information, Military, Economic, Financial, Intelligence & Law Enforcement. DIMEFIL is an extension of the DIME construct that can be found in the National Strategy for Combating Terrorism (NSCT-2003) and the National Military Strategic Plan for the War on Terrorism (NMSP-WOT). The NMSP-WOT defines DIMEFIL as the means, or the resources, used for the War on Terrorism (2006: 5) at http://archive.defense.gov/pubs/pdfs/2006-01-25-Strategic-Plan.pdf; For a brief overview of DIMEFIL see: Smith, A.K. (2007), Turning on a DIME: Diplomacy’s Role in National Security, Carlisle, VA: Strategic Studies Institute, pp. 1-17 at https://ssi.armywarcollege.edu/pdffiles/PUB801.pdf

[3] Arraf, J. (2014). ‘A New Anbar Awakening’, Foreign Policy at http://foreignpolicy.com/2014/01/08/a-new-anbar-awakening/; Jones, S. G. (2011). ‘Security from the Bottom Up’, Time at ; Theros, M & Kaldor, (2007) M. ‘Building Afghan Peace from the Ground Up’, A Century Foundation Report, New York: The Century Foundation, pp. 1-60 at http://www.operationspaix.net/DATA/DOCUMENT/4311~v~Building_Afghan_Peace_from_the_Ground_Up.pdf

[4] Hamilton, B. (2017). ‘Illusions of Victory: The Anbar Awakening and the Rise of the Islamic State’, US Army; Kagan, E, (2007). ‘The Anbar Awakening: Displacing al Qaeda from its Stronghold in Western Iraq’, Iraq Report, The Institute for the Study of War & the Weekly Standard, pp. 1-18 at http://www.understandingwar.org/sites/default/files/reports/IraqReport03.pdf

[5] Long, A. 2008). ‘The Anbar Awakening’, Survival’, Vol. 50, no. 2, pp. 67-94 at http://www.tandfonline.com/doi/pdf/10.1080/00396330802034283?needAccess=true

[6] Human Rights Watch. (2012). Impunity, Militias, and the “Afghan Local Police”, pp.  1-100 at https://www.hrw.org/report/2011/09/12/just-dont-call-it-militia/impunity-militias-and-afghan-local-police ; Long, A., Pezard, S., Loidolt, B & Helmus, T. C. (2012). Locals Rule: Historic Lessons for Creating Local Defence Forces for Afghanistan and Beyond, Santa Monica, CA: RAND Corporation, pp. 1-232 at https://www.hrw.org/report/2011/09/12/just-dont-call-it-militia/impunity-militias-and-afghan-local-police

[7] Dearing, M. P. (2011). ‘Formalizing the Informal: Historical Lessons on Local Defense in Counterinsurgency’, Small Wars Journal at http://smallwarsjournal.com/jrnl/art/formalizing-the-informal-historical-lessons-on-local-defense-in-counterinsurgency .

[8] Mansour, R & Jabar, F. A. (2017). ‘The Popular Mobilization Forces and Iraq’s Future’, Carnegie Middle East Center at http://carnegie-mec.org/2017/04/28/popular-mobilization-forces-and-iraq-s-future-pub-68810 ;  Gharizi, O & Al-Ibrahimi, H. (2018). ‘Baghdad Must Seize the Chance to Work with Iraq’s Tribes’, War on the Rocks at https://warontherocks.com/2018/01/baghdad-must-seize-chance-work-iraqs-tribes/

[9] Gibbs, D. 1986). ‘The Peasant as Counter Revolutionary: The Rural Origins of the Afghan’, International Development, Vol. 21, no. 1, pp. 37–45 at http://dgibbs.faculty.arizona.edu/sites/dgibbs.faculty.arizona.edu/files/peasant.pdf

[10] El-Hameed, R. (2017). ‘The Challenges of Mobilizing Sunni Tribes in Iraq’, Carnegie Endowment for International Peace at http://carnegieendowment.org/sada/59401; n/a. (2016). Militias in Iraq: The hidden face of terrorism, Geneva International Center for Justice at http://www.gicj.org/GICJ_REPORTS/GICJ_report_on_militias_September_2016.pdf

[11] Cox, M. (2017). ‘Army Stands Up 6 Brigades to Advise Foreign Militaries’, Military.com; Cooper, N. B. (2017). ‘Will the Army’s New Advisory Brigades get Manning and Intel Right?’, War on the Rocks at https://warontherocks.com/2017/09/will-the-armys-new-advisory-brigades-get-manning-and-intel-right/ ; Gutowski, A. (2017). ‘Newly created ‘teaching’ brigade prepares to deploy to Afghanistan, FDD Long War Journal at https://www.longwarjournal.org/archives/2018/01/sfab.php ; Keller, J. (2018). ‘The 1st SFAB’s Afghan Deployment Is A Moment Of Truth For The Global War On Terror’, Task & Purpose at  https://taskandpurpose.com/sfab-train-advise-assist-afghanistan/  Strandquist, J. (2015). ‘Local defence forces and counterinsurgency in Afghanistan: learning from the CIA’s Village Defense Program in South Vietnam’, Small Wars & Insurgencies, Vol. 26, no. 1, pp. 90–113 at http://www.tandfonline.com/doi/pdf/10.1080/09592318.2014.959772?needAccess=true ; Green, D. (2017). In the Warlord’s Shadow: Special Operations Forces, the Afghans, and their Fight Against the Taliban, Annapolis, MD: Naval Institute Press, 2017, pp. 1-256.

[12] Al-Waeli, M. (2017). ‘Rationalizing the Debate Over the PMF’s Future: An Organizational Perspective’, 1001 Iraqi Thoughts at http://1001iraqithoughts.com/2017/12/14/rationalizing-the-debate-over-the-pmfs-future-an-organizational-perspective/

[13] Inspector General for Overseas Contingency Operations. (2017). Operation Inherent Resolve, Report to the U.S. Congress-July 2017-September 2017, pp. 1-126; U.S. Department of Defence. (2016). Enhancing Security and Stability in Afghanistan, Report to Congress, pp. 1-106 at https://www.defense.gov/Portals/1/Documents/pubs/Afghanistan-1225-Report-December-2016.pdf ; Hammes, T. X. (2015). ‘Raising and Mentoring Security Forces in Afghanistan and Iraq’, in Hooker Jr, R. D., & Joseph J. Collins. J. J. (eds.), Lessons Encountered: Learning from the Long War, Fort MacNair: National Defence University, pp. 277-344 at https://www.sciencedirect.com/science/article/pii/S0030438715000691

Afghanistan Allies & Partners Insurgency & Counteinsurgency Iraq Irregular Forces Option Papers Patrick Blannin United States

Options to Manage the Kingdom of Saudia Arabia’s Nuclear Ambitions

Joshua Urness is an officer in the United States Army who has served both in combat and strategic studies roles.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  In a notional future the Kingdom of Saudi Arabia (KSA) Defense Ministry leadership are strongly advocating for initiating a domestic nuclear weapons development program and have begun discussing the issue at King Abdullah City for Atomic and Renewable Energy.

Date Originally Written:  January 14, 2018.

Date Originally Published:  March 26, 2018.

Author and / or Article Point of View:  This article is written from the point of view of a non-proliferation and arms control professional working in the U.S. government. This professional was asked to provide recommendations to members of the national security council on how to dissuade the Kingdom of Saudi Arabia from pursuing nuclear weapons.

Background:  This background, though containing some facts, is based on the above described notional situation. Key drivers for the KSA on the issue are anticipation of the expiration of the Iranian Joint Comprehensive Plan of Action within 10-15 years and persistent adversarial relations with Iran; likely attributable to continued Islamic Revolutionary Guard Corps activity throughout the Gulf Cooperation Council region. This adversarial activity includes perceived Iranian support of Houthi Rebels, by proxy, in Yemen, a force that frequently fires ballistic missiles into KSA territory and has destabilized the KSA’s southern border region.

For this notional scenario we assume that the KSA:

– is a member of the Nuclear Non-proliferation Treaty (NPT) and has actively supported the establishment of a Weapons of Mass Destruction Free Zone in the Middle East (as recently as May, 2017[1]).

– does not currently possess the technological, intellectual or infrastructural capability necessary to produce fissile material or a nuclear weapon[2].

– has been working to develop a domestic nuclear energy program.

– possesses nuclear weapon capable delivery vehicles which were purchased in 2007 from China (DF-21 ballistic missile variants) and has spent substantial resources developing its Strategic Missile Force[3].

– recently published a plan for state-level economic reformation (“Vision 2030”[4]).

– signed a memorandum of understanding with the U.S. in 2008 on nuclear energy cooperation, an objective also discussed with France[5].

– has illicit agreements with states such as Pakistan for “off the shelf” nuclear weapons capabilities based on the known fact that the KSA funded work by A.Q. Khan[6].

Significance:  This situation matters to the United States because of the following U.S. national security interests:

– Prevent the spread and use of weapons of mass destruction (National Security Strategy, 2017)

– “Checking Iran’s malign influence while strengthening regional friends and allies” (Defense Posture Statement, 2017) and, therefore, the security of trade within and through the Middle East.

– Support of the Nuclear Non-Proliferation Treaty and the NPT 2020 review.

– Support of weapons of mass destruction free zones and, therefore, the establishment of a nuclear weapon free zone in the Middle East.

Option #1:  The U.S. focuses on influencing KSA key stakeholder and future king, Crowned Prince Mohammed Bin Salman, to neutralize proponents of nuclear weapons development by supporting his keystone political platform, “Vision 2030.”

“Vision 2030” is an extremely ambitious and aggressive plan that is heavily reliant on both foreign direct investment[7] and non-native intellectual contribution to domestic institutional development. The U.S. could assist the KSA in providing both in a manner that emphasizes domestic nuclear energy and deemphasizes the pursuit of nuclear weapons. Mohammed Bin Salman, author of the plan, is expected to accede the throne soon (to ensure the passing of power under supervision of the current king), and already exercises significant authority regarding the KSA’s future and will be the primary stakeholder in all major decisions.

Risk:  This option accepts that the KSA develops a domestic nuclear energy program which may require more than customary monitoring to determine if this program will become dual-use for nuclear weapons development.

Gain:  This option demonstrates public U.S. support for key allies sustainable economic development in a manner that obscures specific intentions of policy and  will benefit the U.S. economy in long run because of increased ties to development.

Option #2:  The U.S. enhances its current security guarantee and cooperation by expanding the types of weapon systems/services delivered to the KSA and making rapid initial delivery of key systems, which will provide public regional assurance of commitment.

Recent weapons agreement with the KSA totaling $110 billion (bn) U.S. dollars ($350 bn over 10 years) does not include long-range stand-off weapons (land, air or sea) capable of counter-battery fire that could reach Iran. The agreements do include air defense systems (Patriot, THAAD) in limited numbers. This option would expand the current weapons agreement to include such stand-off weapons and increases in air defense systems. This option also emphasizes rapid delivery of equipment currently available to satisfy urgency of KSA military leaders. Expanding service packages with equipment would require forward stationing of U.S. service members in the KSA to train, maintain and develop technical institutional knowledge of new systems, further promoting STEM initiatives of “Vision 2030.”

Risk:  This option only passively addresses KSA nuclear weapon development discussions as it seeks to address insecurity by attempting to conventionally deter Iran.

Gain:  The U.S. Department of Defense is currently seeking acquisition of long-range munitions in significant numbers and funding from this expanded agreement could be used to jump-start production. Rapid delivery would reinforce commitment to all allies in the region.

Other Comments:  Option #1 maximizes benefits for both parties, better than other options. While U.S. national interests are supported in the region, the U.S. will also benefit economically from partnerships built out of acknowledgment and support of the KSA’s effort to achieve “Vision 2030.” Option #1 will also demonstrate U.S. engagement in the region’s key interests and political/economic initiatives. Discussions of nuclear weapons development will be decisively dealt with in a non-public manner; an issue that, if handled publicly, could cause concern in other regional states.

Recommendation:  None.


Endnotes:

[1] “United Nations PaperSmart – Secretariat – UNODA – NPT – First Session (NPT) – Documents.” Accessed September 22, 2017. http://papersmart.unmeetings.org/secretariat/unoda/npt/2017-first-session-of-the-preparatory-committee/documents/

[2] “Will Saudi Arabia Acquire Nuclear Weapons? | NTI.” Accessed September 22, 2017. http://www.nti.org/analysis/articles/will-saudi-acquire-nuclear-weapons/

[3] “Why Did Saudi Arabia Buy Chinese Missiles?” Foreign Policy. Accessed September 22, 2017. https://foreignpolicy.com/2014/01/30/why-did-saudi-arabia-buy-chinese-missiles/

[4] “Saudi Vision 2030.” Accessed September 22, 2017. http://vision2030.gov.sa/en

[5] Department Of State. The Office of Electronic Information, Bureau of Public Affairs. “U.S.-Saudi Arabia Memorandum of Understanding on Nuclear Energy Cooperation,” May 16, 2008. https://2001-2009.state.gov/r/pa/prs/ps/2008/may/104961.htm

[6] Sanger, David E. “Saudi Arabia Promises to Match Iran in Nuclear Capability.” The New York Times, May 13, 2015, sec. Middle East. https://www.nytimes.com/2015/05/14/world/middleeast/saudi-arabia-promises-to-match-iran-in-nuclear-capability.html

[7] “Goals | Saudi Vision 2030.” Accessed September 22, 2017. http://vision2030.gov.sa/en/goals

Capacity / Capability Enhancement Joshua Urness Nuclear Issues Option Papers Saudi Arabia (Kingdom of Saudi Arabia) Weapons of Mass Destruction

Options for the U.S. to Deter China in the East & South China Seas

Lieutenant Colonel Christopher Curtin is a Field Artillery Officer with over 20 years of experience in the United States Marine Corps, including at the Pacific Division of Plans, Policies, and Operations at Headquarters Marine Corps.  Annie Kowalewski is a Chinese military and defense researcher at Georgetown’s Center for Security Studies. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Chinese militarization of artificial islands in disputed waters in the East and South China Seas.

Date Originally Written:  March 1, 2018.

Date Originally Published:  March 12, 2018.

Author and / or Article Point of View:  The authors are a military member and a defense researcher.  The authors believe that Chinese actions in the East and South China Sea are destabilizing and threaten to shift the balance of power in the Asia-Pacific region.

Background:  China is showing no evidence of slowing down its territorial aspirations within the “nine dash line” and continues to emplace anti-aircraft guns and close-in weapons systems on its man-made islands in the East and South China Seas[1].  China also uses its maritime militia to bully neighboring countries and extend Chinese fishing rights and territorial reach.  The United States has thus far been unsuccessful in responding to or deterring these Chinese challenges to the status quo.

Significance:  Chinese actions represent a “salami-slicing” strategy aimed at slowly changing regional norms and asserting Chinese dominance in the East and South China Seas.  This strategy allows China to exert influence and establish itself as a regional hegemon, thereby threatening the balance of power and U.S. primacy in the region.  Chinese militarization and power projection also threaten the United States’ allies and security partners, some of which the United States is bound by treaty to offer security assistance.

Option #1:  The United States invests in capabilities-based deterrents that can deter specific Chinese actions.

Risk:  China has objected to the capabilities that provide this type of deterrent, such as the new F-35B fighter operating on naval vessels in the pacific[2].  China may use the deployment of these capabilities as an excuse to finally militarize islands such as the Scarborough Shoal.

Gain:  A capabilities-based deterrent will make Chinese islands in the East and South China Seas vulnerable and, ultimately, a military liability rather than an advantage.  New technologies such as the F-35B allow the United States more flexibility when operating in the Pacific, by providing U.S. and allied commanders with a 5th generation aircraft that is normally only employed off traditional U.S. aircraft carriers.  Option #1 would not only help offset the eventual Chinese People’s Liberation Army Navy (PLA(N)) numerical superiority in the Pacific, but also demonstrate the U.S. commitment to modernizing a capability that has been historically suited for military operations against static, geographically isolated island targets.  This option may help shift China’s risk calculus when deciding how aggressively it hopes to militarize the islands, once it realizes that increased island investment actually increases vulnerability instead of capability.

Option #2:  The United States invests in strategic deterrence by helping boost allies’ and security partners’ amphibious capabilities.

Risk:  Boosting allies’ and security partner amphibious capabilities runs the risk of antagonizing China.  China has already strongly condemned proposed amendments to the Japanese constitution calling for a larger defense budget[3].  China has been known to use economic and political coercion to pressure regional countries to adopt, or abandon, policies.

Gain:  Boosting allies’ and security partner amphibious capabilities will be key to creating a sea force able to challenge an increasingly capable PLA(N).  This option would also allow allies and security partners to better deal with Chinese salami-slicing activities by providing them with the capability to deter or engage the Chinese on their own, rather than rely on U.S. deployments and assistance[4].

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Bader, Jeffrey. (2014). The U.S. and China’s Nine-Dash Line: Ending the Ambiguity. Retrieved from https://www.brookings.edu/opinions/the-u-s-and-chinas-nine-dash-line-ending-the-ambiguity/.

[2] Lockheed Martin. (2018). The F-26B Lightning II. Retrieved from https://www.f35.com/about/variants/f35b.

[3] Huang, Kristin. (2017, October 23). China to keep wary watch on Abe’s push to change pacifist constitution. Retreived from http://www.scmp.com/news/china/diplomacy-defence/article/2116635/china-keep-wary-watch-abes-push-change-pacifist.

[4] Erickson, Andrew. (2016, September 21). Seapower and Projection Forces in the South China Sea. Retreived from https://armedservices.house.gov/legislation/hearings/seapower-and-projection-forces-south-china-sea.

A2AD (Anti Access and Area Denial) Allies & Partners Annie Kowalewski China (People's Republic of China) Christopher Curtin Maritime Option Papers South China Sea United States

Options for the Strategic Goals of the Royal Canadian Navy

Lieutenant(N) Fred Genest is a Naval Warfare Officer in the Royal Canadian Navy and has deployed operationally in HMCS Charlottetown and HMCS Fredericton.  He is currently completing a Master of Public Administration degree while on staff at the Royal Military College of Canada.  He tweets at @RMCNavyGuy.  This article does not represent the policies or opinions of the Government of Canada or the Royal Canadian Navy.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Royal Canadian Navy (RCN) is in the process of recapitalizing its fleet but has not had a significant debate on its strategic goals in decades.

Date Originally Written:  December 19, 2017.

Date Originally Published:  March 12, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the senior Canadian political and military leadership.

Background:  Successive governments have asserted that Canada must deploy warships overseas to help maintain international security and stability[1].  Despite the RCN’s fleet recapitalization, there has been no debate about the best way to employ its forces.

Current RCN employment is based on history, Cold War thinking, and national myths. Canada sees itself as “punching above its weight” since the Second World War.  In that war, Canada gave control of its forces to the British and American leaders, with disastrous results at home such as the closure of the St. Lawrence seaway.  During the Cold War, Canadian warships deployed with North Atlantic Treaty Organization (NATO) Standing Naval Forces; this continues in the 21st century.  In its role as a “junior partner” since World War 2, Canada has followed the British and American lead in security and defence, subordinating its national interest to the alliance’s goals.

Significance:  As a sovereign middle power, Canada can set its own strategic priorities[2].  A commitment-capability gap—insufficient units to accomplish designated tasks—has been identified in the RCN since at least the 1964 White Paper on Defence[3].  The Canadian Department of National Defence (DND) saw this as normal at the end of the Cold War[4].  A 2013 report[5] stated that Canada would have difficulty meeting its readiness and force posture requirements until well into the 2020s.  Adjusting the current strategy could help reduce the gap.

Option #1:  Maintain the status quo with a medium global force projection navy[6], constant rotations with NATO, and a worldwide presence.

Risk:  With Option #1 the commitment-capability gap could grow.  The Government of Canada (GoC) intends to be prepared to participate in concurrent operations across multiple theatres[7].  However, readiness goals will not be met until the late 2020s[8], perhaps even until the Canadian Surface Combatant (CSC) project is completed in the 2040s.  Manning is, and will remain, a problem in certain areas like anti-submarine warfare and engineering.

By continuing the historical pattern of letting alliance leaders determine its strategy, Canada is abdicating its responsibility to protect its national interests.

Gain:  There is prestige in being one of the few navies that routinely deploys around the world[9], and RCN ships are recognized by its allies as the “go-to” during operations[10].  Option #1 improves Canada’s standing in the world, especially amongst peer allied nations, and allows Canada to exercise some leadership in international affairs.  This increased leadership role allows Canada to further its interests through diplomacy.

Furthermore, there is a morale-boosting effect in having regular overseas deployments; sailors, like soldiers, are keen to acquire “bits of coloured ribbon.”  In the RCN, this is achieved through overseas operations.  Regular overseas deployments or lack thereof may therefore be a factor in recruitment and retention.

There is also an internal political gain: by highlighting successes abroad, the GoC can raise awareness of the RCN and increase popular support for its foreign policy[11].  This is beneficial to the RCN, as popular support can translate into political pressure to obtain the tools required to achieve its institutional goals.

Option #2:  Downgrade the RCN to a medium regional power projection navy.  Cease overseas deployments except for specific, time-limited United Nations or NATO missions critical for peace or security.

Risk:  No longer routinely deploying internationally would be seen as a loss of prestige, and could lead to a loss of informal diplomatic leadership.

Local operations are often unpopular with sailors, and removing the opportunity to go overseas could lead to a loss of morale, with obvious effects on retention.  Also, one of the main ways Canadian sailors are trained for full-spectrum operations is through workups leading to an overseas deployment, and through multinational exercises while deployed.  Removing those training opportunities could reduce personnel readiness.  Option #2 could also harm the justifications for future, or even current, procurement projects.

Gain:  RCN commitments would be more in line with capabilities.  The GoC’s commitments will continue to be difficult for the RCN to meet in the next decade[12]; reducing the level of commitment would allow the RCN and its allies to plan based on actual capabilities.

Carefully selecting operations as part of Option #2 would also let Canada set its own priorities for its warships.  In recent years, Canadian ships have taken part in operations that were only vaguely related to Canadian interests, such as European Union migrant activities.  Not committing to those operations would free up the RCN to take part in more nationally-relevant operations.

With the CSC, Canada will maintain a full-spectrum capability, and being a medium regional power projection navy does not preclude overseas deployments.  Option #2 would bring Canada in line its European NATO peers, who keep their warships near their own waters, to protect their national interests.

Another challenge for the RCN is its maintenance budget, which is insufficient to meet all requirements. One of the effects is that ships have to swap parts to achieve material readiness and some repairs are left undone due to a lack of parts or available personnel.  Deployments, especially repeated overseas deployments by the same units, are hard on equipment. Reducing the number of overseas deployments under Option #2 would reduce premature failures and maintenance costs.

Other Comments:  Option #2 may not be feasible in the current political climate, but this does not preclude vigorous examination.

Recommendation:  None.


Endnotes:

[1] Department of National Defence. (2017a). Leadmark 2050: Canada in a New Maritime World. Ottawa. Retrieved from http://navy-marine.forces.gc.ca/assets/NAVY_Internet/docs/en/analysis/rcn-leadmark-2050_march-2017.pdf 
— Leadmark 2050 is a document produced by the Royal Canadian Navy to set its long-term vision beyond its five-year strategic plan. It is a follow-up to the 2001 publication, Leadmark 2020.

[2] Lindley-French, J. (2017). Brexit and the Shifting Pillars of NATO. Retrieved from http://www.cgai.ca/brexit_and_the_shifting_pillars_of_nato

[3] Department of National Defence. (1964). White Paper on Defence. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2012/dn-nd/D3-6-1964-eng.pdf — While it did not call it as such, the concern was evident.
  In Commonwealth countries, White Papers are used to provide information about government policy to parliamentarians and the public.  In Canada, there have been three White Papers on Defence since World War 2: 1964, 1971, and 1994. Major defence policy documents were also released in 1984, 1992 and 2017.

[4] Department of National Defence. (1987). Challenge and commitment : a defence policy for Canada. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2012/dn-nd/D2-73-1987-eng.pdf

[5] Department of National Defence – Chief Review Services. (2013). Evaluation of Naval Forces. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2015/mdn-dnd/D58-33-2013-eng.pdf 
— This document evaluated the RCN’s performance from 2008 to 2013, particularly the ability to generate and employ naval forces as directed by the GoC.

[6] Department of National Defence. (2017a). Leadmark 2050: Canada in a New Maritime World. Ottawa. Retrieved from http://navy-marine.forces.gc.ca/assets/NAVY_Internet/docs/en/analysis/rcn-leadmark-2050_march-2017.pdf

[7] Department of National Defence. (2017b). Strong Secure Engaged: Canada’s Defence Policy. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2017/mdn-dnd/D2-386-2017-eng.pdf

[8] Department of National Defence – Chief Review Services. (2013). Evaluation of Naval Forces. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2015/mdn-dnd/D58-33-2013-eng.pdf

[9] Department of National Defence. (2017a). Leadmark 2050: Canada in a New Maritime World. Ottawa. Retrieved from http://navy-marine.forces.gc.ca/assets/NAVY_Internet/docs/en/analysis/rcn-leadmark-2050_march-2017.pdf

[10] Department of National Defence – Chief Review Services. (2013). Evaluation of Naval Forces. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2015/mdn-dnd/D58-33-2013-eng.pdf

[11] Ibid.

[12] Ibid.

Canada Fred Genest Maritime Option Papers Strategy

China’s Options Towards the (Re)emerging Quadrilateral Security Dialogue

Adam Ni is a researcher at the Strategic and Defence Studies Centre, Australian National University.  His areas of interest include China’s foreign and security policy.  He can be found on Twitter @adam_ni.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The People’s Republic of China (China) is facing the (re)emergence of the Quadrilateral Security Dialogue, known as the Quad, consisting of the United States, India, Japan and Australia.  The unstated aim of the Quad is to constrain China’s growing power in Asia through possible military and economic cooperation that would raise the cost if Beijing challenges the status quo.

Date Originally Written:  February 28, 2018.

Originally Published:  March 5, 2018.

Author and / or Article Point of View:  The author is a scholar of China’s foreign and security policy.  The article is written from the point of view of Chinese decision-makers considering policy options in response to the Quad’s challenges.

Background:  The Quad can be traced back to 2007 when diplomatic efforts culminated in a multilateral naval exercise off the Bay of Bengal.  While the countries involved contended that their activities were not aimed at China, it was clear that these activities were largely a response to China’s growing power.  However, the Quad was short-lived with Australia pulling out in February 2008 under Chinese pressure[1].

Recently, the Quad has been revived in the face of an increasingly powerful and assertive China with expanded geopolitical ambitions.  In November 2017, officials from the Quad nations met on the sidelines of the East Asia Summit in the Philippines and agreed that a “free, open, prosperous and inclusive Indo-Pacific region” is in the interest of all countries[2].  This meeting was followed in January by the meeting of the Quad navy chiefs at the Raisina Dialogue in India.  During the meeting, Admiral Harry Harris, the Commander of U.S. Pacific Command, characterized China as a “disruptive, transitional force” in the region, and urged Quad nations to take measures against China’s “unilateral ways to change the use of global commons” and uphold “rule-based freedom of navigation[3].”  This sentiment was echoed by the navy chiefs of the other three Quad nations.

Significance:  While it is still too early to tell what the Quad would entail, in theory, it aims to constrain China’s growing power and to ameliorate China’s behavior by altering Beijing’s strategic calculus.  The military dimension of the Quad could take the form of expanded military cooperation that would raise the cost for China to use or threaten the use of force, including in relation to the East and South China Seas.  The economic dimension could take the form of expanded economic and infrastructure cooperation that would compete with China’s Belt and Road Initiative, a grand plan to reshape the world economy with China at the center.

Option #1:  Reassurance.  China continues to emphasize to the Quad nations its intent to develop peacefully through public statements and diplomatic channels.

Risk:  Without pushing back against the Quad, the Quad nations and others in the region may believe that China is unwilling to impose a cost on them for challenging China’s security and economic interests.  This lack of push back may lead to further coalescence of the Quad and may even draw in other states in the region that have become wary of China’s growing power, including those that have territorial disputes with China in the South China Sea.

Gain:  Option #1 may help to undermine the narrative of an ambitious China with a willingness to adopt coercive means to protect and advance its interests.  This option would strengthen the arguments of domestic forces in the Quad nations that advocate a softer approach in responding to Chinese power.

Option #2:  Punishment.  China applies a high degree of economic and diplomatic pressure on Quad nations to demonstrate the cost of challenging China’s interests and thus deter further challenges.  This option could take the form of economic coercion, formal diplomatic protests, and the downgrading of bilateral cooperation in key fields.

Risk:  Option #2 would strengthen the rationale for the Quad and the argument for constraining China’s power in the first place by demonstrating China’s willingness to adopt coercive measures against those that challenge its interests.  This option may further exacerbate the negative perception of China among the Quad nations, especially where there is already a lively debate about China’s influence (such as in Australia and the United States).  In addition, economic coercion may damage the Chinese economy and in the long run make the target economies less dependent on China.

Gain:  China demonstrating strength and resolve early on may lead to the collapse of the Quad if the Quad nations are not willing to pay the high cost of challenging China’s interests.  For example, Australia is highly dependent on China for trade and investment flows.  The Chinese government could put in place measures to reduce Chinese tourists or students from going to Australia and link these restrictions to Australia’s involvement with the Quad.  Such measures may also deter other regional countries from cooperating with the Quad against China’s interests.

Option #3:  Reassurance and caution.  China continues to emphasize its peaceful intent while also signaling its willingness to impose an economic and political cost on the Quad nations should they continue to challenge China’s interests.

Risk:  Option #3 may not be effective due to a lack of concrete cost imposed on the Quad nations, through, for example, coercive economic measures.  At the same time, the cautioning may be interpreted as an aggressive warning of China’s coercive intent, further exacerbating public anxiety in the Quad nations.

Gain:  This approach may be enough to forestall the further development of the Quad through providing reassurance but also signals China’s resolve to protects its interests.  Option #3’s key benefit is that it does not incur large political or economic cost for China immediately, but hinges Chinese retaliation on further Quad activities.

Other Comments:  The revived Quad is still in the early stages of its development, and it is too early to tell what the Quad would entail.  The above options are presented on the basis that the Quad may involve military and economic dimensions that challenge China’s interests, including its territorial claims in the South China Sea as well as its Belt and Road Initiative.  Given the diversity of strategic interests between the Quad nations in relation to China, there is a likelihood that the Quad will not develop beyond a mechanism for dialogue.

Recommendation:  None.


Endnotes:

[1] Indrani Bagchi, “Australia to pull out of ‘quad’ that excludes China,” Times of India, February 6, 2008. Available at: https://timesofindia.indiatimes.com/india/Australia-to-pull-out-of-quad-that-excludes-China/articleshow/2760109.cms.

[2] “India-Australia-Japan-U.S. Consultations on Indo-Pacific (November 12, 2017),” Ministry of External Affairs, Government of India, November 12, 2017. Available at: http://mea.gov.in/press-releases.htm?dtl/29110/IndiaAustraliaJapanUS_Consultations_on_IndoPacific_November_12_2017

[3] “‘China a disruptive power,’ say navy chiefs of Quadrilateral nations,” Times of India, January 19, 2018. Available at: https://timesofindia.indiatimes.com/india/china-a-disruptive-power-quad-nations-navy-chiefs/articleshow/62562144.cms.

Adam Ni Australia China (People's Republic of China) India Japan Option Papers United States

Options to Build Local Capabilities to Stabilise the Lake Chad Region

Fulan Nasrullah is a national security policy adviser based in Nigeria.  He currently works for an international research and policy advisory firm.  Fulan tweets at @fulannasrullah and blogs here.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government.


National Security Situation:  Counterinsurgency and stabilisation campaigns in the Lake Chad region.

Date Originally Written:  December 11, 2017.

Date Originally Published:  March 5, 2018.

Author and / or Article Point Of View:  This article is written from the point of view of a Nigerian National Security Advisor, offering options on the building of key local capabilities in the Lake Chad region to further degrade destabilising non-state armed groups in the region, while fostering stability in the area.

Background:  With the launch of conventional offensives by the Nigerian and Chadian armies in 2015, non-state armed groups in the Lake Chad region and Northeast Nigeria have lost much of the territory which they had earlier captured.  The successes of the regional governments’ conventional offensives have forced the non-state armed groups to return to a heavy emphasis on revolutionary and asymmetric warfare, which the local armies and governments are ill prepared to confront.

The conventional offensive resulted in a situation where local security capabilities, already inadequate, are  increasingly overstretched and worn down, by having to manage multiple security problems over such a wide area.

The Nigerian Army has an estimated 40,000-45,000 combat and support personnel (out of a total 130,000+ personnel) deployed in Northeast Nigeria, in over forty combat battalions.  These include the battalions that make up the in theatre 7 and 8 Divisions, plus those backfilling from 3, 1 and 2 Divisions.  These forces represent the majority of the Nigerian Army’s combat deployable strength, most of whom have been serving a minimum of 2 years of continuous deployment in the Northeast theatre.

However, unlike the much larger Nigerian military, other regional armies involved in this conflict have fewer manpower and material resources to expend.  These less capable forces struggle to combat an insurgency that has proven itself adaptable, and which despite losing conventionally, has sustained itself and progressively gained momentum on the asymmetric front.  The insurgency specifically uses armed groups to offset the disadvantage they suffer in conventional strength, through guerrilla operations, terror, and a heavy focus on information operations and ideological education and propagation targeted at local populations in rural areas.

Weak institutional capabilities, in addition to lack of intelligence and analysis-based understanding of these armed groups, have contributed to multiple conflicting and unrealistic strategies from the regional states, plus enhanced insurgent momentum.

Significance:  United States investment in building local capabilities is a necessity for both the U.S. and Lake Chad regional states, both to degrade active non-state armed groups in the region, and to build, foster, and maintain stability.  Without this investment by the United States, regional states will  be unable to stop the conflict which, though currently at a  strategic stalemate, could turn into a strategic victory for the insurgent groups.

While Jamaa’atu Ahlis-Sunnati Lid-Da’wati Wal-Jihad poses a serious threat to local stability, the Islamic State’s West African Province (ISWAP) is a greater worry for United States’ interests globally and in the long-term.  The power vacuum created by regional states failing to degrade insurgent capabilities[1], thus ceding territory, will create a huge opening for ISWAP and its local affiliates in the Lake Chad, Sahel, and Libyan regions to exploit.  Power vacuums have already been created in the Lake Chad Islands[2], and will be further created as the Nigerian government plans to abandon the rural Borno State[1].

Option #1:  The U.S. invests solely in a kinetic buildup, by establishing a regional infantry and counterinsurgency training centre in Nigeria, in the mold of the Fort Irwin National Training Centre, drawing on lessons the U.S. military learnt in Iraq and Afghanistan, to train local militaries.  A kinetic build up would also involve providing training and funding for more troops and units for the Nigerian and Chadian armies.  These troops would be dedicated to the clearing out of the Lake Chad Islands and areas around the Lake, in addition to training and funding more special operations units with the firepower and mobility necessary to engage in relentless pursuit of insurgents.  Finally, this option would invest in training, funding, and arming already existing local volunteer militia and paramilitary organisations such as the Civilian Joint Task Force in Nigeria, while embedding U.S. advisors with both militia, paramilitary, and regular armed forces units down to the platoon level.

Risk:  Option #1 results in the U.S. de facto owning the war against non-state armed groups in the Lake Chad region.  In the U.S. this owning would lead to deeper engagement in yet another foreign war in an era of President Donald Trump’s “America First,” and increase the risks of more American combat deaths in this region with the accompanying political blowback.  Within the region, Option #1 would increase resistance from local political and military elements who do not want to admit they are incapable of dealing with the crisis themselves, or who may simply be war profiteers not interested in this conflict ending.

Gain:  Option #1 results in the degrading of the military, logistic, and organisational capabilities of ISWAP and Jamaa’atu Ahlis-Sunnati Lid-Da’wati Wal-Jihad and the rolling back of ISWAP’s growing structure in the region.  This degrading and rolling back would place destabilising actors under constant crushing military pressure, increase the tactical performance of local military forces, and use existing volunteer militias to stabilize the government-controlled areas when the conventional military forces depart.  All of the preceding will enable military units to concentrate on offensive operations thus eliminating the ability of global-level actors, e.g. the Islamic State and Al-Qaeda, to use bases and ungoverned spaces in the region to attack U.S. interests.

Option #2:  The U.S. invests in a non-kinetic build-up, by helping to establish and expand regional states’ information operations capabilities particularly in electronic warfare, psychological operations, and targeted information dissemination via “Radio-In-A-Box” and other mediums.  Option #2 also includes the U.S. providing training and funding for comprehensive reformations of local intelligence services to create lacking signals intelligence, human intelligence, and intelligence analysis capabilities.  Option #2 will enhance the U.S. Security Governance Initiative programme[3] which seeks to enhance local civil administration capabilities in law enforcement, anti-corruption, and criminal justice, and enhance local capabilities to deliver humanitarian support and government services to communities in the conflict zone.

Risk:  Option #2 reduces emphasis on degrading insurgent capabilities so soft-power efforts are properly funded.  This option would leave the insurgents alone and lead to indirect validation of regional government falsehoods that the insurgents have been defeated and the war is over.  This indirect validation will foster nonchalance and complacency from states of the region, to the strategic advantage of the insurgents. Option #2 will ensure de facto reduction of pressure on the insurgents, which gives room for the insurgents and their external allies to exploit the resultant power vacuum.

Gain:  Option #2 strengthens local governance capabilities, increases civil stability in government controlled areas, and is less expensive, less visible, and shorter term in an era of “America First.”  Option #2 would greatly reduce the risk of American combat deaths.

Other Comments:  None

Recommendations:  None.


Endnotes:

[1] Carsteen, Paul and Lanre, Ola. (December 1, 2017) “Nigeria Puts Fortress Towns At Heart Of New Boko Haram Strategy”, Reuters, retrieved from: https://www.reuters.com/article/us-nigeria-security-borno/nigeria-puts-fortress-towns-at-heart-of-new-boko-haram-strategy-idUSKBN1DV4GU

[2] Taub, Ben (December 4, 2017), “Lake Chad: World’s Most Complex Humanitarian Disaster”, New Yorker Magazine, retrieved from: https://www.newyorker.com/magazine/2017/12/04/lake-chad-the-worlds-most-complex-humanitarian-disaster

[3] Chalfin, Julie E. and Thomas-Greenfield, Linda. (May 16, 2017), “The Security Governance Intiative” PRISM Vol 6. No.4, Center For Complex Operations, National Defense University (US) retrieved from: http://cco.ndu.edu/News/Article/1171855/the-security-governance-initiative/

Africa Fulan Nasrullah Insurgency & Counteinsurgency Irregular Forces Lake Chad Option Papers United States

Call for Papers: The Pacific

89920-050-809B5D63

Background:

Divergent Options is a non-politically aligned national security website that, in 1,000 words or less, provides unbiased, dispassionate, candid articles that assess a national security situation, present multiple options to address the situation, and articulate the risk and gain of each option.  Please note that while we assess a national security situation and may provide options, we never recommend a specific option.

Call for Papers:

Divergent Options is calling for papers assessing situations or discussing options related to national security interests with a Pacific Ocean nexus.

Please limit your article to 1,000 words and write using our Options Paper or Assessment Paper templates which are designed for ease of use by both writers and readers alike.

Please send your article to submissions@divergentoptions.org by April 13th, 2018.

If you are not interested in writing on this topic, we always welcome individual articles on virtually any national security situation an author is passionate about.  Please do not let our call for papers cause you to hesitate to send us your idea.  We look forward to hearing from you!

One of our Strategic Advisors, Dr. Kori Schake, offered the following prompts to inspire potential writers:

– Assess the potential second-order effects of a U.S. preventative strike on North Korea.

– Develop options to compensate for the U.S. losing blue water invulnerability and air superiority in potential conflicts with China.

Our Twitter and Facebook followers offered the following prompts to inspire potential writers:

– Assess U.S. national interests regarding North Korea and their associated intensities.

– What options does the U.S. have regarding North Korea?

– Assess the threat of sea-based missile capabilities.

– What options do countries have to defend against sea-based missile capabilities?

– Assess the threat to freedom of navigation posed by Chinese man-made islands in the Pacific.

– What additional options does China have in a military conflict in the Pacific now that they have built and militarized islands?

– What options does the U.S. have towards the tri border region of Malaysia, Indonesia, and the Philippines?

– What options does the U.S. have regarding joint military training with China?

– Assess if a U.S. military-to-military relationship with Japan prior to World War 2 would have impacted the likelihood of war.

– Assess the impact narratives about World War 2 have on today’s security environment.

– What options does the U.S. have to balance its priorities and risk as it shifts away from the Middle East and towards the Pacific?  A specific focus on shifting strategic air assets, munitions, and wartime reserve and prepositioned stocks stocks away from two still active wars in Iraq and Afghanistan and partner activities in Yemen is welcome.

Call For Papers Option Papers

Should I Stay or Should I Go Now?  Options for the U.S. Presence in Syria

Dr. Christopher Bolan has served in Jordan, Tunisia, and Egypt and worked as a Middle East foreign policy advisor to Vice Presidents Gore and Cheney.  He presently teaches and researches national security issues at the Strategic Studies Institute at the U.S. Army War College.  He can be found on Twitter @DrChrisBolan.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  U.S. Force Posture in Syria following the strategic defeat of the Islamic State (IS).

Date Originally Written:  February 23, 2018.

Date Originally Published:  February 26, 2018.

Author and / or Article Point of View:  Author writes from the perspective of a seasoned regional analyst focusing on the Middle East.

Background:  The U.S. military battle against IS is nearing completion in both Iraq and Syria.  An intensified U.S. air campaign in support of local ground forces has effectively (and literally) destroyed the physical infrastructure of the so-called IS “caliphate” that at its peak occupied a territorial expanse roughly equivalent to that of Great Britain, extended its brutal authority over 11 million people, and gave it access to annual economic resources estimated at $1 billion[1].  In Iraq, a combination of U.S.-equipped and trained Iraqi security forces fighting alongside a variety of Shi’ia militia groups (some backed by Iran) allowed Iraqi Prime Minister Haider al-Abadi to declare victory over IS in early December 2017.  In Syria, Kurdish and Syrian Arab forces enabled by U.S. special operations forces and an aggressive coalition bombing campaign liberated the IS caliphate’s self-proclaimed capital at Raqqa last fall and IS is now largely restricted to the Idlib province.

Significance:  The combined coalition military advances in both Iraq and Syria represent the strategic defeat of IS as a terrorist organization capable of holding territory in the Middle East.  These visible defeats strike at the heart of IS’s claim to leadership of the global jihadist movement.  The destruction of the ‘caliphate’ leaves IS a much diminished and impoverished organization.  Nonetheless, these significant battlefield victories do not entirely eliminate the IS threat as it remains capable of inspiring (if not planning) attacks that threaten regional instability and target Western interests.  In Iraq, a continued U.S. military presence codified through traditional security assistance programs in coordination with the central Iraqi government in Baghdad is virtually a foregone conclusion.  However, Syria presents a different strategic calculus for U.S. policymakers as they weigh options at a time when Syrian President Bashar al-Assad appears to be consolidating his control with the active support of his allies in Moscow and Tehran.

Option #1:  Establish a long-term U.S. military presence in Syria.  U.S. Secretary of State Rex Tillerson announced in mid-January 2018 that the U.S. “will maintain a military presence in Syria” for an indefinite period of time[2].  In doing so, Tillerson committed the U.S. to achieving an expansive set of strategic objectives that include: ensuring the defeat of IS and al-Qa’ida; diminishing the influence of Iran; facilitating the return of Syrian refugees; advancing a United Nations (UN)-led political resolution to the crisis; and guaranteeing that Syria is free of weapons of mass destruction.

Risk:  The continued presence of the U.S. military in Syria is opposed to one extent or another by virtually every other important actor in Syria including the internationally recognized government of President Bashar al-Assad, Russia, Iran, and even North Atlantic Treaty Organization (NATO) ally Turkey.  The proximate defeat of IS and the failure of the U.S. Congress to explicitly authorize U.S. military operations in Syria seriously erodes the international and domestic legal basis for this presence.  More importantly, the actual risk of direct military conflict between the U.S. and any one of these outside actors or their local proxies is real and growing.  In early February 2018, the U.S. conducted defensive strikes killing hundreds of Syrian troops and dozens of Russian contractors.  Meanwhile, the U.S. announcement that it was creating a Kurdish security border force in northern Syria prompted the ongoing Turkish incursion into Afrin that is now threatening a direct military confrontation between a NATO ally and both the Syrian Army and U.S-backed Kurdish militias.  Lastly, Turkish President Recep Erdogan has directly threatened the U.S. with a punitive ‘Ottoman slap’ if the U.S. doesn’t end its support for Kurdish elements or abandon its positions further east in Manbij[3].

Gain:  Russian and Iranian military support to Assad have given him the decisive advantage in the civil war restoring his control over the majority of Syria’s population and key economic centers.  Given this existing reality, an indefinite U.S. military presence in eastern Syria may well be the only concrete leverage that the U.S. has to influence the behavior of the other actors in this crisis.  To accomplish the wide-ranging goals of U.S. strategy as articulated by Tillerson, however, this presence will likely need to maintained or even expanded for the foreseeable future.

Option #2:  Withdraw U.S. military forces from Syria.  The U.S. could use the recent battlefield victories against IS as a justification to declare ‘mission accomplished’ and begin a phased and conditions-based withdrawal of forces from Syria.

Risk:  As Tillerson himself argued, a U.S. withdrawal from Syria could create a security vacuum which IS and other Islamist terrorist groups would exploit to regain a foothold in eastern Syria.  Moreover, with the UN Geneva peace process moribund, the absence of a physical U.S. presence on the ground will leave policymakers with precious little direct leverage to influence the ultimate political or military outcomes in Syria.  This approach also feeds the perception of declining U.S. regional influence and could bolster the reputation of Russia and Iran as reliable partners.

Gain:  U.S. policymakers could use a phased withdrawal as diplomatic leverage to press for the withdrawal of all foreign forces from Syria to include Russia, Iran, and their paramilitary proxies (e.g., Hizbollah, Islamic Revolutionary Guards Corps).  The scale and timing of the U.S. withdrawal could be explicitly tied to the departure of these other foreign forces, as well as to progress in defeating the remnants of IS.  This would accomplish the two most critical U.S. strategic objectives outlined by Tillerson:  the defeat of IS; and reducing the influence of Iran.  Additionally, such a phased withdrawal would relieve the U.S. of the substantial costs of reconstruction in Syria which is estimated to easily exceed $250 billion[4].  Finally, the prospect of an imminent U.S. military withdrawal would increase pressure on Kurdish elements to come to a workable compromise with both Damascus and Ankara and thereby bolster prospects for a durable political outcome in Syria that enhances regional stability.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] John Feffer, “The Fall of the House of ISIS,” Foreign Policy in Focus, October 25, 2017.  Available at: http://fpif.org/fall-house-isis/.

[2] Secretary of State Rex W. Tillerson, “Remarks on the Way Forward for the United States Regarding Syria,” Hoover Institute at Stanford University, January 17, 2018.

[3] Bethan McKernan, “Turkish President Erdogan offers US ‘Ottoman Slap’ ahead of Rex Tillerson’s visit to Turkey,” The Independent, February 15, 2018.

[4] UN estimate quoted by Somini Sengupta, “Help Assad or Leave Cities in Ruins?  The Politics of Rebuilding Syria,” The New York Times, December 3, 2017.

Dr. Christopher Bolan Islamic State Variants Option Papers Syria U.S. Army War College Violent Extremism

Options for Streamlining U.S. Department of Defense Decision Making

Dr. John T. Kuehn has served at the U.S. Army Command and General Staff College, Fort Leavenworth, Kansas since 2000.  He retired from the U.S. Navy in 2004 with the rank of Commander.  He presently teaches as a Professor of Military History in the Department of Military History, as well as teaching for Norwich University (Vermont), Naval War College (Rhode Island), and Wolverhampton University (UK) as an adjunct professor.  He can be found on Twitter @jkuehn50 and writes at https://networks.h-net.org/node/12840/blog.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

Editor’s Note:  This article is an entry into our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  The author submitted this article under the contest heading of Most Disruptive.


National Security Situation:  Updating the National Security Act of 1947 (NSA 47) so that Department of Defense (DoD) decision-making is as streamlined as possible.

Date Originally Written:  August 30, 2017.

Date Originally Published:  December 4, 2017.

Author and / or Article Point of View:  The author is a retired Naval Officer and values a return to a national defense structure that includes a broader range of advice and decentralization of power as represented by cabinet secretaries.

Background:  NSA 47 has outlived its utility in the service of the national security of the United States.  In a post-Cold War world of the 21st Century, the system the United States used prior to 1947 is much more suitable to its traditions, Constitution, and the range of threats posed today.  NSA 47 has gone beyond the utility it provided to the United States after World War II.  NSA 47 once had value, especially in a bi-polar Cold War strategic dynamic informed by the terror of atomic and thermonuclear weapons[1].  However, NSA 47’s utility and value have degraded, especially with the end of the Cold War in 1989-1991.  History moved forward while the United States’ macro-security structure remained static.  Subsequent reforms to the 1947 re-organization, such as that by the Goldwater-Nichols Reform Act of 1987 (GNA), have merely “polished the bowling ball,” not recast it into a new shape[2].

Significance:  The Project for National Security Reform (PNSR) began looking at this issue in 2008 and found that NSA 47 no longer fit the strategic environment we are currently facing or will face in the 21st Century[3].  The 2011 PNSR did a good job of describing the problem and challenges in reforming and reorganizing the system[4].  However, the 2011 PNSR provided little else—no bold recommendations about how to make this happen.  What follows are options I modified from a summation of recommendations the PNSR solicited from me in 2011-12:

Option #1:  Disestablish the position of Secretary of Defense (SecDef) and the Office of the Secretary of Defense (OSD).  The SecDef / OSD structure has too broad a span of control and this limits the scope of strategic advice Presidents receive.  The SecDef functions would move back under the civilian secretaries of the military departments: Army, Navy and Air Force.

Risk:  Medium.  The risk here was much lower when I first made this recommendation in 2010.  It is higher right now because of the North Korean situation and the need for unity of command of the nuclear arsenal if the worst happens and the U.S. needs to conduct a retaliatory strike should North Korea use nuclear weapons first.  However, the ultimate transfer of that unity of command could go to the Chairman, Joint Chiefs of Staff (JCS) although the President would have to be a direct participant in any nuclear release, just as he is now.  One need not burn the Pentagon down and start afresh, but certainly who answers to whom is a legitimate topic worthy of serious discussion and, more importantly, serious action—by Congress AND the President.

Gain:  DoD decision-making is decentralized to the Military Departments and thus decisions are made quicker.  OSD manpower is redistributed to the Military Departments and the Office of the Chairman of the Joint Chiefs of Staff thus increasing their respective capability to support the military operations conducted by the Combatant Commands.

Option #2:  Move the civilian Secretaries of Navy, Air Force, and Army back into the cabinet, but retain the SecDef, similar to the way things were organized prior to and during World War II.  The SecDef would still be a part of cabinet, but would be co-equal with the other civilian service secretaries.  Retain the current JCS organization and staff, but enhance the Chairman’s role on the National Security Council (NSC).  As an appointed position, the Chairman can always be relieved in the same manner that President Truman relieved General MacArthur.

Risk:  Low to medium low, for similar reasons listed for Option #1, the security situation is fluid as of this writing with threat of nuclear war.  No other current “crisis,” though, need impede the move to reform.  JCS Chairman role on NSC should include a substantial decrease in the size of the NSC staff, which should leverage more the capabilities of existing organizations like the JCS and the U.S. Intelligence Community.

Gain:  A balance is struck between decentralizing and streamlining decision-making to the Secretaries of the Military Departments while maintaining a SecDef in a coordinating role.  Option #2 is likely more palatable to Congress as current structures are maintained manpower wise yet power is shifted around.

Other Comments:  Congress must be a part of the solution[5].  Policy recommendations need Congressional oversight, responsibility, and accountability so that if a President goes against an NSC-recommended policy or strategy Congress will be in the loop.  One fear has been that this might drive the U.S. toward a “cabinet” system of government and curtail Presidential power.  That fear sounds like a benefit to me.

Additionally, there will be a need for a national debate that includes social media—where politicians quit pre-emptively tweeting and sniping at each other and instead “message” about national security reform—staying on task and staying on message as the public participates in the dialog.  We might turn again to the past, as a generation of millennial Publius’s step forward in a new round of Federalist Paper-type thinking and writing to kick these ideas around and to build real consensus—not just that of Washington insiders[6].  There is no deficit of political and intellectual talent out there-despite what the pundits say and write.  All too often, however, we consult the advice of specially constituted commissions (such as that for 9/11) and then ignore their advice or imperfectly implement only the portions that stop the media howl.

The United States has time.  The current system, as ineffective as it is, is not so broken that we must act quickly and without reflection.  However, I prefer to close with an even more powerful means of highlighting the problem—a story.  Every year, at the end of my World War II series of classes to military officers attending the Army Command and General Staff Office Course, I post the following questions: “The security system that existed prior to and during World War II was so ineffective that it had to be replaced in 1947, right?  This was the same system that the United States used to lose the most desperate and far-ranging war in its history, right?”  Wrong—we won World War II–handily–and we can win again by adopting a system that proved successful in a pre-Cold War world that looks a lot like our world of today.  So-called progress does not always lead to better solutions.  The founders looked backwards to go forward, so can we.

Recommendation:  None.


Endnotes:

[1] This is not the first time the author has made this argument, see John T. Kuehn, “Abolish the Office of the Secretary of Defense?” Joint Force Quarterly, Issue 47, 4th Quarter 2007, 114-116.

[2] Recent attempt have been made to have a second round of GNA via the Project for National Security Reform effort, see James Locher et al. “Project for National Security Reform: Preliminary Findings” January 2008 (hereafter PNSR 2008), Washington, D.C.; and more recently the follow-on report from the PNSR from November 2011, “AMERICA’S FIRST QUARTER MILLENNIUM: ENVISIONING A TRANSFORMED NATIONAL SECURITY SYSTEM IN 2026,” see www.pnsr.org (accessed 7/31/2017). Full disclosure, the author was an unpaid consultant for the second report.

[3] PNSR, 2008 and 2011.

[4] PNSR, 2011, p.5.

[5] John T. Kuehn, “I Liked Ike . . . Whence Comes Another? Why PME Needs a Congressional Advocate,” in Joint Force Quarterly 83 (4th Quarter, October 2016): 40-43.

[6] Publius was the pen name for the authors of the Federalist Papers who argued the merits and reasoning behind the Constitution: Alexander Hamilton, John Jay, and (especially) James Madison. See, Hamilton, Jay, and Madison, The Federalist Papers (New York: Penguin, 1987), paperback.

Contest Governing Documents John T. Kuehn Option Papers United States

Options for U.S. National Service

Adam Yefet has a Master’s degree in International of Affairs at George Washington University’s Elliott School of International Affairs.  He is based in Israel.  He can be found on Twitter at @YefetGlobal.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

Editor’s Note:  This article is an entry into our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  The author submitted this article under the contest heading of Most Disruptive.


National Security Situation:  A revised National Security Act of 1947 could create a national service requirement.

Date Originally Written:  September 30, 2017.

Date Originally Published:  November 20, 2017.

Author and / or Article Point of View:  Adam Yefet has a Master’s degree in International Affairs from George Washington University.  He writes here as an American concerned with U.S. National Security.

Background:  Seventy years after the signing of the 1947 National Security Act, the world is still an unpredictable and dangerous place, but it is not governed by the same fears.  In 1947, the chief concerns of U.S. national security professionals were re-establishing European stability, and preparing for the coming Cold War with the Soviet Union, and ensuring the United States remained atop the new post-war order in an age of industrialized, mass-produced warfare and nuclear bombs.  The urgency of a threat could be measured in the number of troops, tanks, ships, missiles etcetera that enemy states could marshal.  As such, the 1947 National Security Act established an American military and intelligence complex meant to sustain American interests in the face of these challenges.  Today, conventional warfare remains a primary concern, but not the only one.

Significance:  The modern American political environment has revealed intense cleavages in American socio-politics.  Social trust seems on the verge of breakdown as citizens retreat to curated information bubbles not limited to of-the-day political commentary but expanding into the very facts and analysis of events both modern and historical.  Shared truths are shrinking and becoming a thing of the past.  Internal divisions are the greatest existential threat to the United States of America.  A 2017 National Security Act that includes provisions to bridge this divide could reunite the American people behind the values that helped shape America.

Option #1:  Mandatory National Service.  

A new National Security Act could include a provision for one year of mandatory national service to be required of all Americans to be completed between a certain age rage, for example between the ages of 18 and 25.  There would need to a be a number of service options, some existing, some needing to be created, including service in any of the military branches (which would require longer service) or one of several national organizations such as Peace Corps, Teach for America, and City Year.  New services to be created could involve public, local community, and international development, such as public works projects, agriculture development, vocational work, early childhood development, and senior care.  National service will affect all Americans equally, across socioeconomic, ethnic, cultural, gender, racial, and religious lines. No one can buy their way out of the program.

Risk:  The creation of a national service program in peaceful and relatively prosperous times would be a massive economic and political endeavor that would reshape several industries with an influx of cheap labor.  The financial investment on the part of the government to train, house, and pay even a meager salary would be enormous.  The transition process within affected industries would be long and complicated and would face a winding legal path.  The executive power to do so and the consent of the government and the governed to receive it may be impossible to create outside the aftermath of a sharp crisis like World War II and the ensuing Cold War that brought about the original National Security Act.

The gaping political divide and widespread political disillusionment the program seeks to solve would be two of the greatest threats to undermine the program before it got started.  A requirement of national service would be anathema to many Americans as an assault on their principles of limited government and freedom.  Bipartisan political support may not be enough in the current political environment.  Prolonged resistance to service could be politicized and create another ugly divide within the nation.  A program plagued by political divides and undermined from the beginning would risk doing more harm than good.

Gain:  This requirement to serve would be an opportunity for young Americans to live, work, and consociate and will bind them to each other in common national cause.  Service will create an equal opportunity for American citizens to work and learn in a team environment with a sense of national purpose.

Americans found a significant common bond in the 20th century in the course of winning two world wars, crossing the Depression in between, and living the fears and competitions of the Cold War.  Success in these endeavors came from a sense of purpose, for American victory, and required massive government investments in people, jobs, infrastructure and science that paid off in the creation of our modern state and economy a modern global order that has delivered peace and prosperity to more people than at any previous time in human history.  A mandatory national service program would give all American’s a common bond of shared burden that comes before political divisions.

Option #2:  Re-Instate the Draft.

The United States military is stretched thin from the two longest wars in the country’s history, and the global deployment of troops and resources.  If these conflicts are going to be seen to a successful end while maintaining the U.S. military as the strongest in the world, the United States must ask more of its citizens.  Global politics are entering a transitional period heralding the decline of the American-led global order established after World War II.  Interstate and intrastate conflicts are spreading across the Middle East, Asia, and Eastern Europe.  The future of international relations and affairs is unknowable but the U.S. military and intelligence apparatus should be prepared for catastrophic events.  The Selective Service and Training Act[1] already requires young men, and now women, to register.  The foundation already exists for America’s men and women to be called to service.

Risk:  The peacetime draft of potentially millions of citizens will require the enlargement of the already massive Defense Department budget.  The long-term increased costs for veteran support areas of the government, especially health care, would be significant.  The influx of potentially millions of troops, many of whom do not want to be there will demand experienced leadership from military and political figures who may not be up to the task.  The draft may have the effect of lowering the standards of the military branches as they seek to find places for new soldiers and retain them into the future to meet the demands of American foreign policy.

Gain:  All Americans will share the burden of America’s global role as a military and economic superpower.  Service will give the United States government the manpower it needs to be prepared for the conflicts of the present and future.  The American people called to service will have a greater appreciation of their responsibility as citizens in the management of American democracy and American foreign policy.  The draft would pull in America’s best and brightest for service to the nation’s security.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] 50 U.S.C. – SELECTIVE TRAINING AND SERVICE ACT OF 1940. (n.d.). Retrieved October 27, 2017, from https://www.gpo.gov/fdsys/granule/USCODE-2009-title50/USCODE-2009-title50-app-selective-dup1

Contest National Service Option Papers United States

Victory Over the Potomac: Alternatives to Inevitable Strategic Failure

Michael C. Davies has written three books on the Wars of 9/11 and is a progenitor of the Human Domain concept.  He currently works for an international law firm.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 

Editor’s Note:  This article is an entry into our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  The author submitted this article under the contest heading of Most Disruptive.


National Security Situation:  Unless the National Security Act of 1947 is scrapped and replaced, the United States will inevitably suffer grand strategic failure.  After 16 years of repeated, overlapping, and cascading strategic failures[1], the ineptitude of the U.S. national security system has been laid bare for all to see.  These failures have allowed America’s enemies to view the National Security Act’s flaws and provided the time and space to develop effective competitive strategies against the U.S. and successfully threaten both the international order and the U.S. social contract.

Date Originally Written:  September 10, 2017.

Date Originally Published:  October 9, 2017.

Author and / or Article Point of View:  This article is written from the point of view of an individual who previously conducted research on the Wars of 9/11 at the U.S. National Defense University and concluded that the United States of America, as a government, a military, and a society, is currently functionally and cognitively incapable of winning a war, any war.

Background:  Because the U.S. national security system, modeled via the 1947 Act, is built for a different era, different enemies, and different mental models, it is incapable of effectively creating, executing, or resourcing strategies to match the contemporary or future strategic environment.  The deficiencies of the current system revolve around its inability to situate policy and politics as the key element in strategy, competitively match civilian and military forces with contemporary and future environments and missions, maintain strategic solvency, end organizational stovepipes, and consider local and regional politics in strategic decision-making.

Significance:  Without immediate and revolutionary reorganization, a series of ever-more consequential strategic failures is inevitable, eventually leading to grand strategic failure.

Option #1:  Revolutionary Reorganization.

The list below offers the necessary revolutionary reorganization of the national security system to negate the previously mentioned deficiencies.

  1. Command and control of the Geographic Combatant Commands (GCCs) is moved to the Department of State.  Senate-approved civilian Ambassadors are given unity of command over all civilian and military forces and policymaking processes in their area.
  2. The Department of State is reorganized around foreign policymaking at the GCCs, super-empowered Chiefs of Mission in each country[2], and functional areas of expertise[3].
  3. The Department of Defense is reorganized into mission-centric cross-functional corps[4].
  4. The intelligence community is rationalized into a smaller number of agencies and reorganized around, and made dependent on, the above structures.
  5. The National Security Council is curtailed into a presidential advisory unit, a grand strategy unit headed by the Secretary of State to align national objectives, GCC policies, civilian and military force structures, and budgets, and a red team cell.
  6. The Joint Chiefs of Staff remain, but transfer all organizational power to the GCCs and the cross-functional corps.  The Chairman remains as the President’s chief military advisor.  The heads of each military Service will retain a position as military advisors to the President and ceremonial heads of the respective Services.
  7. A second tier is added to the All-Volunteer Force to allow for rapid scaling of civilian personnel into military service as needed, negating the need for National Service and the use of contractors.  Second tier individuals undertake a fast-track boot camp, provided functional training according to skills and need, given operational ranks, and assigned to units as necessary to serve a full tour or more.

Because of the magnitude of power given to the Executive Branch by this Act, the War Powers Resolution must be redrafted into a constitutional amendment.  Congress must now approve any action, whether a Declaration of War or an Authorization for the Use of Force (AUMF), within 5 days of the beginning of combat by simple majority.  The President, the relevant GCC Ambassador, and the relevant country-team Ambassador(s) will be automatically impeached if combat continues without Congressional approval.  All majority and minority leaders of both houses and the relevant Committees will be automatically impeached if an authorizing vote is not held within the 5-day period.  Any AUMF must be re-authorized at the beginning of each new Congressional term by a super-majority of both houses.

Risk:  This reorganization will cause significant turmoil and take time to organizationally and physically relocate people, agencies, and bureaucratic processes to the new structure.  Large-scale resignations should be expected in response also.  Effective execution of policy, processes, and institutional knowledge will likely be diminished in the meantime.  Furthermore, the State Department is not currently designed to accept this structure[5], and few individuals exist who could effectively manage the role as regional policy proconsul[6].  This reorganization therefore demands significant planning, time, and care in initial execution.

Gain:  This reorganization will negate the current sources of strategic failure and align national policy, ground truth, and effective execution.  It will free the President and the Executive Branch from attempting to manage global politics on a granular level daily.  It will enable local and regional expertise to rise to the forefront and lessen the impact of ideologues and military operationalists on foreign policy.  And above all else, America will be capable of winning wars again.

Option #2:  Goldwater-Nichols for the Interagency.

The implementation of all the recommendations from the Project for National Security Reform’s, Forging a New Shield[7], will allow for superior strategic decision-making by lessening the negative impact of organizational stovepipes.

Risk:  The maintenance of a strong President-centric system, Departmental stovepipes, and the military Services as independent entities that overlay Forging’s proposed interagency teams retains too much of the current national security system to be forcefully effective in negating the factors that have caused repeated strategic failures.  This option could be also used to give the appearance of reform without investing the time and energy to make its goals a reality.

Gain:  This reorganization can be readily adopted onto current national security structures with minimal disruption.  Demands for a ‘Goldwater-Nichols for the Interagency’ is an oft-repeated call to action, meaning that significant support for these reforms is already present.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Kapusta, P. (2015, Oct.-Dec.) The Gray Zone. Retrieved Sept. 10, 2017 from https://www.dvidshub.net/publication/issues/27727

[2] Lamb, C. and Marks, E. (2010, Dec.) Chief of Mission Authority as a Model for National Security Integration. Retrieved Sept. 10, 2017 from http://ndupress.ndu.edu/Portals/68/Documents/stratperspective/inss/StrategicPerspectives-2.pdf

[3] Marks, E. (2010, Mar.) A ‘Next Generation’ Department of State: A Proposal of the Management of Foreign Affairs. Retrieved Sept. 10, 2017 from http://www.unc.edu/depts/diplomat/item/2010/0103/oped/op_marks.html

[4] Brimley, S. and Scharre, P. (2014, May 13) CTRL + ALT + DELETE: Resetting America’s Military. Retrieved September 10, 2017, from http://foreignpolicy.com/2014/05/13/ctrl-alt-delete

[5] Schake, K. (2012, March 1) State of Disrepair: Fixing the Culture and Practices of the State Department. Retrieved Sept. 10, 2017 from http://www.hooverpress.org/State-of-Disrepair-P561.aspx

[6] Blair, D., Neumann, R., and Olson, E., (2014, Aug. 27) Fixing Fragile States. Retrieved Sept. 10, 2017 from http://nationalinterest.org/feature/fixing-fragile-states-11125

[7] Project for National Security Reform (2008, Nov.) Forging a New Shield. Retrieved Sept. 10, 2017 from http://www.freedomsphoenix.com/Uploads/001/Media/pnsr_forging_a_new_shield_report.pdf

Contest Governing Documents Michael C. Davies Option Papers United States

Options for Constitutional Change in Afghanistan

David Benson is a Professor of Strategy and Security Studies at the United States Air Force School of Advanced Air and Space Studies (SAASS), part of Air University in Montgomery, Alabama.  His area of focus includes online politics and international relations.  He can be found on Twitter @davidcbenson.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States is attempting to broker peace in Afghanistan allowing it to remove troops, leaving behind a stable country unlikely to be used to stage transnational terror attacks.

Date Originally Written:  August 23, 2017.

Date Originally Published:  September 25, 2017.

Author and / or Article Point of View:  This article provides a neutral assessment of two possible courses of action available to the U.S. and Afghan Governments.

Background:  Afghanistan is a multi-ethnic, religious and linguist state.  Nicknamed “the graveyard of empires,” the disparate nature of the country has prevented both foreign empires and domestic leaders from consolidating control in the country.  The most successful domestic leaders have used Afghanistan’s rough terrain and complicated ethnography to retain independence, while playing larger states off each other to the country’s advantage.

The U.S. and its allies have been conducting military operations in Afghanistan for 16 years.  In that time, the coalition of opposition known as the Taliban has gone from control of an estimated 90% of the country, down to a small fraction, and now controls approximately 50% of the country.  At the time of the U.S.-led invasion, the Taliban was a pseudo-governmental organization capable of fielding a military that used modern tactics, but since than has devolved into a less hierarchical network, and in some ways is better thought of as a coalition of anti-government forces.  Although officially a religious organization, the Taliban has historically drawn its greatest support from among the Pashto majority in the country.  The current Afghan government is at Kabul and has supporters amongst every ethnic group, but has never controlled much territory outside of Kabul.

Following the collapse of the Taliban the U.S.-sponsored government installed a constitution which established a strong central government.  Although the constitution recognizes the various minority groups, and provides protections for minority communities, it reserves most authority for the central government.  For example, though the government recognizes 14 ethnic groups and as many as 5 language families as part of Afghanistan, it still calls for a single centrally developed educational curriculum.  The president even appoints regional governors.

Recently, U.S. President Donald Trump and some of his key advisors have raised the possibility of a negotiated solution in Afghanistan.  Such a negotiation would necessarily include the Taliban, and Taliban associated groups.  Insofar as the ongoing conflict is between the central government and those opposed to the central government, a natural accommodation could include a change in the government structure.

Significance:  Afghanistan was the base of operation for the terrorist organization al-Qa’ida, and where the September 11, 2001 attacks on the United States were planned.  The importance of the September 11th attacks in the U.S. and international consciousness cannot be overstated.  The perceived threat of international terrorism is so great that if Afghanistan is not stable enough to prevent transnational terror attacks from originating there, regional and global powers will be constantly tempted to return.  Afghanistan is also a potential arena for competition between nuclear rivals India and Pakistan.  India seeks an ally that can divide Pakistan’s attention away from India and the Jammu and Kashmir, while Pakistan wants to avoid encirclement.

Option #1:  Do not change the constitution of Afghanistan which would continue to centralize authority with the government in Kabul.

Risk:  The conflict never ends.  The Afghan constitution provides for a far more centralized government than any western democracy, and yet Afghanistan is more heterogeneous than any of those countries.  Ongoing populist revolts against elite leadership personified by Brexit in the United Kingdom and the election of President Trump demonstrate the desire for local control even in stable democracies.  Combined with Afghanistan’s nearly 40 year history of war, such desires for local control that are currently replicated across the globe could easily perpetuate violence in the country.  Imagine the local popular outrage in the U.S. when Barack Obama and Donald Trump were elected if the President also appointed the governors of every state, and dictated the curriculum in every school.

A second-order risk is heightened tension between India and Pakistan.  So long as Afghanistan is internally fractured, it is a source of conflict between India and Pakistan.  If Pakistan is able and willing to continue to foment the Taliban to thwart India’s outreach into the country, then this raises the possibility of escalation between the two nuclear countries.

Gain:  Afghanistan externally looks more like other states, at least on paper.  The Taliban and other terror groups are in violation of local and international law, and there is a place in Kabul for the U.S. and others to press their claims.  The advantage of the constitution as it now stands is that there is a single point of institutional control.  If the president controls the governors, and the governors control their provinces, then Afghanistan is a more easily manageable problem internationally, if not domestically.

Option #2:  Change the constitution of Afghanistan decentralizing some governing authority.

Risk:  Once the Afghan constitution is on the table for negotiation, then there is no telling what might happen.  The entire country could be carved up into essentially independent territories, with the national state of Afghanistan dissolving into a diplomatic fiction.  Although this would essentially replicate de jure what is de facto true on the ground, it could legitimize actors and outcomes that are extremely deleterious for international peace.  At worst, it might allow bad actors legal protection to develop power bases in regions of the country they control without any legal recourse for other countries.

Gain:  A negotiated solution with the Taliban is much more likely to succeed.  Some Taliban members may not give up their arms in exchange for more autonomy, and perhaps even a legal seat at the table, but not all people fighting for the Taliban are “true believers.”  The incentives for people who just want more local control, or official recognition of the control they already exercise, change with a constitution that cedes control from the central government.  Ideally the constitution would replicate to some degree the internal autonomy with external unity created in the 20th under the monarchy.

Other Comments:  War, even civil war, is always a political problem.  As such, a political solution may be more practical than a military one.  While changes can be applied to force structure, rules of engagement and strategy, until all involved are willing and able to change the politics of the situation, failure is imminent.

Recommendation:  None.


Endnotes:

None.

Afghanistan David Benson Governing Documents Option Papers United States

U.S. Options for Basing Forces to Deter North Korea

Mark Loncar is retired from the United States Air Force and is a graduate of the Defense Intelligence College, now called National Intelligence University.  He served in South Korea for 23 months.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. faces a growing existential Intercontinental Ballistic Missile (ICBM) threat from North Korea’s nuclear weapons development program.

Date Originally Written: August 1, 2017.

Date Originally Published:  September 18, 2017.

Author and / or Article Point of View:  This article is written from the point of view of a U.S. foreign policy advisor.

Background:  North Korea recently tested another ballistic missile, the second major test in a month, as part of a nuclear weapons program that, if brought to fruition, could threaten the U.S.  Policymakers in the U.S. are understandably reticent because of the serious threat that North Korea may respond with aggressive military action against South Korea and bring the U.S. into another Korean conflict.

The U.S. security commitment to its South Korea ally has not been in doubt since the Korean War started in 1950.  However, the positioning of U.S. forces in South Korea has been debated, and over the years, the number of U.S. troops has decreased from the mid-30 thousands before the North Korean nuclear program started in the 1990s to around 28,000 today.  Amid the present North Korean nuclear challenge, it is time to reexamine the utility of keeping U.S. forces in South Korea.

Significance:  The Korean peninsula is no longer the center of gravity in any hostilities between North Korea and the U.S. as North Korea’s ICBM capability, according to media reports, could reach Honolulu, Anchorage, and Seattle.  U.S. policy must adapt to this drastic expansion of the threat in order to end the impasse that characterizes U.S. dealings with the North Korean ICBM challenge.  In expanding his nuclear capability to ICBMs, North Korean President Kim Jong-un has turned what was a Korean peninsula-centric issue into more of an eyeball-to-eyeball existential threat to the U.S..

Option #1:  U.S. forces remain positioned in South Korea.

Risk:  U.S. policy options concerning the North Korean nuclear program will continue to be limited due to the risk of war to South Korea.  The presence of U.S. forces in South Korea preserves the status quo, but does not move the U.S. closer to a solution to the North Korean nuclear challenge.  Having U.S. forces in South Korea also complicates U.S. – South Korea relations and gives South Korea leverage in how the U.S. should respond to the North Korean nuclear issue, further constraining U.S. freedom of movement to respond to North Korea.

Gain:  The presence of U.S. forces in South Korea signals U.S. resolve in the Korean Conflict through a sharing of risk with South Korean allies.  This option maintains a U.S. capability to respond quickly and forcibly to North Korean conventional incursions and other hostile actions against South Korea.

Option #2:  U.S. forces redeploy from South Korea to present cleaner options for dealing with North Korean nuclear weapons threat.  The policy would relocate U.S. forces from South Korea to Japan and other countries and bases in the region.  A continued U.S. military presence near the Korean peninsula will help to reassure South Korea and Japan that the long-time security commitments will abide.  The redeployment would also represent a continuation of major U.S. conventional capability in the area to counter any North Korean conventional aggression.

Risk:  Perception of outright appeasement by U.S. allies.  How could the U.S. proceed with redeployment of forces from South Korea without communicating to friends and adversaries that it would be engaging in all-out appeasement of the North Korean regime and surrendering important U.S. and allied interests in Northern Asia to the People’s Republic of China (PRC)?

Gain:  The removal of U.S. forces from South Korea would be a major inducement for North Korea to scrap its nuclear weapons program or for the PRC to pressure it to do so.  Indeed, North Korea’s paranoia concerning U.S. – South Korea intentions toward its regime could be significantly pacified by moving U.S. forces off the Korean peninsula.  At the same time, the stakes would be raised for Kim Jong-un and his PRC benefactors to change behavior on terms attractive to all parties—agreeing to a peaceful denuclearization of the Korean peninsula and a reduced threat of war on the peninsula.

Second, removing the threat to U.S. forces on the peninsula would present less cumbersome options for the U.S. with respect to the North Korean nuclear weapons challenge, especially concerns about war on the Korean peninsula.  The U.S. would also be less constrained in deciding to preempt or respond directly to North Korean nuclear aggression.  This is the real capability of such a redeploying U.S. forces from South Korea.  North Korea and the PRC would be on notice that if North Korea continued its nuclear weapons ICBM development after a redeployment of U.S. forces off the Korean peninsula, the regime’s action may be met with the gravest of responses.

Third, this option would deny North Korea a pretext for attacking South Korea should the U.S. strike Kim Jong-un’s nuclear facilities.  Such a U.S. strike on North Korean nuclear facilities would come only after a U.S. redeployment from the peninsula and the North Korean regime’s obstinate refusal to scrap its nuclear weapons program.  In this security construct, any North Korean attack below the 38th parallel in retaliation for a U.S. strike on North Korean nuclear facilities would likely elicit the immediate destruction of the North Korean state.

Other Comments:  An opportunity is in reach to have a return to the status quo without a Korean peninsula-centric relationship.  This relationship would be more North Korea-South Korea focused, with the U.S. and the PRC overseeing the relationship.  The U.S. would no longer be in the middle of the mix with its own forces physically present in South Korea.  It may not be the best the U.S. could hope for – that would be a democratic government in North Korea if not an eventual unification of North and South Korea.  However, a U.S. redeployment to incentivize peninsula denuclearization and present cleaner options concerning North Korea’s nuclear weapons program may be a more viable alternative than accepting and having to deter a North Korean global ICBM capability, or to fight another war on the Korean peninsula.  In the end, by removing U.S. forces from South Korea, friend and foe should understand that if North Korea refuses to scrap its nuclear weapons capability, it will be the North Korean regime alone against the overwhelming power of the U.S..


Endnotes:

None.

China (People's Republic of China) Mark Loncar North Korea (Democratic People’s Republic of Korea) Option Papers South Korea (Republic of Korea) United States Weapons of Mass Destruction

Options for U.S. National Guard Defense of Cyberspace

Jeffrey Alston is a member of the United States Army National Guard and a graduate of the United States Army War College.  He can be found on Twitter @jeffreymalston.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States has not organized its battlespace to defend against cyberattacks.  Cyberattacks are growing in scale and scope and threaten surprise and loss of initiative at the strategic, operational and tactical levels.  Shortfalls in the nation’s cybersecurity workforce and lack of division of labor amongst defenders exacerbates these shortfalls.

Date Originally Written:  July 23, 2017.

Date Originally Published:  September 4, 2017.

Author and / or Article Point of View:  This paper is written from a perspective of a U.S. Army field grade officer with maneuver battalion command experience who is a senior service college graduate.  The officer has also been a practitioner of delivery of Information Technology (IT) services and cybersecurity for his organization for over 15 years and in the IT industry for nearly 20 years.

Background:  At the height of the Cold War, the United States, and the North American (NA) continent, organized for defense against nuclear attack.  A series of radar early warning lines and control stations were erected and arrayed across the northern reaches of the continent to warn of nuclear attack.  This system of electronic sentries were controlled and monitored through a series of air defense centers.  The actual air defense fell to a number of key air bases across the U.S. ready to intercept and defeat bombers from the Union of Soviet Socialist Republics entering the NA airspace.  The system was comprehensive, arrayed in-depth, and redundant[1].  Today, with threats posed by sophisticated cyber actors who directly challenge numerous United States interests, no equivalent warning structure exists.  Only high level, broad outlines of responsibility exist[2].  Existing national capabilities, while not trivial, are not enough to provide assurances to U.S. states as these national capabilities may require a cyber event of national significance to occur before they are committed to address a state’s cyber defense needs.  Worse, national entities may notify a state after a breach has occurred or a network is believed to be compromised.  The situation is not sustainable.

Significance:  Today, the vast Cold War NA airspace has its analog in undefended space and gray area networks where the cyber threats propagate, unfettered from active security measures[3].  While the capabilities of the myriad of companies and firms that make up the critical infrastructure and key resource sectors have considerable cybersecurity resources and skill, there are just as many that have next to nothing.  Many companies and firms cannot afford cyber capability or worse are simply unaware of the threats they face.  Between all of these entities the common terrain consists of the numerous networks, private and public, that interconnect or expose all of these actors.  With its Title 32 authorities in U.S. law, the National Guard is well positioned to take a key role in the unique spot interface between private industry – especially critical infrastructure – in that it can play a key role in this gray space.

There is a unique role for the National Guard cyber forces in gray space of the internet.  The National Guard could provide a key defensive capability in two different ways.

Option #1:  The National Guard’s Defensive Cyberspace Operations-Element (DCO-E), not part of the Department of Defense Cyber Mission Force, fulfills an active role providing depth in their states’ networks, both public and private.  These elements, structured as full-time assets, can cooperatively work to negotiate the placement of sensors and honeypots in key locations in the network and representative sectors in their states.  Data from these sensors and honey pots, optimized to only detect high-threat or active indicators of compromise, would be aggregated in security operations centers manned primarily by the DCO-Es but with state government and Critical Infrastructure and Key Resources (CIKR) participation.  These security operations centers provide valuable intelligence, analytics, cyber threat intelligence to all and act to provide depth in cybersecurity.  These units watch for only the most sophisticated threats and allow for the CIKR private industry entities to concentrate their resources on internal operations.  Surveilling gray space networks provides another layer of protection and builds a shared understanding of adversary threats, traffic, exploitation attempts returning initiative to CIKR and preventing surprise in cyberspace.

Risk:  The National Guard cannot be expected to intercept every threat that is potentially targeted at a state entity.  Negative perceptions of “mini-National Security Agencies (NSAs)” within each state could raise suspicions and privacy concerns jeopardizing the potential of these assets.  Duplicate efforts by all stakeholders threaten to spoil an available capability rather than integrating it into a whole of government approach.

Gain:  Externally, this option builds the network of cyber threat intelligence and unifies efforts within the particular DCO-E’s state.  Depth is created for all stakeholders.  Internally, allowing National Guard DCO-Es to focus in the manner in this option provides specific direction, equipping options, and training for their teams.

Option #2:  The National Guard’s DCO-Es offer general support functions within their respective states for their Adjutants General, Governors, Department of Homeland Security Advisors, etc.  These elements are tasked on an as-needed basis to perform cybersecurity vulnerability assessments of critical infrastructure when requested or when directed by state leadership.  Assessments and follow-on recommendations are delivered to the supported entity for the purpose of increasing their cybersecurity posture.  The DCO-Es fulfill a valuable role especially for those entities that lack a dedicated cybersecurity capability or remain unaware of the threats they face.  In this way, the DCO-Es may prevent a breach of a lessor defended entity as the entry point for larger scale attacks or much larger chain-reaction or cascading disruptions of a particular industry.

Risk:  Given the hundreds and potentially thousands of private industry CIKR entities within any particular state, this option risks futility in that there is no guarantee the assessments are performed on the entities at the greatest risk.  These assessments are a cybersecurity improvement for the state overall, however, given the vast numbers of industry actors this option is equivalent to trying to boil the ocean.

Gain:  These efforts help fill in the considerable gap that exists in the cybersecurity of CIKR entities in the state.  The value of the assessments may be multiplied through communication of the results of these assessments and vulnerabilities at state and national level industry specific associations and conferences etc.  DCO-Es can gradually collect information on trends in these industries and attempt to use that information for the benefit of all such as through developing knowledge bases and publishing state specific trends.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Winkler, D. F. (1997). SEARCHING THE SKIES: THE LEGACY OF THE UNITED STATES COLD WAR DEFENSE RADAR PROGRAM(USA, Headquarters Air Combatant Command).

[2]  Federal Government Resources. (n.d.). Retrieved July 22, 2017, from https://www.americanbar.org/content/dam/aba/marketing/Cybersecurity/2013march21_cyberroleschart.authcheckdam.pdf

[3]  Brenner, J. (2014, October 24). Nations everywhere are exploiting the lack of cybersecurity. Retrieved July 21, 2017, from https://www.washingtonpost.com/opinions/joel-brenner-nations-everywhere-are-exploiting-the-lack-of-cybersecurity

 

 

 

Cyberspace Jeffrey Alston Non-Full-Time Military Forces (Guard, Reserve, etc) Option Papers United States

Great Power Interaction: United States Options Towards Iran

Phillip J. Giampapa is a personnel security assistant contracted with United States Customs and Border Protection.  Prior to that, Phillip was a civil affairs specialist with the 96th Civil Affairs Battalion (Airborne) at Fort Bragg, North Carolina and is currently an Officer Candidate in the Washington, D.C. Army National Guard.  Phillip has operational experience in Afghanistan and Qatar, as well as familiarity with the Levant and Gulf Countries.  He can be found on Twitter at @phillipgiampapa.  The views expressed in this article do not represent the views or policies of his employer, the Department of the Army, the Department of Defense, or the United States Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  United States’ interactions with Iran under the Trump Administration.

Date Originally Written:  June 6th, 2017.

Date Originally Published:  August 7, 2017.

Author and / or Article Point of View:  This article is written from the point of view of a United States policymaker advising the Trump Administrations on possible options towards Iran.

Background:  In the Middle East, the Trump Administration has signaled its preference to strengthen relationships with the Sunni Gulf states by way of Saudi Arabia and the United Arab Emirates.  By strengthening relationships with the Sunni Gulf states, as well as announcing an arms deal with Saudi Arabia, the United States appears willing to continue isolating Iran.  This has the potential to exacerbate tensions with Iran, which if one views it through an international relations theory lens, Iran will attempt to counteract actual or perceived Saudi (read: Sunni) influence gains to maintain balance in the region, as well as prevent loss of Iranian influence.

Iran has a variety of proxies, as well branches of its armed services serving in countries throughout the Middle East.  This is illustrated through the Iranian-backed Hezbollah in southern Lebanon, as well as deployment of the Islamic Revolutionary Guard Corps (IRGC) in Syria and Yemen.  This does not include the activities of the IRGC in other countries that include Bahrain, Saudi Arabia, Egypt, and Jordan[1].  Iran’s military adventurism throughout the Middle East serves to advance the foreign policy agenda of its Supreme Leader, Ayatollah Ali Khamenei[1].  Put succinctly, the foreign policy agenda of the Supreme Leader is the expansion of Iranian (read: Shia) influence throughout the Middle East to serve as an ideological counterweight against the expansion of Saudi/Wahhabi ideology.

Recently, on May 20, 2017, Iran held a presidential election.  The incumbent, President Hassan Rouhani, won re-election by receiving 57% of the vote[2].  Mr. Rouhani is seen as a reformer in Iran, and he is expected to attempt most of his proposed reforms now that he is in his second term.  How many reforms will actually take place is anyone’s guess, as is the influence Mr. Rouhani will have on IGRC policy, but it will be a factor that should be considered when considering the United States’ approach to great power interactions.

Significance:  The Middle East will continue to be a region that perplexes United States policymakers.  United States’ Allies will continue to be confused as to policy direction in the Middle East until more fidelity is provided from Washington.  Iranian meddling will continue in sovereign nations until it is addressed, whether diplomatically or militarily.  Furthermore, Iranian meddling in the region, and interference in the affairs of sovereign nations, will continue to destabilize the Middle East and exacerbate tensions in areas where conflict is occurring, such as Syria and Yemen.  A complete withdrawal of the United States’ presence in the region would likely create a stronger vacuum potentially filled by an adversary.  As such, the United States must choose the option that will provide the strongest amount of leverage and be amicable to all parties involved in the decision.

Option #1:  Maintain the status quo – the United States continues to strengthen Sunni states and isolate Iran.  Through maintaining the status quo, the United States will signal to its allies and partners in the Middle East that they will continue to enjoy their relationship with the United States as it exists in current form.  President Trump’s recent trip to Saudi Arabia signals this intent through proposed arms sales, announcing the establishment of a center to combat extremism, and the use of negative language towards Iran.

Risk:  The risk inherent in pursuing Option #1 is that the window of opportunity on having a moderate, reform-minded person as President of Iran will eventually close.  Through isolating Iran, it is likely they will not be keen on attempting to make overtures to the United States to reconsider the relationship between the two countries.  Since the United States is not going to pursue a relationship with Iran, other countries will seek to do so.  The risk of missed economic opportunities with an Iran that is an emerging market also has the possibility of closing the window for the United States to be involved in another area where it can exert its influence to change Iranian behavior.

Gain:  Through maintaining the status quo that exists in the Middle East, the United States can be sure that pending any diplomatic, political, or international incidents, it can maintain its presence there.  The United States can continue to nurture the preexisting relationships and attempt to maintain the upper hand in its interactions with Iran.  The United States will also remain the dominant player in the great power interactions with other countries in the Middle East.

Option #2:  The United States strengthens its relationship with Iran through moderate reformers and building relationships with moderates in Sunni states to provide shared interests and commonalities.  Given the propensity of nation-states to expand their power and influence, whether through political or military means, it is likely inevitable that conflict between Iran and the Sunni states will take place in the near future.  If a relationship can be built with moderates in the Iranian government as well as Sunni states, it is possible that commonalities will overlap and reduce tensions between the different powers.

Risk:  The risk exists that neither rival will want to have the United States attempting to influence matters that may be viewed as neighborly business.  The possibility also exists that neither nation would want to build a relationship with the other, likely originating from the religious leaders of Iran or Saudi Arabia.  Finally, the worst-case scenario would be that any type of relationship-building would be undercut through actions from independent and/or non-state actors (i.e. terrorist groups, minority religious leaders, familial rivals from ruling families).  These undercutting actions would destroy trust in the process and likely devolve into reprisals from both sides towards the other.

Gain:  Through interacting with Iran, the United States and other powers can establish relationships which could eventually allow the opportunity to address grievances towards existing policies that serve to inflame tensions.  It is also likely that by having a partner in Iran, instability in the Middle East can be addressed in a more effective manner than is currently being done right now.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] REPORT: Destructive role of Irans Islamic Revolutionary Guard Corps (IRGC) in the Middle East. (2017, March). Retrieved June 06, 2017, from http://www.eu-iraq.org/index.php/press-releases/item/851-report-destructive-role-of-iran’s-islamic-revolutionary-guard-corps-irgc-in-the-middle-east

[2] Erdbrink, T. (2017, May 20). Rouhani Wins Re-election in Iran by a Wide Margin. Retrieved June 06, 2017, from https://www.nytimes.com/2017/05/20/world/middleeast/iran-election-hassan-rouhani.html?_r=0

Great Powers Iran Option Papers Phillip J. Giampapa United States

United States’ Options to North Korea Missile Development

Mike Dyer is a research assistant at a Washington-based international policy think tank.  He can be found on twitter @mikeysdyer.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  United States’ Options in response to North Korea’s nuclear and ballistic missile developments.

Date Originally Written:  July 22, 2017.

Date Originally Published:  July 31, 2017.

Author and / or Article Point of View:  This article is written from the point of view of a senior defense/foreign policy advisor to the Trump Administration.

Background:  After decades of development, for the first time in the history of the Korean conflict, North Korea is nearing the capability to hold U.S. population centers on the continental United States at risk with a small nuclear weapon[1].  Nearing this inflection point requires a reexamination of U.S. policy vis-a-vis Northeast Asia.

Significance:  If North Korea’s Kim regime believes it has an effective deterrent against the United States, it may become emboldened to pursue more provocative and dangerous polices.  Such brinkmanship could lead to disaster.  This new fact threatens U.S. extended deterrence commitments to both Japan and South Korea (Republic of Korea (ROK)), depending on the Trump Administration’s policy response.  The Kim regime, while rational, is certainly volatile, and engages in behaviors well outside of international norms.

Option #1:  The United States accepts the reality of North Korea as a nuclear power while maintaining demands for denuclearization.  This option may require adjustments to U.S. defense posture, namely the reintroduction of tactical nuclear weapons to the Korean peninsula or the expansion of the ballistic missile defense programs.

Risk:  First, the most salient risk the United States would face is relying on deterrence against a regime for which it lacks an acute understanding.  Relying on deterrence to keep the peace on the Korean peninsula is risky because the Kim regime derives power and legitimacy from propping up the United States and others as an aggressive enemy.

Second, even if the United States does nothing, the Kim regime would still be incentivized to provoke the United States and the ROK if only for domestic reasons.

Third, as previously mentioned, North Korea could work to weaken U.S. extended deterrence commitments by credibly threatening the U.S. homeland.  The United States could work to reduce this risk by demonstrating the effectiveness of its missile defense shield.

Gain:  This option does not risk conflict in the near to medium terms, thus it continues to “kick the can down the road.”  This policy trades tactical and operational risk for increased strategic risk over the long-term.  Otherwise, this option gains nothing.

Option #2:  The United States conducts a pre-emptive strike on North Korea’s known nuclear and ballistic missile sites.

Risk:  First, this option risks large-scale retaliation against the ROK and Japan and the U.S. forces stationed there.  There is a significant chance a military strike would miss known or hidden weapons sites or leave North Korea with the capability to deliver a conventional counter strike[2].

Second, a military strike on North Korean nuclear sites is likely to cause an environmental and humanitarian disaster to some degree.  This could result in unnecessary civilian loss of life, increased pan-Korean nationalism at the expense of the U.S.-ROK alliance, and generally loss of support for U.S. leadership/presence in the region.  The illicit transfer of unaccounted for nuclear materiel could also result.

Gain:  If a strike were successful, the Kim regime would effectively be disarmed.  Such a blow to North Korea could lead to a coup against the Kim regime or to the People’s Republic of China (PRC) intervening to stabilize the situation.

Option #3:  The United States increases economic sanctions on the regime to either bring North Korea to the negotiating table or cause the regime to collapse.  This option is not possible without increased support from the PRC a because of its importance to the North Korean economy.

Risk:  First, sanctions need years to take full effect.  During this time, North Korea’s capabilities could grow and the regime would have opportunity to degrade the situation in its favor.

Second, it is unknown what the Kim regime would do if faced with collapse and loss of power.  Some North Korean interlocutors have made the point that North Korea did not build its nuclear weapons only to watch them go unused as the regime collapses.

Third, the regime values security, prestige, and power over a growing economy, it has effective control over its people and they are discouraged from speaking out against the regime even in private.

Gain:  If successful, sanctions have the potential to accomplish U.S. objectives without risking conflict.  Given the Kim regime’s hierarchy of values however, this option is unlikely to work.

Option #4:  The United States and the ROK negotiate a peace treaty with North Korea.  This option accepts the reality of North Korea’s newfound nuclear capability and gives up on past demands for complete, verifiable and irreversible dismantlement of the North’s nuclear program prior to peace negotiations.

Risk:  First, for a durable peace to exist between the United States and North Korea, both sides would have to reach a mutually acceptable political solution, this may mean both North Korea and the ROK giving up on their objectives for reunification—something both states are unwilling to do.  Durable peace would also require security for all concerned and trust that does not currently exist.

Second, negotiating peace without denuclearization would weaken the nuclear nonproliferation regime and cause allies to lose faith in United States’ security commitments.  This option could result in greater nuclear proliferation across Northeast Asia.

Gain:  The gain is limited by the risk of failure, but a peaceful Korean peninsula would benefit regional security and ease the burden on U.S. defense commitments.

Option #5:  The United States undermines the Kim regime by encouraging the flow of information into and out of North Korea.  The United States works with the PRC and ROK to encourage the further development of independent (black) markets in North Korea at the expense of regime control on civil life.

Risk:  First, this policy would require years to fully carry out, allowing North Korea to expand its weapons program in the meantime.

Second, this policy may just raise the quality of life of the North Korean people and expand the regime’s tax base while not convincing the people to push-back against the regime.

Third, as previously mentioned, destabilizing the regime raises the risks of conflict.

Gain:  If successful, this policy could chance the character and policies of the North Korean regime, ultimately leading to peace and reconciliation.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Ackerman, S., & Jacobs, B. (2017). US commander not confident North Korea will refrain from nuclear assault. the Guardian. Retrieved 22 July 2017, from https://www.theguardian.com/world/2017/apr/26/north-korea-nuclear-attack-south-korea-us-navy

[2]  Your Bibliography: Peters, R. (2017). A New Approach to Eliminating North Korean Weapons of Mass Destruction Is Needed. Washington: The U.S. Korea Institute at Johns Hopkins SAIS. Retrieved from http://www.38north.org/wp-content/uploads/pdf/NKIP-Peters-WMDE-062017.pdf  Also see, Bennett, B. (2013). Preparing for the Possibility of a North Korean Collapse. Rand Corporation.

China (People's Republic of China) Mike Dyer North Korea (Democratic People’s Republic of Korea) Nuclear Issues Option Papers South Korea (Republic of Korea)

People’s Republic of China Options Toward North Korea

Paul Butchard is a graduate student in the Department of War Studies at Kings College London in the United Kingdom, where he is pursuing his master’s degree in Intelligence and International Security.  He also holds a bachelor’s degree in International Relations and Politics.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Options for the foreign policy of the People’s Republic of China (PRC) toward North Korea (the Democratic People’s Republic of Korea or DPRK).

Date Originally Written:  July, 15, 2017.

Date Originally Published:  July 24, 2017.

Author and / or Article Point of View:  This article is written from the perspective of foreign policy advisor to the PRC government.

Background:  Since January 2016, the DPRK has conducted two nuclear weapons tests and ten missile tests.  Such actions, coupled with increasingly bombastic rhetoric, displays a more aggressive posture for the DPRK than previous years[1].

Significance:  For the PRC, their relationship with the DPRK is a regional policy issue and a central element of PRC-United States relations.  President Xi Jinping is forging an outgoing, “Striving for Achievement” foreign policy for the PRC[2].  Simultaneously, the PRC has displayed more public disapproval of Pyongyang’s destabilising behaviour than previous years[3].  The course of action the PRC adopts towards the DPRK will play a major role in the relationship between Beijing and Washington in years to come, influencing events globally.

Option #1:  The PRC maintains/increases military, economic and diplomatic aid to the DPRK.  This option sees the PRC continuing or building upon its current course of action, providing vast military and economic aid and diplomatic protection to bring the DPRK’s behaviour in line with the PRC’s wishes.

Risk:  The PRC risks appeasing the DPRK, encouraging it to continue along its current path, one that is increasingly casting the PRC as a suzerain unable to rein in a vassal state, to the casual observer.  The DPRK would view such action as capitulation and an acknowledgment by Beijing that Pyongyang cannot be penalised for actions and policies even when they harm the PRC’s interests[4].  The DPRK is conscious of its strategic importance to Beijing and able to take PRC aid without granting concessions.  The PRC risks escalating confrontation with the United States if the latter perceives the PRC as unwilling to act or enabling the DPRK’s current destabilising behaviour, a possibility given recent remarks by President Trump[5].

Gain:  This option enables the PRC to sustain the DPRK regime, avoiding a humanitarian crisis on its border because of regime collapse, maintaining the tense but peaceful status quo.  The PRC avoids being labelled a United States puppet as the DPRK has previously implied[6].  United States’ sanctions related to the DPRK have so far been limited to private companies and individuals, not the PRC government[7].  This option thus avoids igniting military, diplomatic or economic confrontations with the United States.

Option #2:  The PRC decreases/ceases military, economic and diplomatic aid to the DPRK.  This option sees the PRC ‘sanction’ the DPRK by reducing or halting military, economic or diplomatic aid to alter its behaviour to suit PRC preferences.

Risk:  This option risks the collapse of the DPRK regime due to the PRC being its main economic trading partner.  The PRC also risks economic self-harm due to the vast natural resources it imports from the DPRK[8].  The collapse of the DPRK brings unparalleled security concerns for the PRC from uncontrolled nuclear materials and mass immigration to the potential of a United States ally on its border.

Gain:  By reducing aid the PRC would be acting against the DPRK’s unpredictable actions, potentially slowing its development of an Intercontinental Ballistic Missile (ICBM), increasing its international standing, a cornerstone of President Xi’s foreign policy.  Such action would be seen favourably by the Trump administration increasing the likelihood of favourable trade deals or relative acquiescence to PRC actions in the South China Sea.

Option #3:  Regime change.  This option would see the PRC pursue regime change within the DPRK by means of supporting a coup d’état or palace coup of some description rather than overt military action of its own.

Risk:  The DPRK government and society revolves fully around the Kim dynasty, the removal of the deity that is Kim Jong Un and the Kim lineage risks the total collapse of the state.  There is no clear successor to Kim due to the autocratic nature of the DPRK and any successor would likely be considered a PRC puppet and usurper.  Subsequent destabilisation would result in the aforementioned humanitarian and security crisis’ posing a grave national security threat to the PRC.  Such action would be logistically and strategically difficult to accomplish, requiring multiple sections of the DPRK military and governmental apparatus being coordinated by a vast human intelligence network operated by the PRC.  As such, and due to pervasive North Korean surveillance even of its elites, a coup risks discovery long before execution.  United States and South Korean forces may see any attempt at regime change as an opportunity to launch their own military offensive or as evidence of PRC expansionism and a threat to the South.

Gain:  Replacing Kim Jong Un could lead to increased stability for the PRC’s regional development objectives.  The PRC could avoid total DPRK state collapse due to external pressure and avert the potential national security threats to the PRC mainland.  This option also raises the possibility of enhancing United States-PRC relations, buying the PRC the aforementioned political capital.  A new DPRK regime, allied with the PRC, that tempers its actions toward the United States, also raises the possibility of the removal of the United States’ Terminal High Altitude Area Defense (THAAD) missile defence system from South Korea, which the PRC views as a national security threat.  This option also presents the potential for the reduction of United States troop numbers in South Korea due to increased stability and a reduced threat from the DPRK.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Council on Foreign Relations, (2017) North Korea Crisis. Retrieved July 13, 2017 from https://www.cfr.org/global/global-conflict-tracker/p32137#!/conflict/north-korea-crisis

[2] Yan, X. (2014). From Keeping a Low Profile to Striving for Achievement. The Chinese Journal of International Politics,7(2), 153-184.

[3] Perlez, J. (2017, February 24). China and North Korea Reveal Sudden, and Deep, Cracks in Their Friendship. Retrieved July 14, 2017, from https://www.nytimes.com/2017/02/24/world/asia/china-north-korea-relations-kim-jong-un.html

[4] Pei, M. (2017, March 14). North Korea: What Is China Thinking? Retrieved July 14, 2017, from https://www.theatlantic.com/international/archive/2017/03/china-north-korea-kim-jong-un-nuclear-beijing-pyongyang-thaad/519348/

[5] Weaver, M., Haas, B., & McCurry, J. (2017, April 03). Trump says US will act alone on North Korea if China fails to help. Retrieved July 14, 2017, from https://www.theguardian.com/us-news/2017/apr/02/donald-trump-north-korea-china

[6] Sang-hun, C. (2017, February 23). North Korea Accuses China of ‘Mean Behavior’ After It Tightens Sanctions. Retrieved July 14, 2017, from https://www.nytimes.com/2017/02/23/world/asia/north-korea-china.html

[7] Aleem, Z. (2017, June 29). Why Trump just slapped new sanctions on Chinese banks. Retrieved July 14, 2017, from https://www.vox.com/world/2017/6/29/15894844/trump-sanctions-china-north-korea-bank

[8] Perlez, J., & Huang, Y. (2017, April 13). China Says Its Trade With North Korea Has Increased. Retrieved July 14, 2017, from https://www.nytimes.com/2017/04/13/world/asia/china-north-korea-trade-coal-nuclear.html 

[9] Reuters. (2017, February 28). China reacts with anger, threats after South Korean missile defense decision. Retrieved July 15, 2017, from http://www.reuters.com/article/us-southkorea-usa-thaad-china-idUSKBN16709W

China (People's Republic of China) Leadership Change North Korea (Democratic People’s Republic of Korea) Option Papers Paul Butchard South Korea (Republic of Korea) United States

Options for a Future Strategy for the Afghan Taliban

Paul Butchard is a graduate student in the Department of War Studies at Kings College London in the United Kingdom, where he is pursuing his master’s degree in Intelligence and International Security.  He also holds a bachelor’s degree in International Relations and Politics.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Options for a future strategy for the Afghan Taliban.

Date Originally Written:  July, 12, 2017.

Date Originally Published:  July 17, 2017.

Author and / or Article Point of View:  This article is written from the point of view of someone with influence over strategic policy making within the Afghan Taliban, possibly a member of the Quetta Shura.

Background:  The Taliban has seen continuous conflict for over two decades now and despite its overthrow in 2001 by the United States and the 2013 death of its founder Mullah Omar, remains a potent force within Afghanistan.  The Taliban is currently estimated to hold more territory than at any time since 2001[1].

Significance:  Given the territorial degradation being suffered by Daesh in Iraq and Syria and the presence of a Daesh affiliate in Afghanistan, the Taliban may once again find itself in the crosshairs of an international anti-terrorism coalition.  There are also increasing levels of international training and advisory support being given to the Afghan government[2] to counter the Taliban.  These developments raise the prospect of United States and international re-engagement in Afghanistan.  As such, the Taliban must constantly assess their future direction should they hope to survive and thrive.

Option #1:  Enter negotiations with the Government of Afghanistan (GOA).  Although announcing their intentions not to participate in peace talks, the Taliban, or factions within it, have previously indicated a willingness to engage in negotiations to achieve political goals.  This is evidenced by their opening of a political office in Doha, Qatar and engagement in talks in 2014 among other events.

Risk:  The Taliban risks giving up the 86 districts they currently estimate themselves to fully or partially control, potentially for few guarantees[3].  This option risks the support afforded to the Taliban by Pakistan’s military, as identified by a recent United States Defense Department report, among numerous other sources[4].  Pakistan would not approve a deal in which it loses influence or operational control over the Taliban or subsidiaries like the Haqqani Network.  Pakistan would also oppose subsequent warming of Afghan-Indian relations.  Military demobilisation of any kind leaves the Taliban potentially vulnerable to United States and allied forces reorienting to Afghanistan post-Daesh, a risk when the Trump administration centres its national security policy on the confronting of “[T]he crisis of Islamic extremism, and the Islamists and Islamic terror of all kinds[5].”

Gain:  The GOA has continuously reaffirmed its willingness to enter peace talks with the Taliban and the pardon issued to Gulbuddin Hekmatyar is evidence of a willingness to provide concessions[6].  This option has the support, even if understated, of the British and United States governments[7].  The Taliban enjoyed considerable military success against Afghan forces (ANSF) in 2015-16[8].  Thus, it is in a strong position to push for concessions such as autonomy within its strongholds such as the Pashtun region.  This option enables the Taliban to avoid the ire of the United States coalition turning toward Afghanistan after Daesh in Iraq and Syria are defeated.  This option also points to the possibility of restoration of the notion of the Taliban as a sociopolitical not just militant movement.  Should the right deal be reached, this option also provides chances to increase Pakistani influence in the Taliban-controlled areas of Afghanistan and thus sustain or increase support from the ISI to the Taliban even against international pressure.

Option #2:  The Taliban continues the insurgent war against the ANSF.  This course of action is the one currently favoured and being pursued by Taliban senior command.

Risk:  Although gaining considerable ground since coalition forces withdrew, the Taliban, like the ANSF, has been unable to break the stalemate in Afghanistan.  The Taliban is unlikely to win back Afghanistan through force of arms alone.  By continuing military operations, the Taliban risk attracting the attention of the United States military, which may soon turn to combating the Daesh presence in Afghanistan more directly after the Daesh territorial holdings in Iraq and Syria are eliminated.  By persisting primarily with a military strategy, the Taliban remain somewhat hostage to the whims and machinations of their Pakistani patrons, should the future political environment change, due to domestic or international pressure, the Taliban could theoretically find themselves short on friends and overwhelmed by enemies.

Gain:  The Taliban is enjoying a military resurgence since the withdrawal of coalition forces in 2014.  There are few prospects of an outright ANSF victory.  Operation Mansouri, the recent spring offensive by the Taliban has combined guerrilla tactics, conventional assaults and an increasing number of suicide operations to devastating effect[9].  The Taliban have also seemingly learnt from both coalition successes in Iraq and Afghanistan and from Daesh in their use of small, mobile special operations type units with advanced equipment carving inroads to populations centres and forming of human intelligence networks and sleeper cells, rather than full frontal attacks.  The Taliban’s efforts have culminated in the appearance of the Sara Khitta, or Red Group, a Taliban commando force[10].  Such successes display that the Taliban remain militarily capable and it may be unwise to sacrifice such capability.  The fact that the Taliban have sustained a war of attrition against coalition and ANSF forces shows they have no pressing need to cease military operations, the poppy cultivation it protects, and the goal of conquering the Afghan government it is working toward.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] O’Donnel, L (2016, June 16) The Taliban now hold more ground in Afghanistan than at any point since 2001. Retrieved July 11, 2017, from http://www.militarytimes.com/story/military/pentagon/2016/06/16/afghanistan-nicholson-commander-pentagon-report-war/85972056/

[2] Associated Press (2017, June 16) US sending almost 4,000 extra forces to Afghanistan, Trump official says. Retrieved July 10, 2017, from https://www.theguardian.com/us-news/2017/jun/15/us-troops-afghanistan-trump-administration

[3] Roggio, B (2017, March 28) Afghan Taliban lists ‘Percent of Country under the control of Mujahideen’. Retrieved July 12, 2017, from http://www.longwarjournal.org/archives/2017/03/afghan-taliban-lists-percent-of-country-under-the-control-of-mujahideen.php

[4] United States Department of Defense (2017, June) Enhancing Security and Stability in Afghanistan. Retrieved July 12, 2017, from: https://www.defense.gov/Portals/1/Documents/pubs/June_2017_1225_Report_to_Congress.pdf

[5] Talev, M (2017, May 22) Donald Trump drops phrase ‘radical Islamic terrorism’ on Saudi Arabia trip to soften tone on Muslims. Retrieved July 12, 2007, from http://www.independent.co.uk/news/world/middle-east/donald-trump-saudi-arabia-radical-islamic-terrorism-muslims-soften-tone-iran-palestinians-israel-a7748541.html

[6] Rasmussen, S.E (2016, September 22) ‘Butcher of Kabul’ pardoned in Afghan peace deal. Retrieved July 12, 2017, from https://www.theguardian.com/world/2016/sep/22/butcher-of-kabul-pardoned-in-afghan-peace-deal

[7] Yousafzai et al. (2016, October 18) Taliban and Afghanistan restart secret talks in Qatar. Retrieved July 12, 2017, from https://www.theguardian.com/world/2016/oct/18/taliban-afghanistan-secret-talks-qatar

[8] Koven, B.S (2017, July 09) The End of Afghanistan’s Spring Fighting Seasons and the Demise of the Afghan National Security Forces? Retrieved July 12, 2017, from http://smallwarsjournal.com/jrnl/art/the-end-of-afghanistan%E2%80%99s-spring-fighting-seasons-and-the-demise-of-the-afghan-national-secu

[9] Roggio, B (2017, April 28) Taliban announces start of ‘Operation Mansouri’. Retrieved July 11, 2017, from http://www.longwarjournal.org/archives/2017/04/taliban-announce-start-of-operation-mansouri.php

[10] Snow, S (2016, August 12) Red Group: The Taliban’s New Commando Force. Retrieved on July 11, 2017, from: http://thediplomat.com/2016/08/red-group-the-talibans-new-commando-force/

Afghanistan Islamic State Variants Option Papers Paul Butchard Taliban (Islamic Emirate of Afghanistan)

Options for United States Military Assistance to the Kurdistan Regional Government in Northern Iraq

Brandon Wallace is a policy wonk who spends his time watching Iraq, Kurdish borders, data, and conflict in the Middle East of all varieties.  Brandon can be found on Twitter at @brandonwallacex and at his website www.brandonlouiswallace.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As the defeat of the Islamic State of Iraq and Syria (ISIS) looms closer and the Kurdistan Regional Government of Iraq (KRG) ponders its future relationship with greater Iraq, the United States must decide what, if any, military assistance it will provide to the Kurds.

Date Originally Written:  July 7, 2017.

Date Originally Published:  July 10, 2017.

Author and / or Article Point of View:  This options paper is written from the hypothetical perspective of a senior policy advisor for a policy maker in the United States government.

Background:  The KRG, a semi-autonomous region in Northern Iraq with intentions of secession, requires both intrastate and external sponsors to sustain functionality.  The KRG depends on resource allocations from the central Government of Iraq (GOI) in Baghdad, as well as assistance from the United States and other international partners.  The campaign to defeat ISIS requires a functioning KRG partnership, resulting in several partners providing additional capital and arms to the region.  Without such assistance, the KRG faces serious economic turmoil.  The GOI allocates 17 percent of the federal budget for the KRG, yet the budget does not balance KRG spending.  The KRG carries an inflated public sector wherein 70 percent of KRG public spending is devoted to payroll[1]. The KRG must also support internally displaced people (IDP).  This year, KRG debts exceeded US$22 billion[2].

Moreover, the KRG cannot sustain itself through oil sales.  It is estimated that the maximum output of KRG oil production is nearly 800 kbd (Thousand Barrels Per Day)[3].  To balance the budget, the KRG would need oil to sell at nearly US$105[4].  Today oil trades at roughly US$50.

Significance:  The KRG’s ability to receive independent assistance from the United States has profound implications for the United States’ relationship with the GOI, Kurdish commutes in Iraq, Iran, Syria, and Turkey, and relations between neighboring states.  Yet, the KRG has been a valuable non-state partner in the fight against ISIS.  The United States paid the KRG Ministry of Peshmerga Affairs (the military forces of the KRG) US$415 million for their role in the Mosul Operation to topple ISIS- this does not include military equipment and other forms of aid from the United States and international partners[5].

Option #1:  The United States sustains its current level of military assistance to the KRG.

Risk:  This option risks dissatisfaction with bordering countries of the KRG.  Sustained support implies United States complicit backing of the KRG to the GOI, Iran, Turkey, and a significantly crippled Syria.  Further, military assistance, specifically cash payments from the United States, contributes to the bloating KRG payroll.

Gain:  The KRG will continue to be an important partner in the campaign against ISIS.  As ISIS is driven out of its controlled territories, a well-supported Peshmerga and other Kurdish forces will be necessary for security operations post-Mosul.  No allied actor is so upset by United States support of the KRG as to dramatically obstruct the campaign against ISIS.  Option #1 carefully mitigates the reservations of other actors while accelerating counter-ISIS operations.

Option #2:  The United States diversifies and increases its assistance to the KRG.

Risk:  Significantly increasing independent assistance to the KRG, without involving the GOI, will likely be met with open hostility.  If the United States increases its support to Kurdish groups, anxious governments with Kurdish minorities may attempt to undermine United States’ interests in retaliation.

Conversely, the United States may choose to diversify its assistance to the KRG by changing its lending model.  Last July, an International Monetary Fund loan of US$5.25 billion conditionally reserved US$225 million for KRG road infrastructure and small projects[4].  However, adopting this model, setting conditions for KRG sharing with the GOI, opens the United States to risks.  The KRG may not have the stability to repay a loan, and it is likely the GOI, who may be better positioned to pay off the loan quickly, will insist on the KRG meeting a 17 percent repayment share.  The symbolism of any conditional loan or military transfer to the KRG will certainly strain relations with the GOI.

Gain:  United States’ Foreign Military Sales (FMS) and Foreign Military Assistance (FMA) programs in Iraq require the approval of the GOI, even when agreements are specifically directed at the KRG.  Per United States law, the FMS and FMA are limited only to interaction with central governments.  To secure large-scale military sales directly to the KRG would require a congressional change to existing United States’ laws.  Option #2 would surely win the favor of the KRG, and it may expedite counter-ISIS operations across northern territories.  Expanding the scope of assistance to the KRG by lending conditionally or giving conditionally to the GOI, could force Erbil, capital of the KRG, and Baghdad to broaden collaboration in developing the Iraqi Security Forces (ISF).  Option #2 ensures the KRG does not return to relative isolation from the international community in a post-ISIS future.

Option #3:  The United States ceases all military assistance to the KRG and relies on the GOI to allocate resources.

Risk:  This option to cease assistance to the KRG may hinder security operations in Northern Iraq, and it diminishes the United States’ presence in the region- a vacuum other countries may fill.  For example, this option will certainly please Iran.  Conversely, the KRG will likely interpret this move as aggressive.

Gain:  Providing the GOI full authority in distributing assistance communicates a strong faith in the central government and the Iraqi state.  Further, this consolidation of assistance to a single power center in Baghdad may simplify bureaucratic procedure and empower the ISF.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Coles, I (2016, February 16) Iraqi Kurdish deputy PM says deal with Baghdad ‘easy’ if salaries paid. Retrieved June 06, 2017, from http://www.reuters.com/article/us-mideast-crisis-iraq-kurds-idUSKCN0VP22Z

[2]  Natali, D (2017, January 3) Is Iraqi Kurdistan heading toward civil war? Retrieved June 7, 2017, from http://www.al-monitor.com/pulse/originals/2017/01/kurdistan-civil-war-iraq-krg-sulaimaniya-pkk-mosul-kurds.html

[3]  Jiyad, A. M (2015, July 7) Midyear Review of the State Budget and Oil Export Revenues. Retrieved June 5, 2017, from http://www.iraq-businessnews.com/wp-content/uploads/2015/07/Ahmed-Mousa-Jiyad-Mid-Year-Review-of-the-State-Budget-and-Oil-Export-Revenues.pdf

[4]  Grattan, M (2017, June 25) David Petraeus on US policy under Donald Trump, the generational war against Islamist terrorism, and dealing with China. Retrieved July 7, 2017, from https://theconversation.com/david-petraeus-on-us-policy-under-donald-trump-the-generational-war-against-islamist-terrorism-and-dealing-with-china-80045

[5]  Knights, M (2016, July 28) The U.S., the Peshmerga, and Mosul. Retrieved June 6, 2017, from http://www.washingtoninstitute.org/policy-analysis/view/the-u.s.-the-peshmerga-and-mosul

Allies & Partners Brandon Wallace Capacity / Capability Enhancement Iraq Kurdistan Option Papers United States

Options for Avoiding U.S. Complicity for Coalition War Crimes in Yemen

Michael R. Tregle, Jr. is a U.S. Army judge advocate officer currently assigned as the Brigade Judge Advocate for the 101st Airborne Division Artillery (DIVARTY).  A former enlisted infantryman, he has served at almost every level of command, from the infantry squad to an Army Service Component Command, and overseas in Afghanistan and the Pacific Theater.  He tweets @shockandlawblog and writes at www.medium.com/@shock_and_law.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  On January 31, 2017, the United Nations (U.N.) Panel of Experts on Yemen issued a report concluding that widespread violations of International Humanitarian Law (IHL)[1] had occurred in the Yemeni armed conflict.  Noting numerous violations throughout 2016 alone, including targeting civilian persons and objects, excessive collateral damage, deprivation of liberty, and torture, the Panel concluded that some of these violations amounted to war crimes.  The U.S. provided billions of dollars in logistical support, munitions, and intelligence sharing to the Saudi-led coalition that was responsible for the IHL violations.  Such support could render the United States liable for Saudi violations under the law of state responsibility[2] or as an aider and abettor.

Date Originally Written:  May 19, 2017.

Date Originally Published:  June 29, 2017.

Author and / or Article Point of View:  The author is an active duty officer in the U.S. Army.  This article is written from the point of view of the United States toward continued support of the Saudi-led coalition in the Yemeni war in light of war crimes allegations made by the U.N. Panel of Experts on Yemen.

Background:  Until October 2016, U.S. support to the Saudi-led coalition fighting Houthi rebels in Yemen included the provision of munitions, including weapons and precision guidance kits, refueling capability, and other logistical support.  Following a coalition attack on a funeral in Sana’a that killed 132 civilians and injured nearly 700, which was carried out with a U.S.-supplied GBU-12 precision guided bomb, the United States denounced the attack and suspended further arms sales to Saudi Arabia[3].  The Trump Administration recently announced the resumption of over $100 billion in arms sales to the Saudis, much of which is likely to be used in Yemen[4].  More recently, another key coalition ally, the United Arab Emirates (UAE), was accused of detainee abuse and disappearances, though the link between U.S. support and these accusations is less clear[5].

Significance:  Once the U.S. became aware of the violations, continued support to a Saudi coalition responsible for war crimes could render the U.S. vicariously liable for those crimes.  The principle of state responsibility renders states legally responsible for the wrongful acts of others when the state aids or assists in the wrongful act and knows of the circumstances making that act wrongful.  Similarly, aider and abettor liability could render the U.S. liable if it knew, or should have known, that the aid it provided could result in war crimes[6].  U.S. liability could take many forms, ranging from international condemnation to the indictment of key U.S. arms-sale decision makers in the International Criminal Court as principles to war crimes.  If nothing else, continued support of the Saudi-led coalition in light of the U.N. allegations would erode U.S. credibility as an advocate for human rights and the rule of law and empower other states to ignore international norms protecting civilians in conflict.

Option #1:  The U.S. ceases all arms sales and other support to the Saudi-led coalition until the coalition demonstrates improved compliance with IHL and greater protection of civilians in Yemen.  Such compliance can be ensured through neutral observers, assurances from coalition members, and the provision of U.S. trainers and advisors to improve coalition targeting procedures and detention and interrogation practices.

Risk:  This option risks damaging the longstanding security relationship with Saudi Arabia and the UAE, key allies in the region.  Furthermore, cutting off all support may well strengthen the Houthi opposition in Yemen and foster still worse humanitarian conditions on the ground.  If the U.S. fully absolves itself of supporting the Saudis in Yemen, very little international leverage to compel coalition compliance with IHL will remain, possibly leading to even more violations.

Gain:  This option seeks to maintain U.S. credibility as a world leader in protecting the victims of conflict and demonstrates a willingness to hold even its closest friends accountable for violations.  It further ensures that the U.S. will not be complicit in any way in continued war crimes or other IHL violations in Yemen, thereby avoiding international condemnation or legal liability.

Option #2:  The U.S. continues arms sales and logistical support to the Saudi-led coalition regardless of its compliance with international law.  This option represents maintaining the status quo, and has been implicitly endorsed by the Trump administration[7].

Risk:  As a result of this option, the U.S. will certainly face international condemnation and potential legal liability for supporting a Saudi regime that the U.S. knows is engaged in widespread IHL violations and potential war crimes.  At best, the U.S. reputation as a leader in upholding IHL and human rights norms will be damaged.  At worst, senior U.S. officials could be indicted as principles to war crimes under theories of state responsibility or aiding and abetting the coalition’s conduct.

Gain:  The U.S. cements its relationship with Saudi Arabia as a key ally in the region and makes clear that defeating the Houthi rebellion, and by extension denying Iranian influence in the region, is of greater import than compliance with IHL.  This option signals to coalition allies that they have U.S. support in imposing their will on Yemen, whatever the cost.

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  International Humanitarian law refers to the international law of war or law of armed conflict.  The three terms are synonymous.

[2]  See also Ryan Goodman & Miles Jackson, State Responsibility for Assistance to Foreign Forces (aka How to Assess US-UK Support for Saudi Ops in Yemen), Just Security, Aug. 31, 2016, https://www.justsecurity.org/32628/state-responsibility-assistance-foreign-forces-a-k-a-assess-us-uk-support-saudi-military-ops-yemen/; Ryan Goodman, Jared Kushner, the Arms Deal, and Alleged Saudi War Crimes, Just Security, May 20, 2017, https://www.justsecurity.org/41221/jared-kushner-arms-deal-alleged-saudi-war-crimes/.

[3]  Phil Stewart & Warren Strobel, U.S. to Halt Some Arms Sales to Saudi, Citing Civilian Deaths in Yemen Campaign, Reuters, Dec. 13, 2016, http://www.reuters.com/article/us-usa-saudiarabia-yemen-exclusive-idUSKBN1421UK.

[4]  Jared Malsin, The Big Problem with President Trump’s Record Arms Deal with Saudi Arabia, Time, May 22, 2017, http://time.com/4787797/donald-trump-yemen-saudi-arabia-arms-deal/?xid=homepage.

[5]  Ryan Goodman & Alex Moorehead, UAE, a Key U.S. Partner in Yemen, Implicated in Detainee Abuse, Just Security, May 15, 2017, https://www.justsecurity.org/40978/uae-key-partner-yemen-implicated-detainee-abuse/.

[6]  Aiding and Abetting liability is described in U.S. Dep’t of Def., DoD Law of War Manual para. 18.23.4 (May 2016).  For a more detailed explanation, see Ryan Goodman, The Law of Aiding and Abetting (Alleged) War Crimes:  How to Assess US and UK Support for Saudi Strikes in Yemen, Just Security, Sep. 1, 2016, https://www.justsecurity.org/32656/law-aiding-abetting-alleged-war-crimes-assess-uk-support-saudi-strikes-yemen/; Ryan Goodman, Jared Kushner, the Arms Deal, and Alleged Saudi War Crimes, Just Security, May 20, 2017, https://www.justsecurity.org/41221/jared-kushner-arms-deal-alleged-saudi-war-crimes/.

[7]  See Malsin, supra note 3.

Law & Legal Issues Michael R. Tregle, Jr. Option Papers United States War Crimes Yemen

Options for Next Generation Blue Force Biometrics

Sarah Soliman is a Technical Analyst at the nonprofit, nonpartisan RAND Corporation.  Sarah’s research interests lie at the intersection of national security, emerging technology, and identity.  She can be found on Twitter @BiometricsNerd.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Next Generation Biometrics for U.S. Forces.

Date Originally Written:  March 18, 2017.

Date Originally Published:  June 26, 2017.

Author and / or Article Point of View:  Sarah Soliman is a biometrics engineer who spent two years in Iraq and Afghanistan as contracted field support to Department of Defense biometrics initiatives.

Background:  When a U.S. Army specialist challenged Secretary of Defense Donald Rumsfeld in 2004, it became tech-innovation legend within the military.  The specialist asked what the secretary was doing to up-armor military vehicles against Improvised Explosive Device (IED) attacks[1].  This town hall question led to technical innovations that became the class of military vehicles known as Mine-Resistant Ambush Protected, the MRAP.

History repeated itself in a way last year when U.S. Marine Corps General Robert B. Neller was asked in a Marine Corps town hall what he was doing to “up-armor” military personnel—not against attacks from other forces, but against suicide within their ranks[2].  The technical innovation path to strengthening troop resiliency is less clear, but just as in need of an MRAP-like focus on solutions.  Here are three approaches to consider in applying “blue force” biometrics, the collection of physiological or behavioral data from U.S. military troops, that could help develop diagnostic applications to benefit individual servicemembers.

1

US Army Specialist Thomas Wilson addresses the Secretary of Defense on base in Kuwait in 2004. Credit: Gustavo Ferrari / AP http://www.nbcnews.com/id/6679801/ns/world_news-mideast_n_africa/t/rumsfeld-inquisitor-not-one-bite-his-tongue

Significance:  The September 11th terrorists struck at a weakness—the United States’ ability to identify enemy combatants.  So the U.S. military took what was once blue force biometrics—a measurement of human signatures like facial images, fingerprints and deoxyribonucleic acid (DNA) (which are all a part of an enrolling military member’s record)—and flipped their use to track combatants rather than their own personnel.  This shift led to record use of biometrics in Operation Iraqi Freedom and Operation Enduring Freedom to assist in green (partner), grey (unknown), and red (enemy) force identification.

After 9/11, the U.S. military rallied for advances in biometrics, developing mobile tactical handheld devices, creating databases of IED networks, and cutting the time it takes to analyze DNA from days to hours[3].  The U.S. military became highly equipped for a type of identification that validates a person is who they say they are, yet in some ways these red force biometric advances have plateaued alongside dwindling funding for overseas operations and troop presence.  As a biometric toolset is developed to up-armor military personnel for health concerns, it may be worth considering expanding the narrow definition of biometrics that the Department of Defense currently uses[4].

The options presented below represent research that is shifting from red force biometrics back to the need for more blue force diagnostics as it relates to traumatic brain injury, sleep and social media.

Option #1:  Traumatic Brain Injury (TBI).

The bumps and grooves of the brain can contain identification information much like the loops and whorls in a fingerprint.  Science is only on the cusp of understanding the benefits of brain mapping, particularly as it relates to injury for military members[5].

Gain:  Research into Wearables.

Getting military members to a field hospital equipped with a magnetic resonance imaging (MRI) scanner soon after an explosion is often unrealistic.  One trend has been to catalog the series of blast waves experienced—instead of measuring one individual biometric response—through a wearable “blast gauge” device.  The blast gauge program made news recently as the markers failed to give vibrant enough data and the program was cancelled[6].  Though not field expedient, another traumatic brain injury (TBI) sensor type to watch is brain activity trackers, which CNN’s Jake Tapper experienced when he donned a MYnd Analytics electroencephalogram brain scanning cap, drawing attention to blue force biometrics topics alongside Veterans Day[7].

 

2

Blast Gauge. Credit: DARPA http://www.npr.org/sections/health-shots/2016/12/20/506146595/pentagon-shelves-blast-gauges-meant-to-detect-battlefield-brain-injuries?utm_medium=RSS&utm_campaign=storiesfromnpr

Risk:  Overpromising, Underdelivering or “Having a Theranos Moment.”

Since these wearable devices aren’t currently viable solutions, another approach being considered is uncovering biometrics in blood.  TBI may cause certain proteins to spike in the blood[8]. Instead of relying on a subjective self-assessment by a soldier, a quick pin-prick blood draw could be taken.  Military members can be hesitant to admit to injury, since receiving treatment is often equated with stigma and may require having to depart from a unit.  This approach would get around that while helping the Department of Defense (DoD) gain a stronger definition of whether treatment is required.

3

Credit: Intelligent Optical Systems Inc http://www.intopsys.com/downloads/BioMedical/TBI-Brochure.pdf

Option #2:  Sleep.

Thirty-one percent of members of the U.S. military get five hours or less of sleep a night, according to RAND research[9].  This level of sleep deprivation affects cognitive, interpersonal, and motor skills whether that means leading a convoy, a patrol or back home leading a family.  This health concern bleeds across personal and professional lines.

Gain:  Follow the Pilots.

The military already requires flight crews to rest between missions, a policy in place to allow flight crews the opportunity to be mission ready through sleep, and the same concept could be instituted across the military.  Keeping positive sleep biometrics—the measurement of human signatures based on metrics like amount of total sleep time or how often a person wakes up during a sleep cycle, oxygen levels during sleep and the repeat consistent length of sleep—can lower rates of daytime impairment.

4
The prevalence of insufficient sleep duration and poor sleep quality across the force. Credit: RAND, Clock by Dmitry Fisher/iStock; Pillow by Yobro10/iStockhttp://www.rand.org/pubs/research_briefs/RB9823.html

Risk:  More memoirs by personnel bragging how little sleep they need to function[10].

What if a minimal level of rest became a requirement for the larger military community?  What sleep-tracking wearables could military members opt to wear to better grasp their own readiness?  What if sleep data were factored into a military command’s performance evaluation?

Option #3:  Social Media.

The traces of identity left behind through the language, images, and even emoji[11] used in social media have been studied, and they can provide clues to mental health.

Gain:  It’s easier to pull text than to pull blood.

Biometric markers include interactivity like engagement (how often posts are made), what time a message is sent (which can act as an “insomnia index”), and emotion detection through text analysis of the language used[12].  Social media ostracism can also be measured by “embeddedness” or how close-knit one’s online connections are[13].

 

5

Credit: https://twitter.com/DeptofDefense/status/823515639302262784?ref_src=twsrc%5Etfw

Risk:  Misunderstanding in social media research.

The DoD’s tweet about this research was misconstrued as a subtweet or mockery[14].  True to its text, the tweet was about research under development at the Department of Defense and in particular the DoD Suicide Prevention Office.  Though conclusions at the scale of the DoD have yet to be reached, important research is being built-in this area including studies like one done by Microsoft Research, which demonstrated 70 percent accuracy in estimating onset of a major depressive disorder[15].  Computer programs have identified Instagram photos as a predictive marker of depression[16] and Twitter data as a quantifiable signal of suicide attempts[17].

Other Comments:  Whether by mapping the brain, breaking barriers to getting good sleep, or improving linguistic understanding of social media calls for help, how will the military look to blue force biometrics to strengthen the health of its core?  What type of intervention should be aligned once data indicators are defined?  Many tombs of untapped data remain in the digital world, but data protection and privacy measures must be in place before they are mined.

Recommendations:  None.


Endnotes:

[1]  Gilmore, G. J. (2004, December 08). Rumsfeld Handles Tough Questions at Town Hall Meeting. Retrieved June 03, 2017, from http://archive.defense.gov/news/newsarticle.aspx?id=24643

[2]  Schogol, J. (2016, May 29). Hidden-battle-scars-robert-neller-mission-to-save-marines-suicide. Retrieved June 03, 2017, from http://www.marinecorpstimes.com/story/military/2016/05/29/hidden-battle-scars-robert-neller-mission-to-save-marines-suicide/84807982/

[3]  Tucker, P. (2015, May 20). Special Operators Are Using Rapid DNA Readers. Retrieved June 03, 2017, from http://www.defenseone.com/technology/2015/05/special-operators-are-using-rapid-dna-readers/113383/

[4]  The DoD’s Joint Publication 2-0 defines biometrics as “The process of recognizing an individual based on measurable anatomical, physiological, and behavioral characteristics.”

[5]  DoD Worldwide Numbers for TBI. (2017, May 22). Retrieved June 03, 2017, from http://dvbic.dcoe.mil/dod-worldwide-numbers-tbi

[6]  Hamilton, J. (2016, December 20). Pentagon Shelves Blast Gauges Meant To Detect Battlefield Brain Injuries. Retrieved June 03, 2017, from http://www.npr.org/sections/health-shots/2016/12/20/506146595/pentagon-shelves-blast-gauges-meant-to-detect-battlefield-brain-injuries?utm_medium=RSS&utm_campaign=storiesfromnpr

[7]  CNN – The Lead with Jake Tapper. (2016, November 11). Retrieved June 03, 2017, from https://vimeo.com/191229323

[8]  West Virginia University. (2014, May 29). WVU research team developing test strips to diagnose traumatic brain injury, heavy metals. Retrieved June 03, 2017, from http://wvutoday-archive.wvu.edu/n/2014/05/29/wvu-research-team-developing-test-strips-to-diagnose-traumatic-brain-injury-heavy-metals.html

[9]  Troxel, W. M., Shih, R. A., Pedersen, E. R., Geyer, L., Fisher, M. P., Griffin, B. A., . . . Steinberg, P. S. (2015, April 06). Sleep Problems and Their Impact on U.S. Servicemembers. Retrieved June 03, 2017, from http://www.rand.org/pubs/research_briefs/RB9823.html

[10]  Mullany, A. (2017, May 02). Here’s Arianna Huffington’s Recipe For A Great Night Of Sleep. Retrieved June 03, 2017, from https://www.fastcompany.com/3060801/heres-arianna-huffingtons-recipe-for-a-great-night-of-sleep

[11]  Ruiz, R. (2016, June 26). What you post on social media might help prevent suicide. Retrieved June 03, 2017, from http://mashable.com/2016/06/26/suicide-prevention-social-media.amp

[12]  Choudhury, M. D., Gamon, M., Counts, S., & Horvitz, E. (2013, July 01). Predicting Depression via Social Media. Retrieved June 03, 2017, from https://www.microsoft.com/en-us/research/publication/predicting-depression-via-social-media/

[13]  Ibid.

[14]  Brogan, J. (2017, January 23). Did the Department of Defense Just Subtweet Donald Trump? Retrieved June 03, 2017, from http://www.slate.com/blogs/future_tense/2017/01/23/did_the_department_of_defense_subtweet_donald_trump_about_mental_health.html

[15]  Choudhury, M. D., Gamon, M., Counts, S., & Horvitz, E. (2013, July 01). Predicting Depression via Social Media. Retrieved June 03, 2017, from https://www.microsoft.com/en-us/research/publication/predicting-depression-via-social-media/

[16]  Reece, A. G., & Danforth, C. M. (2016, August 13). Instagram photos reveal predictive markers of depression. Retrieved June 03, 2017, from https://arxiv.org/abs/1608.03282

[17]  Coppersmith, G., Ngo, K., Leary, R., & Wood, A. (2016, June 16). Exploratory Analysis of Social Media Prior to a Suicide Attempt. Retrieved June 03, 2017, from https://www.semanticscholar.org/paper/Exploratory-Analysis-of-Social-Media-Prior-to-a-Su-Coppersmith-Ngo/3bb21a197b29e2b25fe8befbe6ac5cec66d25413

Biometrics Emerging Technology Option Papers Psychological Factors Sarah Soliman United States

Authorization for the Use of Military Force Options

Silence Dogood has a background in defense issues and experience working in Congress.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Current operations in the Global War On Terror are carried out under the authority granted by 2001 Authorization for the Use of Military Force (AUMF).  Given changes in the global security environment, there is currently debate over updating the AUMF.

Date Originally Written:  May 26, 2017.

Date Originally Published:  June 22, 2017.

Author and / or Article Point of View:  Author is writing from the perspective of a senior policy advisor to member of Congress sitting on either the House or Senate Armed Services Committees.

Background:  Shortly following the September 11th terrorist attacks, Congress passed Public Law 107-40, the 2001 Authorization for the Use of Military Force[1].  The 2001 AUMF states, “the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States…”  The 2001 AUMF is currently used as the legal authority for counterterrorism operations in multiple countries, against multiple organizations, including the Islamic State.

Significance:  Clearly defining ends, ways, means, and costs are central to the military planning process.  This analysis should extend and be central to the policy planning process as well.  Relying on the 2001 AUMF for the campaign against the Islamic State raises questions about whether statutory authority does, or should, to extend to this campaign.  Revisiting force authorization statutes will help mitigate the risk of perpetual war, simplify legal authorities, and strengthen congressional oversight[2].  Terrorism is a tactic, and thus cannot be defeated.  Those who engage in terrorism can be targeted and the environmental factors leading to terrorism can be addressed.  Less than 25% of the current members of Congress held office when the 2001 AUMF passed[3].  Revisiting the 2001 AUMF allows current policy makers the opportunity to reexamine the scope and extent of current counterterrorism operations.

Option #1:  Amend the 2001 AUMF to restrict Presidential authorities to use force.

Risk:  Efforts to restrict potential overreach of Presidential authorities may also restrict the flexibility of military responses to the emerging threats and capabilities of future terrorist organizations.  Restriction would relegate presidential authorities to those granted by Article II of the Constitution and international self-defense laws, such as Article 51 of the UN Charter.  This may initially restrict operational flexibility, as mentioned before.  However, this could also lead to an expansion of Article II powers as counterterrorism operations continue under the premise of Article II authorities.

Gain:  Option #1 provides Congress with a check on the President’s authority to use military force in an extended and expanded Global War on Terror.  This option also incentivizes non-kinetic counterterrorism efforts.  These efforts include targeting terrorism financing, economic development, information operations, and judicial counterterrorism strategies.  Restricted authorities could limit the geographical areas of operations.  They could also restrict targeting authorities to a list of named enemy organizations[4].

Option #2:  Amend 2001 AUMF to update or expand Presidential authorities to use force.

Risk:  Updating the 2001 AUMF to expand Presidential authorities to use force may lead to excessive use of military force.  It could also lead to further legitimizing endless war.

Gain:  An updated and expanded AUMF could clearly define uses of technologies not widely available in 2001, such as armed unmanned aerial vehicles and cyberwarfare. Option #2 could also enable the targeting of terrorist groups unaffiliated with Al Qaeda that pose a threat to the United States.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  The Authorization for Use of Military Force (AUMF), Pub. L. No. 107-40, 115 Stat. 224 (2001)

[2]  Wittes, B. (2014, November 11). A Response to Steve Vladeck on the AUMF Principles. Retrieved from https://lawfareblog.com/response-steve-vladeck-aumf-principles

[3]  Brandon, H. (2017, May 05). An ISIS AUMF: Where We Are Now, Where to Go Next, and Why It’s So Important to Get It Right. Retrieved from https://www.justsecurity.org/40549/isis-aumf-now-next-important/

[4]  Popplin, C. (2015, June 09). National Security Network Proposes Plan to Repeal AUMF. Retrieved from https://lawfareblog.com/national-security-network-proposes-plan-repeal-aumf

Authorization for the Use of Military Force (AUMF) Option Papers Silence Dogood United States Violent Extremism

Options to Counter Piracy in the Horn of Africa

Captain Robert N. Hein (U.S. Navy, Retired) was a career Surface Warfare Officer in the U.S. Navy.  He previously commanded the USS Gettysburg (CG-64) and the USS Nitze (DDG-94).  He can be found on Twitter @the_sailor_dogClaude Berube teaches at the United States Naval Academy, was a 2004 Brookings Institution LEGIS Congressional Fellow and a 2010 Maritime Security Studies Fellow at The Heritage Foundation.  He can be found on Twitter @cgberube.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  After lying dormant for a few years, following a large international response, piracy off the Horn of Africa is again threatening the free flow of global commerce.

Date Originally Written:  May 29, 2017.

Date Originally Published:  June 19, 2017.

Author and / or Article Point of View:  Claude Berube has operated off the Horn of Africa, and has written extensively on piracy and private maritime security companies.  Bob Hein has hunted pirates off Somalia.  Bob’s final assignment was the Deputy Director of Strategy on the U.S. Navy Staff.

Background:  Somali piracy threatens major trade routes.  Over 30,000 ships transit the Gulf of Aden annually.  At its peak in 2007, the cost of Somali pirate attacks to the shipping industry was $7B.  The cost decreased to $1.3B in 2015, and climbed to $1.7B in 2016[1].  In May 2017, the Commander of U.S. Africa Command, U.S. Marine Corps General Thomas Walderhauser, indicated as many as six piracy attacks occurred in the last month[2].  Given the expanse of unpatrolled waters in the region and opportunities for criminal and pirate networks to exploit maritime security gaps, there will inevitably be more attacks.

Significance:  Since the Romans and Carthaginians raised their Navies against each other in the Punic Wars, the purpose of Navies has been to protect the coast, and protect maritime commerce.  Prior to that, Thucydides mentions piracy in History of the Peloponnesian War.  The actions of pirates in Africa led to the establishment and deployment of the U.S. Navy in the early 19th century.  A resurgence in Somali piracy represents a renewed threat to global trade, and the stability of Somalia.

Option #1:  The U.S. cedes the constabulary role for counter-piracy activities to the People’s Republic of China (PRC) People’s Liberation Army (Navy) (PLA(N)).  In April 2017 the PRC deployed its 26th anti-piracy flotilla to the Horn of Africa.  In that time, the PRC escorted 5,900 ships in the region[3], and established a base in nearby Djibouti to maintain a mission to not only protects the PRC’s “One Belt” initiative, but give PRC Naval Commanders experience operating far from home.

Risk:  Taking over this mission allows the PRC to gain experience in operating far from home, a key attribute for an historic land power seeking increased influence abroad.  Prior to its first anti-piracy flotilla in 2008, the PLA(N) had been largely absent in international waters for five centuries.  The PRC may also give a false sense of security to those areas where it does not have a direct interest.  By ceding additional maritime security missions to the PLA(N), the U.S. and its partners empower PLA(N) overseas capabilities and the possibility that regional powers will become more reliant on the PRC.  For example, in 2015 the PRC was able to evacuate its citizens from the growing crisis in Yemen due, in part, to their enhanced capabilities from long-range operations in the region and newer platforms[4].

Gain:  The PRC does provide a short-term solution with a modern navy.  It has the motivation to prove itself as a guarantor of maritime security, not just a consumer.  The PRC has the capability and the desire to contain and curtail piracy in the Horn of Africa if not to simply secure shipping then for longer-range operational and strategic goals.

Option #2:  The U.S. builds capacity in the Somali maritime forces, and trains nascent Somali governments with the tools required to ensure domestic maritime security.  Local Somali governments have had some recent success in counter-piracy activity, rescuing eight Indian mariners captured by Somali pirates[5].  Introducing counter-piracy training, maritime domain awareness and intelligence sharing would go far in allowing regions of Somalia to work together to stop what should be a Somali law enforcement issue.

Risk:  The threat of corruption is a major concern; also the responsibility for building maritime law enforcement capacity would be a political minefield for any host nation.

Gain:  Using the dictum of “Teach a man to fish,” places Somalia in a position to police its waterways will provide a permanent solution to the piracy problem.  It will also ensure illegal fishing or overfishing by other states does not further deplete local fishing grounds[6].  Piracy in Somalia was born of frustrated fisherman who had no recourse against foreign fishing boats poaching their grounds.  Giving Somalia the ability to not only deter piracy, but also police their waters against illegal fishing should provide a complete long-term solution.

Option #3:  The U.S. continues to enable Private Maritime Security Companies, (PMSCs), to provide on-board armed guards at the shipping companies’ discretion.  To date, no ship with an armed team aboard has been successfully taken by Somali pirates.

Risk:  PMSCs are subject to market fluctuations.  As piracy rose in 2006-2008, PMSCs proliferated providing a wide spectrum of cost, capabilities, and legitimacy.  Ceding full maritime security control to unregulated PMSCs or to PMSCs from non-partnered nations could have other consequences as well, such as future military operations employing a trained, unaligned and unregulated force.  Additionally, many of the smaller shipping companies, favored by pirates, cannot afford PMSCs thus potentially identifying the smaller shipping companies as soft targets.

Gain:  Working with shipping companies and PMSCs would ensure the U.S. and its partners contribute to regulation of legitimate and capable PMSCs and would deny the PLA(N) an opportunity to enhance its capabilities through gaining experience in counter-piracy operations.

Option #4:  Coalition operations in the region continue.  In addition to independent operations, Somali piracy resulted in the creation of several key partnerships including Combined Task Force 151, the European Union’s Operation ATALANTA, and the North Atlantic Treaty Organization’s (NATO) Operation OCEAN SHIELD.

Risk:  Coalition investment of time, money, staff, and platforms for any operation takes away from other missions.  If other missions such as North Korea, Iran, and threats in the Mediterranean Sea have a higher immediate priority, then coalition ships might not be available if the pirate threat level is assessed as low.  In November 2016, for example, NATO concluded Operation OCEAN SHIELD as it shifted resources to the Baltic and Black Seas[7].

Gain:  Coalition operations enhance interoperability between traditional and new partners.  The larger the coalition, the fewer resources each nation has to contribute.  In most maritime operations, few countries can go it alone.

Other Comments:  While the options are limitless, the options presented here are those the authors assess as being the most feasible and acceptable.

Recommendation:  None


Endnotes:

[1]  CNBC Int’l, Luke Graham, “Somali Pirates are Back,” 03 May 2017

[2] The Trumpet, Anthony Chibarirwe, “Somali Pirates are Back,” 19 May 2017

[3]  The Diplomat, Ankit Panda, “As Somali Pirates Return, Chinese Navy Boasts of Anti-Piracy Operations,” 16 April 2017

[4]  The Diplomat, Kevin Wang, “Yemen Evacuation a Strategic Step Forward for China,” 10 April 2015

[5]  The New York Times, Hussein Mohamed, “8 Indians rescued from Somali Pirates, Officials say,” 12 April 2017

[6]  Asia Today, Hong Soon-Do, “Chinese Illegal Fishing Threatens World Waters,” May 2017

[7]  Reuters, Robin Emmott, “NATO Ends Counter-Piracy Mission as Focus Shifts to Mediterranean,” 23 November 2016

Bob Hein China (People's Republic of China) Claude Berube Horn of Africa Option Papers Piracy

U.S. Options to Address a Growing People’s Republic of China Army (Navy)

Thomas is a junior sailor in the United States Navy.  He can be found on Twitter @CTNope.  The views expressed in this article are the author’s alone and do not represent the official position of the United States Navy, the Department of Defense, or the United States Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Worrying trends in military shipbuilding by the People’s Republic of China (PRC).

Date Originally Written:  April, 29, 2017.

Date Originally Published:  June, 15, 2017.

Author and / or Article Point of View:  The author believes that the current balance of naval forces, both qualitatively and quantitatively, between the U.S. and the PRC, must be examined or the U.S. will face severe policy consequences.  The article is written from the point of view of U.S. Navy (USN) leadership as they assess the growth of the People’s Liberation Army’s (Navy) (PLAN).  This article focuses on options that U.S. policymakers have in response to the trends in the PRC’s military shipbuilding, not the trends themselves.

Background:  Since the mid-2000’s the PRC’s economic situation has vastly improved, most evident as its GDP has grown from 1.2 billion to 11 billion over fifteen years, a growth of over 900 percent[1].  This growth has enabled the PRC to embark on a remarkable shipbuilding program, achieving vast strides in training, technology, capabilities, and actual hull count of modern vessels[3][2].  This growth is creating security challenges in the Pacific as well as igniting tensions between the U.S. and the PRC, as the disparity between the USN and the PLAN shrinks at an alarming rate[4].  These developments have been closely watched by both the U.S. and her Partners, challenging U.S. policymakers to address this new, rising maritime presence while maintaining security in the region.

Significance:  In the U.S. there is a growing bipartisan voice concerned about an assertive PRC[5], as halfway across the globe Asian nations wearily observe the PRC’s growth.  A more powerful PLAN allows greater flexibility for PRC officials to exert influence.  These impressive shipbuilding trends will embolden the PRC, as now they can brush aside actors that held credible deterrence when competing against an unmodernized PLAN.  If current trends in the capacity of PRC shipbuilding and technological advancement continue, the PLAN will be able to challenge the efforts of the USN and U.S. Partners to continue to keep sea lanes of communication open in the space around the disputed ‘nine-dash-line’ as well as other parts of the Pacific.  It is plausible that in the long-term the PLAN will emerge as a near-peer to the USN in the Pacific; as U.S. has to provide for its own security, the security of others, and the security of the Global Commons, while the PRC only has to provide security for itself and its interests.

Option #1:  Platform centric approach.  Review the current force structure of the USN to decide how large the force needs to be to satisfy U.S. policy goals and modify the fleet accordingly.

Risk:  Focusing too heavily on platforms could leave the USN without the tools needed to be on the technological forefront during the next conflict.  Also, a focus on building legacy systems could take resources away from initiatives that require them.

Gain:  An increased number of platforms would allow U.S. policymakers more flexibility in how they decide to most effectively use the USN.  Additionally, more hulls would not only contribute to the deterrence generated by the USN, but also improve the readiness of the USN as more ships can remain in port and undergo maintenance, while other ships conduct missions.  Option #1 maximizes readiness for the next conflict.

Option #2:  Modernization approach.  Focus on improving today’s platforms while additionally investing in the future with disruptive technologies, but do not undertake an extensive build up of hulls.  In this option the fleet would still expand in accordance with current programs, to include the Littoral Combat Ship (LCS), Arleigh Burke Class Destroyers, and Virginia Class Submarines, but these production runs would be cut short to save funds.

Risk:  In the mid-term the USN might not have the hulls necessary to address global security concerns.  However, having fewer hulls does not mean that the USN can’t fight and win, instead, it will require that the USN’s leaders adapt.

Gain:  Investing in the future could yield powerful technologies that change the calculus on how the U.S. employs military forces.  Technologies like the railgun or unmanned systems change the way the USN fights by improving critical traits such as firepower and survivability.  Future technologies could create even greater offsets than previously discovered technologies, with the advent of artificial intelligence on the horizon, future applications appear limitless.  Option #2 increases the chance that the U.S. will continue to operate at the cutting edge of technology.

Option #3:  Balanced approach.  Modify the USN’s size, but not as broadly as the first option, instead providing additional funding towards Research and Development (R&D).

Risk:  This option could prove to be too little, too late.  The USN would benefit from the handful of additional hulls, but PRC shipbuilding pace might negate the benefit of the extra vessels.  The PRC could possibly out-build the USN by adding two new hulls for every one the USN commissions.  Likewise, the USN might need significantly more resources for R&D efforts.

Gain:  The USN would receive additional Arleigh Burke Class Destroyers, LCS Frigates, and Virginia Class Submarines.  In addition, this option would free up more funds to put into R&D to keep the USN ahead of the PLAN in terms of technology.  Overall, this would keep the USN on a balanced footing to be “ready to fight tonight” in the short to mid-term, yet still on a decent footing in the long-term, from R&D efforts.  Option #3 could turn out to be the best of both worlds, combining the increased readiness through hulls as well as continued technological innovation.

Other Comments:  The PLAN still has many issues, ranging from naval subsystems, to C4I, to training and manning[3], but they are correcting their deficiencies at an impressive rate. As such, there is a cost for the U.S. in terms of both omission and commission.

Recommendation:  None.


Endnotes:

[1]  The World Bank Statistics. Retrieved from: http://data.worldbank.org/indicator/NY.GDP.MKTP.CD?

[2]  Gabriel Collins and LCDR Michael Grubb, USN. “A Comprehensive Survey of China’s Dynamic Shipbuilding Industry, Commercial Development and Strategic Implications”.     Published August 2008. Retrieved from: https://www.usnwc.edu/Research—Gaming/China-Maritime-Studies-Institute/Publications/documents/CMS1_Collins-Grubb.aspx

[3]  Ronald O’Rourke . “China Naval Modernization: Implications for U.S. Navy Capabilities—Background and Issues for Congress”. Retrieved from: https://fas.org/sgp/crs/row/RL33153.pdf

[4]  Shannon Tiezzi with Andrew Erickson. “Chinese Naval Shipbuilding: Measuring the Waves”.  Retrieved from: http://thediplomat.com/2017/04/chinese-naval-shipbuilding-measuring-the-waves/

[5]  Various. “Hotspots Along China’s Maritime Periphery”.
Retrieved from: https://www.uscc.gov/Hearings/hotspots-along-china%E2%80%99s-maritime-periphery

Capacity / Capability Enhancement China (People's Republic of China) Maritime Option Papers Thomas United States

Hamas Policy Options Amidst Regional & Internal Change

Miguel Galsim is a final year student completing a double Bachelor of International Relations/Middle Eastern and Central Asian Studies at the Australian National University, with an academic interest in non-state violence.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Hamas Organisation’s purportedly softened political principles and its reshuffling of senior leadership figures has left the group fraught between a path towards further moderation and a road of continued, even elevated, violence.

Date Originally Written:  May 19, 2017

Date Originally Published:  June 12, 2017.

Author and / or Article Point of View:  This options paper is written from the perspective of a senior policymaker within Hamas providing options to the political leadership of the movement.

Background:  On May 1, 2017, Hamas released a document of “General Principles and Policies[1]” that displayed an apparent toning-down of Hamas’ long criticised dogmatism, evident in its original 1988 charter.  The document is bereft of references to the Muslim Brotherhood, instead refers to Hamas’ enemies as Zionists and not Jews, and while not recognising Israel, outlines its recognition of a de-facto Palestinian state along the 1967 borders.  It is widely believed that the document is a device to bring Hamas out of the diplomatic cold.

At the same time, Hamas elected former Prime Minister of Gaza Ismail Haniyeh to head its political bureau on May 6, replacing the highly pragmatic and externally focused Khaled Mashal who was barred by internal regulations from running for another term.  It is also worth noting that prior to the release of the General Principles and Policies and the election of Haniyeh, in February Yahya Sinwar, a military figurehead and former Hamas counterintelligence chief, was elected to become Gaza’s Prime Minister.  Sinwar has 22 years of imprisonment experience under Israel.  Both Haniyeh and Sinwar are insiders in Hamas[2] – having extensive grassroots experience, particularly in Gaza – and have strong links with the military wing, the latter more staunchly.

Compounding Hamas’ internal shifts, regional unrest has deprived Hamas of its traditional backers in Syria and Iran[3], and the return of an anti-Islamist leadership in Egypt has imperilled Hamas supply chains into Gaza and hardened an already difficult border for civilians living under Hamas government.

Significance:  Such a complex situation, buffeted by the potentially countervailing forces of ideological moderation and an insider-oriented shift, creates an uncertain future for Hamas as Gaza’s Islamic-nationalist militant group.  With Hamas insiders now in charge, Gaza becomes a more prominent reference point for strategic thinking.  Accordingly, facing an increasingly dissatisfied populace weary from siege, attempting to preserve its popular support, and also looking to fill the cavities left by a hostile Egypt and a distracted Syria and Iran, Hamas’ next strategic choices will be crucial for its success in pursuing its goals, and at the very least, surviving as a movement.

Option #1:  Hamas allows military imperatives to drive its broader strategic thinking, resulting in a potential escalation of violent operations.

This option would be a conceivable outcome of the election of Sinwar and Haniyeh who, while following in their predecessor’s pragmatic footsteps, nonetheless have better military ties due to their experiences in Gaza.

Risk:  This option would be inflexible and incognizant of the external factors fuelling grievances within their controlled territory.  Increased attacks on Israel would invite disastrous Israeli offensives on Gaza and substantial damage to the group’s own assets, as Hamas has learned to expect.  This would result not only in an immediate danger to Gaza’s populace, but a tightened economic blockade.  A militaristic mindset would also render Hamas even more isolated from global diplomatic support and hostile to Egyptian interests – a subsequent thinning of material and financial resources into Gaza would be the likely result.  These factors would consequently worsen the humanitarian situation in Gaza, withering Hamas’ popular support base.  Simultaneously, increased Hamas violence would give Fatah extended pretexts to dismantle Hamas cells in the West Bank.

Gain:  Emphasising its military needs would help Hamas retain the leadership of violent resistance against Israel and sustain its main differentiator from its rivals in Fatah who renounced armed resistance in 1993.  For certain sectors of the population, militancy would be a pull factor towards the group.  Enhanced coercive capabilities would also assist Hamas’ crackdown on hostile Salafi elements in Gaza and, if not applied haphazardly, act as deterrence against hostile manoeuvres from Fatah and Israel.  Additionally, a focus on military capacity could potentially reinvigorate Hamas’ relationship with Iran as the military wing’s traditional patron[4], as well as a provider of armaments.

Option #2:  Hamas pursues a course of broader political moderation and resorts only to limited, targeted applications of violence.

Given the publication of Hamas’ new political document, the path of moderation is also a viable option.  Haniyeh may be open to pragmatic change, despite his commitment to resistance[5], given the hard lessons he would have learnt first-hand from conflagrations in Gaza.  This should not be taken as disarmament, however – such a move would be disastrous for Hamas’ popularity, territorial control, and deterrence abilities.  Furthermore, it cannot be considered an option as heightened discontent within the military wing would simply endanger the integrity of the entire Organisation.

Risk:  Political compromise may widen rifts between the moderates and conservatives within Hamas, with champion hardliner Mahmoud al-Zahar already stating to the public that the new platform was an “extension” and not a “replacement” of the original, maximalist charter[6].  A more restrained Hamas could also result in external criticisms of Hamas’ failure to carry the banner of resistance, and may inspire a shift in some grassroots support towards more radical elements in Gaza.  Traditional partners in Syria and Iran may also become more estranged.

Gain:  The clear benefit of moderation is its potential to open regional and global diplomatic channels.  Doing so keeps Hamas open to a wider array of policy options and could lead to the future easing of terrorist classifications in some countries, thereby alleviating constraints on its financial flows.  Additionally, an eased political position may boost public appreciation for Hamas’ efforts by alleviating the blockade of Gaza from Israel and Egypt, and giving Israel fewer reasons to launch high-intensity offensives on Gaza.  Concurrently, opting for more surgical military operations – particularly given Sinwar’s sophisticated understanding of Israel, his ability to act with moderation, and the potential that he will work sanguinely with the politburo[7] – would retain Hamas’ coercive edge while not instigating another round of heavy fighting.

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  The Islamic Resistance Movement “Hamas”. (2017, May 1). A Document of General Principles and Policies. http://hamas.ps/en/post/678/a-document-of-general-principles-and-policies

[2]  See Ghassan Khatib’s comments in Mitnick, J & Abualouf, R. (2017, May 6). Hamas selects popular Gaza politician Ismail Haniyeh as its new leader. Los Angeles Times, http://www.latimes.com/world/middleeast/la-fg-hamas-leader-haniyeh-20170506-story.html

[3]  Uthman, T. (2013, March 4). Hamas and the Arab Spring: Arguments on gains and losses (Arabic). Namaa Center for Research and Studies, http://nama-center.com/ActivitieDatials.aspx?id=223

[4]  Mounir, S. (2017, April 23). The predicament of regional options for Hamas after the victory of Yahya Sinwar (Arabic). Al-Ahram Center for Political and Strategic Studies, http://acpss.ahram.org.eg/News/16285.aspx

[5]  Author unknown. (2017, April 30). Haniyeh: Two important merits are coming (Arabic). Shasha News, https://www.shasha.ps/news/263298.html

[6]  Author unknown. (2017, May 17). The new document splitting Hamas from the inside (Arabic). Al-Arab, http://bit.ly/2rvj7El

[7]  Caspit, B. (2017, February 15). Why some in Israel are wary of Hamas’ new Gaza boss. Al-Monitor, http://www.al-monitor.com/pulse/originals/2017/02/israel-gaza-new-hamas-leader-yahya-sinwar-security.html

Hamas Israel Miguel Galsim Option Papers Palestine

Options for Paying Ransoms to Advanced Persistent Threat Actors

Scot A. Terban is a security professional with over 13 years experience specializing in areas such as Ethical Hacking/Pen Testing, Social Engineering Information, Security Auditing, ISO27001, Threat Intelligence Analysis, Steganography Application and Detection.  He tweets at @krypt3ia and his website is https://krypt3ia.wordpress.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  Paying ransom for exploits being extorted by Advanced Persistent Threat Actors: Weighing the Options.

Date Originally Written:  June 1, 2017.

Date Originally Published:  June 8, 2017.

Author and / or Article Point of View:  Recent events have given rise to the notion of crowd funding monies to pay for exploits being held by a hacking group called ShadowBrokers in their new “Dump of the month club” they have ostensibly started.  This article examines, from a red team point of view,  the idea of meeting actors’ extortion demands to get access to new nation state-level exploits and, in doing so, being able to reverse engineer them and immunize the community.

Background:  On May 30, 2017 the ShadowBrokers posted to their new blog site that they were starting a monthly dump service wherein clients could pay a fee for access to exploits and other materials that the ShadowBrokers had stolen from the U.S. Intelligence Community (USIC).  On May 31, 2017 a collective of hackers created a Patreon site to crowd fund monies in an effort to pay the ShadowBrokers for their wares and gather the exploits to reverse engineer them in the hopes of disarming them for the greater community.  This idea was roundly debated on the internet and as of this writing  has since been pulled by the collective after collecting about $3,000.00 of funds.  In the end it was the legal counsel of one of the hackers who had the Patreon eite shut down due to potential illegalities with buying such exploits from actors like ShadowBrokers.  There were many who supported the idea with a smaller but vocal dissenting group warning that it was bad idea.

Significance:  The significance of these events has import on many levels of national security issues that now deal with information security and information warfare.  The fact that ShadowBrokers exist and have been dumping nation-state hacking tools is only one order of magnitude here.  Since the ShadowBrokers dumped their last package of files a direct international event ensued in the WannaCrypt0r malware being augmented with code from ETERNALBLUE and DOUBLEPULSAR U.S. National Security Agency exploits and infecting large numbers of hosts all over the globe with ransomware.  An additional aspect of this was that the code for those exploits may have been copied from the open source sites of reverse engineers working on the exploits to secure networks via penetration testing tools.  This was the crux of the argument that the hackers were making, simply put, they would pay for the access to deny others from having it while trying to make the exploits safe.  Would this model work for both public and private entities?  Would this actually stop the ShadowBrokers from posting the data publicly even if paid privately?

Option #1:  Private actors buy the exploits through crowd funding and reverse the exploits to make them safe (i.e. report them to vendors for patching).

Risk:  Private actors like the hacker collective who attempted this could be at risk to the following scenarios:

1) Legal issues over buying classified information could lead to arrest and incarceration.

2) Buying the exploits could further encourage ShadowBrokers’ attempts to extort the United States Intelligence Community and government in an active measures campaign.

3) Set a precedent with other actors by showing that the criminal activity will in fact produce monetary gain and thus more extortion campaigns can occur.

4) The actor could be paid and still dump the data to the internet and thus the scheme moot.

Gain:  Private actors like the hacker collective who attempted this could have net gains from the following scenarios:

1) The actor is paid, and the data is given leaving the hacker collective to reverse engineer the exploits and immunize the community.

2) The hacker collective could garner attention to the issues and themselves, this perhaps could get more traction on such issues and secure more environments.

Option #2:  Private actors do not pay for the exploits and do not reward such activities like ransomware and extortion on a global scale.

Risk:  By not paying the extortionists the data is dumped on the internet and the exploits are used in malware and other hacking attacks globally by those capable of understanding the exploits and using or modifying them.  This has already happened and even with the exploits being in the wild and known of by vendors the attacks still happened to great effect.  Another side effect is that all operations that had been using these exploits have been burned, but, this is already a known quantity to the USIC as they likely already know what exploits have been stolen and or remediated in country.

Gain:  By not paying the extortionists the community at large is not feeding the cost to benefit calculation that the attackers must make in their plans of profit.  If we do not deal with extortionists or terrorists you are not giving them positive incentive to carry out such attacks for monetary benefit.

Other Comments:  While it may be laudable to consider such schemes as crowd funding and attempting to open source such exploit reversal and mitigation, it is hubris to consider that this will stop the actor with bad intent to just sell the data and be done with it.  It is also of note that the current situation that this red team article is based on involves a nation-state actor, Russia and its military intelligence service Glavnoye Razvedyvatel’noye Upravleniye (GRU) and its foreign intelligence service the Sluzhba Vneshney Razvedki (SVR) that are understood to not care about the money.  This current situation is not about money, it is about active measures and sowing chaos in the USIC and the world.  However, the precepts still hold true, dealing with terrorists and extortionists is a bad practice that will only incentivize the behavior.  The takeaway here is that one must understand the actors and the playing field to make an informed decision on such activities.

Recommendation:  None.


Endnotes:

None.

Cyberspace Extortion Option Papers Scot A. Terban

Options for Defining “Acts of War” in Cyberspace

Michael R. Tregle, Jr. is a U.S. Army judge advocate officer currently assigned as a student in the 65th Graduate Course at The Judge Advocate General’s Legal Center & School.  A former enlisted infantryman, he has served at almost every level of command, from the infantry squad to an Army Service Component Command, and overseas in Afghanistan and the Pacific Theater.  He tweets @shockandlawblog and writes at www.medium.com/@shock_and_law.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The international community lacks consensus on a binding definition of “act of war” in cyberspace.

Date Originally Written:  March 24, 2017.

Date Originally Published:  June 5, 2017.

Author and / or Article Point of View:  The author is an active duty officer in the U.S. Army.  This article is written from the point of view of the international community toward common understandings of “acts of war” in cyberspace.

Background:  The rising prominence of cyber operations in modern international relations highlights a lack of widely established and accepted rules and norms governing their use and status.  Where no common definitions of “force” or “attack” in the cyber domain can be brought to bear, the line between peace and war becomes muddled.  It is unclear which coercive cyber acts rise to a level of force sufficient to trigger international legal rules, or how coercive a cyber act must be before it can be considered an “act of war.”  The term “act of war” is antiquated and mostly irrelevant in the current international legal system.  Instead, international law speaks in terms of “armed conflicts” and “attacks,” the definitions of which govern the resort to force in international relations.  The United Nations (UN) Charter flatly prohibits the use or threat of force between states except when force is sanctioned by the UN Security Council or a state is required to act in self-defense against an “armed attack.”  While it is almost universally accepted that these rules apply in cyberspace, how this paradigm works in the cyber domain remains a subject of debate.

Significance:  Shared understanding among states on what constitutes legally prohibited force is vital to recognizing when states are at war, with whom they are at war, and whether or not their actions, in war or otherwise, are legally permissible.  As the world finds itself falling deeper into perpetual “gray” or “hybrid” conflicts, clear lines between acceptable international conduct and legally prohibited force reduce the chance of miscalculation and define the parameters of war and peace.

Option #1:  States can define cyberattacks causing physical damage, injury, or destruction to tangible objects as prohibited uses of force that constitute “acts of war.”  This definition captures effects caused by cyber operations that are analogous to the damage caused by traditional kinetic weapons like bombs and bullets.  There are only two known instances of cyberattacks that rise to this level – the Stuxnet attack on the Natanz nuclear enrichment facility in Iran that physically destroyed centrifuges, and an attack on a German steel mill that destroyed a blast furnace.

Risk:  Limiting cyber “acts of war” to physically destructive attacks fails to fully capture the breadth and variety of detrimental actions that can be achieved in the cyber domain.  Cyber operations that only delete or alter data, however vital that data may be to national interests, would fall short of the threshold.  Similarly, attacks that temporarily interfere with use of or access to vital systems without physically altering them would never rise to the level of illegal force.  Thus, states would not be permitted to respond with force, cyber or otherwise, to such potentially devastating attacks.  Election interference and crashing economic systems exemplify attacks that would not be considered force under the physical damage standard.

Gain:  Reliance on physical damage and analogies to kinetic weapons provides a clear, bright-line threshold that eliminates uncertainty.  It is easily understood by international players and maintains objective standards by which to judge whether an operation constitutes illegal force.

Option #2:  Expand the definition of cyber force to include effects that cause virtual damage to data, infrastructure, and systems.  The International Group of Experts responsible for the Tallinn Manual approached this option with the “functionality test,” whereby attacks that interfere with the functionality of systems can qualify as cyber force, even if they cause no physical damage or destruction.  Examples of such attacks would include the Shamoon attack on Saudi Arabia in 2012 and 2016, cyberattacks that shut down portions of the Ukrainian power grid during the ongoing conflict there, and Iranian attacks on U.S. banks in 2016.

Risk:  This option lacks the objectivity and clear standards by which to assess the cyber force threshold, which may undermine shared understanding.  Expanding the spectrum of cyber activities that may constitute force also potentially destabilizes international relations by increasing circumstances by which force may be authorized.  Such expansion may also undermine international law by vastly expanding its scope, and thus discouraging compliance.  If too many activities are considered force, states that wish to engage in them may be prompted to ignore overly burdensome legal restrictions on too broad a range of activities.

Gain:  Eliminating the physical damage threshold provides more flexibility for states to defend themselves against the potentially severe consequences of cyberattacks.  Broadening the circumstances under which force may be used in response also enhances the deterrent value of cyber capabilities that may be unleashed against an adversary.  Furthermore, lowering the threshold for legally permissible cyber activities discourages coercive international acts.

Other Comments:  None.

Recommendation:  None.


Endnotes:

None.

Cyberspace Law & Legal Issues Michael R. Tregle, Jr. Option Papers

“Do You Have A Flag?” – Egyptian Political Upheaval & Cyberspace Attribution

Murad A. Al-Asqalani is an open-source intelligence analyst based in Cairo, Egypt.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


(Author’s Note — “Do You Have A Flag?” is a reference to the Eddie Izzard sketch of the same name[1].)

National Security Situation:  Response to offensive Information Operations in cyberspace against the Government of Egypt (GoE).

Date Originally Written:  May 15, 2017.

Date Originally Published:  June 1, 2017.

Author and / or Article Point of View:  This article discusses a scenario where the GoE tasks an Interagency Special Task Force (ISTF) with formulating a framework for operating in cyberspace against emergent threats to Egyptian national security.

Background:  In 2011, a popular uprising that relied mainly on the Internet and social media websites to organize protests and disseminate white, grey and black propaganda against the Mubarak administration of the GoE, culminated in former President Mubarak stepping down after three decades in power.

Three disturbing trends have since emerged.  The first is repeated deployment of large-scale, structured campaigns of online disinformation by all political actors, foreign and domestic, competing for dominance in the political arena.  Media outlets and think tanks seem to primarily cater to their owners’ or donors’ agendas.  Egyptian politics have been reduced to massive astroturfing campaigns, scripted by creative content developers and mobilized by marketing strategists, who create and drive talking points using meat and sock puppets, mask them as organic interactions between digital grassroots activists, amplify them in the echo chambers of social media, then pass them along to mainstream media outlets, which use them to pressure the GoE citing ‘public opinion’; thus, empowering their client special interest groups in this ‘digital political conflict’.

The second trend to emerge is the rise in Computer Network Attack (CNA) and Computer Network Exploitation (CNE) incidents.  CNA incidents mainly focus on hacking GoE websites and defacing them with political messages, whereas CNE incidents mainly focus on information gathering (data mining) and spear phishing on social media websites to identify and target Egyptian Army and Police personnel and their families, thus threatening their Personal Security (PERSEC), and overall Operation Security (OPSEC).  The best known effort of this type is the work of the first-ever Arabic Advanced Persistent Threat (APT) group: Desert Falcons[2].

The third trend is the abundance of Jihadi indoctrination material, and the increase in propaganda efforts of Islamist terrorist organizations in cyberspace.  New technologies, applications and encryption allow for new channels to reach potential recruits, and to disseminate written, audio, and multimedia messages of violence and hate to target populations.

Significance:  The first trend represents a direct national security threat to GoE and the interests of the Egyptian people.  Manipulation of public opinion is an Information Operations discipline known as “Influence Operations” that draws heavily on Psychological Operations or PSYOP doctrines.  It can render drastic economic consequences that can amount to economic occupation and subsequent loss of sovereignty.  Attributing each influence campaign to the special interest group behind it can help identify which Egyptian political or economic interest is at stake.

The second trend reflects the serious developments in modus operandi of terrorist organizations, non-state actors, and even state actors controlling proxies or hacker groups, which have been witnessed and acknowledged recently by most domestic intelligence services operating across the world.  Attributing these operations will identify the cells conducting them as well as the networks that support these cells, which will save lives and resources.

The third trend is a global challenge that touches on issues of freedom of speech, freedom of belief, Internet neutrality, online privacy, as well as technology proliferation and exploitation.  Terrorists use the Internet as a force multiplier, and the best approach to solving this problem is to keep them off of it through attribution and targeting, not to ban services and products available to law-abiding Internet users.

Given these parameters, the ISTF can submit a report with the following options:

Option #1:  Maintain the status quo.

Risk:  By maintaining the status quo, bureaucracy and fragmentation will always place the GoE on the defensive.  GoE will continue to defend against an avalanche of influence operations by making concessions to whoever launches them.  The GoE will continue to appear as incompetent, and lose personnel to assassinations and improvised explosive device attacks. The GoE will fail to prevent new recruits from joining terrorist groups, and it will not secure the proper atmosphere for investment and economic development.

This will eventually result in the full disintegration of the 1952 Nasserite state bodies, a disintegration that is central to the agendas of many regional and foreign players, and will give rise to a neo-Mamluk state, where rogue generals and kleptocrats maintain independent information operations to serve their own interests, instead of adopting a unified framework to serve the Egyptian people.

Gain:  Perhaps the only gain in this case is avoidance of further escalation by parties invested in the digital political conflict that may give rise to more violent insurgencies, divisions within the military enterprise, or even a fully fledged civil war.

Option #2:  Form an Interagency Cyber Threat Research and Intelligence Group (ICTRIG).

Risk:  By forming an ICTRIG, the ISTF risks fueling both intra-agency and interagency feuds that may trigger divisions within the military enterprise and the Egyptian Intelligence Community.  Competing factions within both communities will aim to control ICTRIG through staffing to protect their privileges and compartmentalization.

Gain:  Option #2 will define a holistic approach to waging cyber warfare to protect the political and economic interests of the Egyptian people, protect the lives of Egyptian service and statesmen, protect valuable resources and infrastructure, and tackle extremism.  ICTRIG will comprise an elite cadre of highly qualified commissioned officers trained in computer science, Information Operations, linguistics, political economy, counterterrorism, as well as domestic and international law to operate in cyberspace.  ICTRIG will develop its own playbook of mission, ethics, strategies and tactics in accordance with a directive from the political leadership of GoE.

Other Comments:  Option #1 can only be submitted and/or adopted due to a total lack of true political will to shoulder the responsibility of winning this digital political conflict.  It means whoever submits or adopts Option #1 is directly undermining GoE institutions.  Since currently this is the actual reality of GoE’s response to the threats outlined above, uncoordinated efforts at running several independent information operations have been noted and documented, with the Morale Affairs Department of the Military Intelligence and Reconnaissance Directorate running the largest one.

Recommendation:  None.


Endnotes:

[1]  Eddie Izzard: “Do you have a flag?”, Retrieved from: https://www.youtube.com/watch?v=_9W1zTEuKLY

[2]   Desert Falcons: The Middle East’s Preeminent APT, Kaspersky Labs Blog, Retrieved from https://blog.kaspersky.com/desert-falcon-arabic-apt/7678/

Cyberspace Egypt Murad A. Al-Asqalani Option Papers Psychological Factors

U.S. Options to Develop a Cyberspace Influence Capability

Sina Kashefipour is the founder and producer of the national security podcast The Loopcast.  He  currently works as an analyst.  The opinions expressed in this paper do not represent the position of his employer.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The battle for control and influence over the information space.

Date Originally Written:  May 18, 2017.

Date Originally Published:  May 29, 2017.

Author and / or Article Point of View:  The author believes that there is no meat space or cyberspace, there is only the information space.  The author also believes that while the tools, data, and knowledge are available, there is no United States organization designed primarily to address the issue of information warfare.

Background:  Information warfare is being used by state and non-state adversaries.  Information warfare, broadly defined, makes use of information technology to gain an advantage over an adversary.  Information is the weapon, the target, and the medium through which this type of conflict takes place[1][2][3].  Information warfare includes tactics such as misinformation, disinformation, propaganda, psychological operations and computer network operations [3][4][5].

Significance:  Information warfare is a force multiplier.  Control and mastery of information determines success in politics and enables the driving of the political narrative with the benefit of not having to engage in overt warfare.  Information warfare has taken a new edge as the information space and the political are highly interlinked and can, in some instances, be considered as one[6][7][8].

Option #1:  The revival of the United States Information Agency (USIA) or the creation of a government agency with similar function and outlook. The USIA’s original purpose can be summed as:

  • “To explain and advocate U.S. policies in terms that are credible and meaningful in foreign cultures”
  • “To provide information about the official policies of the United States, and about the people, values, and institutions which influence those policies”
  • “To bring the benefits of international engagement to American citizens and institutions by helping them build strong long-term relationships with their counterparts overseas”
  • “To advise the President and U.S. government policy-makers on the ways in which foreign attitudes will have a direct bearing on the effectiveness of U.S. policies.[9]”

USIA’s original purpose was largely designated by the Cold War.  The aforementioned four points are a good starting point, but any revival of the USIA would involve the resulting organization as one devoted to modern information warfare.  A modern USIA would not just focus on what a government agency can do but also build ties with other governments and across the private sector including with companies like Google, Facebook, and Twitter as they are platforms that have been used recently to propagate information warfare campaigns [10][11].  Private sector companies are also essential to understanding and limiting these types of campaigns [10][12][13][14].  Furthermore, building ties and partnering with other countries facing similar issues to engage in information warfare would be part of the mission [15][16][17].

Risk:  There are two fundamental risks to reconstituting a USIA: where does a USIA agency fit within the national security bureaucracy and how does modern information warfare pair with the legal bounds of the first amendment?

Defining the USIA within the national security apparatus would be difficult[18].  The purpose of the USIA would be easy to state, but difficult to bureaucratically define.  Is this an organization to include public diplomacy and how does that pair/compete with the Department of State’s public diplomacy mission?  Furthermore, if this is an organization to include information warfare how does that impact Department of Defense capabilities such as the National Security Agency or United States Cyber Command?  Where does the Broadcasting Board of Governors fit in?  Lastly, modern execution of successful information warfare relies on a whole of government approach or the ability to advance strategy in an interdisciplinary fashion, which is difficult given the complexity of the bureaucracy.

The second risk is how does an agency engage in information warfare in regards to the first amendment?  Consider for a moment that if war or conflict that sees information as the weapon, the target, and the medium, what role can the government legally play?  Can a government wage information warfare without, say, engaging in outright censorship or control of information mediums like Facebook and Twitter?  The legal framework surrounding these issues are ill-defined at present [19][20].

Gain:  Having a fully funded cabinet level organization devoted to information warfare complete with the ability to network across government agencies, other governments and the private sector able to both wage and defend the United States against information warfare.

Option #2:  Smaller and specific interagency working groups similar to the Active Measures Working Group of the late eighties.  The original Active Measures Working Group was an interagency collaboration devoted to countering Soviet disinformation, which consequently became the “U.S Government’s body of expertise on disinformation [21].”

The proposed working group would focus on a singular issue and in contrast to Option #1, a working group would have a tightly focused mission, limited staff, and only focus on a singular problem.

Risk:  Political will is in competition with success, meaning if the proposed working group does not show immediate success, more than likely it will be disbanded.  The group has the potential of being disbanded once the issue appears “solved.”

Gain:  A small and focused group has the potential to punch far above its weight.  As Schoen and Lamb point out “the group exposed Soviet disinformation at little cost to the United States but negated much of the effort mounted by the large Soviet bureaucracy that produced the multibillion dollar Soviet disinformation effort[22].”

Option #3:  The United States Government creates a dox and dump Wikileaks/Shadow Brokers style group[23][24].  If all else fails then engaging in attacks against adversary’s secrets and making them public could be an option.  Unlike the previous two options, this option does not necessarily represent a truthful approach, rather just truthiness[25].  In practice this means leaking/dumping data that reinforces and emphasizes a deleterious narrative concerning an adversary.  Thus, making their secrets very public, and putting the adversary in a compromising position.

Risk:  Burning data publicly might compromise sources and methods which would ultimately impede/stop investigations and prosecutions.  For instance, if an adversary has a deep and wide corruption problem is it more effective to dox and dump accounts and shell companies or engage in a multi-year investigatory process?  Dox and dump would have an immediate effect but an investigation and prosecution would likely have a longer effect.

Gain:  An organization and/or network is only as stable as its secrets are secure, and being able to challenge that security effectively is a gain.

Recommendation:  None


Endnotes:

[1]  Virag, Saso. (2017, April 23). Information and Information Warfare Primer. Retrieved from:  http://playgod.org/information-warfare-primer/

[2]  Waltzman, Rand. (2017, April 27). The Weaponization of Information: The Need of Cognitive Security. Testimony presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity on April 27, 2017.

[3]  Pomerantsev, Peter and Michael Weiss. (2014). The Menace of Unreality: How the Kremlin Weaponizes Information, Culture, and Money.

[4]  Matthews, Miriam and Paul, Christopher (2016). The Russian “Firehose of Falsehood” Propaganda Model: Why It Might Work and Options to Counter It

[5]  Giles, Keir. (2016, November). Handbook of Russian Information Warfare. Fellowship Monograph Research Division NATO Defense College.

[6]  Giles, Keir and Hagestad II, William. (2013). Divided by a Common Language: Cyber Definitions in Chinese, Russian, and English. 2013 5th International Conference on Cyber Conflict

[7]  Strategy Bridge. (2017, May 8). An Extended Discussion on an Important Question: What is Information Operations? Retrieved: https://thestrategybridge.org/the-bridge/2017/5/8/an-extended-discussion-on-an-important-question-what-is-information-operations

[8] There is an interesting conceptual and academic debate to be had between what is information warfare and what is an information operation. In reality, there is no difference given that the United States’ adversaries see no practical difference between the two.

[9] State Department. (1998). USIA Overview. Retrieved from: http://dosfan.lib.uic.edu/usia/usiahome/oldoview.htm

[10]  Nuland, William, Stamos, Alex, and Weedon, Jen. (2017, April 27). Information Operations on Facebook.

[11]  Koerner, Brendan. (2016, March). Why ISIS is Winning the Social Media War. Wired

[12]  Atlantic Council. (2017). Digital Forensic Research Lab Retrieved:  https://medium.com/dfrlab

[13]  Bellingcat. (2017).  Bellingcat: The Home of Online Investigations. Retrieved: https://www.bellingcat.com/

[14]  Bergen, Mark. (2016). Google Brings Fake News Fact-Checking to Search Results. Bloomberg News. Retrieved: https://www.bloomberg.com/news/articles/2017-04-07/google-brings-fake-news-fact-checking-to-search-results

[15]  NATO Strategic Communications Centre of Excellence. (2017). Retrieved: http://stratcomcoe.org/

[16]  National Public Radio. (2017, May 10). NATO Takes Aim at Disinformation Campaigns. Retrieved: http://www.npr.org/2017/05/10/527720078/nato-takes-aim-at-disinformation-campaigns

[17]  European Union External Action. (2017). Questions and Answers about the East Stratcom Task Force. Retrieved: https://eeas.europa.eu/headquarters/headquarters-homepage/2116/-questions-and-answers-about-the-east-

[18]  Armstrong, Matthew. (2015, November 12). No, We Do Not Need to Revive The U.S. Information Agency. War on the Rocks. Retrieved:  https://warontherocks.com/2015/11/no-we-do-not-need-to-revive-the-u-s-information-agency/ 

[19]  For example the Countering Foreign Propaganda and Disinformation Act included in the National Defense Authorization Act for fiscal year 2017 acts more with the issues of funding, organization, and some strategy rather than legal infrastructure issues.  Retrieved: https://www.congress.gov/114/crpt/hrpt840/CRPT-114hrpt840.pdf

[20]  The U.S Information and Educational Exchange Act of 1948 also known as the Smith-Mundt Act. The act effectively creates the basis for public diplomacy and the dissemination of government view point data abroad. The law also limits what the United States can disseminate at home. Retrieved: http://legisworks.org/congress/80/publaw-402.pdf

[21]  Lamb, Christopher and Schoen, Fletcher (2012, June). Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference. Retrieved: http://ndupress.ndu.edu/Portals/68/Documents/stratperspective/inss/Strategic-Perspectives-11.pdf

[22]  Lamb and Schoen, page 3

[23]  RT. (2016, October 3). Wikileaks turns 10: Biggest Secrets Exposed by Whistleblowing Project. Retrieved: https://www.rt.com/news/361483-wikileaks-anniversary-dnc-assange/

[24]  The Gruqg. (2016, August 18). Shadow Broker Breakdown. Retrieved: https://medium.com/@thegrugq/shadow-broker-breakdown-b05099eb2f4a

[25]  Truthiness is defined as “the quality of seeming to be true according to one’s intuition, opinion, or perception, without regard to logic, factual evidence, or the like.” Dictionary.com. Truthiness. Retrieved:  http://www.dictionary.com/browse/truthiness.

Truthiness in this space is not just about leaking data but also how that data is presented and organized. The goal is to take data and shape it so it feels and looks true enough to emphasize the desired narrative.

Capacity / Capability Enhancement Cyberspace Option Papers Psychological Factors Sina Kashefipour United States

Evolution of U.S. Cyber Operations and Information Warfare

Brett Wessley is an officer in the U.S. Navy, currently assigned to U.S. Pacific Command.   The contents of this paper reflect his own personal views and are not necessarily endorsed by U.S. Pacific Command, Department of the Navy or Department of Defense.  Connect with him on Twitter @Brett_Wessley.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  Evolving role of cyber operations and information warfare in military operational planning.

Date Originally Written:  April 19, 2017.

Date Originally Published:  May 25, 2017.

Author and / or Article Point of View:  This article is intended to present options to senior level Department of Defense planners involved with Unified Command Plan 2017.

Background:  Information Warfare (IW) has increasingly gained prominence throughout defense circles, with both allied and adversarial militaries reforming and reorganizing IW doctrine across their force structures.  Although not doctrinally defined by the U.S. Department of Defense (DoD), IW has been embraced with varying degrees by the individual branches of the U.S. armed forces[1].  For the purposes of this paper, the definition of IW is: the means of creating non-kinetic effects in the battlespace that disrupt, degrade, corrupt, or influence the ability of adversaries or potential adversaries to conduct military operations while protecting our own.

Significance:  IW has been embraced by U.S. near-peer adversaries as a means of asymmetrically attacking U.S. military superiority.  Russian Defense Minister Sergei Shoigu recently acknowledged the existence of “information warfare troops,” who conduct military exercises and real-world operations in Ukraine demonstrating the fusion of intelligence, offensive cyber operations, and information operations (IO)[2].   The People’s Republic of China has also reorganized its armed forces to operationalize IW, with the newly created People’s Liberation Army Strategic Support Force drawing from existing units to combine intelligence, cyber electronic warfare (EW), IO and space forces into a single command[3].

Modern militaries increasingly depend on sophisticated systems for command and control (C2), communications and intelligence.  Information-related vulnerabilities have the potential for creating non-kinetic operational effects, often as effective as kinetic fires options.  According to U.S. Army Major General Stephen Fogarty, “Russian activities in Ukraine…really are a case study for the potential for CEMA, cyber-electromagnetic activities…It’s not just cyber, it’s not just electronic warfare, it’s not just intelligence, but it’s really effective integration of all these capabilities with kinetic measures to actually create the effect that their commanders [want] to achieve[4].”  Without matching the efforts of adversaries to operationalize IW, U.S. military operations risk vulnerability to enemy IW operations.

Option #1:  United States Cyber Command (USCYBERCOM) will oversee Military Department efforts to man, train, and equip IW and IW-related forces to be used to execute military operations under Combatant Command (CCMD) authority.  Additionally, USCYBERCOM will synchronize IW planning and coordinate IW operations across the CCMDs, as well as execute some IW operations under its own authority.

Risk:  USCYBERCOM, under United States Strategic Command (USSTRATCOM) as a sub-unified command, and being still relatively new, has limited experience coordinating intelligence, EW, space and IO capabilities within coherent IW operations.  USSTRATCOM is tasked with responsibility for DoD-wide space operations, and the Geographic Combatant Commands (GCCs) are tasked with intelligence, EW, and IO operational responsibility[5][6][7].”  Until USCYBERCOM gains experience supporting GCCs with full-spectrum IW operations, previously GCC-controlled IO and EW operations will operate at elevated risk relative to similar support provided by USSTRATCOM.

Gain:  USCYBERCOM overseeing Military Department efforts to man, train, and equip IW and IW-related forces will ensure that all elements of successful non-kinetic military effects are ready to be imposed on the battlefield.  Operational control of IW forces will remain with the GCC, but USCYBERCOM will organize, develop, and plan support during crisis and war.  Much like United States Special Operations Command’s (USSOCOM) creation as a unified command consolidated core special operations activities, and tasked USSOCOM to organize, train, and equip special operations forces, fully optimized USCYBERCOM would do the same for IW-related forces.

This option is a similar construct to the Theater Special Operations Commands (TSOCs) which ensure GCCs are fully supported during execution of operational plans.  Similar to TSOCs, Theater Cyber Commands could be established to integrate with GCCs and support both contingency planning and operations, replacing the current Joint Cyber Centers (JCCs) that coordinate current cyber forces controlled by USCYBERCOM and its service components[8].

Streamlined C2 and co-location of IW and IW-related forces would have a force multiplying effect when executing non-kinetic effects during peacetime, crisis and conflict.  Instead of cyber, intelligence, EW, IO, and space forces separately planning and coordinating their stove-piped capabilities, they would plan and operate as an integrated unit.

Option #2:  Task GCCs with operational responsibility over aligned cyber forces, and integrate them with current IW-related planning and operations.

Risk:  GCCs lack the institutional cyber-related knowledge and expertise that USCYBERCOM maintains, largely gained by Commander, USCYBERCOM traditionally being dual-hatted as Director of the National Security Agency (NSA).  While it is plausible that in the future USCYBERCOM could develop equivalent cyber-related tools and expertise of NSA, it is much less likely that GCC responsibility for cyber forces could sustain this relationship with NSA and other Non-Defense Federal Departments and Agencies (NDFDA) that conduct cyber operations.

Gain:  GCCs are responsible for theater operational and contingency planning, and would be best suited for tailoring IW-related effects to military plans.  During all phases of military operations, the GCC would C2 IW operations, leveraging the full spectrum of IW to both prepare the operational environment and execute operations in conflict.  While the GCCs would be supported by USSTRATCOM/USCYBERCOM, in addition to the NDFDAs, formally assigning Cyber Mission Teams (CMTs) as the Joint Force Cyber Component (JFCC) to the GCC would enable the Commander influence the to manning, training, and equipping of forces relevant to the threats posed by their unique theater.

GCCs are already responsible for theater intelligence collection and IO, and removing administrative barriers to integrating cyber-related effects would improve the IW capabilities in theater.  Although CMTs currently support GCCs and their theater campaign and operational plans, targeting effects are coordinated instead of tasked[9].  Integration of the CMTs as a fully operational JFCC would more efficiently synchronize non-kinetic effects throughout the targeting cycle.

Other Comments:  The current disjointed nature of DoD IW planning and operations prevents the full impact of non-kinetic effects to be realized.  While cyber, intelligence, EW, IO, and space operations are carried out by well-trained and equipped forces, these planning efforts remain stove-piped within their respective forces.  Until these operations are fully integrated, IW will remain a strength for adversaries who have organized their forces to exploit this military asymmetry.

Recommendation:  None.


Endnotes:

[1]  Richard Mosier, “NAVY INFORMATION WARFARE — WHAT IS IT?,” Center for International Maritime Security, September 13, 2016. http://cimsec.org/navy-information-warfare/27542

[2]  Vladimir Isachenkov, “Russia military acknowledges new branch: info warfare troops,” The Associated Press, February 22, 2017. http://bigstory.ap.org/article/8b7532462dd0495d9f756c9ae7d2ff3c/russian-military-continues-massive-upgrade

[3]  John Costello, “The Strategic Support Force: China’s Information Warfare Service,” The Jamestown Foundation, February 8, 2016. https://jamestown.org/program/the-strategic-support-force-chinas-information-warfare-service/#.V6AOI5MrKRv

[4]  Keir Giles, “The Next Phase of Russian Information Warfare,” The NATO STRATCOM Center of Excellence, accessed April 20, 2017. http://www.stratcomcoe.org/next-phase-russian-information-warfare-keir-giles

[5]  U.S. Joint Chiefs of Staff, “Joint Publication 2-0: Joint Intelligence”, October 22, 2013, Chapter III: Intelligence Organizations and Responsibilities, III-7-10.

[6]  U.S. Joint Chiefs of Staff, “Joint Publication 3-13: Information Operations”, November 20, 2014, Chapter III: Authorities, Responsibilities, and Legal Considerations, III-2; Chapter IV: Integrating Information-Related Capabilities into the Joint Operations Planning Process, IV-1-5.

[7]  U.S. Joint Chiefs of Staff, “Joint Publication 3-12 (R): Cyberspace Operations”, February 5, 2013, Chapter III: Authorities, Roles, and Responsibilities, III-4-7.

[8]  Ibid.

[9]  U.S. Cyber Command News Release, “All Cyber Mission Force Teams Achieve Initial Operating Capability,” U.S. Department of Defense, October 24, 2016.  https://www.defense.gov/News/Article/Article/984663/all-cyber-mission-force-teams-achieve-initial-operating-capability/

Brett Wessley Cyberspace Information and Intelligence Option Papers Planning Psychological Factors United States

Cyber Vulnerabilities in U.S. Law Enforcement & Public Safety Communication Networks

The Viking Cop has served in a law enforcement capacity with multiple organizations within the U.S. Executive Branch.  He can be found on Twitter @TheVikingCop.  The views reflected are his own and do not represent the opinion of any government entities.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Cyber vulnerabilities in regional-level Law Enforcement and Public Safety (LE/PS) communication networks which could be exploited by violent extremists in support of a physical attack.

Date Originally Written:  April 15, 2017.

Date Originally Published:  May 22, 2017.

Author and / or Article Point of View:  Author is a graduate of both University and Federal LE/PS training.  Author has two years of sworn and unsworn law enforcement experience.  Author had been a licensed amateur radio operator and builder for eleven years.

Background:  Currently LE/PS agencies in the U.S. operate on communication networks designed on the Association of Public-Safety Communications Officials, Project 25 (P25) standard established in 1995[1].  European and East Asian Countries operate on a similar network standard known as the Terrestrial Trunked Radio.

The push on a federal level for widespread implementation of the P25 standard across all U.S. emergency services was prompted by failures of communication during critical incidents such as the September 11th attacks, Columbine Massacre, and the Oklahoma City bombing[2].  Prior to the P25 implementation, different LE/PS organizations had been operating on different bands, frequencies, and equipment that prevented them from directly communicating to each other.

During P25 implementation many agencies, in an effort to offset cost and take advantage of the interoperability concept, established Regional Communication Centers (RCC) such as the Consolidated Communication Bureau in Maine, the Grand Junction Regional Communications Center in Colorado, and South Sound 911 in Washington.  These RCCs have consolidated dispatching for all LE/PS activities thus providing the ability of smaller jurisdictions to better work together handling daily calls for service.

Significance:  During a critical incident the rapid, clear, and secure flow of communications between responding personnel is essential.  The ability of responding LE/PS organizations is greatly enhanced by the P25 standard where unified networks can be quickly established due to operating on the same band and the flow of information can avoid bottle necks.

Issues begin to arise as violent extremist groups, such as the Islamic State of Iraq and Syria (ISIS), have been attempting to recruit more technically minded members that will be able to increase the group’s ability to plan and conduct cyber operations as a direct attack or in support of a physical attack[3].  Electronic security researchers have also found various security flaws in the P25 standard’s method of framing transmission data that prove it is vulnerable to practical attacks such as high-energy denial of service attacks and low-energy selective jamming attacks[4][5].

This article focuses on a style of attack known as Selective Jamming, in which an attacker would be able to use one or more low-power, inexpensive, and portable transceivers to specifically target encrypted communications in a manner that would not affect transmissions that are made in the clear (unencrypted).  Such an attack would be difficult to detect because of other flaws in the P25 standard and the attacks would last no more than a few hundredths of a second each [4].

If a series of Selective Jamming transceivers were activated shortly before a physical attack responding units, especially tactical units, would have minutes to make a decision on how to run communications.

Option #1:  Push all radio traffic into the clear to overcome a possible selective jamming attack.  This option would require all responding units to disable the encryption function on their radios or switch over to an unencrypted channel to continue to effectively communicate during the response phase.

Risk:  The purpose of encrypted communications in LE/PS is to prevent a perpetrator from listening to the tactical decisions and deployment of responders.  If a perpetrator has developed and implemented the capability to selectively jam communications they will likely have the ability and equipment to monitor radio traffic once it is in the clear.  This option would give the perpetrator of an attack a major advantage on knowing the response to the attack.  The hesitancy to operate in the clear by undercover teams was noted as a major safety risk in the after action report of the 2015 San Bernardino Shooting[6].

Gain:  LE/PS agencies responding to an incident would be able to continue to use their regular equipment and protocols without having to deploy an alternative system.  This would give responders the most speed in attempting to stop the attack with the known loss of operational security.  There would also be zero equipment costs above normal operation as P25 series radios are all capable of operating in the clear.

Option #2:  Develop and stage a secondary communications system for responding agencies or tactical teams to implement once a selective jamming attack is suspected to be occurring.

Risk:  Major cost and planning would have to be implemented to have a secondary system that is jamming-resistant that could be deployed rapidly by responding agencies.  This cost factor could prompt agencies to only equip tactical teams with a separate system such as push-to-talk cellphones or radio systems with different communications standards than P25.  Any LE/PS unit that does not have access to the secondary system will experience a near-communications blackout outside communications made in the clear.

Gain:  Responding units or tactical teams, once a possible selective jamming attack was recognized, would be able to maintain operational security by switching to a secure method of communications.  This would disrupt the advantage that the perpetrator was attempting to gain by disrupting and/or monitoring radio traffic.

Other Comments:  Both options would require significant additional training for LE/PS personnel to recognize the signs of a Selective Jamming attack and respond as appropriate.

Recommendation:  None.


Endnotes:

[1]  Horden, N. (2015). P25 History. Retrieved from Project 25 Technology Interest Group: http://www.project25.org/index.php/technology/p25-history

[2]  National Task Force on Interoperability. (2005). Why Can’t We Talk. Washington D.C.: National Institute of Justice.

[3]  Nussbaum, B. (2015). Thinking About ISIS And Its Cyber Capabilities: Somewhere Between Blue Skies and Falling One. Retrieved from The Center for Internet and Society: http://cyberlaw.stanford.edu/blog/2015/11/thinking-about-isis-and-its-cyber-capabilities-somewhere-between-blue-skies-and-falling

[4]  Clark, S., Metzger, P., Wasserman, Z., Xu, K., & Blaze, M. (2010). Security Weaknesses in the APCO Project 25 Two-Way Radio System. University of Pennsylvania Department of Computer & Information Science.

[5]  Glass, S., Muthukkumarasamy, V., Portmann, M., & Robert, M. (2011). Insecurity in Public-Safety Communications:. Brisbane: NICTA.

[6]  Braziel, R., Straub, F., Watson, G., & Hoops, R. (2016). Bringing Calm to Chaos: A Critical Incident Review of the San Bernardino Public Safety Response to the December 2, 2015, Terrorist Shooting Incident at the Inland Regional Center. Washington: Office of Community Oriented Policing Services.

Communications Cyberspace Law Enforcement & Public Safety Option Papers The Viking Cop United States

U.S. Diplomacy Options for Security & Adaptability in Cyberspace

Matthew Reitman is a science and technology journalist.  He has a background in security policy and studied International Relations at Boston University.  He can be found on Twitter @MatthewReitman.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  U.S. competitors conducting national security activities in cyberspace below the threshold of war aka in the “Gray Zone.”

Date Originally Written:  April 14, 2017.

Date Originally Published:  May 18, 2017.

Author and / or Article Point of View:  This article is written from the point of view of the U.S. State Department towards cyberspace.

Background:  State actors and their non-state proxies operate aggressively in cyberspace, but within a gray zone that violates international norms without justifying a “kinetic” response.  Russian influence operations in the 2016 U.S. election were not an act of war, but escalated tensions dramatically[1].  North Korea used the Lazarus Group to circumvent sanctions by stealing $81 million from Bangladesh’s central bank[2].  Since a U.S.-People’s Republic of China (PRC) agreement in 2015 to curb corporate espionage, there have been 13 intrusions by groups based in the PRC against the U.S. private sector[3].  The State Department has helped to curb Islamic State of Iraq and Syria propaganda online via the Global Engagement Center[4].  The recent creation of another interagency entity, the Russia Information Group, suggests similar efforts could be effective elsewhere[5].

The State Department continues to work towards establishing behavior norms in cyberspace via multilateral channels, like the United Nations Group of Governmental Experts, and bilateral channels, but this remains a slow and tedious process.  Until those norms are codified, gray zone activities in cyberspace will continue.  The risk of attacks on Information Technology (IT) or critical infrastructure and less destructive acts will only grow as the rest of the world comes online, increasing the attack surface.

Significance:  The ever-growing digitally connected ecosystem presents a chimera-like set of risks and rewards for U.S. policymakers.  Protecting the free exchange of information online, let alone keeping the U.S. and its allies safe, is difficult when facing gray zone threats.  Responding with conventional tools like economic sanctions can be evaded more easily online, while “hacking back” can escalate tensions in cyberspace and further runs the risk of creating a conflict that spills offline.  Despite the challenge, diplomacy can reduce threats and deescalate tensions for the U.S. and its allies by balancing security and adaptability.  This article provides policy options for responding to and defending against a range of gray zone threats in cyberspace.

Option #1:  Establish effective compellence methods tailored to each adversary.  Option #1 seeks to combine and tailor traditional coercive diplomacy methods like indictments, sanctions, and “naming and shaming,” in tandem with aggressive counter-messaging to combat information warfare, which can be anything from debunking fake news to producing misinformation that undermines the adversary’s narrative.  A bifocal approach has shown to be more effective form of coercion[6] than one or the other.

Risk:  Depending on the severity, the combined and tailored compellence methods could turn public opinion against the U.S.  Extreme sanctions that punish civilian populations could be viewed unfavorably.  If sanctions are evaded online, escalation could increase as more aggressive responses are considered.  “Naming and shaming” could backfire if an attack is falsely attributed.  Fake bread crumbs can be left behind in code to obfuscate the true offender and make it look as though another nation is responsible.  Depending on the severity of counter-propaganda, its content could damage U.S. credibility, especially if conducted covertly.  Additionally, U.S. actions under Option #1 could undermine efforts to establish behavior norms in cyberspace.

Gain:  Combined and tailored compellence methods can isolate an adversary financially and politically while eroding domestic support.  “Naming and shaming” sends a clear message to the adversary and the world that their actions will not be tolerated, justifying any retaliation.  Sanctions can weaken an economy and cut off outside funding for political support.  Leaking unfavorable information and counter-propaganda undermines an adversary’s credibility and also erodes domestic support.  Option #1’s severity can range depending on the scenario, from amplifying the spread of accurate news and leaked documents with social botnets to deliberately spreading misinformation.  By escalating these options, the risks increase.

Option #2:  Support U.S. Allies’ cybersecurity due diligence and capacity building.  Option #2 pursues confidence-building measures in cyberspace as a means of deterrence offline, so nations with U.S. collective defense agreements have priority.  This involves fortifying allies’ IT networks and industrial control systems for critical infrastructure by taking measures to reduce vulnerabilities and improve cybersecurity incident response teams (CSIRTs).  This option is paired with foreign aid for programs that teach media literacy, “cyber hygiene,” and computer science to civilians.

Risk:  Improving allies’ defensive posture can be viewed by some nations as threatening and could escalate tensions.  Helping allies fortify their defensive capabilities could lead to some sense of assumed responsibility if those measures failed, potentially fracturing the relationship or causing the U.S. to come to their defense.  Artificial Intelligence (AI)-enhanced defense systems aren’t a silver bullet and can contribute to a false sense of security.  Any effort to defend against information warfare runs the potential of going too far by infringing freedom of speech.  Aside from diminishing public trust in the U.S., Option #2 could undermine efforts to establish behavior norms in cyberspace.

Gain:  Collectively, this strategy can strengthen U.S. Allies by contributing to their independence while bolstering their defense against a range of attacks.  Option #2 can reduce risks to U.S. networks by decreasing threats to foreign networks.  Penetration testing and threat sharing can highlight vulnerabilities in IT networks and critical infrastructure, while educating CSIRTs.  Advances in AI-enhanced cybersecurity systems can decrease response time and reduce network intrusions.  Funding computer science education trains the next generation of CSIRTs.  Cyber hygiene, or best cybersecurity practices, can make civilians less susceptible to cyber intrusions, while media literacy can counter the effects of information warfare.

Other Comments:  The U.S. Cyber Command and intelligence agencies, such as the National Security Agency and Central Intelligence Agency, are largely responsible for U.S. government operations in cyberspace.  The U.S. State Department’s range of options may be limited, but partnering with the military and intelligence communities, as well as the private sector is crucial.

Recommendation:  None.


Endnotes:

[1]  Nakashima, E. (2017, February 7) Russia’s apparent meddling in U.S. election is not an act of war, cyber expert says. Washington Post. Retrieved from: https://www.washingtonpost.com/news/checkpoint/wp/2017/02/07/russias-apparent-meddling-in-u-s-election-is-not-an-act-of-war-cyber-expert-says

[2]  Finkle, J. (2017, March 15) “North Korean hacking group behind recent attacks on banks: Symantec.” Reuters. Retrieved from: http://www.reuters.com/article/us-cyber-northkorea-symantec

[3]  FireEye. (2016, June 20). Red Line Drawn: China Recalculates Its Use Of Cyber Espionage. Retrieved from: https://www.fireeye.com/blog/threat-research/2016/06/red-line-drawn-china-espionage.html

[4]  Warrick, J. (2017, February 3). “How a U.S. team uses Facebook, guerrilla marketing to peel off potential ISIS recruits.” Washington Post. Retrieved from: https://www.washingtonpost.com/world/national-security/bait-and-flip-us-team-uses-facebook-guerrilla-marketing-to-peel-off-potential-isis-recruits/2017/02/03/431e19ba-e4e4-11e6-a547-5fb9411d332c_story.html

[5]  Mak, T. (2017, February 6). “U.S. Preps for Infowar on Russia”. The Daily Beast. Retrieved from: http://www.thedailybeast.com/articles/2017/02/06/u-s-preps-for-infowar-on-russia.html

[6]  Valeriano, B., & Jensen, B. (2017, March 16). “From Arms and Influence to Data and Manipulation: What Can Thomas Schelling Tell Us About Cyber Coercion?”. Lawfare. Retrieved from: https://www.lawfareblog.com/arms-and-influence-data-and-manipulation-what-can-thomas-schelling-tell-us-about-cyber-coercion

Below Established Threshold Activities (BETA) Cyberspace Diplomacy Matthew Reitman Option Papers United States

Options for Private Sector Hacking Back

Scot A. Terban is a security professional with over 13 years experience specializing in areas such as Ethical Hacking/Pen Testing, Social Engineering Information, Security Auditing, ISO27001, Threat Intelligence Analysis, Steganography Application and Detection.  He tweets at @krypt3ia and his website is https://krypt3ia.wordpress.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  A future where Hacking Back / Offensive Cyber Operations in the Private Sphere are allowed by the U.S. Government.

Date Originally Written:  April 3, 2017.

Date Originally Published:  May 15, 2017.

Author and / or Article Point of View:  This article is written from the point of view of a future where Hacking Back / Offensive Cyber Operations as a means for corporations to react offensively as a defensive act has been legally sanctioned by the U.S. Government and the U.S. Department of Justice.  While this government sanctioning may seem encouraging to some, it could lead to national and international complications.

Background:  It is the year X and hacking back by companies in the U.S. has been given official sanction.  As such, any company that has been hacked may offensively react to the hacking by hacking the adversaries infrastructure to steal back data and / or deny and degrade the adversaries from attacking further.

Significance:  At present, Hacking Back / Offensive Cyber Operations are not sanctioned activities that the U.S. Government allows U.S. corporations to conduct.  If this were to come to pass, then U.S. corporations would have the capabilities to stand up offensive cyber operations divisions in their corporate structure or perhaps hire companies to carry out such actions for them i.e. Information Warfare Mercenaries.  These forces and actions taken by corporations, if allowed, could cause larger tensions within the geopolitical landscape and force other nation states to react.

Option #1:  The U.S. Government sanctions the act of hacking back against adversaries as fair game.  U.S. corporations stand up hacking teams to work with Blue Teams (Employees in companies who attempt to thwart incidents and respond to them) to react to incidents and to attempt to hack the adversaries back to recover information, determine who the adversaries are, and to prevent their infrastructure from being operational.

Risk:  Hacking teams at U.S. corporations, while hacking back, make mistakes and attack innocent companies/entities/foreign countries whose infrastructure may have been unwittingly used as part of the original attack.

Gain:  The hacking teams of these U.S. corporations manage to hack back, steal information, and determine if it had been copied and further exfiltrated.  This also allows the U.S. corporations to try to determine who the actor is and gather evidence as well as degrade the actor’s ability to attack others.

Option #2:  The U.S. Government allows for the formation of teams/companies of information warfare specialists that are non-governmental bodies to hack back as an offering.  This offensive activity would be sanctioned and monitored by the government but work for companies under a letter of marque approach with payment and / or bounties on actors stopped or for evidence brought to the judicial and used to prosecute actors.

Risk:  Letters of marque could be misused and attackers could go outside their mandates.  The same types of mistakes could also be made as those of the corporations that formed offensive teams internally.  Offensive actions could affect geopolitics as well as get in the way of other governmental operations that may be taking place.  Infrastructures could be hacked and abused of innocent actors who were just a pivot point and other not yet defined mistakes could be made.

Gain:  Such actors and operations could deter some adversaries and in fact could retrieve data that has been stolen and perhaps prevent that data from being further exploited.

Other Comments:  Clearly the idea of hacking back has been in the news these last few years and the notion has been something many security professionals have said was a terrible idea.  There are certain advantages to the idea that firms can protect themselves from hacking by hacking back, but generally the sense of things today is that many companies cannot even protect their data properly to start with so the idea of hacking back is a red herring to larger security concerns.

Recommendation:  None.


Endnotes:

None.

Cyberspace Offensive Operations Option Papers Private Sector Scot A. Terban United States

Options to Deter Cyber-Intrusions into Non-Government Computers

Elizabeth M. Bartels is a doctoral candidate at the Pardee RAND Graduate School and an assistant policy analyst at the nonprofit, nonpartisan RAND Corporation.  She has an M.S. in political science from the Massachusetts Institute of Technology and a B.A. in political science with a minor in Near Eastern languages and civilization from the University of Chicago.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Unless deterred, cyber-intrusions into non-government computer systems will continue to lead to the release of government-related information.

Date Originally Written:  March 15, 2017.

Date Originally Published:  May 11, 2017.

Author and / or Article Point of View:  Author is a PhD candidate in policy analysis, whose work focuses on wargaming and defense decision-making.

Background:  Over the years, a great deal of attention has been paid to gaining security in cyberspace to prevent unauthorized access to critical infrastructure like those that control electrical grids and financial systems, and military networks.  In recent years a new category of threat has emerged: the cyber-theft and subsequent public release of large troves of private communications, personal documents and other data.

This category of incident includes the release of government data by inside actors such as Chelsea Manning and Edward Snowden.  However, hacks of the Democratic National Committee and John Podesta, a Democratic party strategist, illustrate that the risk goes beyond the theft of government data to include information that has the potential to harm individuals or threaten the proper functioning of government.  Because the federal government depends on proxies such as contractors, non-profit organizations, and local governments to administer so many public functions, securing information that could harm the government – but is not on government-secured systems – may require a different approach.

Significance:  The growing dependence on government proxies, and the risk such dependence creates, is hardly new[1], and neither is concern over the cyber security implications of systems outside government’s immediate control[2].  However, recent attacks have called the sufficiency of current solutions into question.

Option #1:  Build Better Defenses.  The traditional approach to deterring cyber-exploitation has focused on securing networks, so that the likelihood of failure is high enough to dissuade adversaries from attempting to infiltrate systems.  These programs range from voluntary standards to improve network security[3], to contractual security standards, to counter-intelligence efforts that seek to identify potential insider threats.  These programs could be expanded to more aggressively set standards covering non-governmental systems containing information that could harm the government if released.

Risk:  Because the government does not own these systems, it must motivate proxy organizations to take actions they may not see as in their interest.  While negotiating contracts that align organizational goals with those of the government or providing incentives to organizations that improve their defenses may help, gaps are likely to remain given the limits of governmental authority over non-governmental networks and information[4].

Additionally, defensive efforts are often seen as a nuisance both inside and outside government.  For example, the military culture often prioritizes warfighting equipment over defensive or “office” functions like information technology[5], and counter-intelligence is often seen as a hindrance to intelligence gathering[6].  Other organizations are generally focused on efficiency of day-to-day functions over security[7].  These tendencies create a risk that security efforts will not be taken seriously by line operators, causing defenses to fail.

Gain:  Denying adversaries the opportunity to infiltrate U.S. systems can prevent unauthorized access to sensitive material and deter future attempted incursions.

Option #2:  Hit Back Harder.  Another traditional approach to deterrence is punishment—that is, credibly threatening to impose costs on the adversary if they commit a specific act.  The idea is that adversaries will be deterred if they believe attacks will extract a cost that outweighs any potential benefits.  Under the Obama administration, punishment for cyber attacks focused on the threat of economic sanctions[8] and, in the aftermath of attacks, promises of clandestine actions against adversaries[9].  This policy could be made stronger by a clear statement that the U.S. will take clandestine action not just when its own systems are compromised, but also when its interests are threatened by exploitation of other systems.  Recent work has advocated the use of cyber-tools which are acknowledged only to the victim as a means of punishment in this context[10], however the limited responsiveness of cyber weapons may make this an unattractive option.  Instead, diplomatic, economic, information, and military options in all domains should be considered when developing response options, as has been suggested in recent reports[11]. 

Risk:  Traditionally, there has been skepticism that cyber incursions can be effectively stopped through punishment, as in order to punish, the incursion must be attributed to an adversary.  Attributing cyber incidents is possible based on forensics, but the process often lacks speed and certainty of investigations into traditional attacks.  Adversaries may assume that decision makers will not be willing to retaliate long after the initiating incident and without “firm” proof as justification.  As a result, adversaries might still be willing to attack because they feel the threat of retaliation is not credible.  Response options will also need to deal with how uncertainty may shape U.S. decision maker tolerance for collateral damage and spillover effects beyond primary targets.

Gain:  Counter-attacks can be launched regardless of who owns the system, in contrast to defensive options, which are difficult to implement on systems not controlled by the government.

Option #3:  Status Quo. While rarely discussed, another option is to maintain the status quo and not expand existing programs that seek to protect government networks.

Risk:  By failing to evolve U.S. defenses against cyber-exploitation, adversaries could gain increased advantage as they develop new ways to overcome existing approaches.

Gain:  It is difficult to demonstrate that even the current level of spending on deterring cyber attacks has meaningful impact on adversary behavior.  Limiting the expansion of untested programs would free up resources that could be devoted to examining the effectiveness of current policies, which might generate new insights about what is, and is not, effective.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  John J. Dilulio Jr. [2014], Bring Back the Bureaucrats: Why More Federal Workers Will Lead to Better (and Smaller!) Government, Templeton Press.

[2]  President Barack Obama [2013], Executive Order—Improving Critical Infrastructure Cybersecurity, The White House Office of the Press Secretary.

[3]  National Institute of Standards and Technology (NIST) [2017], Framework for Improving Critical Infrastructure Cybersecurity, Draft Version 1.1.

[4]  Glenn S. Gerstell, NSA General Councel, Confronting the Cybersecurity Challenge, Keynote address at the 2017 Law, Ethics and National Security Conference at Duke Law School, February 25, 2017.

[5]  Allan Friedman and P.W. Singer, “Cult of the Cyber Offensive,” Foreign Policy, January 15, 2014.

[6]  James M. Olson, The Ten Commandments of Counterintelligence, 2007.

[7]  Don Norman, “When Security Gets in the Way,” Interactions, volume 16, issue 6: Norman, D. A. (2010).

[8]  President Barack Obama [2016], Executive Order—Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities.

[9]  Alex Johnson [2016], “US Will ‘Take Action’ on Russian Hacking, Obama Promises,” NBC News.

[10]  Evan Perkoski and Michael Poznansky [2016], “An Eye for an Eye: Deterring Russian Cyber Intrusions,” War on the Rocks.

[11]  Defense Science Board [2017], Task Force of Cyber Deterrence.

Cyberspace Deterrence Elizabeth M. Bartels Non-Government Entities Option Papers

Trump Administration Options Towards Iran

Ted Martin has a keen interest in Iranian affairs and has spent time in Iraq and Afghanistan.  Divergent Options content does not contain information of an official nature nor does the content represent the official position of  any government, any organization, or any group.


National Security Situation:  Iran, sanctions, and the Joint Comprehensive Plan of Action (JCPOA) / United Nations (UN) Resolution 2231(2015)[1].

Date Originally Written:  March 27, 2017.

Date Originally Published:  May 8, 2017.

Author and / or Article Point of View:  Author has spent time in Iraq and Afghanistan as a member of the U.S. Military.  He has also studied Iran and Hezbollah since 2000.  This article is written as advice to a U.S. decision maker.

Background:  Despite the negotiation of the JCPOA, Iran is still a U.S. foreign policy concern.  Iran occupies a strategic position, able to block the export of oil through the Persian Gulf at the narrow Strait of Hormuz, and able to strike the Arab countries that produce that oil.  Iran has long had aspirations of regional hegemony and employed destabilizing proxy forces to further its ends in the region.  Iran’s continued belligerent behavior and the recent U.S. election of President Donald Trump beg a re-assessment of U.S. options.

Significance:  The JCPOA was negotiated by the previous administration under President Barack Obama and has been subject to harsh criticism by the new administration under President Trump.  Iran has recently engaged in provocative behavior by conducting new ballistic missile tests[2].  Although these new ballistic missile tests do not violate the JCPOA, these actions suggest Iran may test the limits of the JCPOA and the Trump administration[2].  As a counter-point to any hard-line the Trump administration may take against Iran, many European companies are already renewing business and banking contacts with the regime[3].  There is little interest in canceling the JCPOA in Europe, and without European support, it would be nearly impossible to re-impose effective sanctions[8].

Option #1:  The U.S. treats Iran as a pariah and continues to work to isolate Iran from the international system.  This assumes that isolation, as a punishment that negatively impacts the Iranian people, will serve to pull Iran back into the fold of acceptable behavior.

Risk:  Iran developed ties with other states on the margins such as Russia and the People’s Republic of China that helped to sustain it during 30 years of sanctions[4][5].  Iran has become proficient at working behind the scenes and using proxies and can mitigate some of the impacts of sanctions and continue its attempts to influence its neighbors[6].  It is unlikely that Europe will willingly join in another round of sanctions if the U.S. decides to renew them[8].  The U.S.’s likely only remaining option would be military action with few international partners.

Gain:  With Option #1, the U.S. will continue to keep local allies in the region who despise Iran such as Saudi Arabia and other Arab states happy[7].  The enduring threat of sanctions and the forced isolation of Iran by the U.S. will maintain the balance of power in the region cultivated over the last twenty years and is an important consideration.  A shunned Iran may make U.S. allies in the region stronger.

Option #2:  The U.S. allows Iran to continue to integrate into the international system.  This assumes that the closer Iran comes to the rest of the world, the less likely it will be to lash out and the more vulnerable it will be to economic or diplomatic pressure.

Risk:  Iran gains legitimacy by being allowed to rejoin the economic and political systems of the world.  Iran would also gain the ability to access items needed for its nuclear program on the international market.  Iran has blustered about closing the Gulf to oil transit before.  However, Iran has never done so, even during its war with Iraq, as such a move would hurt its own oil exports[7].  Closing the Persian Gulf at the straits of Hormuz is still a risk, even if mitigated by Iran’s increased dependence on the world.  Saudi Arabia would oppose Option #2 in the strongest possible terms, and it may seriously damage U.S. formal relations with them[9].

Gain:  Iran in the international community would find itself the beneficiary of access to the international banking system to enable oil exports and other civil export and import rules that would benefit its civil and military population.  As a member of the international community, Iran may find it harder to justify proxies such as Hezbollah.  The U.S. has long hoped to influence Iran to become more moderate and this may further that goal.

Other Comments:  The proxy war between Iran and the allies of Saudi Arabia has involved the U.S and is currently raging in Syria, Lebanon, Iraq, and Yemen[6][9].  Both the U.S. and Iran are likely to continue to fight using proxies in other countries, and the potential to involve the U.S. in more regional conflicts is high.  Iran’s nuclear ambitions are a central part of this problem and finding a solution is important.  Iran may also consider keeping the region chaotic to distract the U.S. and Europe to benefit its purposes.

Recommendation:  None.


Endnotes:

[1]  United Nations. (2015) Retrieved from: http://www.un.org/en/sc/2231/

[2]  Kenyon, P. (2017 February 3). Did Iran’s ballistic missile test violate a U.N. resolution? National Public Radio. Retrieved from: http://www.npr.org/sections/parallels/2017/02/03/ 513229839/did-irans-ballistic-missile-test-violate-a-u-n-resolution

[3]  Arnold, M. (2016 April 3). Europe’s banks begin tentative return to Iran. Financial Times. Retrieved from: https://www.ft.com/content/75dc8d7e-f830-11e5-803c-d27c7117d132

[4]  Katz, M.N. (2010). Iran primer: Iran and Russia. Public Broadcasting System. Retrieved from: http://www.pbs.org/wgbh/pages/frontline/tehranbureau/2010/10/iran-primer-iran-and-russia.html

[5]  Takeyh, R., & Maloney, S. (2011). The self-limiting success of Iran sanctions. International affairs 87 (6) pp. 1297-1312. doi: 10.1111/j.1468-2346.2011.01037.x

[6]  Fisher, M. (2016, November 19). How the Iranian-Saudi proxy struggle tore apart the Middle East. The New York Times. Retrieved from: https://www.nytimes.com/2016/11/20/world/middleeast/iran-saudi-proxy-war.html

[7]  Glaser, C.L. & Kelanic, R.A. (2017 January/February). Getting out of the gulf. Foreign Affairs 96(1).

[8]  Alkhalisi, Z. (2016, November 10). Trump could hit Iran with sanctions — but Europe would scream. CNN Money. Retrieved from: http://money.cnn.com/2016/11/10/news/economy/trump-iran-sanctions/

[9]  Morris, L. & Naylor, H. (2015 July 14). Arab states fear nuclear deal with give Iran a bigger regional role. The Washington Post. Retrieved from: https://www.washingtonpost.com/world/middle_east/arab-states-fear-dangerous-iranian-nuclear-deal-will-shake-up-region/2015/07/14/96d68ff3-7fce-4bf5-9170-6bcc9dfe46aa_story.html

Arms Control Economic Factors Iran Option Papers Ted Martin Treaties and Agreements

Options for Bougainville Independence

Iain Strutt has been involved in military, police and private security in Australia for over twenty years.  He is currently completing a Bachelor of Science (Security) degree with a minor in international relations at Edith Cowan University, Perth, Western Australia.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organisation, or any group.  


Area_Map_Bougainville

National Security Situation:  Independence options for Bougainville Island, an autonomous region of Papua New Guinea (PNG).

Date Originally Written:  March 26, 2016.

Date Originally Published:  May 4, 2017.

Author and / or Article Point of View:  While Bougainville may be a small Pacific Island and seem minor geopolitically, the author believes the outcome of the independence vote in 2019 will have regional implications.

Background:  Bougainville Island will hold a referendum on independence from PNG on June 15th, 2019.  Independence from PNG has been deliberated and defeated before[1].  Historically, Bougainville was administered first by Germany, then Britain.  After World War 2, Australia administered the territory as part of the United Nations Trust Territory of New Guinea.  With PNG independence from Australia in 1975, Bougainville became part of the new nation[2].  Bougainville was originally known as the North Solomons’, being as they were, part of the Solomon Islands.

Secessionists caused an insurrection in Bougainville in 1988 and it continued until the late 1990s.  The conflict succeeded in closing the giant Panguna copper mine in 1989, situated in the southern highlands.  Panguna was vital to the economy of PNG and Bougainville, as it has copper in abundance.  The two most prominent causes for the guerilla war on Bougainville can be traced back to the longstanding imbalance between ethnicity and financial reward.  Inadequate sharing of revenue with the traditional landowners of the copper mine has since been settled, with their involvement in future mining now a reality[3].

Following the ending of the guerilla war, agreement was reached by the secessionists and the PNG government in 2001, seeing Bougainville declared an autonomous region, governed by the Autonomous Bougainville Government (ABG).  Both the ABG and PNG signed the Bougainville Peace Agreement, known as the Arawa Accord in 2001 which has three related processes: 

  1. Autonomy
  2. Referendum
  3. Weapons disposal plan[4]

Two of the three have been accomplished, although it is not known precisely how many weapons were cached or even in existence before or after the December 2001 disposal process, so questions remain over weapons numbers[5].  Of concern is that the independence votes’ outcome hinges upon its ratification by the PNG parliament as the “final decision-making authority[6].”  The state as a person in international law should possess the following qualifications: (a) a permanent population; (b) a defined territory; (c) government; and (d) capacity to enter relations with the other states[7].  Bougainville satisfies all criteria despite efforts to resist the breakup by PNG.

This region has previously been of strategic interest to the Peoples Republic of China (PRC) due to its resources[8].  Foreign powers attempt at influence is nothing new and it appears that the PRC is endeavoring to extend its influence past the so-called Second Island Chain.  The chain is a strategic line that stretches from Japan, to Guam, then to the “vicinity of New Guinea[9].”  Similarly, Australia has a profound strategic interest in South-East Asia, particularly PNG and the islands of the South Pacific[9].  Australia, New Zealand, United States Security Treaty (ANZUS) nations have fought wars and participated in peacekeeping missions in this area over the past 75 years and Bougainville lies within this region.

Financing the reopening of the Panguna mine is something that the PRC can afford, in keeping with its desire for infrastructure projects globally and commercial diplomacy[10].  To get the copper to market requires access from Panguna to Kieta port, with its adjacent airfield, on the east coast of Bougainville.  The strategic importance of Bougainville should therefore not be overlooked as the island is in a sound position to monitor the western Pacific.

Bougainville_Neighbourhood

Significance:  The recent visit to Australia by PRC Premier Li Keqinang has led to the increased warming of the bilateral relationship between the PRC and Australia.  Although Australia is still a firm ANZUS partner, U.S. foreign policy is now inward looking, prompting a refocus by the ANZUS partners.  Australian foreign policy can now act as a positive influence over the PRC in this region, with a “non-provocative, pragmatic diplomatic stance[11].”

Option #1:  Bougainville achieves independence in 2019 and ANZUS can assume defense duties in rotation on the island as there is no allowance for a defense force in the Bougainville constitution.

Risk:  Low.  This is the preferred outcome due to the minimal risk to regional stability.  It would give greater influence in the area to ANZUS nations.  The PNG military can benefit from cross training in keeping with Australia’s regional outlook.

Gain:  Positive.  Economic benefit for Bougainville.  The Panguna mine would reopen without PNG involvement with income provided to the local landowners.

Option #2:  The Bougainville referendum result is denied by the PNG government.  Bougainville declares sovereignty itself, following the examples of Bangladesh, Croatia, Georgia and Moldova (see Other Comments below).

Risk:  Moderate.  If PNG denies the result of the referendum to preserve its sovereignty over Bougainville, civil discontent is highly likely as Bougainville independence is preferred and has been over time.

Gain:  Negative.  An outcome regional partners would not want, due to the potential for violence and civil unrest.  Intervention requiring peacekeepers may occur, a situation the islanders have endured before.

Option #3:  Regardless of the result of the referendum, with closer relationships between Australia, the PRC and the ABG, a mining joint venture could commence at Panguna.  It is conceivable that this would involve the PRC as a partner in the joint venture with an Australian mining company.

Risk:  High.  Although PRC preference is for critical infrastructure projects globally, the risk would be high as there are elements within the ABG itself who have a definite preference not to deal with the PRC in any form.  Politically, this option would be impractical.

Gain:  Moderate.  Economically this would be of benefit to Bougainville for the life of the mine, which is expected to be twenty-five years.

Other Comments:  Bangladesh, Croatia, Georgia and Moldova, came to statehood in differing ways with one common denominator, at the time of their proclamation of independence there was no effective government in all four.  This differs from Bougainville, which has had effective governance for some time, elected officials, and its’ own administration separate from PNG.  Of the four nations mentioned above, Moldova is the most relative to Bougainville.  Moldova declared sovereignty on June 23, 1990, providing for the Moldovan constitution and laws to have primacy over those of the Soviet Union.  This was a proclamation of sovereignty and not independence but was a step towards it.

Recommendation:  None.


Endnotes:

[1]  Jennings P. & Claxton K. (2013) A stitch in time. Preserving peace on Bougainville. Australian Strategic Policy Institute Limited.  p.3.

[2]  Jennings P. & Claxton K. (2013) A stitch in time. Preserving peace on Bougainville. Australian Strategic Policy Institute Limited.  p.15.

[3]  Bougainville Mining Act 2015. Autonomous Region of Bougainville (no.3 of 2015).

[4]  United Nations [UN] (2001) Bougainville Peace Agreement. Introduction and OutlineS/2001/988 Enclosure II Bougainville Peace Agreement.  23rd October 2001. p.8

[5]  Woodbury J. (2015) The Bougainville independence referendum: Assessing the risks and challenges before, during and after the referendum. Australian Defence College. Centre for Defence and Strategic Studies. p.9.

[6]  Woodbury J. (2015) The Bougainville independence referendum: Assessing the risks and challenges before, during and after the referendum. Australian Defence College. Centre for Defence and Strategic Studies.  P.7

[7]  Raic D. (2002) Statehood and the Law of Self-Determination. Brill Academic Publishers. p.406.

[8]  Hegarty M. (2015) Chinas growing influence in the South-West Pacific: Australian policies that could respond to Chinese intentions and objectives. Australian Defence College, Centre for Defence and Strategic Studies. p. 8

[9]  Holmes J.R. (2011) Island Chain Defence. The Diplomat. Retrieved 27th March 2017. http://thediplomat.com/2011/04/island-chain-defense/

[10]  Frost E.L. (2007) Chinas Rise and the Balance of Influence in Asia. Edited by William W. Keller and Thomas G. Rawsky. Ch. 5. Chinas’ Commercial Diplomacy in Asia. University of Pittsburg  Press. p.95.

[11]  Carr. B. (2017) Canberra’s sensible South China Sea Stand is contingent on continual pragmatism in Beijing. The Weekend Australian. March 18-19, 2017, p.24. News Ltd. Sydney.

Australia Australia, New Zealand, United States Security Treaty (ANZUS) Bougainville China (People's Republic of China) Iain Strutt New Zealand Option Papers Papua New Guinea Referendums United States

Options for United States Intelligence Community Analytical Tools

Marvin Ebrahimi has served as an intelligence analyst.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Centralization of United States Intelligence Community (USIC) Analytical Tools.

Date Originally Written:  March 6, 2017.

Date Originally Published:  May 1, 2017.

Author and / or Article Point of View:  Author has served as an all-source analyst.  The author has personal experience with the countless tool suites, programs, and platforms used by intelligence analysts within the USIC to perform their analytical function, and the fact that there is no centralized collaborative environment from which such tools can be learned, evaluated, or selected for unit-specific mission sets tailored to the end-user.

Background:  Various USIC agencies and components have access to countless tool suites, some which are unique to that agency, and some available across the community.  These tools vary according to intelligence function, and are available across the multiple information systems used by intelligence components within the community[1].  While a baseline of tools are available to all, there is little centralization of these tools.  This lack of centralization requires analysts to learn and retain knowledge of how to manipulate the information systems and search engines at their disposal in order to find specific tools required for specific analytical functions.

Significance:  Digital collocation or compilation of analytical tool suites, programs, and platforms in a collaborative space would benefit all-source analysts who require access to a diverse set of tools required of their broadly focused function.  The knowledge and ability required to conduct tool-specific searches, i.e. manipulating a basic search engine in order to navigate to a landing page or agency-specific site where tool-specific information can hopefully be found, is time-consuming and detracts from analysts’ time available to conduct and employ analytical tradecraft.  This loss of time from an analyst’s daily schedule creates an opportunity cost that has yet to be realized.

Option #1:  Centralize analytical training, visibility, and accessibility to tool suites, programs, and platforms through creation of a USIC-wide collaborative analytical environment such as the Director of National Intelligence’s Intelligence Community IT Enterprise initiative[2].  Centralization of analytical training is used here to describe the necessity to train analysts on how to manipulate various databases, search engines, and environments effectively to find the specific tool suite or program required for their function.  Option #1 does not refer to centralizing all USIC member analytical training as outlined in the Intelligence Community Directive 203, “Analytical Standards.”

Risk:  Centralization of analytical training and accessibility leads to conflict primarily within respective USIC members’ unique identities and analytical functions.  The tools used by one agency may not work or be required by another.  Various agencies provide different functions, and centralizing access to tools requires further integration of all USIC agencies in the same or at least a compatible digital space.

Creation of a USIC-wide entity to collate, evaluate, and manage access to the multitude of tool suites, etc. creates yet another potentially bureaucratic element in an already robust community.  Such an entity would have to be controlled by the Office of the Director of National Intelligence unless delegated to a subordinate element.

Compartmentalization required to protect agencies’ sources and methods, analytical tradecraft included, may preclude community-wide collaborative efforts and information sharing necessary to create an effective space.

Gain:  Shared information is a shared reality.  Creation of a community-wide space to colocate analytical tool suites enables and facilitates collaboration, information exchange, and innovation across agencies.  These are positive factors in an information-driven age where rapid exchange of information is expected.

Effectiveness of end-user analysts increases with greater access to collective knowledge, skills, and abilities used by other professionals who perform similar specific analytical functions.

Community-wide efforts to improve efficiency in mission execution, development of analytical tradecraft, and the associated tools or programs can be captured and codified for mass implementation or dissemination thereby improving the overall capability of the USIC analytical workforce.

Option #2:  Improve analyst education and training that increases knowledge, skills, and abilities to better manipulate current and existing tool suites, programs, and platforms.

Risk:  USIC components continue to provide function-specific training to their own analysts while other agency partners do not benefit from agency-specific tools, due to inaccessibility or ignorance of tool), thereby decreasing the analytical effectiveness of the community as a whole.  Worded differently, community-wide access to the full range of analytical tools available does not reach all levels or entities.

Analysts rely on unstructured or personal means such as informal on-the-job training and personal networks in learning to manipulate current tools, while possibly remaining unaware or untrained on other analytical tools at their disposal elsewhere in the community.  Analysts rely on ingenuity and resolve to accomplish tasks but are not as efficient or effective.

Gain:  Analytical tradecraft unique to specific community members remains protected and inaccessible to analysts that do not possess required access, thereby preserving developed tradecraft.

Other Comments:  The author does not possess expert knowledge of collaborative spaces or the digital infrastructure required to create such an information environment; however, the author does have deployment experience as an end-user of several tool suites and programs utilized to perform specific analytical functions.  The majority of these were somewhat proliferated across a small portion of USIC components but were not widely accessible or available past basic search engine functions.

Recommendation:  None.


Endnotes:

[1] Treverton, G. F. (2016). New Tools for Collaboration. Retrieved March, 2016, from https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/160111_Treverton_NewTools_Web.pdf

[2] Office of the Director of National Intelligence IC IT Enterprise Fact Sheet. Retrieved March, 2017, from https://www.dni.gov/files/documents/IC%20ITE%20Fact%20Sheet.pdf

Information and Intelligence Information Systems Marvin Ebrahimi Option Papers United States

Options for Managing Xinjiang Uighur Ethnic Tensions

Daniel Urchick is a defense and foreign policy analyst.  Daniel tweets at @DanielUrchick.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Unrest and separatist tendencies amongst the Uighur ethnic minority in Xinjiang Province, People’s Republic of China (PRC)

Date Originally Written:  March 08, 2017.

Date Originally Published:  April 27, 2017.

Author and / or Article Point of View:  The article is written from the perspective of a PRC government official offering options for countering ethnic violence, separatism, and extremism amongst the Uighurs in Xinjiang. 

Background:  Turkic-speaking Muslim Uighurs comprise an estimated 42 percent of Xinjiang’s population of 19 million.  Uighur unrest was historically sporadic and easily suppressed but since 2008 Xinjiang has seen a slow, but noticeable rise in violent activity that appears to be aimed at local actors, such as the local government structure, state security forces, Han immigrants, and Uighur “collaborators,” rather than at the Chinese Central Government in Beijing.  Some Uighurs have called for total independence from the PRC due to cultural oppression.

Uighur terrorism has allegedly occurred across the PRC, including dual bombings in Yunnan Province in 2008, a bombing in Tiananmen Square in 2013, and a knife attack at Kunming Airport in Yunnan that killed 29 and injured 143 in early 2014.  In late February 2017, the Islamic State in Iraq and Syria (ISIS) released a video of Uighur members who claimed they would shed rivers of blood in the PRC and avenge the oppressed[1].  This video marked the first time Uighur militants had officially been tied to ISIS[2].

The PRC has increasingly relied on a heavy-handed and repressive approach to security operations in Xinjiang.  The arrests and detention of protesters, even peaceful ones, are estimated to be well into the tens of thousands, with an estimated 1.8 executions occurring weekly in 2008[3].  Tens of thousands of PRC security components currently operate in Xinjiang[4].

Drivers of Uighur unrest may include being barred from 95 percent of the civil-service positions in Xinjiang[5], being forced to teach Mandarin in Uighur schools, and, until recently, anyone under 18 was prohibited from entering a mosque.  Despite efforts to placate the Uighurs with promises of foreign direct investment, increased employment opportunities, and modernization projects, the majority of these opportunities are still reserved for the Han Chinese.

Significance:  Xinjiang links the PRC to Central Asia and the greater Middle East geographically, ethnically, and religiously.  The problems of ethnic separatism and religious extremism in the Middle East and Central Asia flow into Xinjiang.  For this reason, in addition to poor administrative practices, there is a small, but growing problem with separatism and terrorism in the region.  Fear of an ISIS-like organization forming in Xinjiang, combined with a theoretical collapse of adjacent Tajikistan, has spurred the PRC into creating an entire security organization: the Shanghai Cooperation Organization (SCO).

Option #1:  The “Alaska” model— Reward the Uighurs with economic dividends based on exploiting Xinjiang’s resources.

Risk:  Economic dividends have historically been reserved for Han Chinese who may grow agitated with the loss of an exclusive “perk,” causing them to lash out at the local and Central Government.  Unhappy Han may direct their frustrations towards the Uighur population, who may respond to violence with greater violence, exacerbating the situation.

Gain:  Opening resource management to the Uighur population will co-opt Uighur elites and likely remove environmental concerns and wealth imbalances as a historical justification to protest resource exploitation in Xinjiang.  Option #1 places the onus of environmental degradation on the Uighur elites vice the local and Central Government.

Option #2:  The “Scotland” model— the Chinese Communist Party (CCP) maintains direct control of international and interprovincial trade, as well as military and police functions, but cultural autonomy exists in exchange for loyalty.

Risk:  This model allows the Uighur identity to grow unchecked, which may develop to a point of seeking greater separation from the rest of the PRC.  Misplaced faith in Uighur officials by the CCP could create Uighur opposition leaders in future periods of unrest and rising tensions.  The granting of such a high-level of autonomy to Xinjiang may spark calls for similar policies in other ethnic minority regions in the PRC.

Gain:  The PRC government maintains control of local security apparatus while receiving maximum economic benefit to be distributed as it sees fit.  True autonomy for the region reduces international and domestic criticism of PRC governance in the region.

Option #3:  The “Hawaii” model— Calls for the creation of an “indigenous people’s organization” to communicate with local officials about ongoing and future disputes with the government or Han population.

Risk:  The creation of the indigenous people’s organization could result in a legitimate alternative authority to the Central Government in Beijing, which, in turn, could eventually organize the Uighur population to formally challenge PRC government authority.  This organization may create avenues for Uighurs who support violent extremism to move into positions of authority.

Gain:  This indigenous people’s organization places an administrative barrier between the local government and Uighur population’s criticism and frustrations.  Both the Central Government and local government can use this organization as a scapegoat when tensions flair, while staffing it with vetted personnel. 

Option #4:  The “Australian” model— Special privileges are granted to minorities, such as no birth restrictions, tax exemptions, and assured education.

Risk:  Special privileges conferred to the Uighurs risk increasing resentment among the Han population towards the Uighurs, leading to increased hostility and even greater inter-ethnic violence.  Even more worrisome, the Han populace in Xinjiang, and around the PRC, may become resentful of the Central Government for withholding highly coveted privileges.

Gain:  Removing restrictions that apply to the rest of the country promotes a sense of exceptionalism in the Uighur population, encouraging loyalty to the PRC.  Assured education encourages educated Uighurs to become local elites and support the Central Government that supported them.

Option #5:  The “West Bank” model— Government promotion of cultural and Islamic tourism to Xinjiang Province.

Risk:  Exposes a larger portion of the PRC populace to Islam, increasing the potential for conversion to a religion that believes in an authority other than the Central Government in Beijing.  Islamic tourists to Xinjiang could bring ideas about Islam and its role in society and government that the PRC government views as destabilizing, further increasing tensions.

Gain:  Uighurs are potentially exposed to more moderate Islamic ideas on a wider scale, rather than radical Islamist ideas that proliferate under or due to government suppression.

Other Comments:  The models presented above can be found with greater detail in Dru Gladney’s 2003 paper “Responses to Chinese Rule in Xinjiang: Patterns of Cooperation and Opposition,” published in the Mongolian Journal of International Affairs (http://www.mongoliajol.info/index.php/MJIA/article/viewFile/122/123).

Recommendation:  None.


Endnotes:

[1]  Katie Hunt and Matt Rivers. “Xinjiang violence: Does China have a terror problem?,” CNN, December 02, 2015. Retrieved from: http://www.cnn.com/2015/12/02/asia/china-xinjiang-uyghurs/

[2]  Ryan Pickrell. “ISIS Vows To ‘Shed Blood Like Rivers’ In First Threat Against China,” Daily Caller, March 1, 2017. Retrieved from: http://dailycaller.com/2017/03/01/isis-vows-to-shed-blood-like-rivers-in-first-threat-against-china/

[3]  Drew Gladney. “Responses to Chinese Rule in Xinjiang: Patterns of Cooperation and Opposition,” The Mongolian Journal of International Affairs. Retrieved from: http://www.mongoliajol.info/index.php/MJIA/article/viewFile/122/123

[4]  “Xinjiang deploys over 10,000 armed police in latest show of force after terror attacks,” South China Morning Post, February 28, 2017. Retrieved from: http://www.scmp.com/news/china/diplomacy-defence/article/2074711/china-stages-another-huge-show-force-xinjiang-wake

[5]  Preeti Bhattacharji. “Uighurs and China’s Xinjiang Region,” Council on Foreign Relations, May 29, 2012. Retrieved from: http://www.cfr.org/china/uighurs-chinas-xinjiang-region/p16870

China (People's Republic of China) Daniel Urchick Minority Populations Option Papers Uighur

70th Anniversary Writing Contest: Options for a New U.S. National Security Act

NSA1947Truman

Background:

On July 26, 1947, U.S. President Harry S. Truman signed the National Security Act of 1947 into law.  The National Security Act of 1947 mandated a major reorganization of the foreign policy and military establishments of the U.S. Government.  The act created many of the institutions that Presidents found useful when formulating and implementing foreign policy, including the National Security Council[1].  As July 26, 2017, marks the 70th anniversary of the signing of this historic document Divergent Options is holding a writing contest.

Contest:

Using our Options Paper template or Assessment Paper template, in 1,000 words or less, provide your assessment or options for how the National Security Act of 1947, or portions thereof, could be re-written to address better the threats, challenges, and opportunities the U.S. faces in the ever-changing national security environment.

Timelines:

Divergent Options will accept entries for 70 days beginning on July 26 and ending on October 4th, 2017.

Awards:

Divergent Options’ Strategic Advisory Board will review all entries and award First Place ($100), Second Place ($50) and Third Place (Divergent Options Coffee Mug) in each of the following award categories:

1.  Best Overall Option Paper

2.  Option Paper Most Able to be Implemented

3.  Most Disruptive Option Paper

All submissions, regardless of whether they win an award or not, will be published.

Submission Procedures:

A.  Review our options paper template.

B.  Send your 1,000 words or less to submissions@divergentoptions.org between July 26 and October 4th, 2017 and note which award category you wish to be considered for.

References:

–  National Security Act of 1947

–  National Intelligence Council Global Trends Report


Endnotes:

[1]  Milestones 1945-1952, National Security Act of 1947. (n.d.). Retrieved April 23, 2017, from https://history.state.gov/milestones/1945-1952/national-security-act

Contest Option Papers Phil Walter United States

Options to Evolve U.S. Law Enforcement and Public Safety Training

The Viking Cop has served in a law enforcement capacity with multiple organizations within the U.S. Executive Branch.  He can be found on Twitter @TheVikingCop.  The views reflected are his own and do not represent the opinion of any government entities.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The evolution of Law Enforcement and Public Safety (LE/PS) Training within the U.S.

Date Originally Written:  April 7, 2017.

Date Originally Published:  April 24, 2017.

Author and / or Article Point of View:  Author is a graduate of both University and Federal LE/PS training.  Author has two years of sworn and unsworn law enforcement experience.  Author believes a reform of LE/PS training led by institutes of higher learning such as colleges and universities is necessary to meet evolving LE/PS challenges.

Background:  Over the past twenty years the U.S. has seen a major shift in public opinion and media coverage of LE/PS operations.  As a result of this shift, there have been ad hoc changes in LE/PS training on various topics to address a lack of specialized training.  But because LE/PS basic training and advanced training is conducted and designed at a local level, the added training can vary from city to city and state to state.  A look at the basic training of LE/PS is important in the context of how LE/PS organizations are preparing to respond to contemporary changes in U.S. culture and the massive scale of resources and time it takes to train a LE/PS Officer[1].

Current LE/PS basic training varies from state to state with varying hours, types of training, and style of training conducted[2].  This mix of training hours, types, and styles produces a varying level of LE/PS Officer upon graduation.  A LE/PS Officer in one state could lack hundreds of hours of training compared to their peer the next state over when beginning their initial field training.

Significance:  The Bureau of Justice Statistics observed in 2008 that there were sixty-one thousand new LE/PS Officers hired in the United States[3].  Due to the nature of attrition, retirement, and LE/PS budgets, this hiring is only expected to increase over the coming years as a younger generation replaces the “Widening Hole in the Bucket” that is staffing levels in departments nationwide[4].

Option #1:  Establish a system of National Law Enforcement Colleges within university systems throughout the U.S. that not only train and certify LE/PS Officers but that do this as part of a wider degree-granting program.  Option #1 is similar to in-depth and standardized training of LE/PS personnel that countries such as Germany and Sweden have developed.

Risk:  With a rising average number of LE/PS recruits in the U.S. each year, sixty-one thousand hired in 2008[4], a series of colleges would have to have enough capacity to handle one hundred to two hundred thousand trainees across the country at varying years of study if a multiple year degree program is established.  Option #1 could also be viewed as a “Federalization” of LE/PS since the undertaking would inevitably involve the Federal Government for funding and certification.  It has also been noted, albeit with limited research, that university-educated LE/PS Officers experience higher levels of frustration and lower levels of overall job satisfaction[5].

Gain:  Option #1 would increase the minimum education of LE/PS Officers allowing them to be educated in various social science fields that the university systems already employ subject matter experts in.  Option #1 could also offset certain costs of training LE/PS Officers as the program could be run as a self-pay system as any other university program or limited scholarship program such as the U.S. Military Reserve Officer Training Corps program.

Option #2:  Developing and implementing a national standard for basic law enforcement training to be met by currently existing training academies.

Risk:  This would increase the cost of LE/PS training to states that have below minimum standards.  If an extended length of training is chosen it would cause a bottleneck in training new LE/PS Officers that agencies are in need of immediately to boost low staffing numbers.  A national set of minimum standards could lead to simply a change in what is taught during basic training instead of an actual increase in training provided as academies may be inclined to abandon non-mandated training to shorten program time.

Gain:  Concerns with the lack of certain types of training, such as social services and crisis intervention, would be resolved as mandatory training hours could be set for these topics.  LE/PS Officers operating on an inter-agency level (City to County or across State Lines) would have been trained initially to the same set of standards and would be able to better cooperate.

Other Comments:  While the lack of certain academic topics in LE/PS training does exist as a current problem, it must also be understood that in a human-services profession such as LE/PS, that informal training through actual field experience is still the most significant way that adults learn in challenging situations[6].  No amount of academic or basic training will replace the need for actual field experience by the trainee to become competent as a LE/PS Officer.

Recommendation:  None.


Endnotes:

[1]  Stanislas, P. (2014). Introduction: police education and training in context. In P. Stanislas (Ed.), International perspectives on police education and training (pp. 1-20). London: Routledge.

[2]  Reaves, B. (2016). Bureau of Justice Statistics (BJS) – State and Local Law Enforcement Training Academies, 2013Bjs.gov. Retrieved 7 March 2017, from http://www.bjs.gov/index.cfm?ty=pbdetail&iid=5684

[3]  Reaves, B. (2012). Bureau of Justice Statistics (BJS) – Hiring and Retention of State and Local Law Enforcement Officers, 2008 – Statistical TablesBjs.gov. Retrieved 7 March 2017, from http://www.bjs.gov/index.cfm?ty=pbdetail&iid=4514

[4]  Wilson, J., Dalton, E., Scheer, C., & Grammich, C. (2017). Police Recruitment and Retention for the New Millennium (1st ed.). Santa Monica: RAND Corporation. Retrieved from http://www.rand.org/content/dam/rand/pubs/monographs/2010/RAND_MG959.pdf

[5]  Stanislas, P. (2014). The challenges and dilemmas facing university-based police education in Britain. In P. Stanislas (Ed.), International perspectives on police education and training (pp. 57-71). London: Routledge.

[6]  Giovengo, R. (2016). Training law enforcement officers (1st ed.). CRC Press.

Education Law Enforcement & Public Safety Option Papers The Viking Cop Training United States

Islamic State Options: Pivot towards Australia

Phillip Etches is a fourth-year undergraduate student in the Australian National University’s International Security and Middle-Eastern Studies program where he focuses on networked non-state threats.  He can be found on Twitter @CN_Hack.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Possible shift in Islamic State’s (IS) operational focus towards Southeast Asia and the threat to Australian citizens.

Date Originally Written:  February 22, 2017.

Date Originally Published:  April 20, 2017.

Author and / or Article Point of View:  This options paper is written from the perspective of an individual with command seniority within IS, or influence over the strategic-level policymaking of that organisation.

Background:  The overall goal must be the demonstration that IS remains a viable enterprise, whether as a landholding caliphate or a check on the Western threat to the Ummah.  Prior to Western intervention, a “balanced” strategy involved fighting for territory within “near enemy” spaces such as Iraq and Syria while also operating in as many “far enemy” spaces as possible.  Doing so allowed IS to show that it could establish a new caliphate while simultaneously using kinetic and information operations directed at Western Europe, Southeast Asia, and North America to demonstrate to believing people that IS was capable of projecting beyond its immediate territory.

Significance:  IS is at an inflection point where it must alter the balance of its strategy towards a new far enemy, and show that it retains the initiative by beginning to target Australian citizens and interests more aggressively.  Doing so will show that IS can still function despite territorial losses, that it retains the initiative, and inspire hope in those whose confidence has been shaken by IS setbacks in Iraq and Syria.  This pivot to Australia is vital if IS is to retain its control over its perception and reality.

Option #1:  Continue attempting to inspire remote or unaffiliated persons to conduct attacks by way of broadly targeted messaging or manipulation of social/familial ties between IS personnel and individuals in the country.

Risk:  The principal risk of the present course is a lack of impact and credibility.  The persons who have thus far answered IS’s call have been portrayed as alone, insufficiently lethal, or of compromised standards and morals[1].  This portrayal has allowed the Australian government and media to characterize operations in Australia as the products of mental illness or juvenile delinquency, lessening the kinetic and psychological effects of our operations.  Additionally, operational risk comes from institutions and legislation involved in Australia’s internal security, forcing willing persons to mount small, unsophisticated attacks only.  As such, broad messaging will therefore continue inspiring small attacks, but will not generate the psychological effect we desire.

Gain:  The main gain of Option #1 is the higher likelihood of successful – if small – attacks which will show that IS can operate without restrictions on time or location.  A secondary gain is the increased certainty which comes from following a proven course.  While the current approach does little to change the overall strategic situation, it will avoid provoking a change in behaviour on the part of the Australian internal security establishment, lowering the risk of creating unforeseen future operational challenges.

Option #2:  Targeting Australians in Southeast Asia via IS personnel displacing from Iraq and Syria or via cooperation with pre-existing networks in the region.

Risk:  The biggest risk to IS from this approach will be the immediate response, as the relevant network elements will be endangered by any post-operational security crackdown in the countries where they mount attacks.  In addition to likely immediate costs, Option #2 will alter the challenges faced by IS in future, particularly given that Southeast Asia is within Australia’s near abroad.  Should the Australian government be sufficiently provoked, it will use any available multilateral and unilateral means – as it has before – to prevent future operations.  Any networks known to be sympathetic to IS will also come under stronger Australian scrutiny.  As such, the principal benefit of operation against Australians outside the attention of the Australian government will likely be lost after the first satisfactory attack.

Gain:  The most obvious gain of Option #2 is that it responds to the challenges of Option #1.  Targeting Australians in Southeast Asia will address the risks of the current approach by enabling the use of competent pre-existing networks beyond the auspices of Australia-based security organizations.  Additionally, operating against Australians in Southeast Asia will enable IS to harness the fears held by many Australians about the Jihad in Southeast Asia and rekindle the anxiety they felt after the 2002 Bali Bombings.  This impact will be enhanced if notables such as Abu Bakar Bashir are able to lend their support to the attacks as they did with the original Bali Bombings.

Other Comments:  It may appear that the geographical remove between Syria and Southeast Asia, unlike that between Syria and Europe, is too great to feasibly conduct operations at a distance.  However, it should be noted that operations can and have been directed at such distances by IS, and tactics, techniques, and procedures can be devised to ensure smooth operation in the absence of direct control by Caliph Ibrahim.  Furthermore, IS has a number of brothers from Indonesia and Malaysia[2].  Their experience both at home and fighting in Syria will make them capable operatives, and with some preparation they should be able to carry out the requisite planning, targeting, and execution of operations against Australians.

Recommendation:  None.


Endnotes:

[1]  Buggy, K. (2016). Under the Radar: How Might Australia Enhance Its Policies to Prevent ‘Lone Wolf’ and ‘Fixated Person’ Violent Attacks? Canberra, Australia:Australian Defence College’s Centre for Defence and Strategic Studies

[2]  Dodwell, B., Milton, D., & Rassler, D. (2016). The Caliphate’s Global Workforce: An Inside Look At The Islamic State’s Foreign Fighter Paper Trail. West Point, NY:USMA

Australia Islamic State Variants Option Papers Phillip Etches Violent Extremism

Options for U.S. Sanctions Towards Russia for Aggression in Ukraine

Michael Martinez is a graduate student at University of Maryland University College where he is currently obtaining his master’s degree in intelligence management.  He also holds a bachelor’s degree in business management from Coastal Carolina University.  He can be found on Twitter @MichaelMartinez.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  U.S. economic sanctions towards Russia following its aggressive actions in Ukraine.

Date Originally Written:  March 1, 2017.

Date Originally Published:  April 17, 2017.

Author and / or Article Point of View:  This article is written from the standpoint of the U.S. national security community regarding future plans or movement on Russian sanctions.

Background:  In February 2014 the Olympic winter games had just concluded in Sochi.  Russia was in the midst of invading the Crimea region and portions of Eastern Ukraine.  The U.S. placed targeted economic sanctions on Russia as a reaction to its invasion.  While these sanctions have been detrimental to Russia’s economy, President Vladimir Putin is still holding portions of Eastern Ukraine and attempting to annex the Donbas region as Russian territory.  The first round of the sanctions from the U.S. were a response to Russia’s annexation of Crimea, while a second round began as the ceasefire between Ukraine and Russia failed to take hold[1].  The future of Russian aggression towards Ukraine is undetermined at this time.

Significance:  In the U.S., the Trump Administration is taking a significantly more laissez-faire approach to Russia and Russian government officials, including Putin, than President Barack Obama did.  Any change in U.S. policy towards Russia will have significant impacts in Eastern Europe and on North Atlantic Treaty Organization (NATO) members – as matters of economics, trade, and territorial occupation are concerned.  A declining Russian populous and economy, being backed into a corner, can provide for dangerous consequences, especially since its military and nuclear stockpiles are quite viable.

Option #1:  The U.S. continues current economic sanctions until Russia withdrawals its forces from Crimea and the Donetsk region, including other areas of Eastern Ukraine.

Risk:  As the U.S. keeps economic pressure on Russia to withdraw from Ukraine’s sovereign territory, a new Cold War may develop as a stalemate between the U.S. and the Russian plays out.  Russia will hold on to the territory it occupies at this point in time and continue cross border skirmishes into the Donetsk region.

Gain:  If U.S. economic sanctions against Russia were to remain in place, these sanctions  and NATO pressure in the form of expanded presence is put upon the Russian government to rethink its strategy in Ukraine.  If these sanctions continue, the Ruble will sustain its downward trajectory and inflation will continue to rise, especially for consumer goods.  Economic contraction will put pressure on the Russian government to take corrective action and rethink their position to counter public opinion.  In 2015, the Russian economy contracted by 3.7%, while it shrank another 0.7% in 2016[2].

Option #2:  The U.S. lifts economic sanctions against Russia to give the Russian population economic stability in a country that heavily relies on oil and gas exports as the main driver of its economy and much of its wealth.

Risk:  Lifting sanctions may send a signal to the Russian administration that its behavior is warranted, acceptable, and falls in line with global norms.  President Putin may feel emboldened to keep moving his forces west to annex further portions of Ukraine.  Most of Eastern Ukraine could become a war zone, and humanitarian efforts would have to be implemented by the United Nations and other Non-Governmental Organizations if more grave violations of the Minsk (II) Protocol occurred.  Putin’s ultimate plan might involve gaining influence in other former Soviet satellite nations.  As such, a Ukraine-like effort may repeat itself elsewhere.  Lifting sanctions might give Putin a green light for his next conquest.

Gain:  The Russian people may take a friendlier view and role towards the U.S. and allow for more trade.  President Putin may be more open to multilateral trade negotiations.  A new trade agreement may become possible between Russia and the U.S., including countries that have been targeted by Russian aggression such as – Ukraine, Belarus, and the Baltic States.  A restoration and expansion of the Commonwealth of Independent States Free Trade Agreement or similar agreement, would be prudent to economic activity in the region[3].  Of note is that Ukraine is in a position where it now relies on Germany and Western European nations for imports and likely cannot stand on its own.

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  Baer, Daniel. (24, February 2017). Don’t forget the Russian sanctions are Russia’s fault. Foreign Policy. Retrieved March 1, 2017. http://foreignpolicy.com/2017/02/24/dont-forget-the-russia-sanctions-are-russias-fault/

[2]  Kottasova, Ivana. (26, February 2017). What would rolling back U.S. sanctions mean for Russia? CNN Money. Retrieved March 1, 2017 http://money.cnn.com/2017/02/16/news/economy/russia-sanctions-trump/index.html

[3]  “Russia Trade Agreements”. (23, June 2016). Exports.gov. Retrieved March 1, 2017 https://www.export.gov/article?id=Russia-Trade-Agreements

Economic Factors Michael Martinez Option Papers Russia Ukraine United States

U.S. Options for Regime Change in Syria

Dr. Christopher Bolan has served in Jordan, Tunisia, and Egypt and worked as a Middle East foreign policy advisor to Vice Presidents Gore and Cheney.  He presently teaches and researches national security issues at the Strategic Studies Institute at the U.S. Army War College.  He can be found on Twitter @DrChrisBolan.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  Regime change in Syria.

Date Originally Written:  December 9, 2016.

Date Originally Published:  April 13, 2017.

Author and / or Article Point of View:  Author is a retired U.S. military officer whose writings and teaching focus on national security issues related to the Middle East.

Background:  Syrian President Bashar al-Assad’s apparent chemical weapons attack on April 4, 2017 that killed scores of innocent civilians prompted U.S. cruise missile strikes targeting a Syrian airfield from which the attacks were launched.  U.S. President Donald Trump said these strikes were designed primarily to “prevent and deter the spread and use of deadly chemical weapons[1].”  While the decision to strike has been widely supported by leaders of both political parties in Washington D.C., international reaction has been predictably mixed.  Traditional U.S. allies in Europe and the Middle East have been broadly supportive, while supporters of the Assad regime including Russia and Iran have condemned the strikes as a “violation of international law[2].”

Significance:  Beyond the narrow justification of these strikes as being necessary to reinforce an eroding international norm against the use of chemical weapons, this U.S. military intervention has resurfaced questions concerning the ultimate strategy that the Trump Administration is pursuing in Syria.  Before the strikes, senior administration officials including Secretary of State (SecState) Rex Tillerson and U.S. Ambassador to the United Nations Nikki Halley suggested that U.S. policy would abandon even the pretense of President Barack Obama’s objective of ousting Assad from power in Damascus[3].  However, in the aftermath of the strikes, the Trump Administration signaled an apparent about-face as National Security Advisor (NSA) Herbert Raymond “H. R.” McMaster declared that U.S. policy in Syria would “simultaneously” pursue the twin goals of destroying the Islamic State in Iraq and Syria (ISIS) and removing Assad[4].  While the fight against ISIS is making significant progress, the administration has not yet articulated a detailed strategy for pursuing the ouster of Assad.  There are two broad options available:

Option #1:  Coercive Diplomacy.  This option seeks to capitalize on the demonstration of U.S. resolve in the wake of the chemical attacks and missile strikes to push all parties to a negotiated solution that would ultimately result in the removal of Assad.  NSA McMaster and SecState Tillerson have suggested that this might indeed be the Trump Administration’s preferred course of action[5].  Additionally, former U.S. Deputy Secretary of Defense Paul D. Wolfowitz is emblematic of this approach and has made the case that “peace is impossible with Mr. Assad in power” and also called on President Trump to lead a “broad diplomatic effort to end the country’s bloodshed[6].”

Risk:  This diplomatic approach is essentially a reprise of President Obama’s strategy to engage Russia to use its substantial influence in Damascus to coerce Assad into relinquishing his position.  Years of a failed Geneva process along these lines are a strong indication that prospects for success are minimal.  Moreover, Russia is either complicit or has been turning a blind eye to Assad’s brutal repression and flagrant attacks on civilians that undoubtedly constitute war crimes.  This blind eye poses a moral hazard to any negotiated agreement involving Moscow.  The real risks and costs for the U.S. will only manifest themselves when prospects for success are greatest.  Presently, there is simply no viable political opposition able to assume power in a deeply divided Syrian society.  As the tragic histories of Iraq and Afghanistan suggest, a strong international presence underpinned by U.S. combat forces and bolstered by U.S. intelligence and logistics support will be required to avoid the eruption of civil war until broader political reconciliation takes hold.  Finally, the reconstruction costs for Syria alone exceed $200 billion[7] – a portion of which will likely be borne by the U.S. Treasury.

Gain:  Option #1 seeks to make maximum diplomatic advantage of a limited U.S. military strike.  It requires little investment beyond organizing a broad diplomatic effort to press all parties to arrive at a negotiated solution.  It is possible that Assad’s use of chemical weapons will serve as an affront to Russian President Vladimir Putin, who was a primary party along with President Obama to the agreement that removed tons of chemical weapons from Syria and avoided a U.S. military strike in 2013.  SecState Tillerson’s long experience negotiating with Russia could equip him to successfully exploit this opportunity to leverage Russian support for ousting Assad.

Option #2:  Limited Military Escalation.  Long-time advocates of deeper U.S. military engagement have been trumpeting the recent U.S. missile attacks as an opportunity to escalate a U.S. military campaign to unseat Assad.  Options here range from resurrecting an earlier Central Intelligence Agency / Department of Defense program to arm-and-equip carefully vetted Syrian opposition groups, to establishing no-fly zones or safe areas for the protection of civilians, to conducting an air campaign to destroy Assad’s air force.

Risk:  These military options have been repeatedly debated and dismissed by senior U.S. officials because of the risks inherent in these approaches.  The previous program to arm-and-equip Syrian opposition groups ended in abject failure.  A program designed to raise a force of 15,000 fighters at a cost of $500 million netted only a handful of recruits that were quickly captured by Al-Qa’ida-linked elements as soon as they crossed into Syria[8].  Former U.S. Chairman of the Joint Chiefs of Staff General Martin Dempsey noted that no-fly zones and safe areas would require the commitment of “thousands of U.S. ground troops” and would cost billions each month to maintain[9].  Finally, a military campaign taking out Assad’s air force would expose U.S. pilots to an advanced and integrated Syrian air defense system that has recently been upgraded by Russia.   Any such military campaign would almost inevitably result in Russian and Iranian casualties, risking escalation and retaliation against U.S. interests regionally and globally.

Gain:  The potential rewards for this high risk approach would be correspondingly rich if this increased military pressure ultimately yielded a negotiated resolution removing Assad from power.  The successful application of American military power would reassure U.S. allies and potentially bolster U.S. deterrence against potential adversaries including Russia, Iran, North Korea, and China.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Office of the Press Secretary, “Statement by President Trump on Syria,” Washington, DC: The White House, April 6, 2017, available from https://www.whitehouse.gov/the-press-office/2017/04/06/statement-president-trump-syria.

[2]  Gregor Aisch, Yonette Joseph, and Anjali Singhvi, “Which Countries Support and Which Oppose the U.S. Missile Strikes in Syria,” The New York Times, April 9, 2011.

[3]  Steve Holland, “White House backs Haley, Tillerson on Syria’s Assad,” Reuters, March 31, 2017, available from www.reuters.com/article/us-mideast-crisis-syria-usa-idUSKBN1722US

[4]  Mahita Gajanan, “National Security Advisor H.R. McMaster:  U.S. Wants to Eliminate ‘Murderous Regime’ in Syria,” Time, April 10, 2017.

[5]  Ibid and Josh Lederman, “Secretary of State Rex Tillerson Issues Warning About Syria:  ‘We Cannot Let This Happen Again’,” Time, April 11, 2017.

[6]  Paul Wolfowitz, “What Comes After the Syria Strikes: With American credibility restored, Trump should lead a diplomatic effort to replace Assad,” The Wall Street Journal, April 10, 2017.

[7]  David W. Lesch and James Gelvin, “Assad Has Won in Syria.  But Syria Hardly Exists,” The New York Times, January 11, 2017.

[8]  Michael D. Shear, Helene Cooper, and Eric Schmitt, “Obama Administration Ends Effort to Train Syrians to Combat ISIS,” The New York Times, October 9, 2015.

[9]  General Martin E. Dempsey, Letter to Senator Levin on the U.S. Military and the Syrian Conflict, July 19, 2013.  Available at:  http://www.cfr.org/syria/general-dempseys-letter-senator-levin-us-military-syrian-conflict-july-2013/p31198.

 

Civil War Dr. Christopher Bolan Leadership Change Option Papers Syria United States Weapons of Mass Destruction

America First Foreign Policy in the South China Sea

Captain Geoffrey Gage, U.S. Navy, is a Federal Executive Fellow at The Brookings Institution Center for 21st Century Security and Intelligence in Washington, DC.  The views expressed by the author are his own and do not reflect those of the U.S. government, the Department of Defense, or the U.S. Navy.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, organization, or group.


National Security Situation:  People’s Republic of China (PRC) land reclamation and coercive maritime activity in the South China Sea (SCS) contradicts international law and threatens U.S. national interests while a nascent U.S. foreign policy and other strategic challenges limit U.S. options.

Date Originally Written:  February 10, 2017.

Date Originally Published:  April 10, 2017.

Author and / or Article Point of View:  The author believes that current U.S. foreign policy, though limited in detail, provides a starting point for addressing the security situation in the SCS.

Background:  Among the competing claims in the SCS, the PRC considers most of the SCS sovereign territory.  Recent PRC maritime interference, land reclamation and fortification in the SCS constitute the most assertive claims and, despite international condemnation, have achieved de facto control of new territory.  More broadly, in dealing with SCS and other international relations issues, the PRC prefers bi-lateral problem solving in search of “win-win” outcomes, while prizing clout that derives from participation in multi-lateral fora, military exercises, and summit meetings[1].

Nascent U.S. foreign policy under the Trump administration, labeled “America First,” prioritizes defeating the Islamic State of Iraq and Syria and rebuilding the military.  “Embracing diplomacy” is a stated intention while better trade deals for the U.S. are a constant theme[2].  Administration statements and actions have generally supported these priorities, though the President’s fiscal year 2017 budget suggests fewer fiscal resources for diplomacy.  In the near term this adds up to an economy of force: military operations focused in the Middle East, managing security commitments elsewhere in order to rebuild readiness, and forging advantageous trade deals.

Significance:  The security situation in the SCS threatens regional stability and the security of sea lanes.  The SCS is the maritime crossroads for trillions of dollars in trade between globally dispersed producers and consumers.  The SCS is also important for U.S. naval forces operating between the Pacific and Indian Oceans in support of regional alliance commitments and, more generally, maintaining freedom of the seas[3].

The SCS is not a vital national interest for the U.S.  The SCS is not as critical to U.S. national security as the prospect of North Korean nuclear armed intercontinental ballistic missiles.  Nevertheless, the security situation in the SCS is very important to the U.S. because of its alliance commitments and the potential for military conflict, indirect economic harm, and degradation of international norms.

The PRC view of the “South Sea” as a vital national interest explains, though does not excuse, their actions.  In addition to vital trade flows, the SCS offers an extension of PRC military capability.  What’s more, Communist Party of China (CPC) legitimacy derives in part from SCS adventurism.  In advance of this year’s 19th CPC Congress, even the status quo gains in the SCS may be sufficient for the party—and President Xi—to claim success and retain tight control.

The April 2017 U.S.-PRC summit will likely focus on basic relationship building, North Korea and trade.  The SCS security situation, if left unaddressed, could be construed as tacit U.S. acceptance.  A reasonable near-term objective may be to maintain the status quo.  Given emerging “America First” foreign policy priorities, U.S. SCS options are captured in two distinct categories, Indirect and Direct.

Option #1:  Indirect Approach.  Leverage issues outside of the SCS to influence the PRC in the SCS.  For example, tie the conditions of trade agreements to PRC actions in the SCS.  Another option is greater U.S. patience on North Korea in exchange for the PRC’s cooperation in the SCS.  A less fraught military option would be to exclude the PRC from participation in combined exercises such as Rim of the Pacific subject to better behavior in the SCS.  This approach hinges on the U.S. “ask,” ranging from maintenance of the status quo to reversal of the PRC’s SCS island reclamation and fortification.

Risk:  Linking largely disparate issues may confuse U.S. priorities and further complicate relations with the PRC.  Option #1, in the case of North Korea, could be perceived by South Korea as a sell-out for a less important issue, creating acrimony between allies and further destabilizing the situation on the Korean peninsula.  Similarly, if the PRC perceives its position in the SCS as an existential one, it may refuse to “give” on trade agreements, sparking a trade war.

Gain:  Option #1 effectively makes the SCS more important to the U.S. from the PRC’s perspective.  Success of this option depends on limited objectives and reasonable demands.  If executed deftly, these indirect levers to stabilize the situation in the SCS could yield progress across a range of mutually important Asia-Pacific challenges while keeping the issue safely on the back burner.

Option #2:  Direct Approach. Focus efforts in the SCS region.  Sustain the long-standing policy of routine military presence, including U.S. Navy freedom of navigation operations (FONOPS) near the contested land features.  Conducting FONOPs and other military operations in the region is an obvious lever, with the option to adjust the frequency and nature of those measures, including land-based exercises with local allied and partner nations.  Drawing “red lines” against further island reclamation or fortification is a logical consideration given past administration statements.  Targeted economic sanctions on PRC entities supporting SCS activities is another lever.  A novel and riskier measure would be to abandon U.S. neutrality with respect to claims in the SCS and endorse a solution—one that might include certain PRC claims.  Finally, the U.S. could tie maintenance of the One China policy to the security situation in the SCS—a direct measure because Taiwan is an SCS claimant whose nationalist forbearers conceived of the nine-dashed line[4].

Risk:  Option #2 presents an array of risks, not least being a military confrontation that could undermine broader U.S. strategic priorities.  In particular, drawing red lines in the SCS would dramatically increase the risk of confrontation, as would linking the One China policy to SCS issues.  Mitigating the risk of a direct approach is done through incremental steps that are mindful of the broader regional situation.

Gain:  Option #2 is unambiguous and reinforces U.S. commitment and resolve on the key issues of freedom of navigation, territorial integrity and treaty obligations.  The direct approach also contains the issue to the SCS, de-linking the matter from higher-priority issues facing the U.S. and the PRC.

Other Comments:  As the new U.S. administration develops a comprehensive national security strategy, foreign challenges and crises will not wait.  Every “environmental monitoring station,” surface-to-air missile site and high seas harassment in the international waters of the SCS constitutes a “win-lose” in the Sino-American relationship.

Recommendation:  None.


Endnotes:

[1]  Foreign Ministry of PRC. (2017). China’s Policies on Asia-Pacific Security Cooperation (http://www.fmprc.gov.cn/mfa_eng/zxxx_662805)

[2]  Trump, Donald J., President. (2017). America first foreign policy. https://www.whitehouse.gov/america-first-foreign-policy

[3]  Mission of the U.S. Navy. http://www.navy.mil/navydata/organization/org-top.asp

[4]  Fisher, M. (2012, November 26). Here’s the Chinese passport map that’s infuriating much of Asia. Retrieved April 08, 2017, from https://www.washingtonpost.com/news/worldviews/wp/2012/11/26/heres-the-chinese-passport-map-thats-infuriating-much-of-asia/

 

China (People's Republic of China) Geoffrey Gage Option Papers South China Sea Trump (U.S. President) United States

U.S. Options for the People’s Republic of China’s Maritime Militias

Blake Herzinger served in the United States Navy in Singapore, Japan, Italy, and exotic Jacksonville, Florida.  He is presently employed by Booz Allen Hamilton and assists the U.S. Pacific Fleet in implementation and execution of the Southeast Asia Maritime Security Initiative.  His writing has appeared in Proceedings and The Diplomat.  He can be found on Twitter @BDHerzinger.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  People’s Republic of China (PRC) Maritime Militias operating in the East China Sea (ECS) and South China Sea (SCS).

Date Originally Written:  February 21, 2017.

Date Originally Published:  April 6, 2017.

Author and / or Article Point of View:  Author believes in freedom of navigation and maintenance of good order at sea in accordance with customary and written law of the sea.  The article is written from the point of view of U.S. sea services leadership toward countering PRC maritime irregulars at sea.

Background:  The PRC employs irregular militia forces at sea alongside naval and maritime law enforcement units.  By deploying these so-called “blue hulls” manned by un-uniformed (or selectively-uniformed) militiamen, the PRC presses its maritime claims and confronts foreign sea services within a “gray zone[1].”  In keeping with national traditions of People’s War, PRC Maritime Militias seek advantage through asymmetry, while opposing competitors whose rules of engagement are based on international law.  The PRC Maritime Militia participated in several of the most provocative PRC acts in the SCS, including the 2009 USNS Impeccable incident, the seizure of Scarborough Shoal in 2012, and the 2014 China National Offshore Oil Corporation (CNOOC) 981 confrontation with Vietnam that also involved the smaller Vietnam Maritime Militia[2].

Significance:  On its surface, employing irregular forces may be an attractive option for a state facing a more powerful opponent, or for a state interested in “a less provocative means of promoting its strategic goal of regional hegemony” such as the PRC[3].  However, incorporating these irregular forces into a hybrid national strategy has deleterious impacts on the structure of the international legal system, particularly in maritime law and the laws of naval warfare[4].  PRC Maritime Militias’ use of “civilian” fishing vessels to support, and conduct, military operations distorts this legal structure by obfuscating the force’s identity and flaunting established international legal boundaries.

Option #1:  U.S. political and military leaders engage the PRC/People’s Liberation Army (Navy) (PLAN) directly and publicly on the existence and operations of the Maritime Militia, insist upon adherence to internationally-accepted legal identification of vessels and personnel[6], and convey what costs will be imposed on the PRC/PLAN if they do not change their behavior.

As an example, the Commander U.S. Pacific Fleet, Admiral Scott Swift, has voiced his frustration with PLAN unwillingness to acknowledge the existence of the PRC Maritime Militia and its relationships with state law enforcement and military forces[5].  In the event that the PRC declines to engage in dialogue regarding the Maritime Militia, discontinuing PLAN participation in the Rim of the Pacific exercise is the suggested response.

Risk:  Without clearly attaching costs to continued use of militia forces in operations against the USN, Option #1 is unlikely to affect PRC behavior.  Conveying possible imposed costs carries risk of further-degrading relations between the U.S. and PRC, but it is precisely PRC perceptions of their behavior as costless that encourages the behaviors exhibited by the PRC’s Maritime Militia[7].

Gain:  Option #1 is an excellent opportunity for the U.S. to underline its commitment to good order at sea and a rules-based maritime order.  By encouraging the PRC to acknowledge the Maritime Militia and its associated command structure, the U.S. can cut through the ambiguity and civilian camouflage under which the Maritime Militia has operated unchallenged.  In the event that the PRC declines to engage, conveying the possible imposition of costs may serve as a warning that behavior negatively affecting good order at sea will not be tolerated indefinitely.

Option #2:  U.S. Pacific Command’s Joint Interagency Task Force West (JIATF-W) assists the Association of Southeast Asian Nations (ASEAN) in developing and implementing an organic maritime domain awareness (MDA) capability with domestic, and international, interagency sharing and response capability.  For the purposes of this article, MDA will be understood to be a host-nation’s ability to “collect, fuse, analyze and disseminate maritime data, information and intelligence relating to potential threats to [its] security, safety, economy or environment[8].”

Risk:  Close to a score of abandoned information portals and sharing infrastructures have been tried and failed in Southeast Asia, a cautionary tale regarding the risk of wasted resources.  Building upon over 20 years of JIATF-W’s experience should help to mitigate this risk, so long as an MDA solution is developed cooperatively and not simply imposed upon ASEAN.

Gain:  By providing focused and long-term support to an ASEAN-led solution, the U.S. can make progress in an area where MDA has been plagued by reticence, and occasionally inability to share vital information across interagency and national borders.  Shared awareness and cooperation at sea will combat the ability of the PRC Maritime Militia to operate uncontested in the SCS by enabling more effective law enforcement and naval response by affected countries.  Working through existing regional institutions such as Singapore’s Information Fusion Centre would add increased value to Option #2.

Option #3:  Utilize U.S. Coast Guard (USCG) to provide law enforcement and maritime safety training support to states bordering the ECS/SCS interested in creating their own maritime militias.

Risk:  Expanding a concept that is damaging the rules-based order may increase the rate of disintegration of good order at sea.  Any observable indication that the U.S. is encouraging the creation of irregular maritime forces would likely be viewed negatively by the PRC.  Option #3 carries risk of engendering diplomatic or military conflict between the U.S. and PRC, or between the PRC and U.S. partners.

Gain:  Option #3 might provide some level of parity for states facing PRC militia vessels.  Vietnam has already made the decision to pursue development of a maritime militia and others may follow in hopes of countering the PRC’s irregular capability.  USCG involvement in the organizational development and training of militias might provide some limited opportunities to shape their behavior and encourage responsible employment of militia forces.

Other Comments:  Encouragement for the expansion of the Code for Unplanned Encounters at Sea (CUES) is not addressed.  The CUES  was adopted during the 2014 Western Pacific Naval Symposium (WPNS) and provides a basis for communications, maritime safety, and maneuvering guidelines for use by ships and aircraft in unplanned encounters at sea.  CUES is not a legally binding document, but an agreed-upon protocol for managing potentially escalatory encounters in the Pacific[9].  This author believes coast guards adjoining the contested areas of the ECS and SCS will continue to resist CUES adoption in order to maintain operational latitude.  Given the reticence of coast guards to accede to the agreement, drawing PRC Maritime Militia into CUES seems an unrealistic possibility.

Recommendation:  None.


Endnotes:

[1]  The South China Sea’s Third Force: Understanding and Countering China’s Maritime Militia, Hearings on Seapower and Projection Forces in the South China Sea, Before the Subcommittee on Seapower and Projection Forces, 114th Cong., 1 (2016)(Statement of Andrew S. Erickson, U.S. Naval War College). http://docs.house.gov/meetings/AS/AS28/20160921/105309/HHRG-114-AS28-Wstate-EricksonPhDA-20160921.pdf

[2]  Conor M. Kennedy and Andrew S. Erickson, “Model Maritime Militia: Tanmen’s Leading Role in the April 2012 Scarborough Shoal Incident,” CIMSEC, 21 April 2016, http://cimsec.org/model-maritime-militia-tanmens-leading-role-april-2012-scarborough-shoal-incident/24573

[3]  James Kraska and Michael Monti, “The Law of Naval Warfare and China’s Maritime Militia,” International Law Studies 91.450 (2015): 465, http://stockton.usnwc.edu/cgi/viewcontent.cgi

[4]  Ibid.

[5]  Christopher Cavas, “China’s Maritime Militia a Growing Concern,” DefenseNews, November 21, 2016,  http://www.defensenews.com/articles/new-website-will-allow-marines-to-share-training-videos

[6]  The South China Sea’s Third Force: Understanding and Countering China’s Maritime Militia, Hearings on Seapower and Projection Forces in the South China Sea Before the Subcommittee on Seapower and Projection Forces, 114th Cong., 1 (2016)(Statement of Andrew S. Erickson, U.S. Naval War College). http://docs.house.gov/meetings/AS/AS28/20160921/105309/HHRG-114-AS28-Wstate-EricksonPhDA-20160921.pdf

[7]  The Struggle for Law in the South China Sea, Hearings on Seapower and Projection Forces in the South China Sea Before the Subcommittee on Seapower and Projection Forces, 114th Cong., 1 (2016) (Statement of James Kraska, U.S. Naval War College).

[8]  Secretary of the Navy Approves Strategic Plan for Maritime Domain Awareness, U.S. Navy, Last updated 8 October 2015, http://www.navy.mil/submit/display.asp? story_id=91417

[9]  Document: Code for Unplanned Encounters at Sea, USNI News, Last updated 22 August 2016, https://news.usni.org/2014/06/17/document-conduct-unplanned-encounters-sea

Association of Southeast Asian Nations Blake Herzinger China (People's Republic of China) Irregular Forces Maritime Option Papers South China Sea United States

Options for the People’s Republic of China following the Taiwan Strait Crisis of 1996

Captain Robert N. Hein is a career Surface Warfare Officer in the U.S. Navy.  He previously commanded the USS Gettysburg (CG-64) and the USS Nitze (DDG-94).  He can be found on Twitter @the_sailor_dog.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


“Hence to fight and conquer in all your battles is not supreme excellence, supreme excellence consists in breaking the enemy’s resistance without fighting, thus the highest form of generalship is to balk the enemy’s plans.”  -Sun Tzu  

National Security Situation:  The People’s Republic of China (PRC) is vying to establish itself as the Asian Hegemon.  What caused this rapid shift in the PRC’s foreign Policy?  Why, after decades of growth, where the PRC was ascribed the long view, has it rapidly accelerated military growth, reorganization, and a diplomatic and economic expansion across the world stage in a scale not seen since Zheng He’s voyages of the 15th century?

Date Originally Written:  February 2, 2017.

Date Originally Published:  April 3, 2017.

Author and / or Article Point of View:  This article is taken from the point of view of the PRC toward the U.S in the two decades following the third Taiwan Straight crisis of 1996.

Background:  In 1995, Taiwan’s president visited the U.S. to attend his graduate school reunion at Cornell.  His visit, coupled with the U.S. sale of F-16s to Taiwan, incensed the PRC at what they viewed as possible changes in the U.S. and Taiwan view of the One China Policy.  The PRC commenced a series of missile tests near Taiwan.  The U.S. responded by sending two aircraft carriers to the vicinity of the Strait of Taiwan[1].  The PRC realized they could do little to respond to U.S. actions and needed a way to ensure they never experienced this humiliation again.

Significance:  The law of unintended consequences often applies to national security.  While U.S. action in 1996 was a clear demonstration of U.S. resolve, the PRC’s response has been to pursue a series of actions to reduce and possibly prevent the ability of the U.S. to influence events in Asia.

Option #1:  After viewing the U.S. way of war against Serbia, Afghanistan, and Iraq, whereby the U.S. consistently pushes its aircraft carriers close to the coast and launches strike fighters and tomahawk land attack missiles against targets ashore, the PRC must find a way to extend its borders out to sea into the ocean.  This can be accomplished by placing relatively cheap long-range anti-ship missile batteries along the shore, increasing the number of ships and submarines in the People’s Liberation Army Navy and, in a bold stroke, build islands in the South China Sea (SCS), and claim the surrounding waters as historical boundaries of the PRC.

Risk:  There is a real danger that the U.S. will react to the build-up of PRC forces and rebuild its navy to maintain global influence.  Previous U.S. administrations justified naval build ups to counter the Soviet threat however, by keeping activities below the threshold of armed conflict, we believe the U.S. will not be able to convince its public of the need for a large military buildup, especially following the years of conflict the U.S. has recently experience in the Middle East.  While Asian nations could turn to the U.S. out of fear, this can be mitigated through strong economic measures.  Asian nations may also attempt to challenge the PRC in the international courts, but the lack of enforcement measures in the international system removes this a real concern.

Gain:  Option #1 will prevent U.S. access to the waters they need to block the PRC from maneuvering against Taiwan.  Due to the proliferation of short-range fighters, and the lack of anti-surface capability of many U.S. warships, the ability of the U.S. to offer a timely response to a forcible re-unification of Taiwan could be prevented.

Option #2:  When we look back to Sun Tzu, and realize the best course of action is to attack the enemy’s strategy, we must determine what other strategy the enemy could impose.  While Option #1 will be effective in countering the U.S. ability to easily execute its traditional means of bombardment from the sea, another option is available to the U.S.; the long-range containment strategy used against the Soviet Union could possibly be executed with a long-range blockade.  By focusing on key choke points such as the Strait of Hormuz and the Bab Al-Mandeb from the Red Sea, an adversary could block much-needed commodities such as oil and rare earth elements needed in the PRC defense industry.  Just as the PRC invoked the historical nine-dash line to establish autonomy in the SCS, revitalizing the historical one belt one road to connect Asia to Europe and Africa will easily stop any means of isolating or containing the PRC.  By continuing investment throughout the world, especially in economically disenfranchised areas, the PRC can prevent the types of alliances used by the U.S. during the Cold War to isolate the Soviet Union.

Risk:  If the PRC moves out too quickly, it spreads itself too thin internationally, and risks alienating the very countries with whom it hopes to partner.  The drain on resources over time will become increasingly difficult.  The PRC’s ability to be a free rider on U.S. security will winnow as other countries will expect the same from the PRC.

Gain:  The PRC establishes itself as a both a regional hegemon, and a global power.  The PRC asserts influence over the global economy and geopolitics to rival the U.S. in a multi-polar world.  Option #2 removes the ability of the U.S. to polarize the eastern hemisphere against the PRC.

Other Comments:  Through a rapid economic development program centered on an export economy in a globalizing world, the PRC has embarked on a multitude of options, covering the diplomatic, informational, military and economic spectrum.  It has employed both above options, which have caused the world to react, often favorably to the PRC.  The question for the PRC now is how to maintain the momentum, solidify their role in a changing world order, and not show their hand too quickly lest they implode.  The question for the U.S. is whether it will continue to pursue the U.S. way of war that has been studied so ably by the PRC, or pursue other options as it both cooperates and competes with the PRC on a rapidly evolving world stage.

Recommendation:  None.


Endnotes:

[1]  Ross, Robert, International Security, Vol 25, No 2 (Fall 2000) p 87 The 1995-96 Taiwan Strait Confrontation

Bob Hein China (People's Republic of China) Containment Deterrence Option Papers South China Sea Taiwan

South China Sea Options: An Alternative Route

“The Black Swan” is an officer and a strategist in the U.S. Army.  He has deployed to Iraq and Afghanistan.  He has been a company commander, and served at the battalion, brigade, division, and Army Command (ACOM) level staffs.  The opinions expressed are his alone, and do not reflect the official position of the U.S. Army, the Department of Defense, or the U.S. Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, organization, or group.


National Security Situation:  Japan is one of the most stalwart allies of the United States (U.S.) in Asia.  The U.S. guarantees Japanese security and sovereignty.  Japan serves as one of the principal rivals of the People’s Republic of China (PRC) in Asia.  Japan is an island, however, and depends upon seaborne trade routes, especially those that transit through Southeast Asia.  PRC claims of sovereignty over virtually the entire South China Sea (SCS) pose a direct threat to Japanese security.

Date Originally Written:  January 29, 2017.

Date Originally Published:  March 30, 2017.

Author and / or Article Point of View:  This article is written from the point of view of Japan towards PRC claims in the SCS.

Background:  For the greater part of recorded history, Japan has been a rival of the PRC.  All Japanese attempts to dominate the Asian mainland however, have ended in failure.  The defeat of Japan during WWII decisively put an end to Japanese Imperial ambitions.  Since the end of the Allied post-WWII occupation in 1952, Japan has been one of the most stalwart allies of the U.S. in Asia, and a bastion of western values.  Japan is an economic powerhouse, a vibrant democracy, and possesses an extremely formidable military.  For those reasons, as well as historical animosity, Japan is one of, if not the main rival, of the PRC in Asia.

The lifeblood of Japan’s prosperity flows through the Straits of Malacca, and then northeast through the SCS en route to Japan.  The PRC has laid claim to the SCS as sovereign territory throughout modern history, as well as Taiwan, and Japan’s own Senkaku Islands.  Events in the 21st century have reached a culminating point.  While Japan and the U.S. have guaranteed the inviolability of Japan’s claims to the Senkaku Islands, the PRC has gained de facto sovereignty over the SCS.  The PRC has done so by the construction, improvement, and militarization of artificial islands.  The PRC has vowed to defend its claims, and no member of the international community has chosen to challenge them, beyond legal arbitration through the United Nations.  Recent PRC assertiveness has its roots in an impressive regimen of military modernization and diplomatic initiatives colloquially called the “rise of China”.

Significance:  The PRC control of virtually the entire SCS poses a direct threat to Japan.  The PRC could coerce or compel Japan in any number of ways by cutting or hindering maritime traffic to Japan as it transits out of the Straits of Malacca.  In the event of war, Japan would be at a distinct disadvantage for the aforementioned reasons, to say nothing of its close proximity to the PRC.

Option #1:  Japan diverts inbound maritime traffic immediately until such a time as the issue of the SCS reaches an acceptable resolution.  Maritime traffic exiting the Straits of Malacca/Singapore would transit through the Java to Celebes to Philippine Sea route.  Simultaneously, Japan invests in improving Indonesian and Philippine port facilities/infrastructure along the proposed route.

Risk:  Cost and time.  The current route through the SCS is the shortest route and therefore the cheapest.  Option #1 entails a significant increase in the cost of shipping.  Furthermore, it will be a significant diplomatic effort for Japan to induce the Indonesian government to allow transit on this scale through its territorial waters.  Option #1 will require further diplomatic and economic effort to induce the Indonesian and Philippine governments to allow investment in the type of upgrades to their facilities that would be necessary to sustain such traffic.  Also, this option may embolden the PRC and result in a loss of face for Japan, as it will be perceived that the PRC is driving Japan out of the SCS.

Gain:  Safety for shipping bound for Japan.  This option completely skirts all PRC territorial claims.  Option #1 entails the cultivation of alliances with several Southeast Asian nations.  Furthermore, Option #1 establishes a buffer zone by placing multiple nations, and miles of blue water ocean, between the PRC’s navy and Japanese shipping.  In the event of war between the PRC and Japan, this route would be most difficult to interdict.

Option #2:  Japan immediately begins regular freedom of navigation patrols with its maritime self-defense force (M-SDF) through the SCS, with the option to provide armed escorts to critical maritime traffic.  Simultaneously, Japan seeks military cooperation with SCS claimants other than the PRC (e.g. Vietnam, Indonesia, the Philippines) to protect maritime traffic.

Risk:  The regular deployment of M-SDF ships to the SCS would be viewed as an escalation by the PRC, and an infringement on its sovereignty.  The likelihood of a stand-off at sea would be high (especially if this is a coalition of Southeast Asian nations), with the correlating risk of miscalculation in the use of force becoming casus belli.  Additionally, the more M-SDF ships that are deployed away from the home islands are the more ships that are unavailable to defend the Japanese mainland.

Gain:  This option would establish Japan as the leader against PRC encroachment.  The operational experience and partnerships gained would be invaluable.  Most importantly, this option virtually guarantees U.S. support, if Japan is perceived to be burden-sharing, but especially if Japan is threatened or attacked.  Practically, beginning and sustaining such patrols early on gives the PRC the flexibility to adjust to a new status quo without a loss of face.

Other Comments:  It has been well established here, but is a refrain of paramount importance – Japan must have access to maritime shipping to survive.  Japan can rely on U.S. support, but must stand ready to safeguard its own interests.  Both options presented here have cooperation and alliances with other nations as a common theme.  Operationalizing that theme is the best way for Japan to weather events in the SCS.

Recommendation:  None.


Endnotes:

None.

China (People's Republic of China) Japan Maritime Option Papers South China Sea The Black Swan

U.S. Partnership Options in the South China Sea

Brett Wessley is an officer in the U.S. Navy, currently assigned to U.S. Pacific Command.  The contents of this paper reflect his own personal views and are not necessarily endorsed by U.S. Pacific Command, Department of the Navy or Department of Defense.  Connect with him on Twitter @Brett_Wessley.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Conflicting territorial claims in the South China Sea (SCS).

Date Originally Written:  January 21, 2017.

Date Originally Published:  March 27, 2017.

Author and / or Article Point of View:  The author is a U.S. Naval Officer serving on staff duty at U.S. Pacific Command.  The article is written from the point of view of U.S. policymakers weighing options in Southeast Asia and the SCS.

Background:  Philippine President Rodrigo Duterte’s decision to table the Hague’s Permanent Court of Arbitration June 2016 ruling was a strategic setback for the U.S.[1].  While the Hague’s ruling legally invalidated the People’s Republic of China (PRC) “Nine Dash Line” under the U.N. Convention on the Law of the Seas (UNCLOS), Duterte’s increased ties to the PRC and deteriorating relationship with the U.S. have led to a potential “fait accompli” in the SCS.  Instead of pressing their claims through international engagement, the Philippines has decided to engage the PRC solely through bilateral forums, and the status quo of the PRC occupying and building islands in the SCS will continue unopposed by the principal aggrieved party.

Significance:  The SCS represents a strategic point of friction between the PRC and the international community, particularly with the U.S.  While territorial disputes in the Senkaku Islands and Taiwan involve major military powers and treaty alliances with the U.S., the international environment in the SCS is more permissive to incremental PRC actions to acquire territory (aka “salami slicing”)[2].  The Philippines is the only regional treaty ally to the U.S., and Duterte’s sidelining of the Hague’s ruling imperils regional neighbors like Vietnam, Malaysia and Indonesia – all of whom have territorial disputes with the PRC’s Nine Dash Line.  The danger for the U.S. is that the PRC may militarize its expansive holdings in the SCS and expand the People’s Liberation Army’s defensive perimeter to the south, thus reinforcing the PRC’s counter-intervention capabilities.

Option #1:  The U.S. repairs relations with Duterte and restore the alliance with the Philippines.

Risk:  Duterte has pushed numerous controversial policies within the Philippines during his short tenure as President, namely the extrajudicial killings of drug-related criminals[3].  Duterte’s rhetoric has been alienating and crude, particularly when involving the U.S. and the previous Obama Administration.  Duterte’s strong feelings about the U.S. are deeply rooted within his personal life and Philippine history, and this bias may be insurmountable through diplomacy.  Furthermore, the PRC has offered Duterte significant economic development and loans, all of which were aimed at dissuading him from aggressively pursuing the Hague’s ruling and improving relations with the U.S.

Even if the U.S. was successful in repairing the relationship with Duterte and the Philippines, doing so may create a perception that the U.S. will accept undermining the rule of law in return for strategic concessions.  This messaging is contrary to the U.S.’ position on the SCS and territorial disputes, in addition to open governance and a rules-based international system.  The greatest risk is that in persuading Duterte to move forward with the Philippine’s legal case against the PRC, the U.S. may be forced to abandon the international principles driving its foreign policy.

Gain:  Improved relations with Duterte and the Philippines would restore the U.S.’ foothold in the SCS for promoting a rules-based international system.  The Philippines is a treaty ally and historical partner of the U.S., and it is unlikely that a closer relationship could be formed with other SCS nations.  Additionally, the Philippines successful legal case against the PRC provides legitimacy to its territorial claims – namely against the illegal PRC seizures of several reefs and fishing grounds in the SCS[4].  Although the weakness of the Philippine Navy and Coast Guard has prevented aggressive patrols of its territorial waters, partnership with the U.S. would provide avenues for equipment and training, in addition to opportunities for intelligence sharing and improved maritime domain awareness.

Option #2:  The U.S. pivots diplomatic and military engagement to Vietnam in the SCS.

Risk:  Although the PRC more recently fought Vietnam during the Sino-Vietnamese War of 1979, the bitter history of U.S. involvement in the Vietnam War will complicate relations between the U.S. and Vietnam.  The nominally communist government of Vietnam, and its rejection of democratic governance in favor of one party rule, will likely be domestically unpopular in the U.S. compared to partnership with the Philippines.  Additionally, Vietnam’s historical partnership with Russia may impede meaningful intelligence sharing with the U.S.

Gain:  When compared to the other SCS claimants competing with the PRC, Vietnam’s investment in maritime defensive capabilities is outstanding.  The legacy of Soviet sea-denial strategies has led to Vietnamese investment in coastal defense cruise missiles, integrated air defense systems, submarines, and patrol craft to defend its SCS territories.  Vietnam has militarized its holdings in the SCS in ways the Philippines and other claimants have been unable or unwilling to do. Vietnam’s geography near the major PRC naval bases on Hainan Island, and its holdings throughout the Spratley Islands, would put PRC military assets at asymmetric risk in any regional conflict [5].

If the U.S. was able to gain basing rights from Vietnam, its ability to conduct Freedom of Navigation Operations would be assisted by a Vietnamese Navy and Coast Guard capable of maintaining a presence in contested waters.  As a military partner to the U.S., the deterrent value of Vietnamese military capabilities in the SCS would be a credible improvement over the status quo.  U.S. pursuit of imposing cost on aggressive PRC expansion in the SCS would be uniquely complimented by Vietnamese military capabilities.

Other Comments:  It is important that the U.S. maintains a regional ally in the SCS with territorial holdings.  As an outside power, the U.S.’ goal of maintaining freedom of navigation in international waters can only be supported by partnership with a legitimate claimant.

Recommendation:  None.


Endnotes:

[1]  Ben Blanchard and Reuters, “Duterte says U.S. has lost, aligns Philippines with China,” CNN Philippines, October 21, 2017.  http://cnnphilippines.com/news/2016/10/20/duterte-cuts-us-ties-aligns-with-china.html

[2]  Robert Haddick, “America Has No Answer to China’s Salami-Slicing,” War on the Rocks, February 06, 2014.  https://warontherocks.com/2014/02/america-has-no-answer-to-chinas-salami-slicing/

[3]  James Hookway, “Rodrigo Duterte Ushers Manila Into a New Era,” The Wallstreet Journal, January 16, 2017.  https://www.wsj.com/articles/outsider-ushers-manila-into-new-era-1484560813

[4]  Jaime Laude, “China takes Philippine atoll,” The Philippine Star, March 02, 2016.  http://www.philstar.com/headlines/2016/03/02/1558682/china-takes-philippine-atoll

[5]  Shang-su Wu, “The Development of Vietnam’s Sea-Denial Strategy,” The Naval War College Review, Winter 2017. https://www.usnwc.edu/getattachment/8756f6bf-78d0-4955-b1c6-ce8ee678f5c0/The-Development-of-Vietnams-Sea-Denial-Strategy.aspx

Allies & Partners Brett Wessley China (People's Republic of China) Option Papers Philippines South China Sea United States Vietnam

Options for the Philippines in the South China Sea

Joshua Urness is an officer in the United States Army who has served both in combat and strategic studies roles.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Sovereign Rights of Economic Exclusion Zones (EEZ)[1] in the South China Sea (SCS) and the legitimacy of the international system to enforce them.

Date Originally Written:  January 18, 2017.

Date Originally Published:  March 23, 2017.

Author and / or Article Point of View:  The author is an active duty officer in the U.S. Army.  This article is written from the point of view of the U.S. towards the Philippines, with a desire to ensure the legitimacy of the international system.

Background:  The People’s Republic of China (PRC) is occupying and developing islands in the SCS based on the historical claim of its nine-dashed line.  These occupations have resulted in the direct challenge of the Philippine EEZ, an internationally recognized right of sovereignty, which fully includes the disputed Spratly Islands (Mischief Reef).  In 2016, the United Nations Convention on the Law of the Sea (UNCLOS) ruled that the Spratly Islands are technically rocks, and upheld that they are wholly within the Filipino EEZ.  Therefore, the PRC is in a “state of unlawful occupation[2].”  Countries especially impacted by the PRC’s expansion in the SCS, Malaysia, Philippines, and Vietnam, do not currently possess the military or political capability to challenge the PRC’s actions independently.

Significance:  The stability of security and diplomatic relations in the SCS is important because of the economic trade routes which pass through the waterway, and the potential value of natural resources in the region.  The PRC’s willingness to ignore the UNCLOS ruling on the sovereignty of the Filipino EEZ is an affront to the legitimacy and credibility of the international system and the security status quo.  Further unchecked aggression by the PRC could embolden other states, creating further instability in other parts of the world.  The PRC’s disregard for the ruling, along with their military modernization and investment in power projection capabilities, will enable them to continue to challenge the sovereignty of EEZs throughout the first island chain.  Because the international system cannot enforce its decision, and the Philippines cannot enforce its own EEZ, the credibility of both international and state authorities will be questioned.

Option #1:  The U.S. facilitates Filipino acquisition of low-cost defensive capabilities which will enable them to enforce their own EEZ.  Examples of low-cost defensive capabilities include anti-ship missiles such as the RBS-16 which has a 100-200 nm range, coast guard equipment, and sensors.

Risk:  If the U.S. is not directly involved in the continued procurement and operations of the weapons given to the Filipinos, there may be an increased risk of mistakes or miscalculations being made by untrained and inexperienced Filipino weapons operators.  This includes the integration of sensors and shooters into an organized system in which commanders, with the authority to decide whether or not to fire a system, have enough information and time to make a good decision.  Because of the potential presence of Filipino Islamist or communist insurgents in areas likely to be chosen for weapon system employment, the security of the weapon sites must be emphasized.  If weapons are stolen or obtained by such actors with malign interests, this could destabilize the regions crucial shipping lanes and local maritime economies.  Additionally, inability or lack of political will on the part of the Philippines to use the capability to protect its citizens, or enforce EEZ claims, may perpetuate internal destabilization of the state.  Also, given the PRC’s positioning of military forces on these islands, the provision of weapons to the Philippines risks war over sea lanes through which 25% of global trade passes.

Gain:  Enforcement of the EEZ would enhance the legitimacy of the international system, even if the Filipinos themselves enforced it, as opposed to an internationally sanctioned coalition.  Option #1 would change the cost/risk calculation for the burgeoning PRC navy that may result in a deterrent effect.  Such a capability may also enable the Filipino government to protect its fishermen and economic interests in the EEZ from harassment from the PRC’s maritime militia.  This option would allow the Filipinos to demonstrate resolve, garnering regional and internal credibility, if they decisively utilize these capabilities to deter or defend.  Land based anti-ship missiles are easily maneuverable and concealable, therefore adding to the survivability and resilience of a force that could be in place for a long time.

Option #2:  A U.S.-led coalition defense strategy composed of states surrounding the SCS that is supported by U.S. foreign military funding centered on facilitating procurement, training and information sharing.

Risk:  A U.S. led coalition of SCS states could polarize the region and lead to a less effective Association of Southeast Asia Nations (ASEAN).  This coalition may also stimulate a regional arms race that would be expensive over time for the U.S., despite the somewhat low-cost of capabilities involved.  The cost of building partner capacity could also be expensive over time where countries such as Malaysia and Indonesia, not accustomed to working with the U.S., would require courtship.  Direct U.S. involvement and partnership in mission command and the integration of sensors and shooters into an organized system would require increases in the forward presence of U.S. forces.  This would expose the U.S. to a higher diplomatic commitment than previously held.  This higher level of presence would be necessary to mitigate the risk of mistakes in the use of the capability, as well as the security and posture of the systems.

Gain:  The primary advantages of a U.S.-led coalition are two-fold; it would ensure the credibility of the international system to assist in the enforcement of edicts (though the U.S. is not a signatory of UNCLOS, it does have a vested interest in the stability of the international system), and it would build a broader foundation of deterrence against further PRC expansion in the SCS.  If the U.S. used a strategy similar to the one for which the RAND Corporation advocates, in their report titled Employing Land-Based Anti-Ship Missiles in the Western Pacific[3], coalition states could work towards building the capacity for a “far blockade” of the first island chain.  This would significantly increase the PRC’s naval risk when operating within firing range of any coalition state, challenging the cost imposition and aggression paradigm, while also building capacity and knowledge that may be useful in future conflict.  Similarly, the U.S. could use such partnerships to develop its own capacity and institutional knowledge in land-based maritime denial systems.

Other Comments:  None.

Recommendation:  None.


Endnotes:  

[1]  China and the Philippines have both signed and ratified the UNCLOS. Part five of the convention, article 55 through 75, cover economic exclusion zones. UNCLOS Part V, Article 56, which can be found at http://www.un.org/depts/los/convention_agreements/texts/unclos/unclos_e.pdf, states that; ” In the exclusive economic zone, the coastal State has:

(a) sovereign rights for the purpose of exploring and exploiting, conserving and managing the natural resources, whether living or non-living, of the waters superjacent to the seabed and of the seabed and its subsoil, and with regard to other activities for the economic exploitation and exploration of the zone, such as the production of energy from the water, currents and winds;

(b) Jurisdiction as provided for in the relevant provisions of this Convention with regard to:

(i) The establishment and use of artificial islands, installations and structures;

(ii) Marine scientific research;

(iii) The protection and preservation of the marine environment;

[2]  Graham, E. (2016, August 18). The Hague Tribunal’s South China Sea Ruling: Empty Provocation or Slow-Burning Influence? Retrieved January 07, 2017, from http://www.cfr.org/councilofcouncils/global_memos/p38227

[3]  Kelly, T., Atler, A., Nichols, T., & Thrall, L. (2013). Employing Land-Based Anti-Ship Missiles in the Western Pacific. Retrieved January 07, 2017, from http://www.rand.org/pubs/technical_reports/TR1321.html

Allies & Partners China (People's Republic of China) Joshua Urness Maritime Option Papers Philippines South China Sea

U.S. Options Towards a Rising People’s Republic of China

Captain Brian T. Molloy has served in the U.S. Army in Afghanistan and various posts around the U.S.  He presently works as a Project Manager at the U.S. Army Corps of Engineers in Pittsburgh, PA.  The opinions expressed in this article are his alone and do not reflect the official position of the U.S. Army, the Department of Defense, or the U.S. Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  U.S. options towards the People’s Republic of China (PRC) as it continues to rise and increase its influence in the region surrounding the South China Sea (SCS).

Date Originally Written:  January, 26, 2017.

Date Originally Published:  March 20, 2017.

Author and / or Article Point of View:  Author is an active duty U.S. Army Officer.  Author believes in the use of force as a last resort and where possible, diplomacy should be the primary lever in influencing foreign powers.

Background:  The U.S. and the PRC are currently playing out a classic dyadic relationship according to power transition theory[1].  This power transition theory is playing out in the SCS with the rising PRC asserting itself militarily and the declining U.S. attempting to reassert control of the region by addressing such military action with “balancing” actions.  Recently U.S. balancing actions have utilized the military instrument of power with the Pacific Pivot[2] and freedom of navigation missions as the most visible.  This U.S. response is playing directly into the beginning stages of a conflict spiral that so often follows with a power transition[3].  The idea of a military deterrent is often floated as the logical alternative to war.  In this case, however, both of the major powers are already a nuclear power with a nuclear deterrent in place.  This nuclear deterrent works to ensure that a direct conflict between the two would be unlikely, however, as we saw in the Cold War, this deterrent does not keep the powers from fighting through proxy wars.  The options presented in this article assume rising influence of the PRC and a declining influence of the U.S., both militarily and economically, in the region.  The SCS has become a potential flash point between the two powers as the PRC uses it’s military to claim land that is also claimed by longtime U.S. Allies in the region.

Significance:  In an increasingly multi-polar global environment, regional powers such as the PRC are becoming a larger threat to U.S. interests throughout the world.  The potential for conflict in the SCS represents the opportunity for the U.S. to either assert influence in the region or cede that influence to a rising PRC.  Control of the SCS is essentially a trade-driven power move by the PRC towards its neighbors.  As such, trade could be the primary focus of the response from the U.S.towards the PRC vice a more dangerous military confrontation.

Option #1:  The U.S. and the PRC seek a strong bi-lateral trade agreement to replace the Trans Pacific Partnership (TPP) and the U.S. leverages negotiations on this trade agreement to provide security guarantees to allies in the SCS region.

With the downfall of the TPP the option to enter into a strong bi-lateral trade deal with the PRC is now open.  Negotiating this deal requires nuance and the ability to intertwine defense and trade into an agreement that is both beneficial to all economically, but also sets limits on military actions seen to be provocative to the U.S. and its Allies in the region.  Precedent for this sort of diplomatic economic deterrent action can be seen in post WWII Western Europe with the European Steel and Coal Community (ECSC)[4].  When complete, Option #1 would be an economic deterrent to conflict in the region.  This economic deterrent will utilize trade agreements to ensure the U.S. and the PRC are entwined economically to the point that a military conflict, even a proxy conflict, would be too costly to both sides.  This economic deterrent could be the action that needs to be taken in order rebalance power in the region.

Risk:  The largest risk in entertaining this approach is that it opens the U.S. to the risk of an economic catastrophe if the approach fails.  This risk would likely be unpalatable to the U.S. public and would have to be crafted carefully.  Additionally, under the current administration, a trade deal similar to this could be difficult due to the ongoing rhetoric coming from the White House.  Finally, this approach risks leaving long-time U.S. Allies no way to dispute their claims in the SCS.

Gain:  This agreement gains the lessened risk of a conflict between the U.S. and the PRC and also has the potential for large economic growth for both sides.  A mutually beneficial trade agreement between two of the largest economies in the world has the potential to remove the risk of conflict and simultaneously improve quality of life domestically.

Option #2:  The U.S. can use its trade power to balance PRC influence in the region through encouraging the Association of Southeast Asian Nations (ASEAN) to trade as a bloc.  This is essentially an Asian version of the European Union which can build multilateral trade agreements and also leverage economic sanctions to assert power in the region.  Building ASEAN to be able to handle this would require a more inclusive membership of some of the more powerful Asian countries, Japan, and the Republic of Korea among them.  This effort would require a radical overhaul of the ASEAN bloc but would benefit much smaller countries as they try to address the influence of the PRC.

Risk:  The U.S., particularly under the current administration, is not a proponent of supranational organizations.  In order for Option #2 to work the U.S. must have a stake in the game.  Additionally, the U.S. risks losing influence in the region to the newly formed ASEAN economic power.  There is the possibility that the newly formed ASEAN could forge close ties with the PRC and other trading partners and leave the U.S. out.  Finally, the SCS is fraught with competing claims not only between the PRC and ASEAN members, but among ASEAN members themselves.  Those conflicts must be worked out before the ASEAN bloc could effectively manage the PRC.

Gain:  This option allows the U.S. to leverage the comparative power of an ASEAN bloc of mostly friendly countries to impose sanctions on the PRC on its behalf.  In this way the U.S. is pushing regional allies take care of their own backyard while still maintaining influence in the region.  The U.S. also benefits as it is able to trade effectively with a large number of Asian countries without entering into a free trade agreement like the TPP.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Garnett, J. (2010). The Causes of War and the Conditions of Peace, in John Baylis et al, Strategy in the Contemporary World: An Introduction to Strategic Studies’ (3rd Edition OUP 2010), (pp. 19–42). Oxford, UK: Oxford University Press; 3rd Edition

[2]  Panetta, L. E., & Obama, B. (2012). Sustaining U.S. global leadership: priorities for 21st century defense. (pp. 2). Washington, D.C.: Dept. of Defense.

[3]  Cashman, G. & Robinson L. (2007). An Introduction to the Causes of War. Patterns of Interstate Conflict from World War I to Iraq. (pp. 1–25). Lanham, MD: Rowman & Littlefield Publishers Inc

[4]  Alter, K, & Steinberg, D. (2007). The Theory and Reality of the European Coal and Steel Community.  Buffet Center for International and Comparative Studies, working paper No. 07-001

Association of Southeast Asian Nations Brian T. Molloy China (People's Republic of China) Economic Factors Option Papers South China Sea United States

South China Sea Options: The Road to Taiwan

“The Black Swan” is an officer and a strategist in the U.S. Army.  He has deployed to Iraq and Afghanistan.  He has been a company commander, and served at the battalion, brigade, division, and Army Command (ACOM) level staffs.  The opinions expressed are his alone, and do not reflect the official position of the U.S. Army, the Department of Defense, or the U.S. Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, organization, or group.


National Security Situation:  The Republic of China (Taiwan) exists in a singular position in world affairs.  Taiwan is viewed as a breakaway province by the communist People’s Republic of China (PRC), who controls the Chinese mainland.  However, Taiwan possesses its own government, economy, and institutions, and its nominal independence has been assured by the United States (U.S.) since 1949.  However, the PRC views any move toward actual independence as casus belli under its “One China” policy, which has been in place for decades.  Recognition or even acknowledgement of Taiwanese positions is a veritable geopolitical and diplomatic taboo.

The recent election of Donald Trump as president of the United States (POTUS) potentially undermines the previous order that has been in place since the Nixon Administration.  Campaigning as a change agent, and one to defy convention, President Trump has suggested the U.S. rethink the “One China” policy.  POTUS’ reception of overtures from Taiwan and hard rhetoric towards the PRC brings the question of Taiwan’s status and future to the forefront of geopolitics once again.

Date Originally Written:  January 28, 2017.

Date Originally Published:  March 16, 2017.

Author and / or Article Point of View:  This article is written from the point of view of Taiwan towards PRC claims in the South China Sea (SCS).

Background:  The communist victory during the Chinese Civil War caused the Nationalist government under Chiang Kai-Shek, with 2 million of its supporters, to flee from the Chinese mainland to the island of Taiwan.  The gradual transition of the island to a democratic form of government, its industrialized, capitalist economy, and its reliance on western benefactors for defense established it as a bulwark of western influence in Asia.  As a result of Cold War rivalries and competing ideologies, the independence of Taiwan has been assured in all but name for more than 65 years by the U.S.  A series of crises, most recently in 1996, demonstrated the inability of the PRC to project military force against Taiwan, and the willingness of the U.S. to ensure Taiwan’s independence.  Today, though the PRC is internationally recognized as the government of China, and the “One China” policy is a globally accepted norm, Taiwan still maintains de facto independence.

Events since the onset of the 21st century have caused the balance of power to shift ever more in favor towards the PRC.  Impressive military expansion and diplomatic initiatives on the part of the PRC have emboldened it to challenge U.S. hegemony in Asia, and defy United Nations (UN) mandates.  The most overt of these initiatives has been the PRC’s assertion of sovereignty over the SCS, and the seeming unwillingness of the international community to overtly challenge PRC claims, beyond referring them to legal arbitration.  The emerging policies of the newly elected POTUS may further exacerbate the situation in the SCS, even as they may provide opportunities to assure the continued independence of Taiwan.

Significance:  Taiwan is a democracy, with a dynamic capitalist economy.  It has diplomatic and military ties to the U.S., and other countries, through arms sales and informal partnerships.  It is strategically positioned along major oceanic trade routes from Southwest Asia to Japan and South Korea.  The issue of Taiwanese independence is a global flash point due to PRC adherence to the “One China” policy.  If the U.S. were to abandon Taiwan, it would effectively terminate the notional independence of the island, and end any hopes of preventing the PRC from becoming the regional hegemon.

Option #1:  Taiwan rejects all PRC claims to the SCS, beyond its exclusive economic zone (EEZ), and supports the rulings of the UN Permanent Court of Arbitration, with the goal of gaining international support, especially from the new U.S. administration.

Risk:  The PRC maintains sovereignty over all Chinese affairs.  Such an act would undoubtedly result in a forceful response from the PRC.  The PRC may move militarily to isolate Taiwan and/or attempt to force a change in government through any means necessary.  Depending on the perceived international response, the PRC may resort to war in order to conquer Taiwan.

Gain:  Taiwan must break its diplomatic isolation if it is to survive as an independent state.  This means currying favor with the UN, regional powers such as Japan and South Korea, and other regional nations such as Vietnam and the Philippines.  Moreover, given the new POTUS’ perceived willingness to break from the “One China” policy, there is a chance to induce greater commitment from the U.S. by ensuring Taiwan’s policies match those of the U.S.

Option #2:  Taiwan maintains the status quo and adheres to the “One China” policy, even in the face of tough U.S. rhetoric.

Risk:  If the PRC’s ambitions are not curbed, the status quo will no longer be enough for PRC leaders.  The creation and subsequent defense of artificial islands in the SCS is a relatively low risk activity.  If the response of the international community is found wanting, then it will only embolden the PRC to seek bigger game.  The ultimate conquest of Taiwan, while by no means an easy task, is a logical step in fulfilling the PRC’s regional ambitions.  Conversely, standing with the PRC may infuriate the new POTUS, and result in the withdrawal of U.S. support.

Gain:  The PRC has successfully integrated other economic and governmental systems into its own system before, under the “One Party, Two Systems” policy.  While this led to a loss of political freedom for Macau and Hong Kong, the two former enclaves still maintain their capitalist systems, and enjoy very high standards of living.  Furthermore, Taiwan is culturally and economically closer to the PRC than to any other nation.

Other Comments:  Any conflict between the PRC and Taiwan would be devastating to the island.  The PRC is simply too large and too close.  However, Taiwan has been nominally independent for more than 65 years.  Its people are the descendants of the generations that fought the communists, and stood firm during the Cold War, events that are still in living memory.  Independence from the mainland is the legacy of the island, and is worth fighting for.

Recommendation:  None.


Endnotes:

None.

China (People's Republic of China) Option Papers South China Sea Taiwan The Black Swan

Options for Singapore in the South China Sea

Blake Herzinger served in the United States Navy in Singapore, Japan, Italy, and exotic Jacksonville, Florida.  He is presently employed by Booz Allen Hamilton and assists the U.S. Pacific Fleet in implementation and execution of the Southeast Asia Maritime Security Initiative.  His writing has appeared in Proceedings and The Diplomat.  He can be found on Twitter @BDHerzinger. Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Singapore’s outlook on the South China Sea (SCS) dispute.

Date Originally Written:  January 13, 2017.

Date Originally Published:  March 13, 2017.

Author and / or Article Point of View:  Author believes in freedom of navigation and maintenance of good order at sea in accordance with the customary and written law of the sea.  This article is written from the point of view of Singapore toward the SCS dispute.

Background:  Conflicting territorial claims, as well as opposing interpretations of entitlements provided by the United Nations Convention on the Law of the Sea (UNCLOS), have heightened tensions throughout the SCS.  The maritime order protected by decades of U.S. Navy engagement is being actively challenged by the People’s Republic of China (PRC), which seeks a reorganization of the order without U.S. primacy.  Singapore sits astride the most critical sea-lane in Asia leading into the partially-enclosed SCS, but is not itself a claimant state in the myriad of disputes.  Singapore does have a vested interest in the peaceful and successful rise of its leading trade partner, the PRC, as well as a critical interest in continued deep engagement in the Pacific by its closest defense partner, the U.S.  Although Singapore’s population is nearly 75% ethnic Chinese, the microstate has made every effort to chart an independent, pragmatic course in foreign policy.  However, the PRC has recently increased pressure on Singapore to stay out of the debate on the SCS[1].

Significance:  Freedom of the seas is an “economically existential issue” for Singapore[2].  The rules-based order underpinned by freedom of navigation, and adherence to the UNCLOS, provided decades of economic growth and success in the region, particularly for Singapore.  However, the PRC’s desire to force a reorganization of the maritime order is directly resulting in erosion of accepted international maritime law and the PRC’s resultant conflicts with the U.S. and Association of Southeast Asian Nations (ASEAN) casts a shadow of doubt over the economic future of the region.  For Singapore, the outcome of the SCS dispute(s) may determine its entire economic future.

Option #1:  Singapore continues advocacy for freedom of navigation and pursuit of friendly relations with the U.S. and the PRC, while maintaining a policy of non-alignment.

Risk:  An increasingly powerful PRC constricts the diplomatic space for middle powers trapped between itself and the U.S., as evidenced in the PRC’s behavior toward Singapore over the past year.  The seizure of Singaporean Armed Forces Terrex vehicles in Hong Kong, recent inflammatory language published in China’s Global Times, and ominous warnings by the PRC that smaller states “need not and should not take sides among big countries,” are overt signaling to Singapore to avoid any position contrary to Chinese interests in the SCS[3][4][5].  More plainly, Singapore will suffer consequences if it is seen to side with the U.S.  Despite efforts to balance diplomatically, Singapore’s reliance on freedom of navigation will inevitably lead to confrontation regarding PRC activities in the SCS and, without a Great Power ally, Singapore may be left vulnerable to PRC pressure.

Gain:  In 51 years of statehood Singapore has achieved both the strongest economy in Southeast Asia and the most advanced military.  In this option’s best-case scenario, Singapore would continue to reap the benefits of partnership with both the PRC and the U.S. without either side trying to force the microstate to the sidelines, or into opposition with the other.

Option #2:  Singapore directs support for the PRC’s positions in the SCS.  Singapore could decouple itself from its defense relationship with the U.S. and effectively capitulate to Chinese demands.

Risk:  The opacity of the PRC’s goals for the SCS is the largest risk.  If the PRC succeeds in becoming the dominant power in the area, will freedom of navigation and free trade be protected, or restricted?  Unless Singapore knows the answer to this question, the existential risk posed to Singapore’s future would be catastrophic in scale.  Even if the PRC encourages free trade, by aligning itself with the PRC Singapore stands to lose its reputation for independence, undermining its trusted position as an honest broker and neutral place of business.

Domestic repercussions would be equally damaging.  Singapore’s population may be predominantly Chinese, but it is a multiethnic society with codified policies of racial equality, with the stated ideal that citizens see themselves as Singaporean rather than identifying by their ethic group.  Minority groups would almost certainly interpret a swing toward the PRC as the end of the meticulously guarded Singaporean identity standing as a bulwark against the racial discord that spurred race riots in Singapore’s infancy[6].

As a small, predominantly Chinese state between two large Muslim states historically suspicious of its defense policies, Singapore would also be inviting new friction with Malaysia and Indonesia by appearing to swing toward the PRC.  Furthermore, Singapore would likely lose high-level military training opportunities with the U.S., as well as unilateral training opportunities its forces enjoy on U.S. soil.

Siding with the PRC would significantly degrade the ASEAN structure by departing from the official non-alignment of the organization.  This would be a significant victory for Beijing, which has previously succeeded in driving wedges through ASEAN, but not with a country as vital to the group as Singapore.

Gain:  In the short-term, the PRC would likely reward Singapore for its obedience, possibly in the form of cessation of public castigation, as well as increased economic cooperation.  Should the PRC’s goals include regulation and control of the SCS, Singapore might find itself a beneficiary of PRC largesse as a state that did not block its ambitions.

Option #3:  Singapore begins actively participating in freedom of navigation operations, either unilaterally or multilaterally.

Risk:  Option #3 is the most likely to elicit retaliatory measures from the PRC, where the government would almost certainly interpret the action as siding with the U.S..

Gain:  Option #3 would first and foremost provide reinforcement to the freedom of navigation upon which Singapore itself depends.  Additionally, it could serve to combat the Chinese narrative of U.S. containment, instead highlighting the fact that the PRC’s unilateral actions have taken place “against the rights and freedoms of the international community [7].”

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  United States Central Intelligence Agency (2017). The World Factbook – Singapore. Retrieved 15 January, 2017, from https://www.cia.gov/library/publications/the-world-factbook/ geos/sn.html

[2]  Sim, W. (2015, March 5). Freedom of navigation vital to S’pore. The Straits Times. Retrieved from http://www.straitstimes.com/singapore/freedom-of-navigation-key-to-spore-shanmugam

[3]  Ping, C.K. (2016, November 25). China comments on Singapore armored vehicles. The Straits Times. Retrieved from http://www.thejakartapost.com/seasia/ 2016/11/25/ china-comments-on-singapore-armored-vehicles-and-equipment-seized.html

[4]  Loh, S. (2016). Full Text of Ambassador Stanley Loh’s Letter to Global Times Editor-In-Chief Hu Xijin, in response to an article by Global Times (Chinese) dated 21 September 2016. Retrieved from Singapore Ministry of Foreign Affairs website: https://www.mfa.gov.sg/content/mfa/media_centre/press_room/ pr/2016/ 201609/full-text-of-ambassador-stanley-loh-s-letter-to-global-times-edi.html

[5]  The State Council Information Office of the People’s Republic of China. (2017). China’s Policies on Asia-Pacific Security Cooperation. Retrieved from http://news.xinhuanet.com/english/china/2017-01/11/c_135973695.htm

[6]  Han, J (n.d.). Communal riots of 1964. In Singapore Infopedia. Retrieved from http://eresources.nlb.gov.sg/infopedia/articles/SIP_45_2005-01-06.html

[7]  The Struggle for Law in the South China Sea: Hearings before the Seapower and Projection Subcommittee on Seapower and Projection Forces, House of Representatives, 114th Cong. 11 (2016) (Testimony of James Kraska).

Blake Herzinger China (People's Republic of China) Maritime Option Papers Singapore South China Sea

Anti-Access / Area Denial Options in the South China Sea

Ryan Kort is a Strategic Plans and Policy Officer (Functional Area 59) in the U.S. Army.  He currently serves as the Chief of the Strategy Branch at U.S. Army Africa / Southern European Task Force in Vicenza Italy.  He is on Twitter @kort_ryan36.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The People’s Republic of China (PRC) creation of islands and militarization of reclaimed islands in the South China Sea (SCS).

Date Originally Written:  February 9, 2017.

Date Originally Published:  March 9, 2017.

Author and / or Article Point of View:   This article, written from the point of view of a U.S. national security staffer, aims to provide both a collective security and an Anti-Access / Area Denial (A2/AD) deterrent option to the U.S. National Security Advisor.

Background:   The PRC adopted a policy of island building over shallow shoals in the SCS.  The PRC forcibly evicted and continues to harass commercial and naval vessels from other SCS claimants such as the Philippines, Vietnam, and Malaysia through use of fisherman ‘militias’ as naval proxies and other means of gray-zone or ‘hybrid’ warfare[1].  The PRC continues the rapid transformation of many of these semi-submerged reefs into islands replete with hard surface runways for strike aircraft and long-range air defense and fires (both tube and missile) capabilities, which pose an A2/AD threat to any actors the PRC may seek to keep out of its claimed ‘9 dash line’ area[2].  

Significance:  Other nations that border the SCS view the PRC’s actions as destabilizing, illegitimate, and threatening to their important national security and economic interests.  Several reclaimed islands are within the Exclusive Economic Zones recognized by the United Nations Convention on the Law of the Seas[3].  The SCS is a critical economic transit route, which approximately 30 percent of all annual maritime trade passes through, including $1.2 Trillion worth of goods destined for U.S. markets[4].  In times of crisis, the People’s Liberation Army, Navy and Airforce could disrupt the free movement of commerce through the area and coerce other nations in the region to recognize PRC dominion over the SCS.

Option #1:  Utilize diplomatic efforts to contain the PRC through the creation of a collective security organization, similar to the now defunct Southeast Asian Treaty Organization also known as SEATO.  This treaty organization would provide a deterrent option aimed at containing PRC adventurism and change PRC strategic calculation on future island building.  

Risk:  The PRC will view this diplomatic effort to isolate their nation as overt containment and respond in a variety of ways with multiple means[5].  At the greatest risk will be those nations the PRC deems vulnerable to coercion that it could peel away from the organization and undermine U.S. legitimacy.  Additionally, this option risks immediate failure if those partners critical to the success of the collective security organization do not join- specifically Australia, the Philippines, Singapore, and Indonesia.  This option also may become obsolete if the PRC completes the construction and garrisoning of the islands it needs to assert complete dominance over the SCS before an alliance to balance against it is in place[6].  

Gain:  The U.S. checks the rise of a regional and potential global peer competitor.  The U.S. stands to gain increased security cooperation and economic ties with the nations in the collective security organization.   

Option #2:  Utilizing a multi-domain concept, the U.S. and select allies create an A2AD challenge for the PRC along both the ‘first’ and ‘second’ island chains in order to negate some of the operational and tactical advantages of PRC bases in the region.  The entire coastline of the PRC is vulnerable to area denial.  A strong foundation of U.S. Army maneuver, fires, and sustainment capabilities would enable the U.S. Navy and U.S. Air Force to operate more effectively within the region, while presenting the additional dilemma of embarked U.S. Marine Expeditionary Forces capable of striking critical facilities.  An archipelagic defense through deterrence by denial would need expanded access to existing bases in Japan, with new footprints in the Philippines, Malaysia and Indonesia[7].  The U.S. could employ a mixture of permanent or rotational forces in the region to demonstrate U.S. capability and resolve.  Additionally, the U.S. must have sufficient forces in the region capable of blockading PRC transit through the Strait of Malacca if required.

Risk:  The key risk associated with this option is vertical and horizontal escalation.  A minor incident could intensify quickly and impact other theaters in the U.S. Pacific Command area of responsibility, such as Korea.  Another risk is loss of or initial refusal to allow access to bases in the nations mentioned earlier, which would unhinge this option.  Additionally, resourcing this A2/AD effort with sufficient forces would commit limited U.S. resources, such as air defense and long-range joint fires, to this single problem set.

Gain:  The U.S. deters conflict through placing PRC assets at risk in both the SCS and across the majority of the Chinese seaboard.  Additionally, this option presents the PRC with a dilemma if it should attempt to utilize hybrid or militia forces due to the increased presence of U.S. and allied forces capable of deterring such ‘hybrid’ aggression at the tactical and operational level.     

Comments:  None.

Recommendation:  None.  


Endnotes:

[1]  De Luce, Dan and McLeary, Paul, In South China Sea, a Tougher U.S. Stance, Foreign Policy, 02 October, 2015, accessed 09 February, 2017  http://foreignpolicy.com/2015/10/02/in-south-china-sea-a-tougher-u-s-stance/

[2]   Kennedy, Connor and Erickson, Andrew, (21 April 2016). Model Maritime Militia- Tanmen’s leading role in the Scarborough Shoal Incident,  Center for International Maritime Security (CIMSEC), accessed 06 January, 2017, http://www.andrewerickson.com/2016/04/model-maritime-militia-tanmens-leading-role-in-the-april-2012-scarborough-shoal-incident/

[3]  Office of the Secretary of Defense, Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China, 2016;  page 7

[4]  Corr, Anders, How the US can help the Philippines Counter China’s occupation of Mischief Reef, Forbes Magazine Online, 28 January 2017, accessed 09 February 2017. http://www.forbes.com/sites/anderscorr/2017/01/28/is-war-against-china-justified/#5066ccc774fb

[5]  Lieberthal, Kenneth and Jisi, Wang, Addressing U.S- China Strategic Distrust, March 2012, Brookings Institute.  Washington’s security ties with other nations in the region and other actions viewed by China as efforts to constrain China.

[6]  Office of the Secretary of Defense, Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China, 2016;  Page i

[7]  Krepinevich, Andrew, Foreign Affairs, Volume 94, Number 2,  How to Deter China- The Case for Archipelagic Defense, pp 78-86, March/April 2015  

A2AD (Anti Access and Area Denial) Allies & Partners China (People's Republic of China) Deterrence Option Papers Ryan Kort South China Sea United States

South China Sea: Continuous U.S. Presence or a new Law of the Sea Treaty 

David Mattingly serves on the board of directors for the Naval Intelligence Professionals and is also a member of the Military Writers Guild.  The views reflected are his own and do not represents the United States Government of any of its agencies.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United Nations Convention for the Law of Sea (UNCLOS III) has failed to adequately define a nation’s territorial waters and to create a body which can enforce its judgements on nations involved in arbitration.

Date Originally Written:  February 7, 2017.

Date Originally Published:  March 6, 2017.

Author and / or Article Point of View:  David Mattingly is retired from the U.S. Navy and has sailed with U.S. Navy Carrier Task Groups in the South China Sea (SCS).  He holds a Masters of Arts in National Security Studies where he studied the geopolitics of the SCS and authored “The South China Sea Geopolitics: Controversy and Confrontation.”

Background:  Over the centuries, a few countries with strong navies controlled the world’s oceans.  The outcome of many conflicts fought on land often had a strong maritime element.  Dutch jurist Hugo Grotius first addressed the Law of Sea in his 1609 treatise Mare Liberum in which he established the idea of the freedom of the seas[1].  After  World War II and the emergence of the United Nations, the first Convention of the Law of the Sea (UNCLOS) concluded with four treaties being signed: Convention on the Territorial Sea and the Contiguous Zone (CTS); Convention on the High Seas (CHS); Convention on Fishing and Conservation of the Living Resources of the High Seas (CFCLR); and Convention on the Continental Shelf (CCS); as well as the Optional Protocol of Signature concerning the Compulsory Settlement of Disputes (OPSD)[2].  UNCLOS II convened in Malta to discuss territorial seas and fishery limits, however, the convention ended without agreeing upon a new treaty[3].  Today, UNCLOS III has been accepted by 167 nations and the European Union, however, although the U.S. has agreed in principle to the convention, it has not been ratified by the U.S.[4].  In the last attempt for ratification in 2012, it failed due to the “breadth and ambiguity” of the treaty and because it was not in the “national interest of the United States” to give sovereignty to an international body.  Ratification was overwhelmingly supported by the Department of Defense and the U.S. shipping industry[5][6].

Traditionally, a nation’s territorial boundary was established as a three-mile belt along its coastline based on the distance that a cannon could shoot a projectile.  All waters beyond the three-mile limit were considered international territory.

Today, the SCS is a possible flash point for confrontation over unresolved issues of the UNCLOS III between the Peoples Republic of China (PRC), its neighboring states which have joined to form the Association of Southeast Asian Nations (ASEAN), and the U.S.  The islands in the SCS remained largely uninhabited until the mid-1970s when the PRC began to lay claim to a number islands and shoals which were claimed during the reign of Emperor Yongle of the Ming Dynasty in 1405 and later claimed by the PRC in what has come to be known as the “Nine-dash line[7].”  A map which was produced after World War II extended the PRC’s territorial waters claim deep into the SCS.  France challenged the PRC’s claim in 1931 by claiming the Parcel Islands and the Spratley Islands as territory of French-Indo China which then passed to the government of Vietnam after the Franco-Indo China War ended in 1954[8].

To understand UNCLOS III, it is important to first understand the definitions of terms such as the differences between an island and a rock.  The PRC began an aggressive land reclamation program where soil was dredged from the ocean bottom to create islands, which have standing under UNCLOS III, unlike rocks and shoals which are not recognized.  The islands created by the PRC can support military garrisons, home porting of both military and fishing ships, and extend the PRC’s territorial limits under the “archipelagos concept[9].”  Within UNCLOS III, this concept furthers a nation’s territorial rights by considering the seas between the mainland and the islands claimed by a nation as a connecting, rather than separating, element.  The PRC could therefore declare an emergency and suspend the “right of innocent passage” for its self-protection.

Significance:  Merchant shipping between Asia, the Middle East, and the Americas transverse the SCS and a PRC declaration of emergency which suspended the “right of innocent passage” would have major impact in global shipping.

Option #1:  The U.S. and coalition naval forces create a continuous presence in the SCS and actively challenge PRC naval activities and construction of and on islands and rocks in dispute.

Risk:  The PRC has openly harassed and attacked ships and aircraft of the U.S. and ASEAN member nations.  The PRC has established the SCS as its home waters and had several years to construct military garrisons on the islands which it created.  It is possible that the Peoples Liberation Army Navy (PLAN) has placed surface to air missiles on the larger islands.  Additionally, the PLAN has aggressively modernized its ships and aircraft to include launching its first aircraft carrier.  As such, Option #1 may increase the possibility of a naval confrontation between the U.S. and the PRC.

Gain:  A naval coalition could provide protection for fishing and merchant shipping in the SCS and shape the narrative that the international community will not idly allow the PRC to control one of the most important sea lines of commerce.

Option #2   The U.S. and other nations could call for UNCLOS IV.  As evidenced by recent events in the SCS, UNCLOS III left many gray areas that are open for arbitration and the decisions lack the power of enforcement.  UNCLOS IV would address these gray areas and establish an enforcement framework.

Risk:  Major powers agreeing to a new UNCLOS could perceive that they have lost sovereign rights.  The UN lacks the ability to enforce treaties unless the major powers are onboard thus the text of a new UNCLOS would have to be carefully worded.

Gain:  In creating an agreement that is recognized by the international community, confrontation between the U.S., the PRC, and ASEAN may be avoided.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Harrison, James. July 5, 2007. Evolution of the law of the sea: developments in law -making in the wake of the 1982 Law of the Sea Convention.

[2]  Treves, Tullio. 1958 Geneva Conventions on the Law of the Sea. United Nations.  http://legal.un.org/avl/ha/gclos/gclos.html

[3]  Second United Nations Convention on the Law of the Sea 17 March – 26 April 1960 Geneva, Switzerland. , January 8, 2017. Washington School of Law, American University. http://wcl.american.libguides.com/c.php?

[4]  The Convention of the Law of Sea. U.S. Navy Judge Advocate Corps. http://www.jag.navy.mil/organization/code_10_law_of_the_sea.htm

[5]  Patrick, Stewart M, June 10, 2012. (Almost) Everyone Agrees: The U.S. Should Ratify the Law of the Sea Treaty. The Atlantic. https://www.theatlantic.com/international/archive/2012/06/-almost-everyone-agrees-the-us-should-ratify-the-law-of-the-sea-treaty/258301/

[6]  Senators Portman and Ayotte Sink Law of the Sea. July 16, 2012. Portman Senate Office, Washington, DC.

[7]  Tsirbas, Marina. , June 2, 2016. What Does the Nine-Dash Line Actually Mean? The Diplomat. http://thediplomat.com/2016/06/what-does-the-nine-dash-line-actually-mean/

[8]  Bautista, Lowell B. 2011.  Philippine Territorial Boundaries: Internal tensions, colonial baggage, ambivalent conformity.  University of Wollongong. New South Wales, http://jati-dseas.um.edu.my/filebank/published_article/3162/035 053%20Lowell%20B.%20Bautista-
 Philippine%20Territorial,%20JATI%20VOL16,%202011-%20new.pdf

[9]  Katchen, Martin H. 1976. The Spratly Islands and the Law of the Sea: “Dangerous ground” for Asian Peace. Presented at the Association of Asian Studies, Pacific Area Conference.  June.  Revised and published in the Asian Survey. 

China (People's Republic of China) David Mattingly Maritime Option Papers South China Sea Treaties and Agreements United States

Options to Arm Volunteer Territorial Defense Battalions in Ukraine

Daniel Urchick is a defense and foreign policy analyst and a Young Professionals in Foreign Policy East Europe and Eurasia Fellow.  Daniel tweets at @DanielUrchick.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Ukrainian-Separatist conflict in the Donbas.

Date Originally Written:  February 20, 2017.

Date Originally Published:  March 2, 2017.

Author and / or Article Point of View:  This article is written from the perspective of a Ukrainian National Security Advisor, offering options on the possible utilization of the pro-Ukrainian government territorial defense battalions, supplementing the regular military and Ukrainian Government’s efforts to either defeat the separatists in the Donbas region, or create a more favorable situation on the ground for the next round of peace talks.

Background:  The Ukrainian military appears to have begun what has been characterized as a “creeping offensive [1]” to the north of Donetsk City in the Donetsk People’s Republic (DNR).  Ukrainian Military forces have made limited advances into the neutral space between government and separatist-controlled territory, known as the “gray zone,” to capture several contested villages such as Novoluhanske north of the city of Horvlika.  It is estimated that about 5,000 Russian troops remain in the Donbas in various capacities along with about 40,000 pro-Russian separatists.  The Ukrainian Military has an estimated 60,000 soldiers along the line of contact with an additional unofficial estimate of 10,000-11,000 “territorial defense battalion” personnel along the front and dispersed around the country.  There are currently 40 territorial defense battalions operating in Ukraine today[2].

Most of the territorial defense battalions were formed by wealthy business oligarchs who provide the majority of the funding and limited supplies.  As a result, most men in any given battalion are likely more loyal to the oligarch that formed the organization than to the State.  Most battalions are integrated into the Ukrainian Military to some degree.  Some remain completely outside the official Ukrainian Military structure.  Still others are in the process of being more fully integrated into the Ukrainian Military structure.  Non-integrated defense battalions do not receive sufficient materiel and logistical support from the military thus they cannot adequately defend against or attack the heavily armed separatists.  Integrated battalions fair little better in their armament and have been provided second tier light armor assets.

Significance:  The arming of territorial defense battalions is an important question aimed at winning the conflict with the Separatists in the Donbas, or at the least, producing a more favorable situation on the ground in future peace negotiations.  The battalions are an important source of manpower with high morale that could be better utilized.  Providing better equipment to the battalions could radically impact the domestic political situation in the Ukraine.  Thus, the right answer to the question of arming the battalions is important to both the defense and political communities in Ukraine, but also to every Western nation supporting Ukraine.

Option #1:  Supply territorial defense battalions full access to the Ukrainian Military’s arsenal of modern heavy armored equipment and other advanced weapon systems.

Risk:  Territorial defense battalions may still not fully submit to the authority of the Ukrainian Military and remain more loyal to their oligarch founders, increasing warlordism.  Battalions with low discipline may also choose to upgrade their equipment in an unauthorized manner, endangering their safety and the safety of friendly forces around them.  The obligation to maintain, fund, and supply armored assets fall on the Ukrainian State which has faced budget constraints since the September 2015 sovereign debt restructuring deal.  Providing territorial defense battalions with heavy armor assets could give Russia, the DNR and LNR pretext for an overt arms race and security dilemma, leading to a breakdown in the relative stability of the Minsk II Agreement.

Gain:  If used in a defensive capacity, the fully equipped territorial defense battalions could become a highly capable reinforcement to the normal line of contact against any possible separatist (counter)offensives, raising the level of deterrence.  As a credible deterrent force, the battalions will allow the military to mass its regular forces for local superiority should it choose to go on a larger offensive.  Supplying the battalions with better equipment is a popular political move.  Option #1 would reinforce the coalition government of President Poroshenko, which has right-wing elements, who have been the most supportive of past armament plans.  Territorial defense battalions are incentivized to remain operating within the Ukrainian military force structure and supporting the government that has now adequately supported them.  Equipment interoperability is maintained throughout Ukrainian forces operating along the line of contact, easing logistical problems that have plagued the military.

Option #2:  Continue to restrict the supply of modern heavy armor assets and other advanced vehicle systems to the territorial defense battalions.

Risk:  The territorial defense battalions, as an important pool of military manpower that can be utilized along the line of contact for both defensive and offensive operations, is deprived of equipment that would be critical to their survival in such operations.  The Poroshenko Government risks increased public dissent by going against public support for arming these battalions.  President Poroshenko also risks further splintering his coalition and pushing the right-wing elements of parliament further away from cooperation.  The battalions will not have an important incentive to remain operating within an official force structure, as their perception of being cannon fodder grows.

Gain:  Right-wing affiliated territorial defense battalions, or battalions with particularly strong loyalty to an oligarch who could be potentially hostile to the Poroshenko regime in the future, are denied heavy weaponry.  Battalions that have low morale, or are facing discipline or disbandment, will not be able to defect to the Separatist-controlled territory with important heavy weapon stocks.  The Ukrainian government does not have to provide funding and supplies for an expensive military equipment program during a time of fiscal constraint.  The restriction helps prevent the flow of weapons onto the black market from these battalions low on funds, morale or discipline.  The DNR and LNR, as well as Russia, are not given a pretext for breaking off the Minsk Agreements entirely or for launching a preemptive offensive.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Webb, Isaac. (2017, January 26). “Ukrainian forces creep into war’s gray zone,” KyivPost, retrieved from: http://www.pressreader.com/ukraine/kyiv-post/20170127/281500750970900

[2]  Pejic, Igor. (2016, October 05). “Kiev’s Volunteer Battalions in the Donbass Conflict,” South Front, retrieved from: https://southfront.org/kievs-volunteer-battalions-in-the-donbass-conflict/

Daniel Urchick Irregular Forces Option Papers Russia Ukraine

Government of Iraq Options for Islamic State Detainees

Loren Schofield is a retired U.S. Army Special Forces Non-Commissioned Officer with 16+ years’ experience in Special Operations and Unconventional Warfare.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  With the renewed offensive against the Islamic State (IS) by the Government of Iraq (GoI), what should be done with captured IS fighters and how can the GoI prevent future incursions?

Date Originally Written:  February 20, 2017.

Date Originally Published:  February 27, 2017.

Author and / or Article Point of View:  This article is written from the point of view of the GoI as they consider what to do with captured IS fighters.

Background:  Mosul is the last major stronghold in Iraq for IS.  This past week the GoI launched an offensive to take back the western side of Mosul which will prove to be much tougher than retaking the eastern half of the city.  Non-Governmental Organizations (NGO) warn that there could be up to 650,000 civilians trapped in territory still controlled by IS[1].  The offensive started just as graphic videos appeared on social media showing men in Iraqi Security Force (ISF) uniforms beating and killing unarmed people on the streets of Mosul[2].

Significance:  The manner in which the ISF treats captured IS fighters, as well as civilian non-combatants, will have long-term effects for the GoI.  How IS fighters and civilian non-combatants are handled post-capture will affect the rebuilding of Iraq, the GoI’s reputation within the international community, and will be watched by the GoI’s enemies.

Option #1:  The GoI and ISF treat all captured IS fighters and civilian non-combatants in accordance with the Geneva Convention and other applicable laws related to human rights and armed conflict.

Risk:  Option #1 will force the GoI and ISF leadership to take a firm hand with their personnel who are caught violating the Geneva Convention and other applicable laws related to human rights and armed conflict.  Option #1 forces the GoI to take a very unpopular position (unpopular with Iraq’s own people as well as the ISF) which could risk GoI political positions during the next elections.  Punishment of ISF who mistreat captured IS fighters and civilian non-combatants could even cause some of the ISF to mutiny thus splitting the force when cohesion is needed.

Gain:  By adhering to the Geneva Convention and other applicable laws related to human rights and armed conflict it puts the GoI and ISF on the moral high ground and shows the world that even in this difficult situation, the GoI and ISF place a priority on human rights and international law.  This will encourage NGO’s and other organizations that provide aid to come in and help the Iraqis rebuild their country.  Option #1 prevents members of the coalition from potentially removing their forces at the time the ISF is most in need should ISF mistreatment of captured IS fighters become publicly known and politically sensitive.  Option #1 will set a precedent and show the Iraqi people who were stuck in territory controlled by IS that they will be treated humanely once freed.

Option #2:  The Supreme Court of Iraq classifies IS as an invading force, tries every IS member on Iraqi soil in absentia, finds them guilty of crimes against humanity or a similar charge, and sentences them to death.  The GoI announces this verdict through all manner of media, to include leaflet drops over IS territory.  The GoI makes it clear that IS fighters will not be captured.  In essence, the GoI uses IS propaganda videos and the understanding of how IS trains and brainwashes their own fighters against them.

Risk:  With IS fighters knowing that surrender is not an option they will dig in and fight harder.  Even though there are many IS fighters who already plan to do this, there will always be a percentage that might potentially surrender.  With Option #2’s declaration those IS fighters who would surrender has been turned to zero.  The fighting will now be more dangerous and more brutal and cause more ISF fatalities.  The fighting will take longer, cause more civilian casualties, and cause worse damage to existing infrastructure.

Gain:  Option #2’s psychological element is as important as the actual military operation to destroy IS.  This psychological element will weaken IS by using the same type of fear that they are known for against them.  If a route to Syria is left open, some IS fighters may attempt to flee instead of face certain death (probably the same percentage of fighters will consider this as would consider surrendering).  Option #2 will also prevent long-term and expensive trials where detainee status (combatant, prisoner of war, criminal, insurgent etc.) may be used by lawyers to delay or extend trials.  The strategy of not capturing IS fighters as they are considered an invading force by the Supreme Court of Iraq will send a message to unfriendly State or non-state actors and may act as a deterrent.  If Option #2’s death sentence is only used on actual IS fighters, and not against the civilian non-combatants who were forced to support IS, the military and political leadership will likely see mass approval from Iraqi citizens.

Other Comments:  While the legalities of the Supreme Court of Iraq trying every IS fighter in absentia may be questionable, it allows coalition forces who want to support the GoI to continue in their support.  It may be a gray area, but sometimes gray is good enough.

Recommendation:  None.


Endnotes:

[1]  Graham-Harrison, Emma, Fazel Hawramy, and Matthew Taylor. “Iraq Launches West Mosul Offensive as Torture Videos Emerge.” The Guardian, February 19, 2017. http://www.theguardian.com/world/2017/feb/19/torture-videos-cast-shadow-over-iraqi-forces-west-mosul-offensive

[2]  Graham-Harrison, Emma. “Iraqi PM Announces West Mosul Attack as Images of Security Forces’ Brutality Emerge.” The Guardian, February 19, 2017. http://www.theguardian.com/world/2017/feb/19/violent-videos-threaten-iraqi-campaign-mosul.

Detention Iraq Islamic State Variants Loren Schofield Option Papers Psychological Factors

Options for Mexico with the Trump Administration

Vincent Dueñas is a recent graduate of the Johns Hopkins School of Advanced International Studies, a U.S. Army Major, and an Associate Member of the Military Writers Guild.  This Mexico vignette was first written to fulfill a requirement in his degree program.  The views reflected are his own and do not represent the opinion of the United States Government or any of its agencies.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Mexican President Enrique Peña Nieto faces a potentially combative relationship with the United States (U.S.), anemic economic growth, and increasing security concerns from Transnational Criminal Organizations (TCOs).

Date Originally Written:  December 21, 2016.

Date Originally Published:  February 9, 2017.

Author and / or Article Point of View:  This article is written from the perspective of the National Security Advisor for Mexican President Peña Nieto, who is offering options for Mexico, in light of incomplete domestic reforms and emergent challenges from the U.S.

Background:  President Peña Nieto’s “Pacto por México” was an agreement aimed at unifying the country’s three major parties in strengthening the Mexican state, improving political and economic democratization, and expanding social rights.  This agreement resulted in the successful enactment of constitutional reforms, but implementation has stalled due to opposition and unfavorable global conditions[1][2].  President Peña Nieto won the presidency as a member of the historically powerful, centrist Institutional Revolutionary Party (PRI).  His election revived the PRI’s control after a 12-year tenure under the right of center National Action Party (PAN).  The PAN and the left of center Party of the Democratic Revolution (PRD) have recently undermined the implementation of the President’s reforms for their own political gain prior to the 2018 election.

Significance:  Current U.S. overtures calling for the funding of a border wall by Mexico and the renegotiation of the North American Free Trade Agreement (NAFTA) pose a significant challenge to Mexico’s economic and national security dynamics.  This dramatic shift in relationship with the U.S., Mexico’s largest trading partner, may detrimentally impact Mexico and create a dangerous security issue.  Although we have a large capable military, our forces are committed to fighting TCOs and we are not prepared to engage in a direct conflict with the U.S.  As a nation, Mexico has actively sought to participate fully in the global liberal world order and a failure to counterbalance U.S. overtures threatens to destabilize our economy and amplify the worsening TCO problem.

Option #1:  Continue the “Pacto por México” and engage in limited unilateral diplomatic confrontation with the U.S.

Risk:  The risk in continuing the “Pacto por México” rests mainly in the inability for the country to implement these reforms at this critical juncture.  President Peña Nieto’s legacy will be incomplete as the PAN and PRD sabotage the progress on reforms in order to gain political advantage.  In responding reactively to the U.S., President Peña Nieto risks being seen as weak and our government will continue to lose legitimacy.  Progress in combating TCOs will continue to fall short as necessary judicial reforms will fail to materialize.

Gain:  The greatest gain from this approach would be the preservation of the status quo, drawing the least ire from the U.S.  It would minimize potential economic blowback and allow maximum possibility for favorable concessions from the U.S. during any renegotiation over NAFTA.  Additionally, it provides the most assured means of avoiding repercussions against vital security cooperation and assistance funding and collaboration with the U.S. military and its security agencies.

Option #2:  Get out in front of the U.S.’ overtures and reframe the challenge of the U.S. through a new PRI-led domestic campaign of “Dialogues” that would represent the next phase of “Pacto por Mexico” and reinvigorate public support for the reforms.  Acknowledging that the “Pacto” has faced difficulties, Mexican society can be rallied together by the PRI through a communications campaign that frames Mexico as a parent-like figure to the U.S., who is suffering from drugs and self-destructive behavior.  This campaign can connect directly with Mexican citizens’ familial inclinations through a perspective that describes a parent who is caring for a fellow family member with understanding.  Simultaneously, a provisional dialogue with TCOs should be initiated to seek a reduction in violence on the basis of pride and the threat that U.S. actions pose to Mexican society writ large.  Lastly, we should initiate and lead a multilateral hemispheric effort to economically and diplomatically counterbalance the U.S. by reinvigorating the concept of the Free Trade Agreement for the Americas.

Risk:  The risks are many, but the dialogue with TCOs poses the greatest risk, as the perception of government collusion with criminals could become a scandal that could undo the party.  The suspension of remittances and security cooperation and assistance funding, such as the Mérida Initiative, would be extremely costly.  This approach would also signal a clear departure from a collaborative approach with the U.S. and commit Mexico to dependency exclusively on other markets, such as China and the countries in Latin America, which historically have not looked favorably towards Mexico.

Gain:  This would increase Mexico’s leverage against the U.S. by spearheading a hemispheric economic block.  A deliberate campaign of domestic and international action could consolidate the PRI’s authority within the country as the leader that will protect Mexican citizens from hostile U.S. intentions and lead a hemispheric coalition to confront discordant U.S. policies.  Riding the hopefulness of the Colombian peace process, a successful truce with TCOs could bring about an era of peace and stability that would allow judicial reforms to be implemented, which could eventually tackle corruption.  President Peña Nieto can garner attention, legitimacy, and credibility by speaking objectively and unemotionally as a counterbalance to the U.S. approach.  This could also pay out in dividends as other regions of the world may begin to look to Mexico as a primary partner in the hemisphere.

Other Comments:  The U.S.’ redefinition of its role as guarantor of the international post-World War 2 order provides the opportunity for other states to become more authoritative in international affairs.  China, for example, has begun challenging the U.S.’ will to engage in a military confrontation in the South China Sea.  Brazil, Canada, Colombia and Mexico are the hemisphere’s most sizeable economic and military powers after the U.S.  Brazil is experiencing political upheaval and is incapable of significant international action.  Canada is too close of an ally to the U.S. and most likely would be unwilling to challenge them directly.  Colombia is undergoing a peace process and is also a major ally of the U.S., which reduces their willingness to challenge the U.S. directly.  Mexico therefore stands as the only country with the ability and freedom to assert itself against the U.S. in the hemisphere.

Recommendation:  None.


Endnotes:

[1]  Sada, Andres. “Explainer: What is the Pacto por Mexico?” Americas Society/Council of the Americas. March 11,2013. Retrieved January 26, 2017, from http://www.as-coa.org/articles/explainer-what-pacto-por-méxico.

[2]  U.S. Congressional Research Service. Mexico: Background and U.S. Relations (CRS-2016-FDT-0759; December 5, 2016), by Clare Ribando Seelke. Text in ProQuest Congressional Research Digital Collection. Retrieved January 26, 2017.

Mexico Option Papers Vincent Dueñas

U.S. Options for Israel: Accept or Reject Settlement Activities

Brian Christopher Darling has served in the United States Army in Iraq, Afghanistan, and Qatar.  He has master’s degrees in Liberal Studies and Public Service Leadership from Rutgers University and Thomas Edison State University, respectively.  Mr. Darling is presently employed at Joint Force Headquarters, New Jersey National Guard.  He can be found on twitter @briancdarling and has written for NCO Journal.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United Nations (UN) Security Council adopted Resolution 2334 on December 23rd, 2016.  In addition to demanding the Palestinian leadership take steps to end violence, this resolution called for an end to the Israeli settlements in the West Bank and Gaza.

Date Originally Written:  January 26, 2017.

Date Originally Published:  February 6, 2017.

Author and / or Article Point of View:  Author is a member of the U.S. military.  Author believes that U.S. involvement in Israeli politics should be limited.  The U.S. and Israel have traditionally enjoyed a strong, informal alliance.  Despite the ongoing friction between the Jewish State and its Arab neighbors and the UN, there is no benefit to the U.S. to inject itself into the situation.  The author’s MA studies focused on war and politics in the Middle East and Asia and the importance of intergovernmental networking to maintain the current global balance of power.

Background:  On December 23, 2016, the UN adopted Security Council Resolution 2334.  The adoption of this resolution, and the abstention from the vote by the U.S., involves a number of operational environment variables, to include regional and global relationships, economics, information, technology, and military capabilities.

Significance:  The abstention by the U.S. during the vote broke with long-standing policy regarding support for Israel, but was in keeping with the Obama administration’s actions towards the Jewish State.  Under Prime Minister Netanyahu, Israeli politics have moved further to the right, making a two-state solution less feasible.

Option #1:  The incoming administration could reaffirm U.S. support for Israel, continuing to disregard the settlement activities that led to the adoption of the resolution.

Risk:  By continuing to accept Israeli settlement of occupied territory, the U.S. would further alienate itself from the international community, returning to the unilateral international relations policies of the Bush administration.  Option #1 would have an adverse effect on U.S. attempts at coalition building to pursue its interests in the Middle East.  The U.S. needs the support of the international community and of intergovernmental organizations like the UN, the International Monetary Fund, and the World Bank in order to facilitate the resolution of ongoing conflicts in Afghanistan and in the Middle East.

Gain:  Under Option #1, the U.S. would, in Israel, maintain an ally in the Middle East, and demonstrate strength in the face of its adversaries.  The informal U.S.-Israeli alliance is beneficial to the U.S., as Israel is considered the only democracy in the Middle East, and economic ties between the two states run deep.  After reaffirming U.S. support for Israel, the U.S. could use this reaffirmation as leverage with Israel to request further assistance in the resolution of other conflicts in the Middle East, to include those ongoing in Syria and Iraq.

Option #2:  The U.S. accepts UN Security Council Resolution 2334, affirming that Israel has no legal basis for its ongoing settlement activity.

Risk:  The U.S. risks losing Israeli support, in the Jewish State and domestically.  Further, the abstention of the U.S. from the 2334 vote and the continued unfavorable treatment of Israel by the UN threaten to further delegitimize the UN in the eyes of the American people.

Gain:  Accepting UN 2334 without any further activity would demonstrate the U.S.’ commitment to operating as an integral part of the liberal international system.  Having abstained from the vote, the U.S. appears to support the UN.  However, in the eyes of U.S. citizens, the vote itself further discredited the UN and garnered public support for the Jewish State.  Further, regardless of UN involvement, the economic relationship between the U.S. and Israel would likely continue, regardless of the U.S. stance on the resolution.  If the U.S. does nothing, maintaining the policy of noninvolvement or abstention, Israel will remain strong, and will continue to maintain a military hedge against Iran and its proxies.

Other Comments:  Israel continues to deal with unfavorable perceptions in the UN due to its settlement activity, and with periodic harassment from a rogue’s gallery of terrorist organizations.  The only real threat to Israel comes not from Palestine, but from Iran and its proxies.  The military capability of the Jewish state keeps the Iranians at bay, and it is widely assumed that Israel has its own nuclear deterrent capability.  If the U.S. does nothing regarding the UN resolution, Israel will remain strong, and will continue to maintain a military edge against Iran and its proxies.

Although the U.S. was the first nation to recognize the Jewish State, Israel no longer needs the U.S. in order to support its activities.  The U.S. abstention from the Security Council vote demonstrates U.S. commitment to the liberal international order and to the rule of law as Israeli settlement activity is founded on claims of legitimacy that are dubious at best.  At the bottom line, the ultimate interest of the U.S. and of Israel is not the continued legitimacy of the UN, but the continued existence of their respective sovereignty, in the current climate of global politics, the U.S. and Israel will remain relevant long after the UN.

Recommendation:  None.


Endnotes:

None.

Brian Christopher Darling Israel Option Pape