Assessing the Impact of the Red Sea Crisis on the Rules Based International Order: Implications for the Indo-Pacific

Dr Estelle Denton-Townshend is a teaching fellow at the University of Waikato.  She holds a Masters and PhD in international politics and security, focusing on the Middle East.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Impact of the Red Sea Crisis on the Rules Based International Order: Implications for the Indo-Pacific

Date Originally Written:  April 1, 2024.

Date Originally Published:  April 22, 2024.

Article and / or Article Point of View:  The article is written from the point of view of the Indo-pacific countries towards the Red Sea Crisis and a perceived weakening of the rules based order.

Summary:  The rules-based international order is crucial to the Indo-Pacific states of Australia and New Zealand.  The strength of the rules-based order is tied to U.S. legitimacy and strength.  The Red Sea crisis disrupts a key trade route and weakens the U.S. on the world stage as the world tires of U.S. inaction to the Netanyahu Government’s attacks on Gaza and the blatant disregard of international humanitarian law. 

Text:  The Indo-Pacific is a key focus of Chinese and U.S. strategic rivalry. Currently, the U.S. security umbrella extends to important routes that serve the Indo-Pacific. However, there have been more than 60 Houthi attacks in the Red Sea since October  17, 2023[1], resulting  in ships diverting to the longer and more expensive route around the African coast and the Cape of Good Hope[2]. The average cargo cost per 40ft container has risen from $1,875 in December 2023, to $5,650 on January 16, 2024.  This price increase and the disruption to global supply chains is feeding into business costs, adding to the global economic headwinds trade is already facing[3][4]. Sparked by Houthi frustration with Israeli attacks in Gaza, the Red Sea crisis has highlighted the fragility of the region’s security[5] and vulnerability of globalised economies to shipping route security issues. 

The lessoning of U.S. military superiority[6] over the 2000s, and the diversification of non-Western alliances points to the emergence of a more multipolar order[7]. The world is heading away from the rules based international order and into a “more power based international system[8].”  This change has implications for how the Indo-Pacific maintains its security and trading links with Europe.  There are strategic vulnerabilities on the trade route to Europe; piracy in the Malacca Strait, the contested South China Sea, and the Red Sea route through the Suez Canal[9][10]. Until recently the main guarantor of access to these routes was provided by the Western established rules-based international order, backed by U.S. military and economic might.  The Red Sea is a particularly complicated case as  rivals are emboldened[11] by U.S. disengagement from the Middle East, and there has been an accompanying increase in non-Western engagement. Additionally, regional autonomy has grown in the face of what the IMF describes as “global geoeconomic fragmentation[12]”,  which is a “policy-driven reversal of global economic integration” and has been fueled by events such as the Gaza war, Ukraine war, Covid 19[13], and potentially by the rising impacts of climate change. 

This Red Sea, which links the security systems of the Indo-Pacific, Mediterranean, and the Middle East, looks likely to become increasingly militarised by a variety of actors.  Military bases are already held in the area by the United Arab Emirates (UAE), France, Italy, Japan, China, and the U.S.  Other strategic competitors in include Turkey,  Qatar, Saudi Arabia, Russia, the European Union, and India[14]. Many of the Red Sea states are highly vulnerable with internal security challenges and are in need of foreign investment to ensure economic growth. Somalia, Sudan, Eritrea, and Djibouti are also amongst the top 10 source countries for refugees.    Additionally, the Sovereign Wealth Funds of the wealthy Gulf states, looking to diversify away from a reliance on fossil fuels, have emerged as key investors in the Red Sea and the Gulf of Aden in the post-covid global economic downturn.  Cooperation in the Red Sea between Global South[15] countries, alongside potential exploitation of the region’s weak states by the wealthy Global South actors gives the West less room for policy errors, including policies that leave a perception that the U.S. is callous with Global South lives.  

With the mighty sovereign wealth funds of China, Saudi Arabia, the UAE and Qatar investing in the Red Sea, the influence of the rules-based international order over the leadership of these unstable states is likely to become overlaid by the wishes of the foreign states with high engagement in the region. This battle for engagement in the region creates uncertainty around the shipping routes.  Australia and New Zealand, given that they are geographically isolated from the rest of the Global North, need to consider the U.S. capable of maintaining the global trading system and it’s routes, including the important Red Sea chokepoint. The U.S. led multinational Operation Prosperity Guardian, established to deter Houthi attacks on shipping, demonstrates that the U.S. is willing to deal with the symptoms of the Red Sea crisis. However, the U.S. seems  reluctant to confront a key underlying driver of the tensions. The U.S. needs to be adept at keeping allies, but also knowing which ones are becoming geopolitically expensive.   The Netanyahu government’s military action in Gaza as retaliation for the terrorist attack on Israel by Hamas on October 7, 2023 is increasingly seen as excessive, with the Gazan death toll reported at  31,600 by Gaza’s Health Ministry[16].  The U.S.’ defeated UN Security Council resolution for an “immediate and sustained ceasefire in Gaza[17]” and subsequent abstention from voting on the following successful ceasefire proposal[18], goes some way towards a tonal shift regarding this issue, but the rules-based international order has been damaged by the initial lack of resolve from the U.S. to rein in Israeli excesses. U.S. inaction leaves space available for China and the Global South leadership to advance the Arab and Islamic world’s demands, as outlined by Algeria’s Ambassador Amar Benjama; that Israel acknowledge responsibility for Gazan civilian deaths[19]. 

International criticism of Government military action by a Western ally undermines the U.S. led rules-based international order. This criticism weakens the legitimacy of the U.S. to criticise China over the treatment of the Uyghurs, to criticise Russia over the lives lost in the Ukraine, and it further weakens the  UN’s Responsibility to Protect.  This criticism also weakens the legitimacy of the U.S.’ commitment to its own Elie Wiesel Genocide and Atrocities Preventions Act of 2018, and the accompanying Executive order 13729, A Comprehensive Approach to Atrocity Prevention and Response, which outlines that “preventing mass atrocities and genocide is a core national security interest and core moral responsibility of the United States[20]”.   

In order to retain its leadership position in a world with increased levels of geoeconomic fragmentation, the U.S. needs to prove that it continues to play a key role in maintaining global order and stability, particularly through leadership of its allied states.  Selectively attempting to apply international rules and norms on non-aligned states and having a muted response to the instability caused by allies such as Israel, particularly in such a region in which instability can impact the world’s economy given its important shipping routes and fossil fuels, is likely to undermine the rules-based international order on which the Indo-Pacific depends for its security and international trade. Without the rules-based international order, Indo-Pacific states face increased coercion from more powerful states, such as China, which is the top trading partner of both New Zealand[21] and Australia[22].

 In an increasingly geoeconomic fragmented world, investment and economic engagement between states is increasingly driven by geopolitical alignment. This alignment should concern the U.S., given in the strategic importance of the Indo-Pacific and the high levels of trade between Pacific states and China.  With economic challenges facing the globe such as recovering from the covid pandemic, the Chinese economic downturn, the wars in Ukraine and Gaza, shipping costs in the Red Sea, and increasing fiscal pressure from climate change impacts, states may become increasing reluctant or economically less able to stand up to key trading partners. With New Zealand officially in recession from March 21, 2024[23] and the Australian economy sitting at 0.2% growth[24],  if the rules-based international order is perceived as weakened these countries may start to feel very vulnerable to Chinese geoeconomic pressure. 


Endnotes:

[1] Congressional Research Service. (2024, March 12). Houthi Attacks in the Red Sea: Issues for Congress. Retrieved from Congress: https://crsreports.congress.gov/product/pdf/IN/IN12301

[2] Scarr, S., Arranz, A., Saul, J., Huang, H., & Chowdhury, J. (2024, February 3). Red Sea attacks: ow Houthi militants in Yemen are attacking ships in one of the world’s busiest maritime trade routes. Retrieved February 11, 2024, from Reuters: https://www.reuters.com/graphics/ISRAEL-PALESTINIANS/SHIPPING-ARMS/lgvdnngeyvo/

[3] Simpson, J. (2024, January 16). What impact have UK and US strikes had on Red Sea shipping disruption?Retrieved January 17, 2024, from The Guardian: https://www.theguardian.com/world/2024/jan/16/what-impact-have-uk-and-us-strikes-had-on-red-sea-shipping-disruption

[4] Villa, M. (2024, February 1). Trade and Inflation: The Costs of the Red Sea Crisis. Retrieved February 11, 2024, from Italian Institute for International Political Studies: https://www.ispionline.it/en/publication/trade-and-inflation-the-costs-of-the-red-sea-crisis-162429

[5] Italian Institute for the International Political Study. (2023, December 22). Houthis Churn the Waters of the Red Sea.Retrieved February 11, 2024, from Italian Institute for the International Political Study: https://www.ispionline.it/en/publication/houthis-churn-the-waters-of-the-red-sea-158406

[6] Center on Military and Political Power. (N.D.). Retrieved February 24, 2024, from Center on Military and Political Power: https://www.fdd.org/projects/center-on-military-and-political-power/

[7] Araya, D. (2022, October 5). America’s Global Dominance Is Ending: What Comes Next? Retrieved February 11, 2024, from Centre for International Governance Innovation: https://www.cigionline.org/articles/americas-global-dominance-is-ending-what-comes-next/

[8] Gaal, N., Nilsson, L., Perea, J. R., Tucci, A., & Velazquez, B. (2023). Global Trade Fragmentation: An EU Perspective. Retrieved February 14, 2024, from European Commission: Economy Finance: https://economy-finance.ec.europa.eu/system/files/2023-10/eb075_en.pdf

[9] Girardi, B., Van Hooft, P., & Cisco, G. (2023, November). What the Indo-Pacific means to Europe: Trade value, chokepoints and security risks. Retrieved February 11, 2024, from The Hague Centre for Strategic Studies: https://hcss.nl/wp-content/uploads/2023/11/What-the-Indo-Pacific-means-to-Europe-Trade-Value-Chokepoints-and-Security-Risks-HCSS-2023.pdf

[10] Panda, J. (2023, October). Indo-Pacific Security in 2030-35: Links in the Chain. Retrieved February 11, 2024, from Hague Centre for Strategic Studies: https://isdp.eu/content/uploads/2023/10/01-SLOCS-Jagannath-Panda-Supply-Chains-Maritime-Choke-Points-and-Indo-Pacific-Security-in-2030-35-v6-SLOCS-1.pdf

[11] Center on Military and Political Power. (N.D.). Retrieved February 24, 2024, from Center on Military and Political Power: https://www.fdd.org/projects/center-on-military-and-political-power/

[12] IMF. (2023, January). Geoeconomic Fragmentation and the future of Multilateralism. Retrieved February 11, 2024, from IMG: https://www.imf.org/en/Publications/Staff-Discussion-Notes/Issues/2023/01/11/Geo-Economic-Fragmentation-and-the-Future-of-Multilateralism-527266

[13] Baba, C., Lan, T., Mineshima, A., Misch, F., Pinat, M., Shahmoradi, A., . . . Van Elkan, R. (2023, November 30). Geo-economic Fragmentation: What’s at stake for the EU. Retrieved from International Monetary Fund: https://www.imf.org/en/Publications/WP/Issues/2023/11/29/Geoeconomic-Fragmentation-Whats-at-Stake-for-the-EU-541864

[14] Ashine, S. G. (2024). The new global superpower geo-strategic rivalry in the red sea and its implications for peace and security in the horn of Africa. Social Sciences & Humanities Open, Vol. 9, https://doi.org/10.1016/j.ssaho.2024.100834.

[15] Heine, J. (2023). The Global South is on the rise – but what exactly is the Global South? Retrieved from The Conversation: https://theconversation.com/the-global-south-is-on-the-rise-but-what-exactly-is-the-global-south-207959

[16] Khadder, K., & Dahman, I. (2024, March 17). Gaza death toll exceeds 31,600, health ministry says. Retrieved from CNN: https://edition.cnn.com/world/live-news/israel-hamas-war-gaza-news-03-17-24/h_52b8706a615460e042d7a6ca43059b80

[17] United Nations. (2024, March 22). Russia and China veto US resolution stating imperative of ‘immediate and sustained ceasefire, in Gaza. Retrieved from United Nations: https://news.un.org/en/story/2024/03/1147856

[18] Borger, J. (2024, March 25). Israel isolated as UN security council demands immediate ceasefire in Gaza.Retrieved from The Guardian: https://www.theguardian.com/world/2024/mar/25/un-gaza-ceasefire-vote

[19] United Nations. (2024, March). US Resolution would have given green light to ‘continuing bloodshed’: Algeria.Retrieved from United Nations: https://news.un.org/en/story/2024/03/1147856

[20] Department of State, USAID, Department of Defense, Department of Justice, US Department of Homeland Security, Federal Bureau of Investigations, Department of the Treasury. (2022). U.S Strategy to Anticipate, Prevent and Respond to Atrocities. Retrieved from U.S Department of State.

[21] Minstry of Foreign Affairs. (2022). China. Retrieved from Ministry of Foreign Affairs and Trade: https://www.mfat.govt.nz/en/countries-and-regions/asia/china/#:~:text=China%20remains%20New%20Zealand’s%20largest,the%20year%20ending%20December%202022).

[22] Department of Foreign Affairs and Trade. (n.d.). Background Paper: The Australia-China Trade and Investment Relationship. Retrieved from Department of Foreign Affairs and Trade: https://www.dfat.gov.au/trade/agreements/in-force/chafta/negotiations/Pages/background-paper-the-australia-china-trade-and-investment-relationship

[23] Beckford, G. (2024, March 21). New Zealand is in Recession: What you need to know. Retrieved from Radio New Zealand: https://www.rnz.co.nz/news/national/512347/new-zealand-is-in-a-recession-what-you-need-to-know

[24] Australian Bureau of Statistics. (2023, December). Australian National Accounts: National Income, Expenditure and Product. Retrieved from Australian Bureau of Statistics: https://www.abs.gov.au/statistics/economy/national-accounts/australian-national-accounts-national-income-expenditure-and-product/latest-release

Assessment Papers Dr Estelle Denton-Townshend Hamas Islamic State Variants Israel Maritime Red Sea

Assessing the Benefits of a United States Foreign Legion

Michael D. Purzycki is an analyst, writer, and editor based in Arlington, Virginia. He has worked for the United States Navy, United States Marine Corps, and United States Army. In addition to Divergent Options, he has been published in the Center for Maritime Strategy, the Center for International Maritime Security, the Washington Monthly, The Liberal Patriot, The Defense PostMerion WestWisdom of CrowdsBraver Angels, and more. He can be found on Twitter at @MDPurzycki, and on Substack at The Non-Progressive Democrat.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Benefits of a United States Foreign Legion

Date Originally Written:  February 11, 2024.

Date Originally Published:  March 4, 2024.

Author and / or Article Point of View:  The author is advising the President of the United States on a potential way for the U.S. to stabilize conflict zones at a time where many American citizens are wary of extended deployments of U.S. ground forces.

Summary:  Despite a general American desire not to fight overseas for extended periods of time, an unpredictable security environment calls for giving U.S. policymakers multiple options for forcibly defending American interests. The ability of Washington to sustain deployments of ground forces is hampered by a small recruiting pool and the political risk of American casualties. Creating a United States Foreign Legion is one potential way around these problems.

Text:  With the wars in Afghanistan and Iraq receding from memory, it is understandable most Americans would not want to contemplate more extended deployments of United States ground forces overseas. However, the American public and their elected leaders can never be certain what conflicts will arise that threaten U.S. interests. While unmanned aerial vehicles (UAVs, or drones) are often viewed as effective weapons in performing such missions as counterterrorism[1], there could be scenarios in which ground troops are needed to neutralize threats.

Unfortunately, the U.S. military faces a recruiting crisis that might hamper its ability to maintain a significant overseas deployment. Less than one quarter of Americans ages 17-24 are fit for military service[2] based on existing standards. Common reasons for unfitness are obesity, low academic achievement, alcohol and drug abuse, and mental health challenges. While each of these problems can and should be addressed for their own sake, even if significant efforts are made, it will likely take years before the percentage of young Americans fit for service significantly increases.

Furthermore, deploying Americans in uniform to far-flung locations entails political risk. Unless most civilians see a clear national security benefit to putting their fellow citizens in danger, public opinion may be critical of an extended deployment. Public opinion will likely become even more negative if U.S. service members are killed in action.

Private military contractors (PMCs), are one possible solution to the need for “boots on the ground.” The U.S. has extensively used PMCs in conflict zones such as Afghanistan and Iraq[3], providing an American presence without the political risk of long-lasting military deployments that are unpopular at home. PMC casualties get comparatively less media attention than the deaths of uniformed service members[4]. However, the fact that PMCs are ultimately more loyal to money as employees than to a nation-state can compromise their utility as a defender of specifically American interests. A rival like China or Russia can offer American-funded PMCs higher pay to induce them to turn against the U.S.

The experience of France offers another potential solution to the dilemma of a need for ground troops versus an aversion to casualties: the Foreign Legion. Unlike PMCs, this force – drawn from around the world – is part of the French military. Its members wear French uniforms, are commanded by French officers, and adhere to French regulations. After serving at least three years, or upon being wounded in action, a legionnaire is eligible for French citizenship[5]. The Foreign Legion gives France a valuable force at its disposal to protect French interests in trouble spots around the world[6].

There have been several conflicts in recent decades when a United States Foreign Legion (USFL) might have been useful. During the Rwandan genocide of 1994, President Bill Clinton chose not to intervene, in part because of U.S. military deaths in Somalia the previous year[7], the political backlash to which was so strong he withdrew U.S. troops from Somalia[8]. Had President Clinton had a USFL at the ready, he might have been more willing to put American boots on the ground to stop the massacre of Tutsis by Hutu militants. Similarly, given President Barack Obama’s self-professed regret of being unprepared to stabilize Libya after the overthrow of Muammar Qaddafi in 2011[9], having USFL forces at his command might have allowed him to stabilize the country with less political risk than the deployment of regular American troops. In a 2016 Washington Post op-ed, Sean McFate named the American-led fight against the Islamic State in Iraq and Syria as a conflict in which an American foreign legion would be useful[10].

There are multiple ways the units within a USFL could be structured. In a 2023 article for Small Wars Journal, Tom Ordeman Jr. suggested placing a foreign legion under the United States Marine Corps and organizing it into units modeled on Marine Air Ground Task Forces[11]. Alternatively, the legion could be placed in the United States Army and consist of Infantry Brigade Combat Teams (IBCTs). The Army could even use the USFL to experiment with reorganization of units. For example, Daniel Vazquez in War on the Rocks in 2020 suggested reducing the number of infantry battalions in each IBCT from three to two, while reintroducing special troops battalions[12]. A USFL could be used as part of this experiment, or else the deployment of the USFL overseas could free up IBCTs for such an experiment.

While the death of any American in combat is tragic, there are times when sending Americans into combat is the least bad thing a U.S. President can do. In a democracy, the need to protect national security interests is weighed against citizens’ willingness, or lack thereof, to see their fellow citizens sent into conflict zones. Even though it runs the risk of fueling American cynicism regarding the deaths of non-Americans, creating a Foreign Legion to complement its existing Armed Forces is an option worthy of further exploration.


Endnotes:

[1] Johnston, Patrick B., and Anoop K. Sarbahi. “The Impact of US Drone Strikes on Terrorism in Pakistan.” International Studies Quarterly, Volume 60, Issue 2, June 2016, Pages 203–219. https://academic.oup.com/isq/article/60/2/203/1750218?login=false

[2] Novelly, Thomas. “Even More Young Americans Are Unfit to Serve, a New Study Finds. Here’s Why.” Military.com, September 28, 2022. https://www.military.com/daily-news/2022/09/28/new-pentagon-study-shows-77-of-young-americans-are-ineligible-military-service.html

[3] Stanton, Ellie, and Josh Frank. “Can’t Do With, Can’t Do Without: The Use of Private Military Contractors in U.S. War Efforts.” University of Colorado Boulder, March 2, 2020. https://www.colorado.edu/polisci/2020/03/02/cant-do-cant-do-without-use-private-military-contractors-us-war-efforts

[4] Schooner, Steven L. “Why Contractor Fatalities Matter.” George Washington University Law School, Autumn 2008. https://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=1061&context=faculty_publications

[5] We Are The Mighty. “5 surprising facts you probably didn’t know about the French Foreign Legion.” February 10, 2023. https://www.wearethemighty.com/mighty-trending/french-foreign-legion/

[6] Ministère des Armées. “The French Foreign Legion.” https://www.cheminsdememoire.gouv.fr/index.php/en/french-foreign-legion

[7] Baldauf, Scott. “Why the US didn’t intervene in the Rwandan genocide.” Christian Science Monitor, April 7, 2009. https://www.csmonitor.com/World/Africa/2009/0407/p06s14-woaf.html

[8] Tisdall, Simon. “Mogadishu outrage puts Clinton in firing line.” Guardian, October 5, 1993. https://www.theguardian.com/world/1993/oct/05/usa.simontisdall1

[9] Tierney, Dominic. “The Legacy of Obama’s ‘Worst Mistake.’” Atlantic, April 15, 2016. https://www.theatlantic.com/international/archive/2016/04/obamas-worst-mistake-libya/478461/

[10] McFate, Sean. “We need an American Foreign Legion.” Washington Post, May 19, 2016. https://www.washingtonpost.com/opinions/we-need-an-american-foreign-legion/2016/05/19/9a04d24e-176e-11e6-9e16-2e5a123aac62_story.html

[11] Ordeman, Jr., Tom. “Legio Patria Nostra: A Blueprint For An American Foreign Legion.” Small Wars Journal, September 3, 2023. https://smallwarsjournal.com/jrnl/art/legio-patria-nostra-blueprint-american-foreign-legion

[12] Vazquez, Daniel. “Is the Infantry Brigade Combat Team Becoming Obsolete?” War on the Rocks, April 17, 2020. https://warontherocks.com/2020/04/is-the-infantry-brigade-combat-team-becoming-obsolete/

Assessment Papers Capacity / Capability Enhancement Defense and Military Reform Michael D. Purzycki Private Military Companies (PMC etc) United States

January 2024 Assessment of the Iranian Missile Arsenal and Regional Responses

Miguel Miranda is the founder of 21st Century Asian Arms Race.  He frequently writes about modern weapons and the different conflicts being fought across the world today.  He also runs the Twitter account @21aar_show to scrutinize arms fairs and military/security conferences.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  January 2024 Assessment of the Iranian Missile Arsenal and Regional Responses

Date Originally Written:  January 16, 2024.

Date Originally Published:  February 5, 2024.

Author and / or Article Point of View:  The author believes that without understanding the elusive and ambiguous arms market, and the evolution of modern weapon systems, governments will be ill-prepared to address their effects.

Summary:  With another Middle East crisis underway since the October 7, 2024 terrorist attacks by Hamas against southern Israel the U.S. is caught in a familiar grappling match with Iran and its proxies. The problem now is the Iran’s immense arsenal of precision weaponry is forcing escalating responses from the U.S. and its Allies and Partners.

Text:  The early hours of January 15, 2024, saw Iranian missile salvos demolishing targets in Iraqi Kurdistan and Syria. The next day another wave hit western Pakistan as retaliation for the January 3, 2024, terror attacks in Kerman that killed 100 civilians[1]. This latest exercise from the Islamic Revolutionary Guard Corps (IRGC) “rocket force” was justified in Iran’s view as retaliation against terrorists and Israeli-U.S. meddling. But the display of firepower was far from unprecedented. In fact, Iranian proxies in Iraq and Yemen have continued persistent attacks on shipping and infrastructure, which have gone on for months now. A bombardment of Al Asad/Al Assad airbase in Iraq on January 20, 2024, stands out after it left American service members with traumatic brain injuries[2].

The commonality in these incidents are the widespread and very reckless use of missiles. In an earlier assessment from six years ago this author grouped Iran’s missile program into three categories: the solid fuel, liquid fuel, and then medium-range models[3]. Today it is no longer an exaggeration to describe how missiles are pouring out of Iran and categorizing them is now a challenge[4]. The ballooning production volumes are so great it helps if these missiles are segregated into six groups. The first are road mobile ballistic missiles[5]. These are followed by anti-ship missiles, subsonic cruise missiles, attack drones, and large caliber rocket artillery[6]. A sixth category encompasses Iran’s fondness for portable missiles whose variety is now bewildering, however, lightweight munitions are not the focus of this assessment[7].

Examining Iranian advances with attack drones should suffice to illustrate the country’s success in organizing mass-production, whether for their own needs or a foreign client’s. Since at least July 2022, U.S. President Joseph Biden’s administration publicized warnings that Russia would soon deploy Iranian drones and ballistic missiles for its conquest of Ukraine[8]. Events revealed the former were the destructive and very cheap Shahed-131 and Shahed-136 (the differences are in their weight classes) one way attack drones and these were spotted as early as August that year[9]. As of December 2023 the air force of Ukraine eliminated more than 3,000 of both[10]. These numbers are one indicator of how large Iranian production for expendable attack drones is, even if the same production is shared with an end user like Russia. Today Iran has at least 15 different attack drones that function as missiles, including imitations of the Aerovironment Switchblade 300, the IAI Harpy, and lightweight air-launched cruise missiles named “Heydar-1/2[11].” There is no evidence Russia is fielding Iranian surface-to-surface tactical missiles in Ukraine but the Biden administration has warned such an eventuality can be expected[12].

Iran’s success at expanding missile production owes much to domestic policy and industrialization but these still rely on global supply chains. An investigation released last June by the German news channel DW explored the mysterious Chinese agent who organized a network of companies to help deliver ballistic missile parts to Iran[13]. Though portrayed as an “arms dealer” this individual, Li Fangwei a.k.a. Karl Lee, who is facing charges at a New York court never dealt with actual weapons and their transport[14]. His role was sourcing raw material, i.e. the propellant powders for missile engines, essential for ordnance production. Judging by the past 40 years this elaborate trans-national commerce was sanctions proof from end-to-end.

What allows Iran’s military to ramp up missile production year after year are the laboratories, manufacturing sites, and universities where assembly of missile airframes and parts are streamlined. It is useful to understand the two umbrella organizations overseeing these programs are the Defense Industries Organization (DIO) and the Aerospace Industries Organization (AIO). Yet this simplified outlook is inadequate for measuring the IRGC’s own industrial footprint, like the Self-Sufficiency Jihad Organizations, and the dozens of companies involved with armaments production[15]. It is not surprising that Iran graduates more engineers than Japan and South Korea[16]. The country boasts a thriving professional class of specialists in aerospace engineering, civil engineering, electrical engineering, and mechanical engineering. There is no dearth of expertise in composite materials either. Iran has both the human talent and the manufacturing sector for accelerating its various missile programs and the results, as seen in arms deliveries to Yemen and Lebanon, are inarguable.

Recent developments in Iranian missile production show the IRGC’s newfound enthusiasm for “hypersonic” missiles. In reality, after the Fattah missile was unveiled in June 2023, it was clear the IRGC, with a complicit media providing hyperbolic coverage, had introduced an updated single stage ballistic missile that was meant to be carried on and launched from a truck[17]. The difference, however, was the Fattah boasted a separating maneuverable re-entry vehicle containing the warhead. Iranian engineers are fond of designing warheads and the vehicles that deliver them. A low-cost Iranian glider warhead now exists and other shapes have appeared on the IRGC’s missiles like on the solid fuel Ra’ad 500 and Haj Qassem missiles. Recently, the medium-range solid fuel Kheybar Shekan was seen in Yemen. The liquid fuel models such as the Ghadr and Sejjil also boast re-entry vehicles[18].

The quantity of Iranian missiles produced today leaves the Middle East/West Asia region with a familiar dilemma from six years ago. Aside from Israel, whose military enjoys the advantage of layered anti-missile defenses and unwavering U.S. support, no country can foil Iranian missiles. Then as now, U.S. forces are at risk without anti-ballistic missile defenses reliant on ground-based AEGIS radars complemented by satellites and networked with THAAD sites. Other regional actors such as Turkey/Turkiye see the threat, and are shouldering the cost of domestic anti-missile defenses[19]. While the U.S. Navy’s carriers and destroyers can perform this role it confines them to small bodies of water where they can be attacked[20]. It is clear that neither containment nor sanctions work against Iranian proxies anymore. Tehran has shown it can deliver missile components and technology through novel methods and set up production in other countries, thereby broadening their threat.


Endnotes:

[1] Iran Press News Agency. (2024, January 4). ISIS claims responsibility for terrorist attack in Iran’s Kerman. Retrieved January 17, 2024, from https://iranpress.com/isis-claims-responsibility-for-terrorist-attack-in-iran-s-kerman

[2] CENTCOM. (2024, January 20). Iranian-backed militants attack Al-Assad Airbase Iraq. Retrieved January 21, 2024, from https://www.centcom.mil/MEDIA/PRESS-RELEASES/Press-Release-View/Article/3651246/iranian-backed-militants-attack-al-assad-airbase-iraq/

[3]  Miranda, M. (2022, February 3). Sejjil missiles cast a shadow over the Middle East. Retrieved January 17, 2024, from https://21stcenturyasianarmsrace.com/2022/02/03/sejjil-missiles-cast-a-shadow-over-the-middle-east/ 

[4] Grady, John. (2022, February 8). CENTCOM nominee Kurilla: Iran largest destabilizing factor in Middle East. Retrieved January 17, 2024, from https://news.usni.org/2022/02/08/centcom-nominee-kurilla-iran-largest-destabilizing-factor-in-middle-east 

[5]  Miranda, M. (2020, January 15). A useufl guide to Iranian ballistic missiles. Retrieved January 17, 2024, from https://21stcenturyasianarmsrace.com/2020/01/15/a-useful-guide-to-iranian-ballistic-missiles/ 

[6]  Miranda, M. (2021, August 15). Iranian rocket artillery just got more dangerous. Retrieved January 17, 2024, from https://21stcenturyasianarmsrace.com/2021/08/15/iranian-rocket-artillery-just-got-more-dangerous/ 

[7] Miranda, M. (2022, April 30) Iran has another new air-to-ground missile. Retrieved January 17, 2024, from https://21stcenturyasianarmsrace.com/2022/04/30/iran-has-another-new-air-to-ground-missile/ 

[8] Miranda, M. (2022, October 2). Iranian combat drones have reached Europe. Retrieved January 17, 2024, from https://21stcenturyasianarmsrace.com/2022/10/02/iranian-combat-drones-have-reached-europe/ 

[9] Miranda, M. (2023, November 25). The drone index: AIO HESA Shahed-136. Retrieved January 17, 2024, from https://21stcenturyasianarmsrace.com/2023/11/25/the-drone-index-aio-hesa-shahed-136/ 

[10] Superville, Darlene. (2023, November 22). The White House is concerned Iran may provide ballistic missiles to Russia for use against Ukraine. Retrieved January 17, from https://apnews.com/article/russia-ukraine-war-iran-ballistic-missiles-f14501f6f9a6401af7f8835b2ddd01cf 

[11] Miranda, M. (2022, July 5). Iranian missiles come in all sizes. Retrieved January 17, 2024, from https://21stcenturyasianarmsrace.com/2022/07/05/iranian-missiles-come-in-all-sizes/ 

[12] FDD (2024, January 5). Russia acquires North Korean missiles, eyes Iranian missiles. Retrieved January 17, 2024, from https://www.fdd.org/analysis/2024/01/05/russia-acquires-north-korean-missiles-eyes-iranian-missiles/ 

[13] DW Documentary. (2023, June 30). The World’s Most Dangerous Arms Dealer. Retrieved January 17, from https://www.youtube.com/watch?v=gqDCrdZVZnk 

[14] Trans-nationional organized crime rewards program: Li Fangwei. Retrieved January 17, from https://www.state.gov/transnational-organized-crime-rewards-program-2/li-fangwei/ 

[15] IRGC research self-sufficiency organization. Retrieved January 17, 2024, from https://www.iranwatch.org/iranian-entities/islamic-revolutionary-guard-corps-irgc-research-self-sufficiency-jihad-organization 

[16] Chatterjee, D. (2023, September 27). The top 10 countries that produce the most engineers. Retrieved January 17, 2024, from https://www.embibe.com/exams/top-10-countries-that-produce-the-most-engineers/ 

[17] Iran Press News Agency. (2023, June 13). ‘Fattah’ hypersonic missile; Iran’s defensive leap forward . Retrieved January 17, 2024, from https://iranpress.com/-fattah-hypersonic-missile-iran-s-defensive-leap-forward 

[18] Iran Press News Agency. (2022, November 10). Top Commander: Iran succeeded in building hypersonic ballistic missile. Retrieved January 17, 2024, from https://iranpress.com/top-commander-iran-succeeded-in-building-hypersonic-ballistic-missile 

[19] Miranda, M. (2022,October 7), The SiPER is almost ready. Retrieved January 17, 2024, from https://21stcenturyasianarmsrace.com/2022/10/07/the-siper-is-almost-ready/ 

[20] CENTCOM. (2024, January 19). USCENTCOM Destroys Three Houthi Terrorists’ Anti-Ship Missiles. Retrieved January 17, 2024, from https://www.centcom.mil/MEDIA/PRESS-RELEASES/Press-Release-View/Article/3651182/uscentcom-destroys-three-houthi-terrorists-anti-ship-missiles/ 

Artillery / Rockets/ Missiles Assessment Papers Iran Miguel Miranda

Assessment of the People’s Republic of China’s United Front Work Department, its Impact on Taiwan’s National Security, and Strategies to Combat Foreign Interference

Editor’s Note:  This article is part of our 2023 Writing Contest called The Taiwan Offensive, which took place from March 1, 2023 to July 31, 2023.  More information about the contest can be found by clicking here.

Heath Sloane is a research analyst based in London, UK, and Masters graduate of Peking University’s Yenching Academy. He has worked for the Middle East Media Research Institute where his research includes Chinese strategic affairs. His research on Chinese and China-Middle Eastern / North African affairs has been translated and published in several leading international affairs. He can be found on Twitter at @HeathSloane.


Title:  Assessment of the People’s Republic of China’s United Front Work Department, its Impact on Taiwan’s National Security, and Strategies to Combat Foreign Interference

Date Originally Written:  July 10, 2023.

Date Originally Published:  August 28, 2023.

Author and / or Article Point of View:  The author believes that the People’s Republic of China (PRC) United Front Work Department’s (UFWD) interference in Taiwan constitutes a political warfare offensive. 

Summary:  The PRC’s UFWD threatens democracies, particularly Taiwan, by exploiting the openness inherent to democratic societies. The UFWD combines military and non-military tactics in its offensive against Taiwan’s institutions. Taiwan’s countermeasures include legislation, education, and a state-civil society collaboration. Unless democracies remain vigilant in their defense against foreign interference, the UFWD will continue to be effective.

Text:  The intricate tableau of global politics is marked by the fluctuating interplay of national interests, aspirations, and stratagems. One of the most prominent actors on this stage, the PRC, guided by General Secretary Xi Jinping, boasts an expansive and complex political infrastructure. Among its numerous political entities, the UFWD — an integral component of the Chinese Communist Party (CCP) — emerges as an entity of particular concern due to its amalgamation of both military and non-military tactics[1]. The UFWD’s mode of operation poses a severe challenge to democratic nations across the globe, particularly those upholding the principles of freedom of speech, freedom of the press, and the cultivation of a dynamic civil society. 

The strength of the UFWD lies in its ability to exploit the inherent characteristics of democratic systems. Unlike the PRC’s command economy and authoritarian political structure, democratic nations embrace a liberal ethos that allows substantial latitude in civil society. This democratic openness becomes a significant point of exploitation for the UFWD[2]. Consequently, comprehending the inner workings, methodologies, and objectives of the UFWD is a critical requirement for the democratic world in crafting an effective and proportionate response.

Taiwan, due to its unique historical bonds and political interplay with the PRC, finds itself at the epicentre of the UFWD’s operations. This positioning transforms Taiwan into an invaluable case study in unravelling the dynamics of foreign interference and devising counter-interference measures. Accordingly, this extensive analysis endeavours to explore Taiwan’s responses to the UFWD’s activities, extrapolate the broader geopolitical implications, and offer viable countermeasures for the global democratic community.

Under Xi Jinping’s leadership, the UFWD has metamorphosed from a predominantly domestic entity into an apparatus deeply embedded in the PRC’s foreign policy machinery[3]. This transformation is epitomised by the growth in the number of pro-CCP organisations operating in democratic nations worldwide, coupled with the escalating use of disinformation campaigns during critical political junctures. Such activities underscore the expanded global reach of the UFWD and highlight its potential to disrupt the democratic processes of various nations.

Yet, Taiwan has refused to be a mere spectator in the face of the UFWD’s interference. Taiwan’s Political Warfare Bureau, an institution harking back to Taiwan’s more authoritarian past, has effectively countered the UFWD’s aggressive manoeuvres[4]. Over the years, this bureau has undergone considerable reforms to better align with Taiwan’s democratic norms, values, and institutions. This transformation has strengthened its capabilities to protect Taiwan’s democratic institutions from the covert activities of the UFWD.

Education serves as the cornerstone of Taiwan’s defence against the UFWD. The educational initiatives, geared towards the dual objectives of demystifying the ideology and tactics that drive the UFWD’s operations, and proliferating awareness about these operations among the military and civilian populations, empower Taiwanese society with the knowledge and tools to recognise and resist UFWD interference. Given the multifarious nature of the UFWD’s operations — which include political donations, espionage, and the establishment of pro-CCP cultural and social organisations[5] — gaining an in-depth understanding of its diverse strategies is crucial for effecting a robust and sustained counteraction.

In conjunction with education, Taiwan’s Political Warfare Bureau has orchestrated a nationwide coordination of counter-interference initiatives. This broad-based network extends across the country’s civil society and national defence infrastructure, fostering an unprecedented level of collaboration between a wide array of national institutions. Regular briefings on UFWD activities, rigorous training programs, and the promotion of cross-institutional collaborations form the lynchpin of this response mechanism.

In the face of the UFWD’s interference, inaction or complacency could lead to dire consequences for Taiwan and democratic societies worldwide. The UFWD’s sophisticated tactics, flexibility, and adaptability make it a formidable adversary. In the absence of proactivity, the road may be paved for deeper and more disruptive infiltration into the political, social, and cultural landscapes of democracies. As such, the development of vigilant, comprehensive, and proactive countermeasures is of paramount importance[6].

Reflecting on Taiwan’s experiences and strategic responses, there is more that democratic nations could do to enhance democratic resilience against the UFWD. Democratic nations could delineate a clear legal definition for ‘foreign interference’ and incorporate this definition into the structural frameworks of relevant state institutions. This step will provide a solid legal foundation for counter-interference initiatives. Additionally, the concept of foreign interference could be integrated into national educational curricula, providing citizens with the necessary knowledge to identify and resist such activities. Finally, systematic training on identifying and countering foreign interference could be mandatory for all military personnel and staff within relevant state institutions.

Further, democracies could consider the establishment of a publicly-accessible monitoring centre, working in conjunction with national defence bodies, civil society organisations, and other institutions to identify, monitor, and publicise instances of foreign interference. The transparent and fact-based disclosure of individuals and organisations exposed to the UFWD will enable citizens and institutions within democracies to be responsive to malign elements in their midst.

The PRC’s UFWD poses a significant challenge to Taiwan’s national security and, more broadly, to democratic societies worldwide. Nonetheless, Taiwan’s experience in grappling with this entity offers a wealth of insights into devising effective counter-interference strategies. As the global geopolitical landscape continues to evolve, the UFWD’s reach continues to extend, necessitating democracies to remain vigilant, adaptable, and proactive in safeguarding their national security and democratic processes from foreign interference. The task ahead is daunting, but the stakes are high, and the preservation of democratic values and structures necessitates that no effort be spared.


Endnotes:

[1] Brady, A. M. (2015). Magic weapons: China’s political influence activities under Xi Jinping. Clingendael Institute, from https://www.wilsoncenter.org/article/magic-weapons-chinas-political-influence-activities-under-xi-jinping 

[2] Gill, B., & Schreer, B. (2018). Countering China’s “United Front”. The Washington Quarterly, 41(2), 155-170, from https://doi.org/10.1080/0163660X.2018.1485323 

[3] Suzuki, T. (2019). China’s United Front Work in the Xi Jinping era–institutional developments and activities. Journal of Contemporary East Asia Studies, 8(1), 83-98, from https://doi.org/10.1080/24761028.2019.1627714 

[4] Blanchette, J., Livingston, S., Glaser, B., & Kennedy, S. (2021). Protecting democracy in an age of disinformation: lessons from Taiwan.Blanchette, J., Livingston, S., Glaser, B., & Kennedy, S. (2021). Protecting democracy in an age of disinformation: lessons from Taiwan, from https://www.csis.org/analysis/protecting-democracy-age-disinformation-lessons-taiwan 

[5] Joske, A. (2022). Spies and Lies. Hardie Grant Publishing.

[6] Gershaneck, K. K. (2019). Under Attack: Recommendations for Victory in the PRC’s Political War to Destroy the ROC. 復興崗學報, (114), 1-40, from https://www.fhk.ndu.edu.tw/uploads/1562309764098tuX1wh0h.pdf 

2023 - Contest: The Taiwan Offensive Assessment Papers China (People's Republic of China) Heath Sloane Influence Operations Taiwan

Assessing the People’s Republic of China’s Current and Future Offensive Operations Against the Republic of China (Taiwan) in the Context of China’s International Ambitions

Editor’s Note:  This article is part of our 2023 Writing Contest called The Taiwan Offensive, which took place from March 1, 2023 to July 31, 2023.  More information about the contest can be found by clicking here.

Elliot Pernula is a currently serving U.S. Army officer, assigned to the United States Army Judge Advocate General’s Corps.  The views expressed in this paper are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense or the U.S. Government. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the People’s Republic of China’s Current and Future Offensive Operations Against the Republic of China (Taiwan) in the Context of China’s International Ambitions

Date Originally Written:  July 31, 2023. 

Date Originally Published:  August 21, 2023.

Author and / or Article Point of View:  The author believes that the People’s Republic of China (PRC) poses a significant threat to the current world order and that the PRC is currently engaged in a deliberate and focused multi-front offensive operation against Taiwan.  This offensive will transition from measured and deliberate to dynamic and kinetic if/when the PRC assesses that an exploitable opportunity has developed.    

Summary:  The PRC is currently engaging in deliberate, strategically unified, and organizationally layered offensive operations against Taiwan.  If left unchecked, the PRC’s deliberate goal-based actions, national initiative, and conceptually aligned efforts will result in the termination of Taiwan’s independence.

Text:  The PRC’s current and future means and mode of conducting offensive operations against Taiwan may be viewed through the lens of the Chinese phrase: wei ji, or loosely translated, where danger lurks, opportunity awaits.  It is under this concept that the PRC is preparing to boldly strike against Taiwan as soon as circumstances are favorable, while concurrently hedging its goals for Taiwan against its international ambitions.

The PRC’s desired international end state is to be a world power, capable of projecting its influence without external constrains[1]. Subservient and corollary to this is the PRC’s operational end state: the “reunification” of Taiwan through the termination of Taiwan’s  ability to independently engage in international commerce, international negotiations, and internal political decision making[2].  While the PRC’s efforts to achieve control of Taiwan span the full spectrum of the instruments of national power (diplomatic, information, military and economic (DIME)), the PRC’s actions are premised on a fundamental informational precept: that any offensive operation taken against Taiwan must be projected to be a defensive operation taken to protect China’s own national sovereignty.  In that, the PRC is currently engaged in offensive informational operations that emphasize that it seeks to “reunify” with Taiwan, under the essential premise that there is only one China. 

The PRC’s mode of offensive operations center on the concurrent employment of all instruments of national power. To the PRC, a reunification achieved without ever engaging in military action through a de facto diplomatic blockade would be far superior to military operations; however, no instrument of national power exists in a vacuum. Thus, currently, the PRC has launched all instruments of national power against Taiwan with the goal of developing exploitable weaknesses.  To the PRC, this full spectrum offensive operation is a gamble on all four elements of DIME; if the PRC presses to heavily in any one area before conditions are ripe, then they may face a backlash from the international community that could hamper its long-term goals.  In essence, the PRC will seek to maintain a measured offensive of constant pressure across all instruments of power while watching for an exploitation point and concurrently remaining sensitive to the international community’s responses. 

Having accepted the fact that the PRC views the future termination of Taiwan’s independence as a non-negotiable outcome, the critical assessment then must turn to when and how the PRC will act by applying overwhelming force under any one or all of its instruments of national power in its four front gamble.  The PRC’s ability to employ maximum military capability will degrade eventually as the PRC’s population ages in the context of its failure to foster future population growth[3].  Essentially, the PRC’s population is aging and the military aged, combat capable population will decrease within the next decades. While this aging makes a near-term military option more attractive, the PRC is not able to independently defeat the Taiwanese military, engage in a global conflict against the United States and its potential responsive coalition members, and then meet its national goals of serving as a post-war superpower.  

The projected destruction that would be wrought in a international armed conflict (IAC) between the PRC and the United States[4] makes a direct military offensive against Taiwan unlikely, unless the international environment experiences a circumstance-shift that would make this option feasible. Critically, there are multiple scenarios that would likely trigger the PRC’s rapid employment of direct military action against Taiwan.  These scenarios include any United States’ military entanglement in another area of the world such that the PRC assesses that the United States is unable to muster the national will or resources needed to engage in a direct military confrontation with the PRC[5].  To that end, the PRC has employed a consistent emphasis on a one China perspective; this will serve to allow the PRC to characterize any future military conflict as a non-international armed conflict (NIAC) between the legitimate Chinese government and a secessionist faction. This NIAC characterization would likewise serve as the foundation to assert that any foreign direct involvement in support of Taiwan would place the PRC in a defensive status in a conflict that would have then transformed into a IAC. Likewise, there are multiple traplines that have been laid that may trigger an immediate, direct, and full spectrum offensive with the purpose of immediate “reunification,” such as any formal declaration of independence by Taiwan, direct foreign basing within Taiwan, offensive-capable military alignment with a foreign government, or dire economic internal PRC turmoil that would make internal societal unification against a common enemy (Taiwan) attractive.  

The PRC will, therefore continue to engage in unified offensive operations across all of its instruments of national power while it waits for a exploitation point.  Essentially, the PRC has one clear goal: to stand as an unencumbered world power; reunification with Taiwan is an essential brick in the road to achieve this goal. To that end, the PRC will develop redundant threat capabilities that will allow it to concurrently muster all instruments of national power against Taiwan with a goal of applying pressure and then exploiting any opportunity to achieve immediate reunification as well as to disincentivize intervention by the United States.  Thus, the PRC seeks to apply the methodical principles of the game of Go against both Taiwan and the United States with the hopes of a bloodless offensive, while holding onto the willingness to launch unified offensive operations if the conditions so warrant. In Go, one may gain a critical advantage by securing exterior blocking positions before moving against near opponent positions.  This strategy requires a player to both push far against an opponent while simultaneously strangling center and near opponent positions (i.e., securing positions in with a corner, side, then center order formula); yet, this strategy works when one spends the time to calculate an endgame scenario well in advance of striking against near-opponent pieces.  An early assault may foreclose future opportunities.  One must both block in the deep game, develop exploitation opportunities in the near game, and strike when one may win with power enough to take advantage incrementally developed initiative. 

Fundamentally, the United States’ options are limited.  The PRC’s goal is clear, its efforts unified, and its power regionally great.  The PRC has indicated that it will abolish Taiwanese independence.  This unified effort is contrasted with the United States’ apparent goal of simply maintaining the status quo; the United States will not have the ability to rally national will for the purposes of defending this undefined, poorly understood, and operationally difficult position.  Thus, the United States  will either deter the PRC until future circumstances prevent the PRC’s actions to reunify, or it will  align itself with Taiwan in such a way that the PRC’s reunification ambitions are quashed. However, such as during the Peloponnesian War, a goal-based, rising power has a near spiritual advantage when applying pressure against another great power whose goal is to mere defend the status quo. 


Endnotes:

[1] Buckley, C. (n.d.). China’s Leader Now Wields Formidable Power. Who Will Say No to Him? NY Times. https://www.nytimes.com/2022/10/23/world/asia/xi-jinping-china-loyalists.html

[2] Garcia, C., & Tian, Y. (n.d.). China’s Xi vows ‘reunification’ with Taiwan. Reuters. https://www.reuters.com/world/china/chinas-xi-says-reunification-with-taiwan-must-will-be-realised-2021-10-09/

[3] Chan, M. (n.d.). Chinese military faces challenge from falling fertility rate. South China Morning Post. https://www.scmp.com/news/china/military/article/3135342/chinese-military-faces-challenge-falling-fertility-rate

[4] Stauffer, B. (n.d.). Freaking Out About a Potential War With China. Politico. https://www.politico.com/news/magazine/2023/06/09/america-weapons-china-00100373

[5] Roush, T. (n.d.). Chinese Malware Could Cut Power To U.S. Military Bases, Businesses And Homes, Report Claims. Forbes. https://www.forbes.com/sites/tylerroush/2023/07/29/chinese-malware-could-cut-power-to-us-military-bases-businesses-and-homes-report-claims

2023 - Contest: The Taiwan Offensive Assessment Papers China (People's Republic of China) Elliot Pernula Offensive Operations Taiwan United States

Examining Disaster Aid as Cover for a Chinese Fait Accompli Against Taiwan

Editor’s Note:  This article is part of our 2023 Writing Contest called The Taiwan Offensive, which took place from March 1, 2023 to July 31, 2023.  More information about the contest can be found by clicking here.

Michael A. Cappelli II is a U.S. Army All Source Intelligence Analyst that has a BA in Asian Studies and Political Science from Rice University. He has learned about Cross Strait issues from the perspectives of all parties involved through his studies in both mainland China and Taiwan., attendance of GIS Taiwan, and internship at the Baker Institute for Public Policy. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Examining Disaster Aid as Cover for a Chinese Fait Accompli Against Taiwan

Date Originally Written:  July 12, 2023.

Date Originally Published:  August 14, 2023. 

Author and / or Article Point of View:  The author is a member of the US military currently serving in the Indo-Pacific and draws on his experience in Cross Strait issues.

Summary:  China’s aggressive actions make the likelihood of conflict over Taiwan seem inevitable. However, it is possible that China may use Non-War Military Activities (NWMA) to unify with Taiwan[1]. In particular, China may use humanitarian assistance and disaster relief as cover for a fait accompli to gain territory in the Taiwan Strait after a natural disaster. 

Text:  Taiwan’s location in the western Pacific makes it a disaster-prone area. Typhoons, earthquakes, and tsunamis are of particular concern, with local sources indicating Taiwan ranks first in the world in natural disaster risk[2]. While a natural disaster, such as a typhoon, is hard to predict, the situation would provide excellent cover for Chinese NWMA. Climate change is expected to contribute to more extreme weather events in the region, and Taiwan’s geographic proximity to China makes humanitarian response an excellent guise for PLA action against Taiwanese controlled territory. 

A Chinese fait accompli disguised as humanitarian aid and disaster relief will likely take on a multidomain approach, with land, sea, air and cyber warfare entities working to take territory and disrupt an already overburdened Taiwanese disaster response. Damage to undersea communications cables near Taiwan’s Matsu Islands in spring 2023 indicates that China is practicing ways to disrupt communication between Taiwan and its outlying areas[3]. Even if China is unable to take Taiwan itself, outlying islands such as Kinmen and Penghu would provide strategic and symbolic gains for the People’s Liberation Army (PLA). The capture of Penghu would be especially beneficial to the PLA, giving Chinese forces territory halfway between the mainland and southern Taiwan to help secure supply lines, stage troops and weapons platforms, and extend anti-access, area denial (A2/AD) capabilities for a future invasion of Taiwan[4]. A Chinese fait accompli against outlying, Taiwanese territory would also present a good test of international reaction to Chinese military action against the Taiwan government. 

While a push on Taiwan itself through NWMA would be significantly more difficult, it is not outside the realm of possibility. China’s continued activities within Taiwan’s Air Defense Identification Zone (ADIZ), and major military exercises show the PLA is capable of launching air and naval units into the seas and airspace around Taiwan with the goal of not only taking Taiwan but also keeping outside military intervention at bay[5]. These regular, grey zone excursions into Taiwan’s ADIZ by the PLA would also make it more difficult to detect the difference between another PLA exercise and a legitimate PLA push on Taiwan.

To prepare for a possible Chinese fait accompli disguised as humanitarian aid and disaster relief, Taiwan will need to ensure it has resilient critical infrastructure. Taiwan’s ability to recover quickly from a natural disaster would lessen Chinese justification for NWMA and reduce the PLA’s window of opportunity to do so. This plan is not without risk. A focus on critical infrastructure in outlying territories may result in wasted resources, equipment, and specially trained personnel positioned in difficult to defend areas. In contrast, resiliency in Taiwan’s outlying islands may prove a deterrent to Chinese military action by creating a level of uncertainty in Chinese mission success. Even if China is not deterred, the PLA could miscalculate the forces need to take Taiwan’s outlying islands[6]. Such a miscalculation could result in a military disaster and force the PLA to over commit units to taking these outlying territories instead of Taiwan itself. This could provide Taiwan the opportunity to push back China, possibly with international support.

Taiwan could also improve civilian preparedness and disaster recovery. Traditionally, the Taiwanese military acts as the primary first responder to natural disasters[7]. Opportunity does exist to transition disaster response away from military units, especially with Taiwan working to boost civil defense preparedness amongst the general population in case of a war with China[8]. Private, civil defense preparation programs for civilians, with some emphasis on disaster relief, are also increasing in popularity[9]. There is risk involved with this strategy. Shifting natural disaster response away from the Taiwanese military may result in reduced disaster response efficiency. This may also prolong a natural disaster’s impact, increasing the very justification China would need to conduct a humanitarian aid and disaster relief based fait accompli.    

While a natural disaster is hard to predict, it could provide excellent cover for a Chinese fait accompli against Taiwan disguised as humanitarian aid and disaster relief. Taiwan’s outlying areas could be highly susceptible to this type of Chinese NWMA. The Taiwanese government and people have not remained complacent to the threat of Chinese military action. During Taiwan’s 2023 Han Kuang military exercise, the Taiwanese military included its first military exercise to defend the country’s main airport in additional to regular air-raid and amphibious assault preparations[10]. Public polling in Taiwan as indicates an increased interest in defending the island, in particular after the Russian invasion of Ukraine[11]. Preparation however may not stop China if it feels conditions are in its favor to take Taiwan.


Endnotes:

[1] Bilms, K. (2022, January 26). Beyond War and Peace: The PLA’s “Non-War Military Activities” Concept. Retrieved from: https://mwi.usma.edu/beyond-war-and-peace-the-plas-non-war-military-activities-concept/. 

[2] Taoyuan Disaster Education Center. (2023, July 27). Natural Hazards. Retrieved from: https://tydec.tyfd.gov.tw/EN/About/Area/Area_A. 

 [3] Hsu, J. and Mok, C. (2023, May 31).  Taiwan’s island internet cutoff highlights infrastructure risks. Retrieved from: https://asia.nikkei.com/Opinion/Taiwan-s-island-internet-cutoff-highlights-infrastructure-risks.  

[4] Chang, S. and Bailey, R. (2022, June 16). Control Without Invasion: Other Actions China Could Take Against Taiwan. Retrieved from: https://www.barrons.com/news/control-without-invasion-other-actions-china-could-take-against-taiwan-01655438409. 

[5] Blanchard, B. and Lee, Y. (2023, April 10). China ends Taiwan drills after practicing blockades, precision strikes. Retrieved from:  https://www.reuters.com/world/asia-pacific/japan-following-chinas-taiwan-drills-with-great-interest-2023-04-10/. 

[6] Brimelow, B. (2022, December 28). Taiwan’s remote islands are on the frontline with China – sometimes only a few hundred yards from Chinese troops. Retrieved from:  https://www.businessinsider.com/taiwans-outlying-islands-are-on-the-frontline-with-china-2022-12. 

[7] Chiang, A. (2018). Taiwan’s Natural Disaster Response and Military – Civilian Partnerships. Global Taiwan Brief, 3 (10). Retrieved from: https://globaltaiwan.org/2018/05/taiwans-natural-disaster-response-and-military-civilian-partnerships/.

[8] Yeh, J. (2023, June 13). Military releases new civil defense handbook amid backlash. Retrieved from: https://focustaiwan.tw/politics/202306130007. 

[9] Hsiao, R.  (2022). Taiwan’s Bottom-Up Approach to Civil Defense Preparedness. Global Taiwan Brief, 7 (10). Retrieved from:  https://globaltaiwan.org/2022/09/taiwans-bottom-up-approach-to-civil-defense-preparedness/. 

[10] CNA. (2023, July 27). Military Conducts first anti-takeover drills at Taoyuan. Taipei Times. Retrieved from: https://www.taipeitimes.com/News/front/archives/2023/07/27/2003803809. 

[11] Wu, C., Yeh, Y., Chen, F., and Wang, A. (2023, February 22). Why NGOs Are Boosting Support for the Self-Defense in Taiwan. Retrieved from: https://nationalinterest.org/feature/why-ngos-are-boosting-support-self-defense-taiwan-206240.  

2023 - Contest: The Taiwan Offensive Aid / Development / Humanitarian Assistance / Disaster Relief Assessment Papers China (People's Republic of China) Major Events / Unforeseen Events / Black Swans Michael A. Cappelli II Taiwan

Assessing the People’s Republic of China’s Multiple Ongoing Offensives Against Taiwan

Editor’s Note:  This article is part of our 2023 Writing Contest called The Taiwan Offensive, which took place from March 1, 2023 to July 31, 2023.  More information about the contest can be found by clicking here.

Andrew Segal is a U.S. Marine Corps intelligence officer that has served in combat zones and multiple U.S. embassies in the Middle East and Africa. He has a M.A. in Business and Organizational Security Management from Webster University and a B.S.M in Accounting from Tulane University. Throughout his career, he has attended several Marine and joint training courses. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the People’s Republic of China’s Multiple Ongoing Offensives Against Taiwan

Date Originally Written:  June 12, 2023.

Date Originally Published:  July 10, 2023.

Author and / or Article Point of View:  The author is a military officer with experience serving overseas in combat zones and U.S. embassies. This article draws on author’s experience studying China’s irregular warfare efforts abroad.

Summary:  The People’s Republic of China has already begun shaping operations to “reunify” Taiwan, using diplomatic, information, and economic offensives. In the coming years, the PRC could take over Taiwan without ever having to use military action. 

Text:  While the United States government is focused on a military response to a cross-strait invasion of Taiwan, the People’s Republic of China (PRC) has already begun shaping operations for an offensive that could, if executed correctly, ”reunify” Taiwan without a shot being fired.

The PRC is focusing on economic, diplomatic, and information offensives against Taiwan that will likely happen concurrently and over an extended period rather than at a single moment. The objective of this offensive would be to inject several senior level pro-China, pro-reunification actors into the Taiwanese government, resulting in Taiwan rejoining the PRC.

To attack Taiwan economically, the PRC government could focus on Taiwan’s largest imports to the island: energy resources. Taiwan imports 98% of its energy resources to meet demand[1]. Although Taiwan has two nuclear reactors, the current Taiwan administration has a policy of phasing out nuclear power by 2025[2]. If China wanted to economically disrupt Taiwan’s energy supply, it could do so through diplomatic and paramilitary activities using its maritime militia. 

This year, 2023, the PRC government increased its economic and diplomatic engagement with Organisation of the Petroleum Exporting Countries (OPEC) member countries Saudi Arabia and Iran, brokering the reinstatement of diplomatic relations between the two countries[3]. The PRC continues to engage with other OPEC member countries at senior levels of those governments[4]. The PRC could use its strengthened diplomatic influence to request, either overtly or covertly, that these OPEC member countries reduce their sales of oil to Taiwan, eventually requesting that OPEC cease to allow Taiwan to purchase petroleum. This lack of petroleum flow would immediately throw Taiwan’s economy into turmoil. 

For any countries that continue to sell energy resources to Taiwan, the PRC could use its maritime militia fleet to block those ships from accessing Taiwan. The PRC fishing vessels could be used to disrupt shipping lanes which would impose costs on companies delivering resources to Taiwan. Companies would likely determine that it is too costly to continue importing products to Taiwan. These gray-zone operations would likely draw condemnation from the U.S. government. In response, the PRC government could use diplomatic pressure through its Belt Road Initiative (BRI) relationships to reduce international condemnation of the maritime militia’s actions. The PRC government will convey the diplomatic message that this is a regional issue and countries should stay out of regional conflicts, as the PRC has done in BRI countries.

The PRC’s economic offensive against Taiwan’s energy resources would be accompanied by an information campaign to influence the world’s opinion of Taiwan and to influence Taiwanese citizens’ opinion against their government. The PRC government would likely accompany the diplomatic effort to reduce energy imports by emphasizing that PRC does not seek to affect global markets; the PRC would likely amplify the talking points about Taiwan being a rogue nation. The PRC would also influence Taiwanese citizens against their government while promoting Chinese ability to keep shipping lanes open and maintain its energy resources for one of the largest populations in the world. 

The PRC’s informational offensive would be further aided through control of undersea communications. In March 2023, the PRC demonstrated its ability to cut undersea cables to Taiwanese islands[5]; this action was generally underreported with no overt diplomatic response by the U.S. government. This cable cutting is further evidence of the shaping operation by the PRC government: the PRC is using the undersea cable disruptions to test the international response, and level of international condemnation of its disruptions. PRC cyber activities could disrupt the Taiwanese government from promoting a positive, coherent message to its own citizens, thus appearing unable to meet the needs of the average Taiwanese citizen. Covert Chinese cyber offensives could be used to affect Taiwan’s critical infrastructure, which will further denigrate Taiwanese citizens’ opinions of their government, and its ability to provide key services.

These gray-zone campaigns, combined with increased economic turmoil through disruption of energy resources, could ultimately result in Taiwanese citizens protesting their current government. The PRC injection of pro-China messaging could ultimately bring forth Taiwanese politicians that promise strong relations with China, like the relationship China maintains with Hong Kong. If these things happened, the PRC’s takeover of Taiwan would be inevitable and accomplished without firing a shot.

There are actions that Taiwan could take today to combat these economic, diplomatic and information offensives by the PRC. First, Taiwan could adopt a strategy of mutually assured destruction in the event of major disruptions to Taiwan’s economy due to outside influences by China or other countries. China and the rest of the world are dependent on Taiwan’s semiconductor production. The Taiwanese government could implement a policy that if they are attacked economically, they will reduce semiconductor exports to offending countries, including China. 

Second, Taiwan’s Navy could increase its patrols of sea lines of communications with a stated policy of detaining, prosecuting, and destroying any vessels or crews that disrupt Taiwan’s infrastructure. Undersea cables and energy resource imports are strategic assets, and the PRC needs to understand the consequences to disruption to Taiwan. Third, Taiwan’s government can redouble its efforts of strengthening/building diplomatic relations with countries around the world. As the PRC’s selfish policies become less popular in certain countries, and countries realize their substantial debt to the PRC, Taiwan can find a way to establish diplomatic relations and trade partnerships. These expanded relations will make it harder for countries to ignore Taiwan diplomatically when Taiwan and the U.S. condemn China’s offensives at the United Nations.

China has already begun shaping operations for an economic, diplomatic, and informational campaign against Taiwan. Based on the minimal response to date by the Taiwanese government, U.S government, or the rest of the world, it is increasingly likely that China will take over Taiwan in a matter of years, under the noses of the whole world.


Endnotes:

[1] U.S. Energy Information Administration. (2016, December). Taiwan. Retrieved from https://www.eia.gov/international/overview/country/TWN

[2] Deusterberg, T., Fu, A. (2022, September 13). Taiwan Needs US Help on Energy Security. RealClearEnergy. Retrieved from https://www.realclearenergy.org/articles/2022/09/13/taiwan_needs_us_help_on_energy_security_853093.html

[3] Gallagher, A., Hamasaeed, S., Nada, G. (2023, March 1). What You Need to Know about China’s Saudi-Iran Deal. United States Institute of Peace. Retrieved from https://www.usip.org/publications/2023/03/what-you-need-know-about-chinas-saudi-iran-deal

[4] Bruno, G. (2022, December 27). Middle East Needs a More Nuanced Taiwan Policy. The Arab Weekly. Retrieved from https://www.thearabweekly.com/middle-east-needs-more-nuanced-taiwan-policy

[5] McCurry, J. (2023, June 9) How Taiwan’s Submarine Internet Cables Could be a Major Weakness. Vice. Retrieved from https://www.vice.com/en/article/bvj8x3/taiwan-internet-cables-matsu-china

2023 - Contest: The Taiwan Offensive Andrew Segal Assessment Papers Below Established Threshold Activities (BETA) China (People's Republic of China) Taiwan

Assessing the Benefits of the U.S. Army Divesting in Armored Brigade Combat Teams and Investing in Security Force Assistance Brigades

Michael D. Purzycki is an analyst, writer, and editor based in Arlington, Virginia. He has worked for the United States Navy, United States Marine Corps, and United States Army. In addition to Divergent Options, he has been published in the Center for Maritime Strategy, the Center for International Maritime Security, the Washington MonthlyMerion WestWisdom of CrowdsBraver Angels, and more. He can be found on Twitter at @MDPurzycki, on Medium at https://mdpurzycki.medium.com/, and on Substack at The Non-Progressive Democrat.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Benefits of the U.S. Army Divesting in Armored Brigade Combat Teams and Investing in Security Force Assistance Brigades

Date Originally Written:  June 26, 2023.

Date Originally Published:  July 3, 2023.

Author and / or Article Point of View:  The author believes that the demand signal for the U.S. Army to conduct Security Force Assistance is greater than the demand signal for it to employ Armored Brigade Combat Teams.  The author also believes reducing the number of Armored Brigade Combat Teams, and increasing the number of Security Force Assistance Brigades, will make the United States Army better able to address 21st century threats at a time when recruiting faces strong challenges.

Summary:  Russia’s loss of many of its tanks in Ukraine highlights the vulnerability of heavy armor in modern conflict. While tanks are still relevant, the U.S. Army may currently place too much emphasis on them. A greater reliance instead on advisors might help the U.S. protect its interests abroad with fewer personnel and less heavy equipment.

Text:  The M1 Abrams has been the U.S. Army’s main battle tank since 1980[1]. While it was designed to repel an invasion of North Atlantic Treaty Organization (NATO) member states by the Warsaw Pact, it first saw combat in the Persian Gulf War of 1991, where it proved highly effective against the Soviet-built tanks of the Iraqi army[2]. Today, the Abrams forms the core of the Army’s Armored Brigade Combat Teams (ABCTs), of which there are 11 in the Active Component and five in the National Guard[3].

For many years, however, defense experts have questioned whether the Abrams is well-suited to the conflicts the Army has fought, or is likely to fight, in the 21st century. In 2000, Keith B. Bickel of the Center for Strategic and Budgetary Assessments noted that the Abrams was too wide to fit through narrow streets in many villages in Kosovo[4], where U.S. troops were deployed in 1999 as part of a NATO peacekeeping mission. In 2002, James R. Blaker and Steven J. Nider of the Progressive Policy Institute, stressing the need for light infantry units to fight the War on Terror, called for shifting much of the Army’s heavy armor to reserve units[5]. Security expert and former Army paratroop officer Sean McFate advocated a similar shift of tanks to the National Guard in his 2019 book, The New Rules of War[6]. 

While Russia’s invasion of Ukraine has shown that armor is still relevant to 21st century, it does not necessarily follow that the U.S. needs a large number of ABCTs. A 2021 paper by Stacie Pettyjohn, Becca Wasser, and Jennie Matuschak of the Center for a New American Security, while it called for the U.S. Army to be ready to repel a Russian invasion of NATO, also called for “cannibalizing several brigade combat teams” to ensure the U.S. had sufficient equipment in Eastern Europe prepared to act quickly in the event of a Russian attack[7]. While this analysis considers heavy armor to still be important for the U.S. and NATO, one can infer from it that the Army can fulfill its mission in Eastern Europe with fewer ABCTs than it currently possesses.

Russia has lost approximately two-thirds of the tanks it has used in its invasion of Ukraine[8]. While this is in part due to the use of poor tactics by Russian commanders, such as the failure to employ combined arms, the tanks have proven vulnerable to such weapons as man-portable anti-tank systems (MANPATS) and unmanned aerial vehicles (UAVs)[9]. This provides another incentive for the U.S. to reconsider the role of the Abrams in the 21st century Army.

The U.S. also suffers from multiple challenges in military recruitment. More than three-quarters of Americans between the ages of 17 and 24 are ineligible for service, often due to obesity, drug and alcohol use, and other issues related to physical and mental health[10]. As early as 2012, Army Lieutenant General Mark Hertling described obesity as a national security concern[11]. Concerns about discrimination by commanders also hamper recruiting[12], as do worries about sexual harassment and assault within the military[13]. While each of these factors can and should be addressed for their own sake, they also provide an incentive for the Army to consider units that require fewer soldiers than an ABCT.

One such type of unit are the Security Force Assistance Brigades (SFABs). Established in 2018, SFABs’ mission is to “conduct training, advising, assisting, enabling and accompanying operations with allied and partner nations”[14]. Each of the Army’s five current Active SFABs is regionally focused[15], giving it expertise in the cultures and security challenges of a particular part of the world. An SFAB includes approximately 800 soldiers[16], while an ABCT includes more than 4,000[17].

With fewer ABCTs, the U.S. can more readily provide Abrams tanks to allies and partners. The U.S. is currently providing Abrams to NATO ally Poland[18], as well as to Ukraine as it fights to repel Russia’s invasion[19]. Furthermore, with fewer U.S. brigades requiring tanks, more vehicles can be prepositioned in locations such as Poland[20] and South Korea[21], allowing the Army to rapidly respond to potential threats posed by the armies of Russia and North Korea.

Training partner forces to end conflicts, or to prevent them before they occur, makes it less likely that the U.S. will see a need to deploy its own troops to conflict zones. At a time when the recent wars in Afghanistan and Iraq have soured most Americans on extended overseas deployments of U.S. troops, American leaders and policymakers will need options for maintaining stability in contentious regions that do not involve large-scale deployments of ground forces. Increasing the number of SFABs, in tandem with reducing the Army’s emphasis on heavy armor, provides one such option.


Endnotes:

[1] First Division Museum. “M1 Abrams Tank.” https://www.fdmuseum.org/exhibit/m1-abrams-tank/

[2] Hollings, Alex. “How American Abrams Tanks Devastated Russian Tanks in Iraq.” Sandboxx, March 22, 2023. https://www.sandboxx.us/blog/how-american-abrams-tanks-devastated-russian-tanks-in-iraq/

[3] Congressional Research Service. “Defense Primer: Organization of U.S. Ground Forces.” November 21, 2022. https://sgp.fas.org/crs/natsec/IF10571.pdf

[4] Bickel, Keith B. “Buying Smart.” Blueprint Magazine, January 1, 2000. https://www.ndol.org/ndol_ci_kaid_124_subid_159_contentid_1129.html

[5] Blaker, James R. and Steven J. Nider. “Time to Transform.” Blueprint Magazine, January 16, 2002. https://web.archive.org/web/20070212194620/http://www.dlc.org/ndol_ci.cfm?kaid=124&subid=159&contentid=250033

[6] McFate, Sean. The New Rules of War: Victory in the Age of Durable Disorder. New York, HarperCollins, 2019, page 39. https://www.amazon.com/New-Rules-War-Victory-Disorder/dp/0062843583

[7] Pettyjohn, Stacie, Becca Wasser, and Jennie Matuschak. “Risky Business Future Strategy and Force Options for the Defense Department.” Center for a New American Security, July 2021. https://s3.us-east-1.amazonaws.com/files.cnas.org/documents/RiskyBusiness_Budget22_Web.pdf?mtime=20210720095157&focal=none

[8] Saballa, Joe. “Russia Has Lost Two-Thirds of Tanks in Ukraine: Intel.” Defense Post, June 1, 2023. https://www.thedefensepost.com/2023/06/01/russia-lost-tanks-ukraine/

[9] Imperial War Museums. “Why have Russian tanks struggled in Ukraine?” https://www.iwm.org.uk/history/why-have-russian-tanks-struggled-in-ukraine

[10] Novelly, Thomas. “Even More Young Americans Are Unfit to Serve, a New Study Finds. Here’s Why.” Military.com, September 28, 2022. https://www.military.com/daily-news/2022/09/28/new-pentagon-study-shows-77-of-young-americans-are-ineligible-military-service.html

[11] “Obesity is a National Security Issue: Lieutenant General Mark Hertling at TEDxMidAtlantic 2012.” December 6, 2012. https://www.youtube.com/watch?v=sWN13pKVp9s

[12] Skove, Sam. “As Army Launches Recruiting Drive in Cities, One Recruiter Lays Out the Challenges.” Defense One, May 17, 2023. https://www.defenseone.com/threats/2023/05/army-launches-recruiting-drive-cities-one-recruiter-lays-out-challenges/386435/

[13] Seck, Hope Hodge. “Female Army enlistments down after Vanessa Guillen’s death, data shows.” Army Times, June 13, 2023. https://www.armytimes.com/news/your-army/2023/06/13/female-army-enlistments-down-after-vanessa-guillens-death-data-shows/#:~:text=In%20terms%20of%20female%20representation,has%20yet%20to%20fully%20recover

[14] U.S. Army. “Security Force Assistance Brigades.” https://www.army.mil/sfab

[15] Congressional Research Service. “Army Security Force Assistance Brigades (SFABs).” March 23, 2023. https://sgp.fas.org/crs/natsec/IF10675.pdf

[16] Association of the United States Army. “The U.S. Army’s Security Force Assistance Triad: Security Force Assistance Brigades, Special Forces and the State Partnership Program.” October 3, 2022. https://www.ausa.org/publications/us-armys-security-force-assistance-triad-security-force-assistance-brigades-special

[17] Congressional Research Service. “Defense Primer: Organization of U.S. Ground Forces.” November 21, 2022. https://sgp.fas.org/crs/natsec/IF10571.pdf

[18] Associated Press. “Poland signs deal to buy 2nd batch of Abrams tanks.” January 4, 2023. https://www.defensenews.com/global/europe/2023/01/04/poland-signs-deal-to-buy-2nd-batch-of-us-abrams-tanks/

[19] Baldor, Lolita C. and Tara Copp. “US Abrams tanks for training Ukrainian forces arrive in Germany ahead of schedule.” Associated Press, May 11, 2023. https://apnews.com/article/abrams-tanks-ukraine-war-training-russia-62a21f24f4769044b3fcade518e5b44e

[20] U.S. Department of State. “U.S. Security Cooperation With Poland.” October 31, 2022. https://www.state.gov/u-s-security-cooperation-with-poland/

[21] Winkie, Davis. “Army will no longer rotate tank units to Korea — but the tanks are staying.” Army Times, July 1, 2022. https://www.armytimes.com/news/your-army/2022/07/01/army-will-no-longer-rotate-tank-units-to-korea-but-the-tanks-are-staying/

Armor Assessment Papers Capacity / Capability Enhancement Defense and Military Reform Governing Documents and Ideas Michael D. Purzycki U.S. Army

Assessing U.S. 1990s – 2000s China Trade Policy’s Effects on U.S. National Security

Assad Raza is a retired U.S. Army Civil Affairs Officer with deployment experience throughout the Middle East. He holds a M.A. in Diplomacy with a concentration in International Conflict Management from Norwich University, and a M.M.A.S from the U.S. Army Command and General Staff College. He can be found on Twitter @assadraza12. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing U.S. 1990s – 2000s China Trade Policy’s Effects on U.S. National Security

Date Originally Written:  May 23, 2023.

Date Originally Published:  June 5, 2023.

Author and / or Article Point of View:  The author believes that the trade policy between the U.S. and China during the 1990s to 2000s resulted in the growth of China and wider socioeconomic disparities within the U.S. due to the relocation of manufacturing overseas.

Summary:   During the 1990s and 2000s, U.S. trade policies hurt the U.S. middle class as manufacturing jobs moved China. This movement enabled China to become an economic powerhouse and greater military threat to U.S. interests. However, recent policy developments offer hope for rebalancing trade between the two nations and revitalizing domestic manufacturing to fortify the U.S. middle class, as it had been before the end of the Cold War.

Text:  After World War II, the U.S. experienced a significant increase in demand for manufacturing, both in the private sector and the military industrial complex. The post-war population began spending more on a wide range of goods, including new cars and home appliances. Simultaneously, the government invested heavily in military equipment, primarily due to the escalating Cold War tensions with the Soviet Union. This surge in manufacturing activity not only created numerous job opportunities across the nation but also played a pivotal role in fostering the development of one of the strongest middle classes in U.S. history[1]. However, with the conclusion of the Cold War, the United States initiated trade liberalization with multiple countries, particularly China. This shift in trade policies facilitated China’s rise as a global power but had a detrimental impact on the U.S. middle class, as numerous manufacturing jobs were outsourced overseas.

The U.S. failed to foresee the ramifications of opening up trade with China in the 1990s to 2000s, which had a significant impact on the middle class and contributed to China’s emergence as a strategic competitor. U.S. Representative Ro Khanna (D-CA) highlighted these effects in a Foreign Affairs article, stating that “Since 1998, the widening U.S. trade deficit has resulted in the loss of five million well-paying manufacturing jobs and the closure of nearly 70,000 factories[2].” Khanna also emphasized how the decline in manufacturing jobs had a particularly negative effect on Americans without college degrees, limiting their ability to achieve middle-class status. These adverse effects were largely accelerated by a policy passed in 2000 that named China as a permanent free trade partner for the United States.

In the year 2000, the U.S. Congress passed the Permanent Normal Trade Relations with China (PNTR) bill, which aggressively opened up trade with China. The bill received approval in the House with a vote of 237 to 197 and in the Senate with an 83 to 15 majority[3]. However, in 2016, economists reported that the predicted emergence of new jobs to replace those lost did not materialize following the exodus of manufacturing jobs to China as trade relations normalized[4]. While the intention behind this policy was to benefit U.S. economic interests and foster normalized ties with China[5], it came at the expense of the U.S. middle class, as evidenced fifteen years later.

These policies, which prioritized cheaper goods over U.S. middle-class jobs, have played a significant role in driving China’s rapid economic growth. Consequently, China’s economy has the potential to surpass that of the United States and become the world’s largest economy by 2050. Alongside its large population and increased military capabilities, this economic growth positions China as the most significant threat to the United States[6]. The long-term effects of the trade imbalance between the two countries have escalated tensions between the powers and continue to impact the U.S. domestic manufacturing job market. However, it is important to note that the responsibility for these consequences does not solely lie with the United States. China has engaged in various controversial practices to manipulate the situation in its favor, exacerbating the adverse effects of the trade dynamics.

The historical combination of low wages and an undervalued currency in China has provided strong incentives for numerous U.S. companies to relocate their manufacturing operations there. The availability of a large labor force, along with a lower cost of living and fewer labor regulations, allowed Chinese companies to exploit their workers with low compensation[7]. Additionally, the Chinese government over the years has implemented currency management policies, intentionally keeping the value of its currency relatively low in comparison to major currencies such as the U.S. dollar[8]. This combination of factors, including low wages and an undervalued currency, created a significant cost advantage for U.S. companies engaged in manufacturing in China. By shifting production to China, these companies manufactured goods at a lower cost, thereby increasing their profit margins or enabling them to offer products at competitive prices in the global market. These practices, which have caused controversy, are meant to give China an economic edge by producing cheaper exports that add to the U.S. trade deficit and result in fewer domestic manufacturing jobs.

It is worth noting that the United States is taking steps to address the trade imbalance between China and the U.S. This inequality has persisted for over 20 years, and steps are being taken to encourage the return of manufacturing to the U.S. This return will not only help revive the middle class, but also reduce dependence on China, particularly in light of the global supply chain disruptions caused by COVID-19. The U.S. government has introduced several initiatives to achieve this goal, such as the Inflation Reduction Act, which aims to increase domestic energy production and manufacturing by 40 percent by 2030[9]. Another initiative is the CHIPS and Science Act, which offers incentives for domestic semiconductor production in response to the impact of the pandemic[10]. Despite these efforts, the loss of manufacturing jobs to China has already taken a toll on the U.S. middle class, and it may be difficult for them to fully recover to the level it was at the conclusion of the Cold War.


Endnotes:

[1] Pruitt, S. (2020, May 14). The post World War II boom: How America got into gear. History.com. https://www.history.com/news/post-world-war-ii-boom-economy  

[2] Khanna, R. (2022a, December 20). The new industrial age. Foreign Affairs. https://www.foreignaffairs.com/china/ro-khanna-new-industrial-age-america-manufacturing-superpower  

[3] Tankersley, J. (2016, March 21). What republicans did 15 years ago to help create Donald Trump today. The Washington Post. https://www.washingtonpost.com/news/wonk/wp/2016/03/21/how-republicans-helped-create-donald-trump-more-than-15-years-ago/  

[4] Autor, D., Dorn, D., & Hanson, G. (2016). The China shock: Learning from labor market adjustment to large changes in trade. National Bureau of Economic Research. https://doi.org/10.3386/w21906  

[5] Clinton, W. J. (2000, May 24). Remarks by the president on passage of permanent normal trade relations with China: The Rose Garden. U.S. Department of State. https://1997-2001.state.gov/regions/eap/000524_clinton_china.html  

[6] Spillane, J. (2023, March 20). Can China surpass the United States as the next world superpower?. LSE International Development. https://blogs.lse.ac.uk/internationaldevelopment/2023/03/20/can-china-surpass-the-united-states-as-the-next-world-superpower/  

[7] Plekhanov, D. (2017, December 13). Is China’s era of cheap labor really over? The Diplomat. https://thediplomat.com/2017/12/is-chinas-era-of-cheap-labor-really-over/  

[8] Morrison, W. M., & Labonte, M. (2013, July 22). China’s currency policy: An analysis of the economic issues – CRS report RS21625. Congressional Research Service (CRS). https://crsreports.congress.gov/product/pdf/RS/RS21625/70  

[9] U.S. Senate. (2022). Summary: The inflation reduction act of 2022 – senate. Senate.Gov. https://www.democrats.senate.gov/imo/media/doc/inflation_reduction_act_one_page_summary.pdf  

[10] Bennet, M. (2022). Chips and science act of 2022 section-by-section summary – U.S. Senator Michael Bennet. U.S. Senate.Gov. https://www.bennet.senate.gov/public/_cache/files/4/0/40919cb4-ff63-4434-8ae2-897a4a026b30/7BCDD84F555A6B85BEC800514F1D3AFD.chips-and-science-act-of-2022-section-by-section.pdf

Assad Raza Assessment Papers China (People's Republic of China) Governing Documents and Ideas Trade United States

Assessing Guatemalan Military Relationships

Juan Manuel Perez has served in the Guatemalan Army. He presently is retired. Throughout his military career, he took various military training courses as part of his professionalization including Strategic High Studies, War College, Command and Staff College, Human Rights, and Peacekeeping Operations. He can be found on Twitter @r_juanmanuel. 


Title:  Assessing Guatemalan Military Relationships 

Date Originally Written:  April 10, 2023. 

Date Originally Published:  April 24, 2023.  

Author and / or Article Point of View:  The author is a retired military member who believes trust builds strong international military relationships. This article includes the author’s great experiences working together with U.S. Southern Command leaders between 2016-2017.

Summary:  The Guatemalan Military is able to meet the challenges it faces through its various partnerships.  Its partnership with the U.S. Southern Command builds capacity and capabilities to counter threat networks and prepare for and respond to disasters and humanitarian crises.  Its partnerships with border sharing nations such as Salvador, Honduras, Mexico, and an adjacency zone with Belize enable all involved to address common threats.

Text:  The diplomatic relation between the U.S. Government and Guatemala has existed since 1849[1].  This partnership between the U.S. Government and Guatemala has improved Guatemalan Military capabilities and competencies to address trans-regional challenges.  

Guatemala is part of 31 countries that encompass the U.S. Southern Command (USSOUTHCOM) Area of Responsibility (AOR).  In this AOR, trans-regional and transnational threats affect security and governance. Drug trafficking is also a significant security challenge.  However, due to the close proximity of the U.S. and the USSOUTHCOM AOR, U.S. support can be provided and strong relationships built.

USSOUTHCOM provides different levels of support to countries in its AOR: strategic, operational, and tactical. This support assists host nation militaries and security forces with training, equipment, and planning as part of the U.S. Department of Defense contribution to regional strategy. 

USSOUTHCOM support to the Guatemalan Military has been critical to building capacity to counter regional threat networks and preparing for and responding to disasters and crises.  Organizations supporting the Guatemalan Military also include the greater U.S. Department of Defense, U.S. Army South, the Arkansas National Guard, and the U.S. Department of State’s Bureau of International Narcotics and Law Enforcement Affairs. 

Through the Interagency Task Force (IATF) in combating drug trafficking[2], USSOUTHCOM strengthened the Guatemalan Military and National Police through counter narcotics aid and technical assistance. The IATF consisted in three task forces which operate close to the Guatemala’s main porous borders.  

The first Task Force was called “Tecun Uman” which operated in western border with Mexico. The second Task Force was called “Chorti” which operated in the eastern region of the Guatemala adjacent to the border region with Honduras.  The third Task Force was called “Xinca”, which operated adjacent to the border region with El Salvador. In 2016-2017 the project of a fourth Task Force “Jaguar” was planned, which was going to be focused to work in the northern region of Guatemala bordering Mexico.  

The Guatemalan Military must also be prepared to handle natural disasters during the rainy season, the possibility of eruption of one of the chain of volcanos, and the latent hazard of earthquakes.  USSOUTHCOM has worked with the Guatemalan Military to enhance Humanitarian and Disaster Relief capabilities. The U.S. has share advanced technology which have help to predict, avert, or mitigate before natural threats happens. The exchange of experiences and lesson learned have created trust between partners nations, in real crisis responses. The U.S. capabilities also have aided to delivery quick humanitarian supplies for people in need, especially in time of hurricanes or tropical floods. These efforts have helped improved interoperability and institutionalize preparedness and responses measures.

Guatemala has developed a security strategy based on the competencies and capabilities that each government institution possesses. These competencies and capabilities generate synergy through partnerships with friendly countries which share a common border with Guatemala such as Salvador, Honduras, Mexico and an adjacency zone with Belize. 

Another source of assistance to the Guatemalan Military is both Surveillance and intelligence technology through the Cooperative Situational Information Integration (CSII) system[3] collecting threat data to counter illicit organizations. Guatemala’s strategic relationship with Mexico enables the high-level group for security (GANSEG) to hold meetings on Intelligence, International Security and Terrorism, Organized Crime and Legal cooperation, and Public and Border Security.  

Guatemala coordinates with the Belize Defense Forces to conduct patrols with the scope of the Confidence Building Measures[4] along the adjacency zone, with the purpose of fighting the threats towards both countries.  

Guatemala also enhanced border security efforts with Honduras through the high-level group for security and justice (GANSEJ).  Other Central America countries have developed protocols on different topics, including natural disasters and peace operations within dynamics of the Central America Armed Forces Conference (CFAC)[5]. 

Efforts by USSOUTHCOM through its entire AOR, and the Guatemalan Military with both USSOUTHCOM and its partners and neighbors, have enhanced security throughout the region, both from trans-regional threats and natural disasters. These efforts have built long-lasting relationships and interoperability that will enable Guatemala, and other countries in the USSOUTHCOM AOR to work together in the future to address any challenge that comes along.


Endnotes:

 [1] U.S. Department of State. (2021, November 9). U.S. relations with Guatemala – United States Department of State. U.S. Department of State. Retrieved April 23, 2023, from https://www.state.gov/u-s-relations-with-guatemala/

[2] Oak, G. S. (2015, February 9). Building the guatemalan interagency task force Tecún Umán. RAND Corporation. Retrieved April 23, 2023, from https://www.rand.org/pubs/research_reports/RR885.html

[3] US, Latin American countries demonstrate, assess new information-sharing technology. DVIDS. (n.d.). Retrieved April 23, 2023, from https://www.dvidshub.net/news/122355/us-latin-american-countries-demonstrate-assess-new-information-sharing-technology

[4] OAS: Belize and Guatemala Sign Agreement on Negotiation Framework and Confidence Building Measures. (n.d.). Retrieved April 23, 2023, from https://www.oas.org/en/media_center/press_release.asp?sCodigo=E-188/05

[5] Valle/Diálogo, K. (2022, August 2). CFAC strengthens alliances in Central America. Diálogo Américas. Retrieved April 23, 2023, from https://dialogo-americas.com/articles/cfac-strengthens-alliances-in-central-america/#.ZEUX8S_MIzw

Allies & Partners Assessment Papers Capacity / Capability Enhancement Guatemala Juan Manuel Perez

Assessing the National Guard State Partnership Program and Possible Impact on U.S./Latin America Relations: Is the State Partnership Program Being Leveraged to Its Fullest Potential?

Travis L. Eddleman is a Lieutenant Colonel in the United States Army. He is currently Battalion Commander of the 875th Engineer Battalion, Arkansas Army National Guard. He earned his Doctor of Science (D.Sc.) in Civil Security Leadership, Management, and Policy from New Jersey City University. His research focuses on civil-military relations and the challenges of the traditional drilling guardsman. He can be found on Twitter @tleddleman. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessing the National Guard State Partnership Program and Possible Impact on U.S./Latin America Relations: Is the State Partnership Program Being Leveraged to Its Fullest Potential?

Date Originally Written:  March 9, 2023.

Date Originally Published:  March 13, 2023.

Author and/or Article Point of View:  The author is a U.S. Army National Guard Officer. The author believes in the inherent strengths of the State Partnership Program and that the program should be leveraged to its fullest potential to strengthen security cooperation in Latin America, preserving U.S. influence in the hemisphere.

Summary:  With continuous involvement in Iraq and Afghanistan over the last two decades, the United States has neglected relationships in Latin America. Several countries within the U.S. sphere of influence have been subjected to Chinese and Russian influence. The National Guard State Partnership Program has produced strong, long-term relationships that can be leveraged to strengthen continued security cooperation in Latin America. 

Text:  The concept of security cooperation involves developing and fostering defense relationships promoting specific U.S. security interests[1] and “aligning security cooperation programs, activities, and resources with defense strategy and priorities[2].” Of the many programs encompassed under the umbrella of security cooperation, the State Partnership Program (SPP) directly involves individual states’ National Guard forces and provides them an avenue to assist in accomplishing strategic level objectives and policy goals for both the Department of Defense and the Department of State[3]. Since its inception over 25 years ago, the SPP has increased to include 85 partnerships with 93 different nations across all Geographic Combatant Commands (GCCs)[4]. The SPP does not seek to increase self-sustainment among partner militaries but to establish and maintain important security relationships between the U.S. and other nations with common interests and goals[5]. 

The Monroe Doctrine, originally issued by U.S. President James Monroe in 1823, established the western hemisphere as the United States’ “sphere of interest.” The subsequent Roosevelt Corollary to the Monroe Doctrine further instituted the U.S. intent to police the western hemisphere in defense and preservation of U.S. interests there[6]. The Roosevelt Corollary was the first U.S. attempt to achieve global security for its own interests[7]. Since that time, these policies have largely focused southward to Latin America. However, with the two-decade long involvement in Iraq and Afghanistan, the United States, according to some analysts, quickly turned its back on our Latin American partners[8]. 

The diversion of U.S. attention from activities in Latin America created opportunity for increased Russian and Chinese influence[9] along with numerous concerning shifts in the countries of Argentina, Peru, Bolivia, Brazil, and Colombia[10]. In a 2021 assessment, the Office of the Director of National Intelligence identified several concerning security issues ongoing in Latin America. Due to continuing sanctions against Russia, the Russian government has expanded relations with and in support of Venezuela, Cuba, and other Latin American nations to increase commerce agreements and offset the impact of U.S. sanctions. In addition, widespread frustration, and concern over economic woes in Latin America brought about by the COVID-19 pandemic, further threatened regional security and stability[11]. 

As the first quarter of the 21st century draws to a close, security cooperation in Latin America has become more important than it has been in decades, and the National Guard possesses the ability to increase U.S. influence and strengthen continued security cooperation between the U.S. and friendly nations to the south though the State Partnership Program. As the United States looks to extend and fortify its strategic influence, policy makers would be wise to consider this currently existing, well-established program, as it could have a significant impact on the achievement of national strategic objectives. Currently the U.S. has 24 existing SPP relationships in Latin America[12], more than any other GCC[13]. Yet, despite these 24 existing relationships, the SPP seems an afterthought at most and a completely missed opportunity at worst[14]. The National Guard brings a key aspect to relationships with their foreign partners. Guardsmen tend to stay in place for years, sometimes even decades in the same unit. They initiate and develop long-term, robust relationships with their foreign partners that add a very personal dimension to these important security cooperation agreements[15]. In many instances, relationships between National Guard forces and their foreign partners have become so strong the foreign militaries have deployed oversees with their National Guard counterparts in both Iraq and Afghanistan[16]. 

Despite a nearly 30-year existence of the SPP, the National Guard Bureau (NGB) only recently implemented new budgeting measures to allocate funding based upon the importance of a particular SPP relationship and how closely that relationship aligns with U.S. strategic goals and desired outcomes[17]. The NGB allocated funding for fiscal year 2022 based upon assignment of each state partnership to one of three prioritized groups. More detailed management and budgetary alignment of resources of this sort will prove instrumental to U.S. security cooperation agreements as the U.S. turns its attention back to changing political environments in Latin America and concern about America’s standing there.

Doug Bandow, a Senior Fellow at the CATO Institute, suggested the U.S. needs to learn better ways to manage its own neighborhood: Latin America[18]. The means to reassert the influence once enjoyed under the Monroe Doctrine and the subsequent Roosevelt Corollary and capitalize on existing security cooperation efforts already exists in the form of the National Guard SPP. Policy makers and senior leaders can continue to leverage the quality relationships the SPP has have built in those countries now buffeted by concerning influence. General Daniel Hokanson, Chief of the NGB, referenced the SPP as “a process among friends[19].” With rapid change and growing Russian and Chinese influence in Latin America, the United States would do well to remember its friends and capitalize on these long-standing relationships forged between U.S. citizen-soldiers and their foreign partners. 


Endnotes:

[1] U.S. Department of Defense. (2016, December 29). DOD directive 5132.03, December 29, 2016 – U.S. department of defense. Retrieved March 3, 2023, from https://open.defense.gov/portals/23/Documents/foreignasst/DoDD_513203_on_Security_Cooperation.pdf 

[2] Department of Defense. (2023). Security Cooperation. Retrieved March 7, 2023, from https://open.defense.gov/Transparency/Security-Cooperation/#:~:text=The Office of the Under,with defense strategy and priorities. 

[3] Security Cooperation, 2023.

[4] Department of Defense. (2022, March 23). Department of Defense Strategic Evaluation the Office of the deputy … defense.gov. Retrieved March 6, 2023, from https://open.defense.gov/portals/23/documents/security_cooperation/state_partnership_program.pdf 

[5] Lengyel, J. (2018). “Securing the nation one partnership at a time.” Strategic Studies Quarterly, Fall, 3-9. 

[6] National Archives and Records Administration. (2022, May 10). Monroe Doctrine (1823). Retrieved March 6, 2023, from https://www.archives.gov/milestone-documents/monroe-doctrine 

[7] Ricard, S. (2006). “The Roosevelt Corollary,” Presidential Studies Quarterly, 36, 17-26.

[8] Youngers, C. (2003, June 6). The U.S. and Latin America after 9-11 and Iraq. Americas Program. Retrieved March 8, 2023, from https://www.americas.org/1807/ 

[9] Gaffney, F. (2022, June 21). Paging president Monroe. Center for Security Policy. Retrieved March 5, 2023, from https://centerforsecuritypolicy.org/paging-president-monroe/ 

[10] Bandow, D. (2022, June 29). Latin America Rises: Whither the Monroe Doctrine. Cato.org. Retrieved March 3, 2023, from https://www.cato.org/commentary/latin-america-rises-whither-monroe-doctrine 

[11] Office of the Director of National Intelligence. (2021, April 9). Annual Threat Estimate of the U.S. Intelligence Community. dni.gov. Retrieved March 5, 2023, from https://www.dni.gov/files/ODNI/documents/assessments/ATA-2021-Unclassified-Report.pdf

[12] Lengyel, 2018.

[13] SOUTHCOM’s 2022 Posture Statement to Congress. (2022, March 8). Retrieved March 6, 2023, from https://www.southcom.mil/Media/Special-Coverage/SOUTHCOMs-2022-Posture-Statement-to-Congress/ 

[14] Warbrick, M. (2022, February 25). Time to integrate State Partnership Program in Pentagon Planning. Breaking Defense. Retrieved March 4, 2023, from https://breakingdefense.com/2022/02/time-to-integrate-state-partnership-program-in-pentagon-planning/ 

[15] Garamone, J. (2021, November 12). Guard Partnership Program adapts, continues to grow. U.S. Department of Defense. Retrieved March 5, 2023, from https://www.defense.gov/News/News-Stories/Article/Article/2842285/guard-partnership-program-adapts-continues-to-grow/ 

[16] Lengyel, 2018.

[17] Sherman, T. (2022, July 12). State Partnership Program: DOD should ensure partner Record Completed Activities and Clarify Appropriate Authorities. Retrieved March 4, 2023, from https://www.gao.gov/assets/gao-22-104672.pdf 

[18] Bandow, 2022.

[19] Garamone, 2021.

Assessment Papers Capacity / Capability Enhancement Latin America Non-Full-Time Military Forces (Guard, Reserve, Territorial Forces, Militias, etc) Travis L. Eddleman U.S. Army

Assessing the Need for the Battlefield Scavenger

Shawn Moore is Principal of the Russell Area Technology Center. He has studied abroad as a Fulbright Scholar in Uzbekistan, Tajikistan, and Japan. He has conducted research studies in China and the Republic of Korea. Shawn is an Officer in the South Carolina State Guard and recipient of the Association of Former Intelligence Officers‘ Peter Jasin Graduate Fellowship. Shawn holds a Bachelor of Science in History and Geography from Morehead State University, a Master of Arts in Counseling, and a Masters of Arts in Leadership. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Need for the Battlefield Scavenger

Date Originally Written:  January 14, 2023.

Date Originally Published:  January 30, 2023.

Author and / or Article Point of View:  The author believes that a new type of support soldier is necessary for the battlefields of today.

Summary:  The decisive impact of autonomous systems on the battlefield today coupled with supply chain interruptions during major combat operations will lead to the novel creation of the battlefield scavenger. This scavenger will retrieve, repurpose, repair, and return autonomous systems to operational status, reducing supply chain dependence and enhancing combat effectiveness.

Text:  The war in Ukraine has shown the demands for a wide range of technical capabilities across all facets of conflict. Autonomous systems, for the purposes of this article, refers to “any particular machine or system capable of performing an automated function and potentially learning from its experiences to enhance its performance[1].”

Autonomous systems in Ukraine have carried out surveillance, kinetic strikes, electronic warfare, and resupply missions either independently or operating collaboratively. When employed in combat, autonomous systems provide operational advantages over an adversary. The Ukraine War has also shown the rapid rate in which materiel is consumed in modern war. These autonomous devices may not be costly, but the technology becomes increasingly difficult to obtain as factories and supply lines fall under attack. Further, in a Great Power Conflict, access to raw materials to produce autonomous systems will be contested.

The worldwide diffusion of technology has the potential to offset some of the supply and procurement problems in Ukraine. Officials in Europe addressed these problems publicly with the revelation that Russian Soldiers were seen cannibalizing components and microchips from refrigerators and washing machines to use for military purposes[2]. The Russian Military proved that autonomous systems being removed from the battlespace results in lives lost and the loss of valuable time at critical periods of battle. The Ukraine Military has turned to commercially available autonomous systems and modified them for combat operations.

The reliance on autonomous systems will require a new type of combat service support soldier who will scavenge the battlespace for discarded scrap, damaged autonomous systems, and devices that could be repurposed. Inspired by the Jawas of the film “Star Wars,” this article will refer to this new combat service support soldier also as JAWAS, though this is an acronym for Joint LAnd Water Air Scavenger. In “Star Wars,” Jawas[3] were passionate scavengers, combing the deserts of Tatooine for droids or scraps which they would capture and sell to the local residents, forming a codependent circle of trade. In a not too distant future, the side that is able to innovate and employ JAWAS the quickest will have an advantage over the adversary.

The JAWAS will work in on land, water, air, and even space. The JAWAS will be composed of individuals with exceptional imagination, the ability to think laterally while having the physical stamina to engage in scavenging the battle space and defending their area of operations. JAWAS will station close to the front line to reduce the response time operating as a self-contained company from a mobile platform that includes workshops. The JAWAS will operate on the Golden Hour, a term familiar to military medicine. The Golden Hour is the ability to get wounded warfighters off the battlefield and delivered to the care of a full-scale military hospital within an hour[4]. JAWAS will roam the environment to quickly retrieve, repurpose, repair and return autonomous systems to an operational status.

Once a system is acquired, relying on field expedient materials in theater and limited supplies, the JAWAS will undertake the process of designing, fabricating, programming, and assembling autonomous systems for combat on land, water, or air. JAWAS will need to be a special type of soldier coming from the science, technology, engineering and mathematics fields, but also have with an exceptional imagination. They will use power tools, hand tools, and advanced diagnostic equipment to support multidomain operations. The leadership from junior officers and noncommissioned officers of JAWAS will be no less than that required by combat troops.

JAWAS support combat operations by leveraging autonomous systems to create advantages over adversaries. Furthering the reliance on locally sourced materials will limit the supply and procurement requests for parts and components. This local sourcing will allow scarce transportation to be dedicated to moving war materiel into the theater. While JAWAS may not exist now, the demand signal is coming, and employing untrained soldiers in this manner will result in confusion, panic, and possible defeat.


Endnotes:

[1] James Rands, “Artificial Intelligence and Autonomous Systems on the Battlefield – Proof.” Posted 28 February 2019, (accessed May 2, 2020); Richard J. Sleesman, and Todd C. Huntley. “Lethal Autonomous Weapon Systems: An Overview.” Army Lawyer, no. 1, Jan. 2019, p. 32+, (access May 2, 2020).

[2] Nardelli, A., Baschuk, B., & Champion, M. (2022, October 29). Putin Stirs Worry That Russia Is Stripping Home-Appliance Imports for Arms. Time. Retrieved January 29, 2023, from https://time.com/6226484/russia-appliance-imports-weapons/

[3] Jawa. Wookieepedia. (n.d.). Retrieved January 29, 2023, from https://starwars.fandom.com/wiki/Jawa

[4] Aker, J. (2022, June 14). Military Medicine Is Preparing for the Next Conflict. Medical Education and Training Campus. Retrieved January 29, 2023, from https://www.metc.mil/METC-News/News/News-Display/Article/3062564/military-medicine-is-preparing-for-the-next-conflict/.

Assessment Papers Autonomous Weapons Systems Capacity / Capability Enhancement Emerging Technology Shawn Moore

Assessing Terrorism and Artificial Intelligence in 2050

William D. Harris is a U.S. Army Special Forces Officer with six deployments for operations in Iraq and Syria and experience working in Jordan, Turkey, Saudi Arabia, Qatar, Israel, and other regional states. He has commanded from the platoon to battalion level and served in assignments with 1st Special Forces Command, 5th Special Forces Group, 101st Airborne Division, Special Operations Command—Central, and 3rd Armored Cavalry Regiment.  William holds a Bachelor of Science from United States Military Academy, a Master of Arts from Georgetown University’s Security Studies Program, a Masters from the Command and General Staff College, and a Masters from the School of Advanced Military Studies.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  AssessingTerrorism and Artificial Intelligence in 2050

Date Originally Written:  December 14, 2022.

Date Originally Published:  January 9, 2023.

Author and / or Article Point of View:  The author is an active-duty military member who believes that terrorists will pose increasing threats in the future as technology enables their operations.  

Summary:  The proliferation of artificial intelligence (AI) will enable terrorists in at least three ways.  First, they will be able to overcome their current manpower limitations in the proliferation of propaganda to increase recruitment.  Second, they will be able to use AI to improve target reconnaissance.  Third, terrorists can use AI to improve their attacks, including advanced unmanned systems and biological weapons.

Text:  Recent writing about the security implications of artificial intelligence (AI) has focused on the feasibility of a state like China or others with totalitarian aspirations building a modern panopticon, combining ubiquitous surveillance with massive AI-driven data processing and pattern recognition[1].  For years, other lines of research into AI have analyzed the application of AI to fast-paced conventional warfare.  Less has focused on how AI could help the sub-state actor, the criminal, insurgent, or terrorist.  Nevertheless, history shows that new technologies have never given their user an enduring and decisive edge.  Either the technology proliferates or combatants find countermeasures.  Consequently, understanding how AI technology could enable terrorists is a first step in preventing future attacks.

The proliferation of AI has the potential to enable terrorists similar to the way that the proliferation of man-portable weapons and encrypted communications have enabled terrorists to become more lethal[2].  Terrorists, or other sub-state entrepreneurs of violence, may be able to employ AI to solve operational problems.  This preliminary analysis will look at three ways that violent underground groups could use AI in the coming decades: recruitment, reconnaissance, and attack.

The advent of mass media allowed the spread of radical ideological tracts at a pace that led to regional and then global waves of violence.  In 1848, revolutionary movements threatened most of the states in Europe.  Half a century later, a global yet diffuse anarchist movement led to the assassination of five heads of state and the beginning of World War I[3].  Global revolutionary movements during the Cold War and then the global Islamist insurgency against the modern world further capitalized on the increasing bandwidth, range, and volume of communication[4].  The sleek magazine and videos of the Islamic State are the latest edition of the terrorists’ use of modern communications to craft and distribute a message intended to find and radicalize recruits.  If they employ advanced AI, terrorist organizations will be able to increase the production rate of quality materials in multiple languages, far beyond what they are currently capable of producing with their limited manpower.  The recent advances in AI, most notably with OpenAI’s Chatbot, demonstrate that AIs will be capable of producing quality materials.  These materials will be increasingly sophisticated and nuanced in a way to resonate with vulnerable individuals, leading to increased radicalization and recruitment[5].

Once a terrorist organization has recruited a cadre of fighters, then it can begin the process of planning and executing a terrorist attack, a key phase of which is reconnaissance.  AI could be an important tool here, enabling increased collection and analysis of data to find patterns of life and security vulnerabilities.  Distributed AI would allow terrorists conducting reconnaissance to collect and process vast quantities of information as opposed to relying on purely physical surveillance[6].  This AI use will speed up the techniques of open source intelligence collection and analysis, enabling the organization to identify the pattern of life of the employees of a targeted facility, and to find gaps and vulnerabilities in the security.  Open-source imagery and technical information could provide valuable sources for characterizing targets.  AI could also drive open architecture devices that enable terrorists to collect and access all signals in the electromagnetic spectrum and sound waves[7].  In the hands of skilled users, AI will able to enable the collection and analysis of information that was previously unavailable, or only available to the most sophisticated state intelligence operations.  Moreover, as the systems that run modern societies increase in complexity, that complexity will create new unanticipated failure modes, as the history of computer hacking or even the recent power grid attacks demonstrate[8].  

After conducting the target reconnaissance, terrorists could employ AI-enabled systems to facilitate or execute the attack.  The clearest example would be autonomous or semi-autonomous vehicles.  These vehicles will pose increasing problems for facilities protection in the future.  However, there are other ways that terrorists could employ AI to enable their attacks.  One idea would be to use AI agents to identify how they are vulnerable to facial recognition or other forms of pattern recognition.  Forewarned, the groups could use AI to generate deception measures to mislead security forces.  Using these AI-enabled disguises, the terrorists could conduct attacks with manned and unmanned teams.  The unmanned teammates could conduct parts of the operation that are too distant, dangerous, difficult, or restricted for their human teammates to action.  More frighteningly, the recent successes in applying machine learning and AI to understand deoxyribonucleic acid (DNA) and proteins could be applied to make new biological and chemical weapons, increasing lethality, transmissibility, or precision[9].  

Not all terrorist organizations will develop the sophistication to employ advanced AI across all phases of the organizations’ operations.  However, AI will continue and accelerate the arms race between security forces and terrorists.  Terrorists have applied most other human technologies in their effort to become more effective.  They will be able to apply AI to accelerate their propaganda and recruitment; target selection and reconnaissance; evasion of facial recognition and pattern analysis; unmanned attacks against fortified targets; manned-unmanned teamed attacks; and advanced biological and chemical attacks.  

One implication of this analysis is that the more distributed AI technology and access become, the more it will favor the terrorists.  Unlike early science fiction novels about AI, the current trends are for AI to be distributed and more available unlike the centralized mainframes of earlier fictional visions.  The more these technologies proliferate, the more defenders should be concerned.

The policy implications are that governments and security forces will continue their investments in technology to remain ahead of the terrorists.  In the west, this imperative to exploit new technologies, including AI, will increasingly bring the security forces into conflict with the need to protect individual liberties and maintain strict limits on the potential for governmental abuse of power.  The balance in that debate between protecting liberty and protecting lives will have to evolve as terrorists grasp new technological powers.


Endnotes:

[1] For example, see “The AI-Surveillance Symbiosis in China: A Big Data China Event,” accessed December 16, 2022, https://www.csis.org/analysis/ai-surveillance-symbiosis-china-big-data-china-event; “China Uses AI Software to Improve Its Surveillance Capabilities | Reuters,” accessed December 16, 2022, https://www.reuters.com/world/china/china-uses-ai-software-improve-its-surveillance-capabilities-2022-04-08/.

[2] Andrew Krepinevich, “Get Ready for the Democratization of Destruction,” Foreign Policy, n.d., https://foreignpolicy.com/2011/08/15/get-ready-for-the-democratization-of-destruction/.

[3] Bruce Hoffman, Inside Terrorism, Columbia Studies in Terrorism and Irregular Warfare (New York: Columbia University Press, 2017).

[4] Ariel Victoria Lieberman, “Terrorism, the Internet, and Propaganda: A Deadly Combination,” Journal of National Security Law & Policy 9, no. 95 (April 2014): 95–124.

[5] See https://chat.openai.com/

[6] “The ABCs of AI-Enabled Intelligence Analysis,” War on the Rocks, February 14, 2020, https://warontherocks.com/2020/02/the-abcs-of-ai-enabled-intelligence-analysis/.

[7] “Extracting Audio from Visual Information,” MIT News | Massachusetts Institute of Technology, accessed December 16, 2022, https://news.mit.edu/2014/algorithm-recovers-speech-from-vibrations-0804.

[8] Miranda Willson, “Attacks on Grid Infrastructure in 4 States Raise Alarm,” E&E News, December 9, 2022, https://www.eenews.net/articles/attacks-on-grid-infrastructure-in-4-states-raise-alarm/; Dietrich Dörner, The Logic of Failure: Recognizing and Avoiding Error in Complex Situations (Reading, Mass: Perseus Books, 1996).

[9] Michael Eisenstein, “Artificial Intelligence Powers Protein-Folding Predictions,” Nature 599, no. 7886 (November 23, 2021): 706–8, https://doi.org/10.1038/d41586-021-03499-y.

Artificial Intelligence / Machine Learning / Human-Machine Teaming Assessment Papers Emerging Technology Violent Extremism William D. Harris

Assessing The Network-State in 2050

Bryce Johnston (@am_Bryce) is an U.S. Army officer currently serving in the 173 rd Airborne Brigade. He is a West Point graduate and a Fulbright Scholar. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing The Network-State in 2050

Date Originally Written:  December 12, 2022.

Date Originally Published:  December 26, 2022.   

Author and / or Article Point of View:  The author is an active-duty U.S. Army officer whose studies intersect technology and politics. His assessment combines Balaji Srinivasan’s concept of the network-state with Chamath Palihapitiya’s[1] claim that the marginal cost of energy and computation will eventually reach zero. The article is written from the point of view of an advisor to nation-states.

Summary:  Online communities have become an integral part of life in 2022. As money, computing power, and energy become cheaper, citizens may find themselves identifying more with an immersive online network than their nation. If this trend continues, the world’s balance of power may soon include powerful network-states that do not respect political boundaries and control important aspects of the globe’s information domain. 

Text:  The nation-state was the primary actor in international affairs for the last two centuries; advances in digital technology may ensure the network-state dominates the next two centuries. The network-state, as conceived by Balaji Srinivasan, is a cohesive digital community that is capable of achieving political aims and is recognized as sovereign by the international community[2]. The citizens of the network-state are not tied to a physical location. Instead, they gain their political and cultural identity through their affiliation with a global network connected through digital technology. The idea of the network-state poses an immediate challenge to the nation-state whose legitimacy comes through its ability to protect its physical territory.  By 2050, nation-states like the United States of America could compete with sovereign entities that exist within their borders. 

An accepted definition of a state is an entity that has a monopoly on violence within its territory[3]. While a network-state may have a weak claim to a monopoly of physical violence, they could monopolize an alternate form of power that is just as important. Most aspects of modern life rely on the cooperation of networks. A network-state that has a monopoly over the traffic that comes through it could very easily erode the will of a nation-state by denying its citizens the ability to move money, communicate with family, or even drive their car. One only has to look at China today to see this sort of power in action. 

Culturally, citizens in developed countries have grown used to spending most of their time online. The average American spends about eight hours online engaged with digital media[4]. Digital communities such as QAnon and WallStreetBets have been able to coordinate their members to affect the physical world. These communities were able to distill a strong sense of identity in their members even though they only ever interacted with each other in an online forum. Advances in generative media, virtual reality hardware, and digital currencies will only make these communities more engaging in the near future. 

The network-state is not inevitable. Three conditions are necessary to create the technology needed to sustain a politically viable digital community that spans the world by 2050. First, the marginal cost of capital must approach zero. The last decade saw interest rates stay near zero. Cheap money leads to the misallocation of capital towards frivolous endeavors, but it also nudges technologists to place a higher value on innovations that have a longer time horizon[5]. Artificial intelligence, crypto, and virtual reality all need significant investments to make them viable for the market. These same technologies also make up the building blocks of the network-state.

Second, the marginal cost of computing must approach zero. The technologies mentioned above require vast amounts of computational power. To persuade millions of users to make their online community the core of their identity, online communities will need to provide a persistent level of immersion that is not feasible today. This technical challenge is best understood by looking at the billions of dollars it took to allow Mark Zuckerberg’s metaverse citizens to traverse their community on legs[6]. Moore’s Law, which states that the number of transistors on microchips will double every year, has remained largely true for the last forty years[7]. While this pattern will likely come to an end, other technologies such as NVIDIA’s specialized graphic chips and quantum computing will ensure that the cost of computing power will drop over time[8].

Finally, the marginal cost of energy must approach zero. Improvements in computing technology will likely make systems more energy efficient, but digital communities that encompass a majority of mankind will require a large amount of energy. The ability to transfer this energy to decentralized nodes will become important as network-states span vast swaths of the earth. Solar panels and battery stations are already becoming cheap enough for individuals to buy. As these materials become cheaper and more reliable, most of the citizens in a network-state likely provide their own power. This decoupling from national grids and fossil fuels will not only allow these citizens to run their machines uninhibited but make them less vulnerable to coercion by nation-states who derive their power from energy production. 

The likelihood of these conditions occurring by 2050 is high. Investors like billionaire Chamath Palihapitiya are already betting on a drastic reduction in the cost of energy and computing power[9].  Assuming these three trends do allow for the creation of sovereign network-states, the balance of power on the global stage will shift. A world in which there is a unipolar moment amongst nation-states does not preclude the existence of a multipolar balance amongst network-states. Nation-states and network-states will not compete for many of the same resources, but the proliferation of new sovereign entities creates more opportunities for friction and miscalculation.

If war comes, nation-states will consider how to fight against an adversary that is not bound by territorial lines. Nation-states will have an advantage in that they control the physical means of production for commodities such as food and raw materials, but as the world becomes more connected to the internet, networks will still have a reach into this domain. The rise of the network-state makes it more important than ever for nation-states to control their physical infrastructure and learn to project power in the cognitive domain. Advanced missile systems and drones will do little to threaten the power of the network-state; instead, offensive capabilities will be limited to information campaigns and sophisticated cyber-attacks will allow the nation-state to protect its interests in a world where borders become meaningless.


Endnotes:

[1] Fridman, L. (November 15, 2022). Chamath Palihapitiya: Money, Success, Startups, Energy, Poker & Happiness (No. 338). Retrieved December 1, 2022, from https://www.youtube.com/watch?v=kFQUDCgMjRc

[2] Balaji, S. (2022, July 4). The Network-state in One Sentence. The Network-state. https://thenetworkstate.com/the-network-state-in-one-sentence

[3] Waters, T., & Waters, D. (2015). Politics As Vocation. In Weber’s Rationalism and Modern Society (pp. 129-198). Palgrave MacMillan, New York.

[4] Statista Research Department. (2022, August 16). Time spent with digital media in the U.S. 2011-2024. Statista Media. https://www.statista.com/statistics/262340/daily-time-spent-with-digital-media-according-to-us-consumsers

[5] Caggese, A., & Perez-Orive, A. (2017). Capital misallocation and secular stagnation. Finance and Economics Discussion Series, 9.

[6] Klee, M. (2022, October 12). After Spending Billions on the Metaverse, Mark Zuckerberg Is Left Standing on Virtual Legs. Rolling Stone. https://www.federalreserve.gov/econres/feds/capital-misallocation-and-secular-stagnation.html

[7] Roser, M., Ritchie, H., & Mathieu, E. (2022, March). Technological Change. Our World in Data. https://ourworldindata.org/grapher/transistors-per-microprocessor

[8] Sterling, B. (2020, March 10). Preparing for the end of Moore’s Law. Wired. https://www.wired.com/beyond-the-beyond/2020/03/preparing-end-moores-law/

[9] Fridman, L. (November 15, 2022). Chamath Palihapitiya: Money, Success, Startups, Energy, Poker & Happiness (No. 338). Retrieved December 1, 2022, from https://www.youtube.com/watch?v=kFQUDCgMjRc

 

Assessment Papers Bryce Johnston Emerging Technology Government Information Systems

Assessing “Reflections on Net Assessment” by Andrew W. Marshall, Edited by Jeffrey S. McKitrick and Robert G. Angevine

Phil Walter is the founder of Divergent Options.  Divergent Optionscontent does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing “Reflections on Net Assessment” by Andrew W. Marshall, Edited by Jeffrey S. McKitrick and Robert G. Angevine

Date Originally Written:  October 16, 2022.

Date Originally Published:  December 19, 2022.

Author and / or Article Point of View:  The author is a graduate of the American Academy for Strategic Education’s Net Assessment and Competitive Strategy course.  The author is fortunate to count members and alumni of the Department of Defense Office of Net Assessment as friends and mentors.  Mr. Marshall’s idea regarding the Office of Net Assessment being “diagnostic but not prescriptive” is what inspired the author to start the website Divergent Options.  The author was contacted by The Andrew W. Marshall Foundation[1], asked to review this book, and provided a free copy of it.

Summary:  U.S. national security is recovering from over twenty years of Instant Gratification Warfare in Iraq and Afghanistan.  The threat posed by the People’s Republic of China requires the U.S. to think in decades instead of in deployment cycles, and develop strategies and plans in an integrated manner.  “Reflection on Net Assessment” is the perfect book for someone who needs to shake off organizationally-incentivized impatience and focus on long-term threats.

Text:  Andrew W. Marshall was born in 1921 and worked at the RAND Corporation in the 1950s and 1960s.  In the late 1960s, Henry Kissinger recruited Andy to apply his approaches in the National Security Council, where Andy worked for several years before becoming the first Director of Net Assessment, a post he held for the next 43 years.  Andy retired from government service in 2015 at the age of 94 and dedicated the remaining four years of his life to supporting all those who sought his counsel and writing his own short essays on the history and practice of defense analysis[2].     

The Andrew W. Marshall Foundation and the Institute for Defense Analyses[3] released “Reflections on Net Assessment: Interviews with Andrew W. Marshall[4],” on October 4, 2022.  The book features twelve interviews with Mr. Marshall that were conducted between 1993 and 1999 by defense analyst Kurt Guthe and others.  These interviews discuss Mr. Marshall’s 25 years at the RAND Corporation, and over 40 years in the Department of Defense Office of Net Assessment.  The interviews were woven together by Jeffrey S. McKitrick and Robert G. Angevine and each interview is preceded by a description of world events happening at the time.  These descriptions help frame the reader’s mindset before the interview transcript begins.

For those who have not heard of the term Net Assessment, Department of Defense Directive 5111.11 defines it as “[T]he comparative analysis of military, technological, political, economic, and other factors governing the relative military capability of nations. Its purpose is to identify problems and opportunities that deserve the attention of senior defense officials.”  The Secretary of Defense assigned the Director of Net Assessment the responsibility to “Develop and coordinate independent net assessments of the standing trends, and future prospects of U.S. military capabilities and national potential in comparison with those of other countries or groups of countries so as to identify emerging or future threats or opportunities for the United States, consistent with the April 14, 2017 and October 1, 2019 Secretary of Defense Memorandums. Pursuant to Section 904(b) of Public Law 113-291, these net assessments may be communicated to the Secretary of Defense, without obtaining the approval or concurrence of any other DoD official.”  The net assessments include “current and projected U.S. and foreign military capabilities by theater, region, domain, function, or mission; and specific current and projected U.S. and foreign capabilities, operational concepts, doctrine, and weapon systems[5].”

We are all products of the time in which we live.  In my case, I grew up during the Cold War and participated in operations in Iraq and Afghanistan.  The problem U.S. national security currently faces is that the intellectual underpinnings for the U.S. strategy that won the Cold War came from a generation that won a war.  The intellectual underpinnings for today’s strategies for the U.S. to compete with China and Russia come from a generation that lost two Authorizations for the Use of Military Force.  In the context of U.S. national security having to re-learn Cold War techniques and determine if they are applicable to our present national security situation, this book will help immensely.

The twelve interviews in this book are an absolute treasure.  These interviews illustrate Mr. Marshall’s mindset, and how this mindset evolved over time based on both external national security stimuli and internal bureaucratic friction.  Someone reading this book will close the cover on the last page having not only received a class from a master of strategic thought but will have also learned how to survive and make progress in a large bureaucracy taking into account that “There is only so much stupidity one man can prevent[6].”

Mr. Marshall was highly motivated to ask the right question.  He believed that “Poor, mediocre answers to good questions are more important than getting splendid answers to poor questions.  That means that getting the questions right is very, very important.  Most analysis spends far too little time on what the questions really are[7].”  Mr. Marshall also believed that getting the right people in the room to discuss a topic was a must, even if these people were outside of his organization.  He believed that “…the objective in any analysis is to do the best that this country can do, not just the best that RAND or whatever organization you’re talking about can do[8].”  Mr. Marshall disliked it when organizations would “…rather die than bring in anybody else[9],” and discusses his views on how the Central Intelligence Agency became more insular and therefore less impactful over time.   

Mr. Marshall believed that there were people who focused on reality and wanted to know how the world really functioned and those who focused on their models or hypotheses and barely looked at the world[10].  This reality drove him to observe that during the Cold War there was a tendency “…to treat the North Atlantic Treaty Organization alliance as a real alliance, rather than the situation of a major power and a bunch of protectorates[11].”  Office of Net Assessment research during the Cold War reflected realities such as the Soviet Navy having more weapons than sensors to find targets and Israel and Egypt having the same number of tanks during the 1973 war but Israel’s tanks were able to get into battle three times if damaged and Egypt’s only once[12].  

Imposing cost on a competitor is discussed throughout the book and Mr. Marshall even looks at health care and environmental pollution as factors that the Soviet Union may have to address ahead of military investment[13].  Regarding Soviet operations in Afghanistan, Mr. Marshall speaks to measuring costs from a Soviet perspective, and trying to determine what costs meant the most to them, instead of what costs would mean the most to the U.S. if it were in the same situation[14].

My biggest take away from this book is the idea that, if the U.S. competition with the Soviet Union began in 1947, the impacts of U.S. strategies began to be felt by the Soviets in 1977.  These impacts set the conditions for the 1980s Cost Imposition and Competitive Strategies approaches, neither of which would have worked in the 1950s or 1960s when the Soviet economy was strong.  U.S. national security personnel would do well to embrace this timeline when thinking about the People’s republic of China.  Overall, I found this book to be highly interesting, extremely motivating, and very applicable to current events.  While most of us never met Mr. Marshall, this book gives us the opportunity to learn an immense amount from him.   

“So I have come away, really for the rest of my life, with the belief that what should happen is, if you have a problem, you get the very best people to work on it, and it doesn’t matter if they’re in your organization or not[15].” 


Endnotes:

[1] The Andrew W. Marshall Foundation can be found at:  www.andrewwmarshallfoundation.org/

[2] About Andrew W. Marshall, The Andrew W. Marshall Foundation, https://www.andrewwmarshallfoundation.org/andrew-w-marshall

[3] The Institute for Defense Analyses can be found at:  http://www.ida.org/

[4] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, can be found at: https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[5] DoD Directive 5111,11, “Director of Net Assessment,” April 14, 2020, can be found at: https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodd/511111p.pdf

[6] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 14, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[7] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 16, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[8] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 18, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[9] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 18, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[10] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 63, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[11] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 61, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[12] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 199, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[13] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 198, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[14] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 229, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

[15] “Reflections on Net Assessment: Interviews with Andrew W. Marshall,” ISBN-13: 9780578384221, Page 65-66, https://www.barnesandnoble.com/w/reflections-on-net-assessment-andrew-w-marshall/1141455631

Andrew W. Marshall Assessment Papers DoD Office of Net Assessment Jeffrey S. McKitrick Phil Walter Robert G. Angevine

An Assessment of U.S. Military Thinking on Cislunar Space Based on Current Doctrine

Louis Melancon, PhD made his own green-to-blue leap from the U.S. Army to the U.S. Space Force where he currently serves in Space Systems Command. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  An Assessment of U.S. Military Thinking on Cislunar Space Based on Current Doctrine 

Date Originally Written:  December 4, 2022.

Date Originally Published:  December 12, 2022. 

Author and / or Article Point of View:  The author believes that doctrine shapes the mindsets and the eventual culture of military organizations. Current U.S. military space doctrine is insufficient to create the mindsets and culture to face the emerging challenges of cislunar operations. 

Summary:  The U.S. military mindset for space myopically focues on orbital regimes, similar to a green water navy staying in littoral waters.  If this mindset continues, the U.S. military cannot compete in cislunar space (the area of space between the earth and the moon or the moon’s orbit) in the same way in which a blue water navy competes in the open ocean.  The maritime theory of Sir Julian Corbett is useful as a lens to understand the current mindset constraints and shortfalls. 

Text:  The race for cislunar space is underway. The recent the U.S. National Aeronautics and Space Administration’s Artemis mission heralding an impending return of manned space flight beyond orbital regimes is an inspiring early leg. At least six nations are currently pursing efforts beyond geocentrism and its orbital regimes, pursuing moon missions and other activities at positions in space where objects sent there tend to stay put, known as LaGrange Points[1]. The ability to operate reliably in cislunar space is not just a matter of national pride, it is a demonstration of and mechanism by which to grow multiple aspects of national power. There are clear reasons for this: cislunar space offers a new frontier for economic development and if mankind permanently lives beyond the Earth, it will be in cislunar space. 

Elements of the U.S. government are fully ready enter into this race. The recent National Cislunar Science and Technology Strategy is a bold call for action. This document recognizes the importance of scientific and commercial development of cislunar space and the importance this will play for the future of U.S. national power[2]. It is with some, but not much, hyperbole that this strategy seems like a homage to Sir Julian Corbett, perhaps not the most well known, but in the author’s opinion the most thoughtful theorist on naval and maritime power. 

For the purposes of this article, there are a handful of applicable insights from Corbett’s seminal work, Some Principles of Maritime Strategy that are useful to assess the importance of the U.S. military being involved in cislunar space. Corbett proposes that a naval force alone rarely wins a war. Rather than the decisive fleet action of Alfred Thayer Mahan, Corbett sees a larger maritime picture[3]. It is not just a naval force but the economy through trade, communications, and naval capability of a state altogether traversing that common of the world’s oceans. Preserving and growing this strength requires command of the sea, and that is what Corbett suggests non-continental, maritime states leverage to be successful in conflict rather than simply relying on a powerful fleet. Command of the sea is not a constant condition. It is fleeting, pursued at positively at times, denied to adversaries at times, wholly up for grabs between adversaries at other times. But you do have to be there to compete. This brings us to the another insight, about the necessity of a fleet. 

Corbett also believes it is necessary to have a fleet in being to establish command of the sea. This is a different definition than the modern parlance which describes ships in a defended port. Here it is more about the fleet existing and operating somewhere, creating the potential for command of the sea by, at a minimum, denying an adversary the ability to feel they have a fully secured command of the sea[4]. The only type of force that can provide this is, using modern terms, a “blue water navy,” a force that can operate across the isolation of the wide, open oceans. In the space domain cislunar is the wide, open ocean. 

The problem is that the doctrinal space heuristic in the U.S. military doesn’t account for this Corbettian concept of command of the sea. There is a mismatch between the orbital regime heuristic and cislunar space as an area of competition. Whether one is looking at the unclassified summary of the Defense Space Strategy[5], Joint Publication 3-14 Space Operations[6], or the U.S. Space Force’s (USSF) Spacepower[7], the geocentric/orbital regime is the dominant, truthfully sole, heuristic. This single view results in mindsets and concepts that create a “green water navy” — a force that only operates within its littoral and neighboring waters, i.e. the orbital regimes near Earth, not a blue water navy that can establish and challenge command of the sea in cislunar space. 

Don’t misunderstand: it is absolutely critical that the USSF operate and dominate in the littoral waters of the orbital regimes. As the USSF Chief of Space Operations has publicly stated, all the other military services require space to fulfill their missions[8]. It is not an exaggeration that space is the glue binding how the U.S. joint force prefers to fight its wars. USSF must then operate effectively in the orbital regimes, enabling the rest of the military. This orbital regime mindset too aligns beautifully with Corbett, but Corbett pointed out that this is not sufficient[9]. Yes, different forms of equipment are needed between a green water and blue water force, but placing equipment differences aside, a blue water force can accomplish the functions of a green water force. The inverse doesn’t hold. Each breeds different mindsets, doctrines, and thus heuristics. A blue water force must cultivate and rely on a mission command, an independent mindset, that is not a requirement for a littoral focused force. 

The doctrinal documents mentioned don’t preclude cislunar operations. Spacepower mentions cislunar three times. But it does so in relation to orbital regimes, not a distinct area for operational and conceptual development. The argument that cislunar space isn’t precluded in the doctrine is weak, because cislunar presents a wholly different challenge, thus demanding new thinking patterns. The previous mental construct simply is an ill fit. Heuristics provide easy button when encountering roughly similar problems, but that’s also their danger. Not realizing the problems aren’t similar means a failed fit and tends to crowd out new ideas. This is where U.S. military space doctrine currently finds itself, potentially applying a way of thinking with which they are comfortable to a new problem that doesn’t suit that solution. 

Navies have and can evolved from green to blue water. But that takes time, lots of time. Other players in the U.S. government, other nations, and some commercial actors are not taking that time. There are bold efforts to create new heuristics for this space. The question becomes if the U.S. military feels it should slowly evolve or have a revolutionary leap, challenging its newest military service with jumping rather than crawling from green water force tethered to Earth through orbital regimes or a blue water force independently operating in cislunar space.  If it is the latter, these efforts will be stymied due to current heuristics and doctrine with limited cislunar vision.


Endnotes:

[1] Duffy, L., & Lake, J., (2021). Cislunar Spacepower the New Frontier.Space Force Journal. Retrieved December 4, 2022, from https://spaceforcejournal.org/3859-2/.

[2] Cislunar Technology Strategy Interagency Working Group (2022). National Cislunar Science and Technology Strategy. National Science and Technology Council. 

[3] Corbett, J. S. (2004). Some Principles of Maritime Strategy. Courier Corporation.

[4] Ibid. 

[5] Esper, M. (2020). Defense Space Strategy Summary. Office of the Secretary of Defense.

[6] Joint Staff (2020). Joint Publication 3-14 Space Operations. Joint Chiefs of Staff. 

[7] Raymond, J. (2020). Spacepower: Doctrine for Space Forces. US Space Force. 

[8] Pope, C. (2022, Nov 2).  “Saltzman formally elevated to Space Force’s highest position – Chief of Space Operations.” https://www.spaceforce.mil/News/Article/3207813/saltzman-formally-elevated-to-space-forces-highest-position-chief-of-space-oper/

[9] Corbett. Principles.

Assessment Papers Governing Documents and Ideas Space U.S. Space Force

Assessment of the Risk of a Nuclear Exchange with Russia: Is the U.S. Whistling Past the Nuclear Graveyard?

Neil Snyder is a U.S. Army Colonel.  The views expressed in this article are his own.  His research focuses on national security decision-making and civil-military relations. He earned a PhD in Political Science from Stanford University as a Goodpaster Scholar of the United States Army Strategic Plans and Policy Program (ASP3).  Follow him on Twitter @neilsny.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Risk of a Nuclear Exchange with Russia: Is the U.S. Whistling Past the Nuclear Graveyard?

Date Originally Written:  November 11, 2022.

Date Originally Published:  November 14, 2022.

Author and / or Article Point of View:  The author believes that risk of a nuclear exchange in Ukraine is not solely due to Putin’s aggression. Instead, risk is a consequence of strategic interaction between the U.S. and Russia, meaning a consequence of both Putin’s actions and U.S. decision-making.

Summary:  There is uncertainty over how the U.S. might respond to Putin’s threats of nuclear weapon use in Ukraine, which raises curiosity about the sources of nuclear risk.  This risk includes three aspects of U.S. policymaking: presidential leadership, creativity and engagement of forward-thinking nuclear planners, and the flexibility of the bureaucracy in the face of crisis. The conclusion is that the U.S. may own some of the risk of a nuclear exchange over Ukraine.

Text:  Russian President Vladimir Putin has threatened to use a nuclear weapon in Ukraine, prompting comparisons to the 1962 Cuban missile crisis[1]. Fortunately, Putin has recently issued statements tempering the threat[2], but the war in Ukraine is not over. Russia appears to be losing badly, suggesting Putin might play the one (nuclear) card he has left.  

Unfortunately, the risk of nuclear exchange over Ukraine is not widely understood because the public discourse has been confusing.  Some reporting suggests that Putin’s threats are real[3], but prominent commentators have also dismissed the threats[4]. There is also uncertainty over how the U.S. might respond to Russian nuclear aggression. U.S. Army General (Retired) David Petraeus recently argued that the U.S. would most likely respond to Russian nuclear action with a massive conventional response[5]. Even so, it is not clear how a massive conventional response would not trigger further escalation, given Russia’s already precarious strategic position.

One narrative is that Putin is singularly responsible for the current nuclear risk because of his blatant attempt at nuclear blackmail[6] and his “record of folly and recklessness[7].” Putin’s invasion of Ukraine is clearly a moral wrong and he precipitated the crisis, but the U.S. may nonetheless contribute to the risk of this crisis in unforeseen ways. A rigorous assessment requires considering both Putin’s aggression and how the U.S responds. 

Seventy years of U.S. nuclear planning for Russian, Chinese, North Korean, and terrorist-related contingencies has not prepared the U.S. well for the current crisis. Ukraine is not a member of the North Atlantic Treaty Organization. A Russian nuclear attack on Ukraine does not encumber the U.S. with the same obligations as an attack on a formal ally. It is not altogether clear how the U.S. should respond to an attack on a partner, especially if Russia employs low-yield weapons, performs a nuclear demonstration, or takes other actions lower on the so-called nuclear ladder[8]. 

This highly contingent situation motivates a closer look into the black box of U.S. nuclear response planning to see how the U.S.’s own nuclear structures might contribute to today’s risk. U.S. presidential leadership, policy advocacy (or lack thereof) by nuclear policy analysts, and the bureaucratic politics of the U.S. defense enterprise all affect how the U.S. has responded to prior nuclear crises. 

U.S. President John F. Kennedy’s management of the 1962 Cuban Missile Crisis is perhaps the canonical example of presidential leadership amidst a nuclear crisis. Graham Allison’s Essence of Decision illustrates how Kennedy’s personal leadership was necessary to structure decision-making and tamp down escalation risk[9]. Kennedy challenged advisors’ assumptions, forced the Executive Committee or “ExComm” to generate alternatives to the escalatory options advisors initially favored, and expanded the bargaining range with Nikita Khrushchev, the Premier of the Soviet Union. Kennedy’s intrusive leadership during the crisis was necessary to reduce escalation risk over Cuba, following the model of the “unequal dialogue” advanced by Elliot Cohen[10]. 

However, Kennedy’s steady hand may be more the exception than the rule. Multiple presidents have taken the U.S. to the nuclear brink. President Dwight Eisenhower contemplated nuclear escalation in Korea. President Richard Nixon made multiple proposals to use nuclear weapons in Vietnam. Most recently, President Donald Trump threatened “Fire and Fury” against North Korea. As Keith Payne has observed, leaders have pursued “surprising goals and risked national security in ways…considered highly unlikely and even irrational at the time[11].”

U.S. Presidents’ personal management style, experiences[12], and heuristics affect U.S. nuclear risk during crises[13]. Even “ideal” presidents have limits because they are human. Kahneman and Tversky’s seminal work illustrates that all decision-makers suffer from debilitating cognitive biases[14]. The late Robert Jervis argued that leaders’ misperceptions could increase the probability of nuclear conflict in some situations[15]. All of the preceding suggests taking a close look at how the White House and the National Security Council is weathering the current crisis in Ukraine. Unfortunately for the public, presidents’ deliberations over sensitive national security matters are normally done behind a wall of secrecy (which, ironically, could be another source of risk). 

Even clear-eyed U.S. presidents rely on the options developed by the national security bureaucracy. Those nuclear response options (or the lack thereof) have frequently been a source of risk for escalation. Fred Kaplan’s remarkable book on the ebbs and flows of U.S. nuclear policy reveals that, throughout U.S. nuclear history, true progress and reform of nuclear plans depended on the actions of a small number of enterprising defense intellectuals who challenged assumptions and led change[16]. Entrepreneurial defense experts are key to the risk equation during nuclear crises because, as Tom Nichols recently pointed out, the “military and the nuclear establishment are resistant to change[17].” Without experts’ advocacy and influence from within the national security bureaucracy, U.S. presidents are likely to have fewer and less suitable response options.  

Furthermore, a Russian nuclear attack on Ukraine does not map cleanly to the kinds of situations nuclear planners have historically focused on. As Scott Sagan has observed, the defense establishment often relies on rigid plans[18]. It should not surprise readers that the defense establishment relies on standard operating procedures instead of doing the hard work to chart a new course.  And today’s crisis in Ukraine exists within the rich context of the U.S. Defense Department’s ongoing operations, activities, and investments. Skepticism that this vast U.S. national security enterprise has the organizational agility to adapt quickly in the face of a dynamic crisis like the situation in Ukraine is healthy. That lack of strategic agility is evident today, as routine exercises have been identified as a source of increasing risk[19].

Each of these U.S.-internal sources of risk causes concern because if a Russian nuclear attack in Ukraine is a frightening, then the thought of a nuclear exchange between Russia and the U.S. is altogether more terrifying. Deterrence seems to be holding but, as Colin Gray famously argued, there is “no objectively correct answer” to questions of nuclear risk[20].  Assessing nuclear risk is extremely difficult[21]. Putin clearly deserves blame for provoking the crisis and, though there is no moral equivalency between Putin’s actions and potential U.S. responses, U.S. policymakers would gain from remaining strategically humble and assess themselves as source of risk, too. 


Endnotes:

[1] “Russia’s Lavrov Needles Biden over Cuban Missile Crisis and Ukraine,” Reuters, October 30, 2022, https://www.reuters.com/world/europe/russias-lavrov-needles-biden-over-cuban-missile-crisis-ukraine-2022-10-30/.

[2] “Putin Says ‘no Need’ for Using Nuclear Weapons in Ukraine,” PBS NewsHour, October 27, 2022, https://www.pbs.org/newshour/world/vladimir-putin-rules-out-using-nuclear-weapons-in-ukraine.

[3] Helene Cooper, Julian E. Barnes, and Eric Schmitt, “Russian Military Leaders Discussed Use of Nuclear Weapons, U.S. Officials Say,” The New York Times, November 2, 2022, https://www.nytimes.com/2022/11/02/us/politics/russia-ukraine-nuclear-weapons.html.

[4] Greg Myre, “How Likely Is a Russian Nuclear Strike in Ukraine?,” NPR, October 4, 2022, https://www.npr.org/2022/10/04/1126680868/putin-raises-the-specter-of-using-nuclear-weapons-in-his-war-with-ukraine; Timothy Snyder, “How Does the Russo-Ukrainian War End?,” Thinking About… (blog), October 5, 2022, https://snyder.substack.com/p/how-does-the-russo-ukrainian-war.

[5] Olafimihan Oshin, “Petraeus Predicts US Would Lead NATO Response to ‘Take out’ Russian Forces If Putin Uses Nuclear Weapon,” The Hill, October 2, 2022, https://thehill.com/homenews/sunday-talk-shows/3671100-petraeus-predicts-us-would-lead-nato-response-to-take-out-russian-forces-if-putin-uses-nuclear-weapon/.

[6] Andriy Zagorodnyuk, “Bowing to Putin’s Nuclear Blackmail Will Make Nuclear War More Likely,” Atlantic Council (blog), October 18, 2022, https://www.atlanticcouncil.org/blogs/ukrainealert/bowing-to-putins-nuclear-blackmail-will-make-nuclear-war-far-more-likely/.

[7] “Putin Threatens Nuclear War. The West Must Deter Disaster.,” Washington Post, October 3, 2022, https://www.washingtonpost.com/opinions/2022/10/03/putin-nuclear-war-ukraine-deter/.

[8] Michael Fitzsimmons, “The False Allure of Escalation Dominance,” War on the Rocks (blog), November 16, 2017, https://warontherocks.com/2017/11/false-allure-escalation-dominance/; Herman Kahn, On Thermonuclear War (Princeton, NJ: Princeton University Press, 1960).

[9] Graham Allison and Philip Zelikow, Essence of Decision: Explaining the Cuban Missile Crisis, 2nd ed. (New York, NY: Longman, 1999).

[10] Eliot A. Cohen, Supreme Command (New York, NY: Free Press, 2002).

[11] Keith B. Payne, “The Great Divide in US Deterrence Thought,” Strategic Studies Quarterly Summer (2020): 16–48.

[12] Michael C. Horowitz and Allan C. Stam, “How Prior Military Experience Influences the Future Militarized Behavior of Leaders,” International Organization 68, no. 3 (2014): 527–59.

[13] Elizabeth N. Saunders, Leaders at War: How Presidents Shape Military Interventions (Ithaca, NY: Cornell University Press, 2011).

[14] Daniel Kahneman, Thinking, Fast and Slow (New York: Farrar, Straus, and Giroux, 2011).

[15] Robert Jervis, Perception and Misperception in International Politics (Princeton, NJ: Princeton University Press, 1976).

[16] Fred Kaplan, The Bomb: Presidents, Generals, and the Secret History of Nuclear War (New York: Simon and Schuster, 2020).

[17] Tom Nichols, “The Nuclear Question America Never Answers,” The Atlantic, November 1, 2022, https://www.theatlantic.com/ideas/archive/2022/11/biden-nuclear-posture-review-2022/671949/.

[18] Scott D. Sagan and Kenneth N. Waltz, The Spread of Nuclear Weapons: A Debate Renewed, 2nd ed. (New York, NY: Norton, 2003).

[19] Kate Hudson, “NATO, Russia War Games Are Making Nuclear Risks Worse,” Al Jazeera, October 24, 2022, https://www.aljazeera.com/opinions/2022/10/24/biden-is-making-putins-nuclear-threat-worse.

[20] Colin Gray, Strategy and Defence Planning: Meeting the Challenge of Uncertainty (Oxford: Oxford University Press, 2014), 2.

[21] Amy J. Nelson and Alexander H. Montgomery, “How Not to Estimate the Likelihood of Nuclear War,” Brookings (blog), October 19, 2022, https://www.brookings.edu/blog/order-from-chaos/2022/10/19/how-not-to-estimate-the-likelihood-of-nuclear-war/.

 

Assessment Papers Neil Snyder Nuclear Issues Russia Ukraine

Assessing the Role of China’s Aircraft Carriers in a Taiwan Invasion

Michael G. Gallagher is an American expatriate and independent researcher living in Seoul, South Korea, with his Korean wife. He has MA and Ph.D. degrees in International Relations from the University of Miami in Coral, Gables, Florida.  Prior to residing in South Korea, he has lived in Mainland China and Hong Kong.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Role of China’s Aircraft Carriers in a Taiwan Invasion

Date Originally Written:  June 1, 2022.

Date Originally Published:  July 11, 2022.

Author and / or Article Point of View:  The author believes that China in its present form poses a grave threat to the United States and its allies and that insufficient attention-at least in public- has been paid to certain aspects of Chinese military planning. This inattention may be the result of the U.S. Navy’s (USN) projecting its views of aircraft carrier strength onto its view of China.

Summary:  Despite the publicity China’s carrier force has received in the press, the huge ships, as impressive as they are, may only play a secondary role in Chinese naval operations during a Taiwan invasion. The function of China’s carrier force will be to clean up any remaining opposition after Chinese forces decisively defeat the U.S. and Japanese fleets using a blizzard of cyberattack and missile barrages.

Text:  China’s aircraft carriers have been in the news over the last few months.  The Liaoning and its escorts conducted exercises in the South China Sea May of this year[1].  China’s second carrier and its first domestically built one, the Shandong, was recently spotted with several drones on its flight deck[2]. Meanwhile, the Chinese have just launched a third carrier, the Fujian,  and planning for a fourth carrier, possibly nuclear-powered, is in the works[3]. There is even discussion of six People’s Liberation Army – Navy (PLAN) carrier groups by 2035[4].

Traditional reasons for building aircraft carriers includes sea control, showing the flag, having a mobile airfield that you and only you control, and the sheer prestige of having a large carrier force. However, none of these reasons cancel out the fact that aircraft carriers are an increasingly vulnerable weapons system that is already over 100 years old. The first full-fledged carrier was a converted battlecruiser, the  Royal Navy’s HMS Furious. The Furious entered service during World War I in 1917[5]. The first specifically designed carrier was the Japanese Hosho, launched in 1921[6].

Apart from its carrier force, China has expended enormous resources since the mid-1990s on capabilities that are specifically designed to sink the USN’s nuclear-powered aircraft carriers and wrest control of the waters of the Western Pacific from the United States and its allies. To achieve this strategic end, the PLAN has acquired an impressive arsenal of land-based ballistic missiles like the DF-21 land-based anti-ship ballistic missile and the DF-26 “Guam Killers” Intermediate Range Ballistic Missile, which also has an anti-ship mode, H-6 medium-range bombers armed with ship-killing cruise missiles, a 79 boat strong submarine force, and numerous frigates and destroyers armed with anti-ship missiles[7][8][9][10]. 

If any assault against Taiwan is delayed until the late 2020s, China’s emerging hypersonic capability will likely play a significant role in in its attack plans. Mounted on  either  JL-2 or JL-3 Submarine Launched Ballistic Missiles or land-based weapons like the DF-26 Medium Range Ballistic Missile and the longer-range DF-41 Intercontinental Ballistic Missile (ICBM), nonnuclear hypersonic glide vehicles using kinetic energy impacts would devastate Anderson Air Force Base on Guam, Pearl Harbor, and the U.S. Navy’s huge Pacific Fleet base at San Diego[11][12][13].

Non-nuclear hypersonic warheads mounted on ICBMs could even strike high-value civilian targets in the U.S. like Boeing’s huge Everett, Washington factory. These weapons would be doubly effective if they could be deployed as Multiple Independent Reentry Vehicles. This potentially revolutionary advance was hinted at during China’s July 2021 hypersonic weapon test when the glide vehicle, mounted on a ballistic missile, may have released an extra payload while in flight[14].

Current U.S. Anti-Ballistic Missile systems like THAAD, Patriot-3 and the US Navy’s family of Standard missiles would have limited effectiveness against such weapons. And that gap in defensive capability may not be filled until around 2030[15].

The PLAN’s strong anti-carrier posture, when combined with the fiscal reality that it is less expensive to use a missile than put a carrier at risk, points to China’s carriers playing a clean-up role in a Taiwan invasion scenario.  This scenario would begin with a blizzard of cyberattack and missile barrages, accompanied by wave after wave of cruise and ballistic missile strikes against American and Japanese bases on Guam, Okinawa and elsewhere. PLAN carriers would then sink any remaining hostile warships and force the smaller nations of Southeast Asia, plus Australia and New Zealand, to bend their knee to Beijing[16].

Still, even if China scored huge gains early in any conflict over Taiwan, the stealthy U.S. and Japanese submarine fleets could cripple any Chinese naval campaign.  Chinese planners may assume that any enemy submarines at sea when the war began would be cut off from repair and resupply and would eventually wither on the vine.  This may be a valid assumption if the Chinese plans do involve strikes on U.S. home ports and possibly parts of U.S. industrial infrastructure.  However, until these U.S. and Japanese submarine forces run out of food, fuel, or munitions, they are still a threat.

Taiwan, the target of China’s violent, high velocity, high-technology assault, would almost certainly be forced to surrender. With Taiwan’s two potential saviors, the U.S. and Japanese fleets, having carriers resting on the bottom of the Pacific, the island democracy would be cut off from all possible aid by an impenetrable Chinese naval blockade.  Messy amphibious assaults against contested beaches would not be necessary.

China’s carrier force may wind up playing the same role the US Navy’s fast battleships did in the Pacific during World War Two. Those powerful warships, once the queens of battle, found themselves relegated to back up roles, providing fire support for amphibious landings and using their formidable antiaircraft batteries to help defend the now dominant carriers from air attack[17].


Endnotes:

[1] D, M. (2022, May 23). Chinese Carrier Group now operating in the East China Sea. USNI.org. Retrieved July 6, 2022, from https://news.usni.org/2022/05/23/chinese-carrier-strike-group-now-operating-in-east-china-sea

[2] A, W. (2022, June 3). Drones included in Refit for China’s second aircraft carrier Shandong. South China Morning Post. Retrieved July 6, 2022, from https://www.scmp.com/news/china/military/article/3180265/drones-included-refit-chinas-second-aircraft-carrier-shandong

[3] K, M & D, R.(2022, June 17). China launches hi-tech aircraft carrier in naval milestone. Retrieved July 6, 2022, AP News. from https://apnews.com/article/beijing-china-shanghai-government-and-politics-6ce51d1901b3a5658cc9ef7e62b65000

[4] World’s biggest Naval Power: Can China Develop Six Aircraft Carriers By 2035 & Challenge Its Arch-Rival USA Eurasian Times Desk. (2021, December 23). Retrieved July 6, 2022 from https://eurasiantimes.com/worlds-biggest-naval-power-can-china-develop-six-aircraft-carriers-by-2035-challenge-its-arch-rival-usa/

[5] History’s First Aircraft Carrier. Naval Encylopedia.com. (2021). Retrieved June 26, 2022 from https://naval-encyclopedia.com/ww1/uk/hms-furious-1917.php

[6] The Hosho, world’s first purpose built aircraft carrier. Naval Encylopedia.com. (2021). Retrieved June 26, 2022 from https://naval-encyclopedia.com/ww2/japan/hosho.php

[7] DF-21 (CSS-5). Missile Threat: CSIS Missile Defense Project (2022, March 28). Retrieved July 6, 2022 from https://missilethreat.csis.org/missile/df-21/

[8] DF-26. Missile Threat: CSIS Missile Defense Project (2021, August 6) Retrieved July 6, 2022 from https://missilethreat.csis.org/missile/dong-feng-26-df-26/

[9] Hanyang H-6 Medium Bomber. Military-Today.com. (2022).  Retrieved July 6, 2022 from http://www.military-today.com/aircraft/h6k.htm

[10] 2022 China Military Strength. Globalfirepower.com. (2022).. Retrieved July 6, 2022 from https://www.globalfirepower.com/country-military-strength-detail.php?country_id=china

[11] Missiles of China. Missile Threat: CSIS Missile Defense Project. (2021, April 12). Retrieved July 6, 2022 from https://missilethreat.csis.org/country/china/

[12] Missiles of China.  Missile Threat: CSIS Missile Defense Project. (2021, April 12). Retrieved July 6, 2022 from https://missilethreat.csis.org/country/china/

[13] DF-41 (Dongfeng-41/CSS-X-20). Missile Threat: CSIS Missile Defense Project. (2021, July 31). Retrieved July, 6 from https://missilethreat.csis.org/missile/df-41/

[14] N, T, R &, T, T, J. (2021, November 3). China’s Hypersonic Mystery Weapon Released Its Own Payload And Nobody Knows Why (Updated). The War Zone. Retrieved July 6, 2022 from https://www.thedrive.com/the-war-zone/43242/chinas-hypersonic-mystery-weapon-released-its-own-payload-and-nobody-knows-why

[15] A, E. (2022, May 23). Just getting started: Too early to say when hypersonic interceptor will go live. Breaking Defense. Retrieved July 6, 2022 from https://breakingdefense.com/2022/05/just-getting-started-too-early-to-say-when-hypersonic-interceptor-will-go-live/

[16] S,R.( 2021, June 21). China’s Third Aircraft Carrier is Aimed at a Post-US Asia. Foreign Policy. Retrieved July 6, 2022 from https://foreignpolicy.com/2022/06/21/china-third-aircraft-carrier-fujian/

[17] F,R.(2020, July 13). Rethinking the Technological Story of the Pacific Theater of the Second World War. The Diplomat. Retrieved July 9, 2022 from https://thediplomat.com/2020/07/rethinking-the-technological-story-of-the-pacific-theater-of-the-second-world-war/

 

Assessment Papers China (People's Republic of China) Major Regional Contingency Maritime Michael G. Gallagher Taiwan

Assessing China as a Superpower

James Ridley-Jones is a PhD student at King’s College London currently researching Geostrategy in Central Asia. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title: Assessing China as a Superpower

Date Originally Written:  June 14, 2022.

Date Originally Published:  June 20, 2022.   

Author and / or Article Point of View:  The author is a PhD student studying Foreign Policy in Central Asia. The author believes that perception plays a key role in global power structures. The article is written from the point of view of the international community toward Chinese power.

Summary:  The Russian invasion of Ukraine exposed the gap between how the world assessed Russia’s might and influence and its actual performance.  Prior to a conflict, “power perceived is power achieved” is common.  When looking at China’s might and influence, and taking into account recent revelations during the Russian invasion of Ukraine, questions remain regarding what China can actually achieve in the long run.  

Text:  From a global power perspective the conflict in Ukraine taught the United States a significant lesson about reality comparative to perception. Russia was perceived to be a significant challenge to North Atlantic Treaty Organization (NATO) forces militarily, an economic influencer to Europe even if not the predominant economy, and a country with global influence across Europe, the Middle East, Africa, across Asia, and even holding some influence in South America. The reality is that although Russia is still considered a challenge in these areas, the challenge is not to the level believed prior to the conflict in Ukraine. This assessment however does not look to debate on Russia, their actions, capabilities or intentions, but rather to question if a superpower needs to possess such things, or just be perceived to possess such attributes, all in relation to China.

When considering military might, China is often assessed to be a significant player on potential capabilities. China has the largest military in the world, are significantly developing their technological capabilities, advancing new training programs, and reorganising their command structures. These changes demonstrate that China perceives problems within its military however, institutional change does not always guarantee success. China’s evolving military capabilities come with a host of their own problems and questions, not all of which there is evidence of resolutions. With growth comes organisation issues, technology requires application, and there is no demonstrated successful application of some technologies China might be developing. All of these problems plague even the most successful of militaries, but that doesn’t detract from these problems as considerations, especially given China’s more significant nature i.e. its size and development. Also evident is the limited combat experience of the Chinese military.  The last full conflict the Chinese military fought was against Vietnam in 1979 with limited experience beyond that other than peacekeeping missions and occasional sparring with the Indian military in the Himalayas, China lacks modern conflict experience[2].

Even with these military considerations, China prefers to employ economic and Soft Power, which merits consideration when envisioning China as a superpower.

When looking at the Chinese economy, the slowdown is a factor to consider. Chinese economic strength presently affords them significant sway globally.  If this economic strength were to slowdown, it is questionable as to whether China’s sway would continue to the same degree. Although there are considerably debated variables in the literature, Riikka Nuutilainen and Jouko Rautava suggest that as China’s economic growth slows, its contribution to Russia’s growth performance will likely decline as well[2]. Although their study is specific to Russia, it is more widely indicative of the potential impact to other countries of a withdrawal of Chinese investment, purchasing of raw materials, and slowing energy demand. If this slowdown were to happen, given Chinese utilization of such mechanisms for diplomatic engagement, there would be noticeable knock on effects.

In South America, Chinese economic relations and diplomatic positioning in the region has had an effect. Both the Dominican Republic and Nicaragua most recently flipped their positions toward Taiwan after being offered financial incentives by China, including loans and infrastructure investments[3]. In this case a Chinese economic incentive has led to enough diplomatic pressure being exerted to change national relationships between several nations, specifically in South America, with Taiwan. These cases demonstrate that economic might can be wielded successfully as a tool to exert influence.

Another example case is Serbia, where Chinese economic power is perceived to be significant in the country, comparative to the reality. Forty percent of Serbians think that China gives the country the most aid of all those that contribute, when in actuality China is not even close to giving significant amounts of aid[4]. Of the 56 million Euros that China has pledged to Serbia since 2009, only 6.6 million has actually been delivered, which is significantly less that the European Union, who has given 1.8 billion, or even Germany who has given 189 million[5]. Although a specific case,  Serbia demonstrates that perceptions of Chinese economic influence and power are significantly higher than actuality.

In Central Asia, it is assumed that Chinese investment has had significant affect, but often this is not to the extent that is perceived as Chinese Soft Power fails to connect with the wider population beyond the national elites[6]. This Chinese failure demonstrates a lack of influence at a different level to government and could potentially have a significant impact over time should it not be addressed. Such failures merit review in other regions of the world as part of a wider understanding of actual Chinese global influence compared to the U.S. current view of it.

Given the changing nature of the Chinese economy from a production based manufacturing economy to a more consumer based economy, it is questionable as to whether the country will be able exert similar pressure as a customer and consumer, rather than its current position as a producer and investor.

U.S. current assessments of Chinese potential as a superpower is based heavily on perceptions of potential Chinese exertion of power with limited cases of exertion, rather than necessarily them having that actual power. South America illustrates successful economic influence, but to what extent is it perception based similarly to the case of Serbia, such details are currently lacking.

Whilst remaining cautious in order to not underestimate Chinese capabilities in any of their foreign policy, it is important to analyse more closely Chinese accomplishments to obtain a better understanding of Chinese potential in becoming a superpower, both to ensure a better position to challenge Chinese actions as well as to cooperate where possible.


Endnotes:

[1] Blasko, D. (2015). Ten Reasons Why China Will Have Trouble Fighting a Modern War – War on the Rocks. War on the Rocks. Retrieved 8 June 2022, from https://warontherocks.com/2015/02/ten-reasons-why-china-will-have-trouble-fighting-a-modern-war/. 

[2] Nuutilainen, R., & Rautava, J. (2019). Russia and the slowdown of the Chinese economy [Ebook] (2nd ed.). Bank of Finland, BOFIT. Retrieved 8 June 2022, from https://helda.helsinki.fi/bof/bitstream/handle/123456789/16551/bpb0220.pdf.

[3] Roy, D. (2022). China’s Growing Influence in Latin America. Council on Foreign Relations. Retrieved 8 June 2022, from https://www.cfr.org/backgrounder/china-influence-latin-america-argentina-brazil-venezuela-security-energy-bri. 

[4] Institute for Economic Affairs, 2020 in Radio Free Europe Radio Liberty. (2020). Who Gives The Most Aid To Serbia? [Image]. Retrieved 8 June 2022, from https://www.rferl.org/a/who-gives-the-most-aid-to-serbia-/30660859.html. 

[5] Ibid.

[6] Ridley-Jones, J. (2020). Assessing the Development of Chinese Soft Power in Central Asia. Divergent Options. Retrieved 8 June 2022, from https://divergentoptions.org/2020/09/23/an-assessment-of-the-development-of-chinese-soft-power-in-central-asia/. 

 

Assessment Papers China (People's Republic of China) Competition Governing Documents and Ideas Great Powers & Super Powers James Ridley-Jones

Assessing Superpowers in 2050 – The Great Game Redefined

Rocco P Santurri III is a Wargame Analyst, independent Financial Consultant, and an American Football Coach. Currently he is also a graduate student in Strategic Communications at the War Studies Department of King’s College London. Additionally, he serves as a Major in the U.S. Army Civil Affairs and Psychological Operations Command with the 457th Civil Affairs Battalion in Germany.  He has conducted Civil Affairs operations since 2011 throughout Asia and Europe.  He can be found on LinkedIn.com at www.linkedin.com/in/RoccoPSanturri3. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


Title:  Assessing Superpowers in 2050 – The Great Game Redefined

Date Originally Written:   May 6, 2022.

Date Originally Published:  May 30, 2022.

Author and / or Article Point of View:  The author believes that the United States must transition from its current definition of Great Power Competition (GPC) to one that will reflect the operating environment in 2050.  He is concerned that the lobbying efforts of the Military-Industrial Complex will continue to result in policies being driven by the production of lucrative weapon systems with limited future utility, instead of being determined by realities in the operating environment. These lobbyist-driven policies will leave the U.S. prepared for the last conflict but not the next. The currently narrow focus on large conventional engagements must be shifted to one that embraces Chief of the General Staff of the Russian Armed Forces Valery Gerasimov’s often misunderstood concept of total, not hybrid, warfare, specifically within growing areas of conflict such as Artificial Intelligence, Cyberwarfare, Economics, Sub-Threshold Operations, and Information Operations. These are areas China has prioritized in its future planning concepts and will contribute to its ascension in 2050 to world’s dominant superpower.

Summary:  GPC in 2050 will be between China, Russia, and the United States. China will emerge as the world’s preeminent superpower, on the strength of its understanding of the future operating environment in 2050, as well as possession of the requisite resources to support its ambitions.  Russia and the United States will remain powerful, but as regional hegemons, due to deficiencies in mind for one, and in means for the other.

Text:  The world is changing, rapidly.  Geopolitics is certainly not immune to change, as GPC has seen significant, fundamental changes in recent years. The binary nature of the Cold War that gave way to one superpower has seen the rise of other competitors and a return to GPC[1].  Over the coming years this multipolar contest will produce a dominant superpower, but the competition itself will change in response to a different geopolitical operating environment[2]. New criterion will emerge and demand a new approach for GPC success.   

While some have written of new challengers in GPC, the run-up to 2050 for the title of top superpower plays like an enticing but predictable Hollywood rerun.  China, Russia, and the U.S., each with their strengths, each with their weaknesses, remain the three most qualified contestants for the title of dominate world superpower.  The strengths of the three are both seen and unseen: enormous populations and territories, economic strength, powerful militaries, robust clandestine services, and perhaps most important, permanent membership in the United Nations Security Council, or UNSC[3]. Their collective weaknesses are similar in visibility: aging or declining populations, internal political strife, and international overextension, to name but a few. But on aggregate, these three remain the principal contenders.  While fellow UNSC members and historic powers England and France, as well as emerging contenders Brazil and India, are also in the discussion, none warrant consideration in GPC circa 2050.  Instead, the focus remains on the “Big Three”. Analysis begins with examining their key strengths and weaknesses.

With over one billion people and $3 trillion in currency exchange reserves[4], China presents an economic powerhouse that is now acquiring a greater hunger for superpower status. President Xi Jinping has aggressively pursued a new role for China on the world stage.  China’s military continues to undergo a rapid upgrade in both size and quality. The Chinese navy, the largest in the world, continues to expand its presence in the South China Sea, while Belt and Road initiatives entice countries from Africa to South America to side with China while being rewarded with lavish infrastructure funding that also opens the door for Chinese military expansion[5].  China’s strengths are not without weaknesses; these include an aging population, underconsumption, few allies, international condemnation for its treatment of Uighurs, and an enormous police state that carefully tracks a populace that regularly protests restrictions on freedom[6]. These weaknesses make the Chinese ascent anything but guaranteed. 

The revanchism of Russian President Vladimir Putin has catapulted Russia back into GPC after a prolonged hangover following the dissolution of the Soviet Union[7].  However, the book cover of Russia has proven more impressive than the contents.  Russia’s stumbles in Ukraine in 2022 have shown its military to be a shadow of its former self. Despite abundant resources, Russia remains a country with a relatively small economy that is dependent upon gas and oil exports[8]. Additionally, there appears to be no succession plan when Mr. Putin is no longer de facto dictator of Russia[9].  With an all-pervasive security apparatus often faced inward to quell domestic unrest, Russia’s path to 2050 is littered with crucial questions, with the likely answers not boding well for Russian GPC aspirations. 

Boasting the world’s largest economy and military, the U.S. seems well-positioned to maintain its dominant superpower status.  But there are cracks in the armor that are becoming more visible with the passage of time.  Political gridlock, social unrest, a ballooning deficit, and an isolationist sentiment after the misadventures in Afghanistan and Iraq cast the U.S. as more of a fading superpower, and not an ascending one[10]. Furthermore, the ever-present military lobby in the U.S. threatens to leave the U.S. prepared for current warfare, but not that of the future. Lastly, U.S. commitments to North Atlantic Treaty Organization, especially to “alliance a la carte” allies such as Hungary and Turkey, further complicate and undermine the U.S. focus on GPC while these countries actively support GPC adversaries China and Russia.  

In 2050, the world will witness China emerge as the winner of GPC, with Russia second.  The U.S. places a distant third due to its inability to perceive and adapt to the true nature of the future operating environment.  Epitomizing the adage of “fighting the last war”, the U.S. will continue to measure superpower qualifications on outdated criterion and fail to grasp the sweeping changes not on the horizon, but already upon us.  While the U.S. remains fixed on kinetic engagements with peer and near-peer adversaries, China capitalizes on its superior understanding of the future operational environment.  The U.S. wins the current paradigm of GPC, but it will lose the future incarnation.  The passing of the torch has already begun.  While the lobby of the Military-Industrial Complex keeps the U.S. fixated on weapon systems worth billions, China perceptively pushes ahead on a foundation of four specific areas.  These areas are economics, information operations, chemical and cyberwarfare, and technological advances, specifically advances in Artificial Intelligence (AI). Careful to avoid disastrous engagements such as the U.S. in Afghanistan and Iraq, China skillfully employs a long term view based on economic strength and the leverage it creates.

The world will be a drastically different place in 2050.  The future is often uncertain and difficult to predict.  No country’s leadership has a mastery of prognosticative skills, but some are certainly better than others.  Blending ancient beliefs, a long term view, an acute study of modern history, and a determined leader focused on his country’s ascent, China scores highest due its abilities in visualizing and navigating the way forward while possessing the resources to support the journey.  While Russia has similar qualities in terms of vision, its ability to exploit this advantage is limited by economic strength dependent upon the demand for its resources; this limits Russia to a distant second place position. And the U.S. relinquishes its top spot and is relegated to regional hegemon, a victim of fighting the previous war amid a world of competitors who have long since lost their “reverential awe[11]” for the American Empire. 


Endnotes:

[1] Kroenig, M. (2020). The Return of Great Power Rivalry: Democracy versus Autocracy from the Ancient World to the U.S. and China / Matthew Kroenig. Oxford University Press.

[2] Jones, B. (2017). Order from Chaos: The New Geopolitics. Retrieved on February 15, 2022, from https://www.brookings.edu/blog/order-from-chaos/2017/11/28/the-new-geopolitics/

[3] Bosco, D. Five to Rule Them All: The UN Security Council and the Making of the Modern World. New York: Oxford University Press, 2009.

[4] Xu, M. et al. (2021). China’s FOREX Reserves Rise in October for First Time Since July. Retrieved on February 15, 2022, from https://www.reuters.com/business/chinas-forex-reserves-rise-oct-first-time-since-july-2021-11-07/

[5] Shephard, W. (2020). How China’s Belt and Road Initiative Became a Global Trail of Trouble. Retrieved on May 4, 2022, from https://www.forbes.com/sites/wadeshepard/2020/01/29/how-chinas-belt-and-road-became-a-global-trail-of-trouble/?sh=49dcc5ad443d

[6] Human Rights Watch. (2022). China: Events of 2021. Retrieved on May 4, 2022, from https://www.hrw.org/world-report/2022/country-chapters/china-and-tibet#:~:

[7] Jenkins, B. (2016). Dealing with a Revanchist Russia. The Rand Blog.  Retrieved on February 1, 2022, from https://www.rand.org/blog/2017/02/dealing-with-a-revanchist-russia.html

[8] Gobles, P. (2018). Russia More Dependent on Exports Now Than in 2018. The Jamestown

Foundation.  Retrieved on February 1, 2022, from https://jamestown.org/program/russia-more-dependent-on-raw-materials-exports-now-than-in-2008/

[9] Luhn, A. (2020). Who Will Replace Putin? Politico.  Retrieved on February 1, 2022, from https://www.politico.eu/article/who-will-replace-valdimir-putin-russia-kremlin/

[10] Ferguson, N. (2020). The Future of American Power. The Economist. Retrieved on February 1, 2022, retrieved from https://www.economist.com/by invitation/2021/08/20/niall-ferguson-on-why-the-end-of-americas-empire-wont-be peaceful

[11] Gibbon, & Milman, H. H. (2008). A History of the Decline and Fall of the Roman Empire Volume 1. Project Gutenberg.

Assessment Papers China (People's Republic of China) Competition Governing Documents and Ideas Great Powers & Super Powers Russia United States

Assessing the Benefits of India’s Frustrating Pragmatic Energy

Chandler Myers is an officer in the U.S. Air Force. He holds a BS in English from the Air Force Academy and a MA in international relations with a focus in cyber diplomacy from Norwich University. Chandler contributes to WAR ROOM, the U.S. Armys online national security journal. Divergent Optionscontent does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Benefits of India’s Frustrating Pragmatic Energy 

Date Originally Written:  May 3, 2022.

Date Originally Published:  May 9, 2022. 

Author and / or Article Point of View:  The author believes that India’s position on the Russian invasion has proven that it can champion international institutions and norms while being ferociously aware of its limitations.

Summary:  India choosing to fully condemn or support the Russian invasion of Ukraine at the United Nations would have negative consequences. India needs Russian military equipment. At the same time, India’s geography requires continual dialogue with China to resolve territorial disputes. With chilling precision, India’s unmistakable neutral position suits their complex, globally-integrated interest.

Text:  Efforts to keep a sufferable neutral status as Moscow encourages ever-more horrific atrocities in Ukraine has raised important Western concerns on New Delhi’s position. India has, for good reason, abstained from every resolution at the United Nations Security Council and General Assembly on this matter[1]. Though this decision may look different with time, one can argue that New Dehli’s related position is improving its global status. India’s Prime Minister (PM) Narendra Damodardas Modi, recently speaking in Berlin, communicated: “we believe that no party can emerge victorious in this war.” He is right. But, that does not mean India cannot profit from Russia’s violence towards Ukraine. The Germany-India bilateral discussions on May 2, 2022, ended in documented agreements that supplement both country’s on-going sustainable development. The agreements cover wide ranging technical cooperation and German financial assistance in areas related to clean energy, sustainable urban development, climate adaptations, research and development, environmental protections, and so on[2]. Add to that, German Chancellor Olaf Scholz also invited PM Modi, for what will be India’s fourth annual consecutive appearance, as a guest to the G-7 summit in June. 

On the opposite end, India is likely enjoying discounted Russian crude oil amidst ordinary buyers closing their ports due to Moscow’s war. According to India’s Ministry of Commerce, in 2021 Russian imported oil only made up 2% of India’s total imports[3]. This 2% is an obvious small share compared to a recent report by Kpler, a commodities research company. Captured in a British Broadcasting Corporation article, Kpler reported a higher figure of contracted purchased quantity of Russian oil from India in months spanning March through June (of 2022) than all of 2021. From that data, one can opine that India is having less trouble than the U.S., United Kingdom (UK) , and European Union (EU), if any at all, contending with Russia’s invasion of Ukraine. India will not plagiarize U.S., UK, and EU sanction decisions toward Russia as its decision lays elsewhere. 

Indian-Russo ties are well documented, most of which focus on defense. Stimson Center analysts estimated 85 percent of India’s military equipment is of Russian or Soviet origin[4]. Other estimates are figured as low as 45 percent[5]. Knowing this, India’s territorial disputes with Pakistan and China, who are allies of Russia, have intensified India’s views of its defense inventory. As recent as March 10, 2022, Pakistan claimed that a surface-to-surface missile shot from India into its Punjab province[6]. Additionally, Chinese and Indian counter claims over parts of the Kashmir region remain unchanged. Even with unresolved storied challenges, China and Russia have found a nation expected to be the most populous by 2030 seemingly on its side and they intend to take advantage. 

Before Russia’s February 24, 2022, invasion of Ukraine, the world saw numerous Western diplomats and heads of state meet with Kremlin leadership in hopes to reverse Moscow’s hardening language and military buildup. In Ukraine, the same and different leaders continue to meet with Ukrainian President Volodymyr Zelensky to offer symbolic and material support. As the war lengthens, similar leaders from the West have met with counterparts in India to deepen cooperation. Before Modi’s trip to European countries that include Germany, Denmark, and France in May 2022, he met with European Commission President, Ursula von der Leyen, in April. The specific details of the two-day meeting have yet to be uncovered, however, both parties signaled strengthening economic and technology cooperation with the creation of a new Trade and Technology Council[7]. India’s pragmatic stance is also seeing benefits from deeper security cooperation between it and the United Kingdom[8]. 

New Dehli’s position has also attracted Chinese Foreign Minister, Wang Yi. In a meeting between him and his Indian counterpart, Subrahmanyam Jaishankar, Wang sought a cooling relationship between the two countries. Quoted in a Reuters article, Wang explained, “The two sides should … put the differences on the boundary issue in an appropriate position in bilateral relations, and adhere to the correct development direction of bilateral relations[9].”

The diplomatic atmosphere is not confined to governments meeting with one another either. The Hoover Institution, a conservative think tank based in the U.S., has decided to use this opportunity to launch a new series, “India’s Opportunities in the 2020s[10].” It is without question that—for now—interest in India is finding enlarged footing by all sides.

Prime Minister Modi’s ethical scorecard has been declining long before Russia’s recent invasion. India voting at the United Nations to condemn or show full support of the Russian invasion of Ukraine would likely result in serious consequences for India. Rather than choose between the stated options, Modi has found, with exceptional clarity, the sweet spot. As frustrating it is for the United States, China wants to normalize relations with India. And in the same vein, Western countries want to deepen cooperation in areas like security, clean energy, and technology as Russian oil is on the cheap. Even with domestic troubles abound, Modi has cushioned criticism from abroad and elevated India’s attractiveness onto the world stage.  


Endnotes: 

[1] Mohan, C. “For India, Putin’s War Starts to Look like a Gift”. Foreign Policy, March 30, 2022. https://foreignpolicy.com/2022/03/30/india-ukraine-russia-war-china-oil-geopolitics/ 

[2] News On Air. “India and Germany to launch an Indo-German Partnership for Green and Sustainable Development”. 3 May, 2022. https://newsonair.com/2022/05/03/india-and-germany-to-launch-an-indo-german-partnership-for-green-and-sustainable-development/

[3] Menon, Shruti. “Ukraine crisis: Why India is buying more Russian oil”. BBC News, 26 April 2022. https://www.bbc.com/news/world-asia-india-60783874 

[4] O’Donnell, F. and Vasudeva, A. “Between a Rock and Hard Place: India’s Stance on the Russia-Ukraine Crisis”. Stimson Center, 4 March 2022. https://www.stimson.org/2022/between-a-rock-and-a-hard-place-indias-stance-on-the-russia-ukraine-crisis/ 

[5] Tharoor, S. “Modi’s Big Mistake How Neutrality on Ukraine Weakens India”. 27 April, 2022. https://www.foreignaffairs.com/articles/india/2022-04-27/modis-big-mistake 

[6] Associated Press. “Military says unarmed missile from India ends up in Pakistan”. 10 March, 2022. https://apnews.com/article/india-new-delhi-pakistan01cb6d4d7ce5d8aee98cd6135615712c 

[7] Kijewski, L. “EU and India vow to ramp up cooperation with new Trade and Technology Council”. 25 April, 2022. https://www.politico.eu/article/eu-and-india-vow-to-ramp-up-cooperation-with-new-trade-and-technology-council/ 

[8] Parkin, B. and Parker, G. Boris Johnson set to offer Narendra Modi increased UK-India defence co-operation”. 21 April, 2022. https://www.ft.com/content/7cd277bd-d17c-426e-9d63-addcb5405523 

[9] Das, K. and Miglani, S. “Chinese minister seeks normal India ties, Delhi says ease border tension first”. 25 March, 2022. https://www.reuters.com/world/china/chinese-foreign-minister-see-indian-counterpart-surprise-meeting-2022-03-25/ 

[10] Hoover Institution. “India’s Opportunities in the 2020s”. 17 May, 2022. https://www.hoover.org/events/indias-opportunities-2020s 

Assessment Papers Chandler Myers China (People's Republic of China) India Russia Ukraine United Nations

An Assessment of Thinking Big About Future Warfare 

Marco J. Lyons is a U.S. Army Lieutenant Colonel who has served in tactical and operational Army, Joint, and interagency organizations in the United States, Europe, the Middle East, Afghanistan, and in the Western Pacific. He is currently a national security fellow at Harvard Kennedy School where he is researching strategy and force planning for war in the Indo-Pacific. He may be contacted at marco_lyons@hks.harvard.edu. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group. 


Title:  An Assessment of Thinking Big About Future Warfare 

Date Originally Written:  April 15, 2022. 

Date Originally Published:  May 2, 2022.

Summary:  There are critical, outstanding disconnects between U.S./western military theory, forces, and doctrine that hamper linking military strategy to national policy. Big ideas about future warfare matter primarily around seizing and maximizing advantages over potential adversaries to compel favorable policy outcomes. The big ideas are useful and matter because identifying, developing, and deploying warfighting advantages unfolds over long periods of time.

Text:  Far more than any particular revolution in military affairs, western powers are witnessing what may be called an extended revolution in strategic affairs. Such dramatic and wide-reaching change in warfare and how it is conceived involves 1) fundamental questions of the utility and most effective forms of power and diplomacy; 2) challenges to future force planning caused by advances in information technologies, long-range, precision fires, and hybrid combinations of symmetrical and asymmetrical capabilities, and whether these define a new warfighting regime and character of war; and 3) influences of globalization – or more specifically, the security environments created by the various forces making up social and economic globalization – on militaries. Bringing these three dynamics together – and more may be added to the list – in a deeply integrated way will almost certainly yield a new paradigm of warfare. 

Both change and continuity are expected characteristics of the future security environment. Thinking about future big ideas is really only possible because there is enough continuity in history and military affairs[1]. Understanding future war is helped by elaborating on seven critical contexts or broad categories of circumstances: political, social-cultural, economic, military-strategic, technological, geographical, and historical[2].

It is difficult if not impossible to talk about big ideas in future warfare without referencing the possibilities for revolutionary change. One of the more popular ideas about the likelihood of new forms of warfare is the revolution in military affairs, or RMA, which nearly dominated defense publications and discussions in the 1990s. The term has a special linguistic power by implying historic, almost inevitable change[3]. Examinations of military history yield periods of profound change in war’s ever-changing character, and sometimes these periods may be called revolutionary, but these assessments are still difficult to complete in a fully persuasive manner[4]. There is no consensus view of the RMA as a way of thinking about future warfare. 

The early days of Operation Enduring Freedom (OEF) seemed to fall both within and outside the more traditional lines of western war[5]. But just because the U.S. Air Force contributed the core capabilities that allowed Joint Force commanders to achieve effects with air power in Afghanistan following the 9/11 terrorist attacks did not mean that the character of military operations more broadly had changed. Early OEF was a case of what was possible given the seven critical contexts identified above. Although there are convincing reasons to believe that the character of future warfare will change, and probably change in significant ways, the fundamental nature of war will remain the same[6].

Defense planners thinking about the character of future warfare will be well-served by using a simplified list of four operational challenges. These operational challenges could be used to explore needed capabilities and force postures. The four might be: 1) early halt of an invasion with depth (e.g., Ukraine) or without (e.g., the Baltic states); 2) early attack and early counteroffensive to destroy an enemy combined arms army without the benefit of a massive force buildup first (e.g., Taiwan); 3) effective and low-risk intervention in an ongoing, complex conflict zone or region; and 4) effective low-risk peace enforcement in complex terrain including megacities[7]. There is nothing revolutionary about these four. 

It is inherently difficult to predict the exact course of future change, especially since future enemies will invariably have a say in these eventualities. Nonetheless it is important for defense planners to have a clear sense of the character and general scope of future conflict. While technology will almost certainly continue to evolve, including in the critical areas of reconnaissance and long-range precision fires, there is no overwhelming evidence that the character of future operations will change dramatically for ground forces in most types of missions, and especially in close combat in complex and urban terrain[8]. Tactical continuity is supreme. 

Big ideas about future warfare matter primarily around seizing and maximizing advantages over potential adversaries. Generally, the big ideas are useful and matter because identifying, developing, and deploying warfighting advantages always unfolds over longer periods of time. Finally, the exact nature of future warfighting advantages is highly situational – or contextual – and potential adversaries are presumably trying to counter friendly attempts to secure advantages[9]. The tension in “big idea versus context” illustrates the interactive nature of war. 

Doctrine and the other dimensions of force development are profoundly shaped by the reigning big ideas that capture the attention of military leaders and organizations. Those big ideas sketch what the organizations in question are prepared to do, against which opponents, in which operational environments[10]. So the U.S. Army, on the one hand, may want to cling to the big idea that the most consequential future conflicts will be major theater, conventional forces, maneuver and fire campaigns. Nonetheless, the indicators are that irregular fights – alongside large-scale combat operations – in complex hybrid combinations are not going anywhere. 

Implementing big ideas involves turning vision into things, concepts into capabilities and formations, and orchestrating grand actions in accordance with the vision[11]. Big ideas matter but after all, success is judged by adaptation.

Land forces, and particularly the U.S. Army, have been affected more than other military forces by the existential crisis in supposed relevance caused by the end of the Cold War, the lopsided victory in the First Gulf War, the advent of information technologies, revival of irregular and stability operations, and globalization. There are critical, outstanding disconnects between U.S./western military theory, forces, and doctrine that are, most likely, hampering the effective linking of military strategy to national policy. 


Endnotes:

[1] Colin S. Gray, “Another Bloody Century?” Infinity Journal, no. 4 (Fall 2011): 4–7, https://www.militarystrategymagazine.com/wp-content/uploads/2013/12/Infinity_Journal_Special_Edition_war_and_strategy_back_to_basics.pdf#page=14. Gray makes some of the most reasonable and persuasive arguments against assuming too much change in the character of war over time. 

[2] Colin S. Gray, “The 21st Century Security Environment and the Future of War,” Parameters 38, no. 4 (2008): 18, https://press.armywarcollege.edu/parameters/vol38/iss4/7/. Also see Warren Chin, “Technology, War and the State: Past, Present and Future,” International Affairs 95, no. 4 (July 2019): 765–783. Chin concludes that the relationship between war and the state may be in for dramatic change – an existential crisis – as another wave of industrialization, impacts of artificial intelligence and other advanced technologies on societies and economies, as well as possible global climate emergencies tax the modern state to the point of breakdown. 

[3] Lawrence Freedman, The Revolution in Strategic Affairs, 1st ed. (London: Routledge, 1998), 7–8. 

[4] Carlo Alberto Cuoco, The Revolution in Military Affairs: Theoretical Utility and Historical Evidence, Research Paper, no. 142 (Athens, Greece: Research Institute for European and American Studies, April 2010), https://www.files.ethz.ch/isn/115259/rieas142b.pdf. 

[5] Colin McInnes, “A Different Kind of War? September 11 and the United States’ Afghan War,” Review of International Studies 29, no. 2 (2003): 165–184, https://library.fes.de/libalt/journals/swetsfulltext/16323302.pdf. 

[6] David J. Lonsdale, The Nature of War in the Information Age: Clausewitzian Future (London: Frank Cass, 2004). Also see P.E.C. Martin, “Cyber Warfare Schools of Thought: Bridging the Epistemological/Ontological Divide, Part 1,” Royal Canadian Air Force Journal 5, no. 3 (Summer 2016): 43–69, https://rcaf-arc.forces.gc.ca/assets/AIRFORCE_Internet/docs/en/cf-aerospace-warfare-centre/elibrary/journal/2016-vol5-iss3-summer.pdf#cyber-warfare-schools-of-thought. 

[7] Paul K. Davis, David C. Gompert, Richard Hillestad, and Stuart Johnson, Transforming the Force: Suggestions for DoD Strategy (Santa Monica, CA: RAND Corporation, 1998), https://www.rand.org/pubs/issue_papers/IP179.html. 

[8] Michael E. O’Hanlon, The Future of Land Warfare (Washington, DC: Brookings Institution Press, 2015), https://library.oapen.org/handle/20.500.12657/25774. 

[9] Colin S. Gray, The Airpower Advantage in Future Warfare: The Need for Strategy (Maxwell Air Force Base, AL: Air University, Airpower Research Institute, December 2007), https://apps.dtic.mil/sti/pdfs/ADA477043.pdf. 

[10] Terry Terriff, “The Past as Future: The U.S. Army’s Vision of Warfare in the 21st Century,” Journal of Military and Strategic Studies 15, no. 3 (2014): 195–228, https://jmss.org/article/view/58119/43736. 

[11] Robert H. Scales, Future Warfare: Anthology (Carlisle Barracks, PA: U.S. Army War College, Strategic Studies Institute, 2000), https://apps.dtic.mil/sti/pdfs/ADA365316.pdf. 

Assessment Papers Defense and Military Reform Governing Documents and Ideas Marco J. Lyons Policy and Strategy U.S. Army

Assessing the Costs of Expecting Easy Victory

Michael D. Purzycki is an analyst, writer, and editor based in Arlington, Virginia. He has worked for the United States NavyUnited States Marine Corps, and United States Army. In addition to Divergent Options, he has been published in the Center for International Maritime Security, the Washington MonthlyMerion West, Wisdom of Crowds, Charged AffairsBraver Angels, and more. He can be found on Twitter at @MDPurzycki, and on Medium at https://mdpurzycki.medium.com/.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Costs of Expecting Easy Victory

Date Originally Written:  April 10, 2022.

Date Originally Published:  April 25, 2022.

Author and / or Article Point of View:  The author believes American leaders’ expectation of quick victory in post-9/11 wars, and the concomitant refusal to ask for material sacrifice by the American public, undermined the ability to win those wars.

Summary:  Unlike World War II, America’s post-9/11 conflicts did not involve shared material sacrifice, such as tax increases or reducing oil use. Previous success during Operation Desert Storm in 1991 and initial U.S. success in Afghanistan following the 9/11 attacks led then-U.S. Secretary of Defense Donald Rumsfeld to doubt the need for large troops deployments to Iraq. These factors left the U.S., as a whole, unprepared for the reality of post-conflict stabilization.

Text:  Like the bombing of Pearl Harbor in 1941, the terrorist attacks of September 11, 2001, led to widespread popular support for war[1]. In both cases, the deaths of thousands of Americans catalyzed lengthy deployments of U.S. troops overseas. However, the two eras varied widely in the extent to which Americans outside the military were asked to sacrifice to win the wars.

While 16 million Americans served in the military during World War II[2], the entirety of American society was mobilized. At least 20 million Victory Gardens supplied 40% of the country’s produce by 1944[3]. Citizens were urged to carpool to save fuel and rubber[4]. The war saw the introduction of income tax withholding, turning a tax previously limited to wealthy Americans into a way ordinary citizens funded the war effort[5].

No such ethos of sacrifice emerged after 9/11. A month after the attacks, President George W. Bush argued, “We cannot let the terrorists achieve the objective of frightening our nation to the point where we don’t conduct business, where people don’t shop[6].” In 2003, President Bush signed a reduction in income tax rates[7]. Whatever the economic pros and cons of doing so, the decision to cut taxes during a war did not indicate the government intended to ask the public to sacrifice.

In the twelve years before the 2003 invasion of Iraq, major operations the U.S. led were brief and included relatively few American casualties. The 1991 Gulf War lasted six weeks, including only four days of ground combat, and fewer than 300[8] of the more than 500,000[9] Americans deployed were killed. The American-led interventions in Bosnia (lasting three weeks in 1995) and Kosovo (eleven weeks in 1999) consisted of air and missile strikes followed by deployments of NATO peacekeeping missions[10][11]. No Americans were killed in combat during the former conflict, and only two were killed in a training exercise during the latter[12]. After 9/11, the U.S. relied largely on air and missile strikes to oust the Taliban from control of Afghanistan in ten weeks; Afghan allies carried out most of the fighting on the ground[13].

Expecting a quick victory – and expecting Iraq to quickly stabilize after Iraqi President Saddam Hussein was overthrown – Secretary of Defense Rumsfeld and Commander of U.S. Central Command General Tommy Franks underestimated the number of troops needed to stabilize Iraq. Before the invasion, General Eric Shinseki, then Chief of Staff of the U.S. Army, told the Senate Armed Services Committee that stabilization would require “several hundred thousand soldiers[14].” Similarly, Middle East policy expert Kenneth Pollack argued for “two to three hundred thousand people altogether[15].” By contrast, Secretary of Defense Rumsfeld expected the war to last a matter of months[16], while Deputy Secretary of Defense Paul Wolfowitz dismissed Shinseki’s estimate, saying “It is hard to conceive that it would take more forces to provide stability in a post-Saddam Iraq than it would take to conduct the war itself[17].”

When the invasion was launched, 145,000 U.S. troops were involved[18], along with 70,000 Kurdish Peshmerga fighters[19], 45,000 British troops[20], and others. A year later, the U.S.-led coalition troops in Iraq numbered 162,000[21]. This proved inadequate to stabilize Iraq, particularly after the disbanding of the Iraqi army in 2003[22]. Until the “surge” of 2007, in which more than 28,000 additional troops[23] were deployed, brutal fighting between Iraqi factions was rife – more than 96,000 Iraqi civilians were killed from 2003-2007[24]. More than 3,900 Americans were killed from 2003-2007[25], compared to fewer than 600 from 2008-2011[26]. Meanwhile, American popular support for the war declined, from 72% in 2003 to 43% in 2007[27].

The role of oil in the debates surrounding the Iraq war links to the lack of shared sacrifice[28][29]. From 2002 to 2006, 12% of crude oil imported[30] into the U.S. came from Saudi Arabia[31]. Analysts such as New York Times journalist Thomas Friedman argued for a large increase in the federal gasoline tax[32], which would have echoed the reduction of fuel use during World War II. However, U.S. officials did not make decreased reliance on Middle Eastern oil a Policy priority.

Fuel dependence was also a factor in American casualties in Afghanistan and Iraq. According to a 2009 report by the Army Environmental Policy Institute, from 2003 to 2007, one in every 24 fuel and water resupply convoys in Afghanistan, and one in every 38 in Iraq, resulted in an American casualty[33]. But while the military has sought to reduce fossil fuel use in recent years[34], Americans at home were not asked to sacrifice for it at the height of the Iraq war.

While many factors contributed to America’s post-9/11 military struggles, one factor was the expectation of quick victory. Between underestimating the difficulty of stabilization and refusing to ask for material sacrifice by the public, American leaders were unprepared for a long struggle. This lack of preparation can serve as a lesson for leaders debating whether to fight future conflicts and preparing for difficult fights if they do.


Endnotes:

[1] Washington Post. “Post-ABC Poll: Terrorist Attacks.” September 13, 2001. https://www.washingtonpost.com/wp-srv/politics/polls/vault/stories/data091401.htm

[2] National World War II Museum. “WWII Veteran Statistics.” https://www.nationalww2museum.org/war/wwii-veteran-statistics

[3] Smithsonian Gardens. “Victory Garden at the National Museum of American History.” https://gardens.si.edu/gardens/victory-garden/#:~:text=Roughly%20one%20half%20of%20all,by%20victory%20gardens%20by%201944

[4] Yale University. “’When you ride ALONE you ride with Hitler!’ U.S. Government Propaganda Poster, 1943. https://energyhistory.yale.edu/library-item/when-you-ride-alone-you-ride-hitler-us-government-propaganda-poster-1943

[5] Hill, Adriene. “How tax withholding became the norm for American workers.” Marketplace, July 31, 2017.  https://www.marketplace.org/2017/07/31/how-tax-withholding-became-norm-american-workers/

[6] C-SPAN. “Presidential News Conference.” October 11, 2001. https://www.c-span.org/video/?c4552776/user-clip-bush-shopping-quote

[7] White House. “President Bush Helped Americans Through Tax Relief.” https://georgewbush-whitehouse.archives.gov/infocus/bushrecord/factsheets/taxrelief.html

[8] Defense Casualty Analysis System. “U.S. Military Casualties – Persian Gulf War Casualty Summary Desert Storm.” https://dcas.dmdc.osd.mil/dcas/pages/report_gulf_storm.xhtml

[9] U.S. Department of Defense. “Desert Storm: A Look Back.” January 11, 2019. https://www.defense.gov/News/Feature-Stories/story/Article/1728715/desert-storm-a-look-back/

[10] North Atlantic Treaty Organization. “History of the NATO-led Stabilisation Force (SFOR)

in Bosnia and Herzegovina.” https://www.nato.int/sfor/docu/d981116a.htm

[11] North Atlantic Treaty Organization. “NATO’s role in Kosovo.” https://www.nato.int/cps/en/natolive/topics_48818.htm

[12] BBC News. “Two die in Apache crash.” May 5, 1999. http://news.bbc.co.uk/2/hi/335709.stm

[13] Council on Foreign Relations. “The U.S. War in Afghanistan: 1999 – 2021.” https://www.cfr.org/timeline/us-war-afghanistan

[14] Mills, Nicolaus. “Punished for telling truth about Iraq war.” CNN, March 20, 2013. https://www.cnn.com/2013/03/20/opinion/mills-truth-teller-iraq/index.html

[15] Lemann, Nicholas. “The Next World Order.” New Yorker, March 24, 2002. https://www.newyorker.com/magazine/2002/04/01/the-next-world-order

[16] Esterbrook, John. “Rumsfeld: It Would Be A Short War.” CBS News, November 15, 2002. https://www.cbsnews.com/news/rumsfeld-it-would-be-a-short-war/

[17] Mills, Nicolaus. “The General who Understood Iraq from the Start.” Dissent, April 25, 2008. https://www.dissentmagazine.org/online_articles/the-general-who-understood-iraq-from-the-start

[18] Mills, March 20, 2013.

[19] Peltier, Major Isaac J. “Surrogate Warfare: The Role of U.S. Army Special

Forces.” School of Advanced Military Studies, United States Army Command and General Staff College, 2005. http://www.jezail.org/03_archive/manuals_monogrms/Surrogate_war_UW.pdf

[20] NBC News. “Britain says most troops out of Iraq by June.” December 10, 2008. https://www.nbcnews.com/id/wbna28161917

[21] Carney, Stephen A. “Allied Participation in Operation Iraqi Freedom.” Center for Military History, United States Army, 2011. https://history.army.mil/html/books/059/59-3-1/CMH_59-3-1.pdf

[22] Thompson, Mark. “How Disbanding the Iraqi Army Fueled ISIS.” TIME, May 28, 2015. https://time.com/3900753/isis-iraq-syria-army-united-states-military/

[23] BBC News. “US Iraq troop surge ‘starts now.’” June 15, 2007. http://news.bbc.co.uk/2/hi/middle_east/6757329.stm

[24] Statista. “Number of documented civilian deaths in the Iraq war from 2003 to February 2022.” https://www.statista.com/statistics/269729/documented-civilian-deaths-in-iraq-war-since-2003/

[25] Statista. “Number of U.S. soldiers killed in the Iraq war from 2003 to 2020.”  https://www.statista.com/statistics/263798/american-soldiers-killed-in-iraq/

[26] Ibid.

[27] Pew Research Center. “Public Attitudes Toward the War in Iraq: 2003-2008.” March 19, 2008. https://www.pewresearch.org/2008/03/19/public-attitudes-toward-the-war-in-iraq-20032008/

[28] Ahmed, Nafeez. “Iraq invasion was about oil.” Guardian, March 20, 2014. https://www.theguardian.com/environment/earth-insight/2014/mar/20/iraq-war-oil-resources-energy-peak-scarcity-economy

[29] Tyagi, Tal. “The Iraq War Was Not About Oil.” Quillette, May 6, 2019. https://quillette.com/2019/05/06/the-iraq-war-was-not-about-oil/

[30] U.S. Energy Information Administration. “U.S. Imports of Crude Oil and Petroleum Products.” https://www.eia.gov/dnav/pet/hist/LeafHandler.ashx?n=PET&s=MTTIMUS1&f=M

[31] U.S. Energy Information Administration. “U.S. Imports from Saudi Arabia of Crude Oil and Petroleum Products.” https://www.eia.gov/dnav/pet/hist/LeafHandler.ashx?n=PET&s=MTTIMUSSA1&f=M

[32] Friedman, Thomas L. “The Real Patriot Act.” New York Times, October 5, 2003. https://www.nytimes.com/2003/10/05/opinion/the-real-patriot-act.html

[33] Army Environmental Policy Institute. “Sustain the Mission Project: Casualty Factors

for Fuel and Water Resupply Convoys.” September 2009. https://apps.dtic.mil/sti/pdfs/ADB356341.pdf

[34] Gardner, Timothy. “U.S. military marches forward on green energy, despite Trump.” Reuters, March 1, 2017. https://www.reuters.com/article/us-usa-military-green-energy-insight/u-s-military-marches-forward-on-green-energy-despite-trump-idUSKBN1683BL

Assessment Papers Governing Documents and Ideas Michael D. Purzycki United States

Assessing the Tension Between Privacy and Innovation

Channing Lee studies International Politics at the Edmund A. Walsh School of Foreign Service at Georgetown University. She can be found on Twitter @channingclee. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Tension Between Privacy and Innovation

Date Originally Written:  April 1, 2022.

Date Originally Published:  April 11, 2022.

Author and / or Article Point of View:  The author is a student of international politics. 

Summary:  Given the importance of data to emerging technologies, future innovation may be dependent upon personal data access and a new relationship with privacy. To fully unleash the potential of technological innovation, societies that traditionally prize individual privacy may need to reevaluate their attitudes toward data collection in order to remain globally competitive.

Text:  The U.S. may be positioning itself to lag behind other nations that are more willing to collect and use personal data to drive Artificial Intelligence (AI) advancement and innovation. When the COVID-19 pandemic began, the idea of conducting contact tracing to assess virus exposure through personal devices sounded alarm bells across the United States[1]. However, that was not the first time technologies were engaged in personal data collection. Beyond the pandemic, the accumulation of personal data has already unlocked enhanced experiences with technology—empowering user devices to better accommodate personal preferences. As technology continues to advance, communities around the world will need to decide which ideals of personal privacy take precedence over innovation.

Some experts like Kai-Fu Lee argue that the collection of personal data may actually be the key that unlocks the future potential of technology, especially in the context of AI[2]. AI is already being integrated into nearly all industries, from healthcare to digital payments to driverless automobiles and more. AI works by training algorithms on existing data, but it can only succeed if such data is available. In Sweden, for example, data has enabled the creation of “Smart Grid Gotland,” which tracks electricity consumption according to wind energy supply fluctuations and reduces household energy costs[3]. Such integration of technology with urban planning, otherwise known as “smart cities,” has become a popular aspiration of governments across the globe to make their cities safer and more efficient. However, these projects also require massive amounts of data.

Indeed, data is already the driving force behind many research problems and innovations, though not without concerns. For example, AI is being used to improve cancer screening in cervical and prostate cancer, and AI might be the human invention that eventually leads scientists to discover a cancer cure[4]. Researchers like Dr. Fei Sha from the University of Southern California are working to apply big data and algorithmic models to “generate life-saving biomedical research outcomes[5].” But if patients deny access to their healthcare histories and other information, researchers will not have the adequate data to uncover more effective methods of treatment. Similarly, AI will likely be the technology that streamlines the advancement of digital payments, detecting fraudulent transactions and approving loan applications at a quicker speed. Yet, if people resist data collection, the algorithms cannot reach their full potential. As these examples demonstrate, “big data” can unlock the next chapter of human advances, but privacy concerns stand in the way.

Different societies use different approaches to deal with and respond to questions of data and privacy. In Western communities, individuals demonstrate strong opposition to the collection of their personal information by private sector actors, believing collection to be a breach of their personal privacy privileges. The European Union’s (EU) General Data Protection Regulation  and its newly introduced Digital Services Act, Canada’s Personal Information Protection and Electronic Documents Act, and California’s Consumer Privacy Act curb the non-consensual collection of personal information by businesses, thereby empowering individuals to take ownership of their data. Recently, big tech companies such as Meta and Google have come under public scrutiny for collecting personal data, and polls reveal that Americans are increasingly distrustful of popular social media apps such as Facebook and Instagram[6]. 

Still, the American public is not as guarded as it may appear. Video-focused social media app TikTok, whose parent company Bytedance is based in China, reported more than 100 million daily U.S. users in August 2020, up 800% since January 2018[7]. Despite warnings that the Shanghai-based company could potentially share personal data with Beijing, including threats by the Trump administration to “ban TikTok” for national security reasons, nearly a third of Americans continue to use the application on a daily basis, seemingly ignoring privacy concerns. While lawmakers have attempted to regulate the collection of data by large corporations, especially foreign companies, public opinion appears mixed.

Norms in the Eastern hemisphere tell a different story. Privacy laws exist, such as China’s Personal Information Protection Law and Japan’s upcoming ​​Amended Act on Protection of Personal Information, but the culture surrounding them is completely distinct, particularly when it comes to government collection of personal data. At the height of the pandemic, South Korea introduced a robust contact tracing campaign that relied on large databases constructed by data from credit card transactions[8]. Taiwan succeed in contact tracing efforts by launching an electronic security monitoring system that tracks isolating individuals’ locations through their cell phones[9]. In China, almost everything can be achieved through a single app, WeChat, which allows users to post pictures, order food, message friends, hire babysitters, hail a cab, pay for groceries, and more. This technological integration, which has transformed Chinese society, works because enough personal information is stored and linked together in the application. 

Some may argue that not all the data being collected by governments and even corporations has been neither voluntary nor consensual, which is why collection discussions require legal frameworks regarding privacy. Nevertheless, governments that emphasize the collective good over personal privacy have fostered societies where people possess less paranoia about companies utilizing their information and enjoy more technological progress. Despite aforementioned privacy concerns, WeChat topped more than one billion users by the end of 2021, including overseas users[10].

Regardless of a nation’s approach to technological innovation, one thing must be made clear: privacy concerns are real and cannot be diminished. In fact, personal privacy as a principle forms the foundation of liberal democratic citizenship, and infringements upon privacy threaten such societal fabrics. Law enforcement, for example, are more actively optimizing emerging technologies such as facial recognition and surveillance methods to monitor protests and collect individual location data. These trends have the potential to compromise civil liberties, in addition to the injustices that arise from data biases[11].

Yet there is also no doubt that the direction global privacy laws are headed may potentially stifle innovation, especially because developing technologies such as AI requires large quantities of data. 

The U.S. will soon need to reevaluate the way it conceives of privacy as it relates to innovation. If the U.S. follows the EU’s footsteps and tightens its grip on the act of data collection, rather than the technology behind the data collection, it might be setting itself up for failure, or at least falling behind. If the U.S. wants to continue leading the world in technological advancement, it may pursue policies that allow technology to flourish without discounting personal protections. The U.S. can, for example, simultaneously implement strident safeguards against government or corporate misuse of personal data and invest in the next generation of technological innovation. The U.S. has options, but these options require viewing big data as a friend, not a foe.


Endnotes:

[1] Kate Blackwood, “Study: Americans skeptical of COVID-19 contact tracing apps,” Cornell Chronicle, January 21, 2021, https://news.cornell.edu/stories/2021/01/study-americans-skeptical-covid-19-contact-tracing-apps.

[2] Kai-Fu Lee, AI Superpowers: China, Silicon Valley, and the New World Order (Boston: Mariner Books, 2018).

[3] “Data driving the next wave of Swedish super cities,” KPMG, accessed March 12, 2022, https://home.kpmg/se/sv/home/nyheter-rapporter/2020/12/data-driving-the-next-wave-of-swedish-super-cities.html.

[4] “Artificial Intelligence – Opportunities in Cancer Research,” National Cancer Institute, accessed February 15, 2022, https://www.cancer.gov/research/areas/diagnosis/artificial-intelligence.

[5] Marc Ballon, “Can artificial intelligence help to detect and cure cancer?,” USC News, November 6, 2017, https://news.usc.edu/130825/can-artificial-intelligence-help-to-detect-and-cure-cancer/.

[6] Heather Kelly and Emily Guskin, “Americans widely distrust Facebook, TikTok and Instagram with their data, poll finds,” The Washington Post, December 22, 2021, https://www.washingtonpost.com/technology/2021/12/22/tech-trust-survey/.

[7] Alex Sherman, “TikTok reveals detailed user numbers for the first time,” CNBC, August 24, 2020, https://www.cnbc.com/2020/08/24/tiktok-reveals-us-global-user-growth-numbers-for-first-time.html.

[8] Young Joon Park, Young June Choe, Ok Park, et al. “Contact Tracing during Coronavirus Disease Outbreak, South Korea, 2020,” Emerging Infectious Diseases 26, no. 10 (October 2020):2465-2468. https://wwwnc.cdc.gov/eid/article/26/10/20-1315_article.

[9] Emily Weinstein, “Technology without Authoritarian Characteristics: An Assessment of the Taiwan Model of Combating COVID-19,” Taiwan Insight, December 10, 2020, https://taiwaninsight.org/2020/11/24/technology-without-authoritarian-characteristics-an-assessment-of-the-taiwan-model-of-combating-covid-19/.

[10] “WeChat users & platform insights 2022,” China Internet Watch, March 24, 2022, https://www.chinainternetwatch.com/31608/wechat-statistics/#:~:text=Over%20330%20million%20of%20WeChat’s,Account%20has%20360%20million%20users.

[11] Aaron Holmes, “How police are using technology like drones and facial recognition to monitor protests and track people across the US,” Business Insider, June 1, 2020, https://www.businessinsider.com/how-police-use-tech-facial-recognition-ai-drones-2019-10.

Assessment Papers Channing Lee Emerging Technology Governing Documents and Ideas Government Information Systems Privacy

Assessing the Forces Driving the Redesign of U.S. Army Land Power

Marco J. Lyons is a Lieutenant Colonel in the U.S. Army who has served in tactical and operational Army, Joint, and interagency organizations in the United States, Europe, the Middle East, Afghanistan, and in the Western Pacific. He is currently a national security fellow at Harvard Kennedy School where he is researching strategy and force planning for war in the Indo-Pacific. He may be contacted at marco_lyons@hks.harvard.edu. Although the ideas here are the author’s alone, he benefitted from feedback provided by Colonel George Shatzer (Strategic Studies Institute, U.S. Army War College) on an earlier draft. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessing the Forces Driving the Redesign of U.S. Army Land Power 

Date Originally Written:  March 23, 2022. 

Date Originally Published:  March 28, 2022.

Author and / or Article Point of View:  The author believes that threat, geopolitical, and technological changes necessitate a reassessment of broad U.S. Army future force design parameters. Without this reassessment, the U.S. Army and the Joint Force risk wasting resources on obsolete conceptions. 

Summary:  Redesigning U.S. Army land power for the twenty-first century will require policy makers and defense leaders to negotiate numerous conflicting dynamics. Future U.S. Army forces will need to be immediately ready for crises but also adaptable. They will need to be powerful enough for major combat operations and organizationally flexible, but also tailored to missions and tasks. 

Text:  The principles that have historically guided U.S. Army force planning—size, mix, and distribution—to meet strategic needs include: early use of the Regular Component in a contingency; reliance on the Reserve Component for later-arriving forces; primacy of defeating an aggressor in major combat operations; capabilities for short-notice deployments; and the importance of readiness to deploy over cost considerations[1]. These principles will likely persist. 

Future technological factors will shape U.S. Army strategy, force structure, and planning decisions. Important technological changes that may decisively influence future U.S. Army force design include advances in information acquisition, processing, distribution, and utilization; capabilities for light, medium, and heavy forces; integrated air defense and protection; and changes to support and maintenance requirements for advanced systems. Demands to reconfigure forces for a broad range of contingencies will not shrink in the foreseeable future. The overriding imperative for air deploy-ability will not change significantly[2]. Like in the 1990s, come-as-you-are wars are still likely, but these require reconceptualization in a Great Power context. 

There will continue to be missions and tasks that only Soldiers, Sailors, Marines, or Airmen can realistically accomplish. Military power employment and military power integration and significantly different – the sum, integrated, is greater than the parts, acting independently. Missions and tasks of the future joint force will be assigned based on military necessity and objectives, and not based on predetermined formulas or a desire for equitability. Future force planning will balance forms of military power and the different major components within land power with the understanding that high-/low-technology mixes are generally superior to a reliance on only one end of the technology spectrum[3]. 

Military affairs are evolving rapidly as events in Ukraine illustrate. Ballistic missiles, precision strikes, unmanned systems, space and cyberspace, and weapon of mass destruction technologies are spreading to various areas around the world. The means and ways of warfare are changing. Battle space in the air, sea, space, and cyberspace domains, in which U.S. forces have enjoyed various degrees of dominance, is becoming increasingly contested[4]. This contestation directly threatens U.S. integration of joint functions, especially fires, movement and maneuver, and sustainment. 

Globalization creates both economic wealth and activity, along with security vulnerabilities. For many advanced economies, the range of security threats is expanding and becoming more varied. The twenty-first century is likely to see more so-called coalitions of the willing than formalized alliance structures like during World War Two. It is not clear that traditional military forces and capabilities will still retain their value and utility[5]. 

The unclassified summary of the 2018 National Defense Strategy (NDS) recognized a weakening, post-1945 international order. The 2018 NDS also called for increased strategic flexibility and freedom of action to manage a high volume of change[6]. Although accurately forecasting the future strategic environment is inherently prone to error, it is also practical to assume that major changes will happen rapidly in the wake of particular high-impact events[7]. 

Because future great power competitors will likely have formidable escalation capabilities, the importance of designing for escalation advantage in future force planning will increase. Part of the complexity being generated in the emerging operational environment is caused by the increasing number of competition-warfighting domains, expanding options for synergy between them, and their disparate considerations with respect to speed, range, and lethality. As the reach, penetrability, and effectiveness of sensors, networks, and weapon systems improve, the demands for integration of capabilities and effects across domains multiply[8]. One characteristic of the emerging operational environment worth watching is that more power centers have more ways to push events on the international stage to their liking[9]. This pushing might be called hyper-competition[10]. 

Future adversaries will almost invariably be fighting on or near land, near their home or otherwise controlled territory, with shorter and simpler lines of communications. Platform for platform, land ones are cheaper, less technologically complex, easier to produce in large numbers, and quicker to replace than their air and maritime counterparts[11]. Part of what makes the twenty-first century military challenge so seemingly intractable is that the drivers of change appear to be forcing adaptation across the full breadth of policy, security, and military dimensions[12]. This means that these traditional factors will almost certainly change in the near- to mid-future: federated military forces based on physical domains; alliances and partnerships of convenience; and “runaway” technological advances that are formulated for purely civilian use. 

Numerous dynamics suggest that the future joint force will be smaller but will still need to retain technological overmatch, rapid deploy-ability, joint and multinational interoperability, and organizational agility[13]. Force development is about getting the joint force to do what it does better while force design is about getting the joint force to do new things in new, more disruptive ways[14]. Changes to both force development and force design are needed to protect current and future overmatch. For national security, and for getting to the future force needed, force development is best when linked directly to the right kinds of research clusters looking at disruptive technologies, that can then be integrated quickly into the right kinds of military capabilities[15]. As for force design, U.S. Army Futures Command is a primary vehicle for delivering rapid technological integration to ground forces. Integrating various technological, research, and military activities based on a coherent view of future national security will take reformed national policy. 

Redesigning U.S. Army land power for the twenty-first century will require policy makers and defense leaders to negotiate numerous conflicting dynamics. Future U.S. Army forces will need to be immediately ready for crises but also adaptable. They will need to be powerful enough for major combat operations and organizationally flexible, but also tailored to missions and tasks. Countering Russian Armed Forces in Ukraine or the Chinese People’s Liberation Army will take forces dominant in and through the land domain while being fully relevant in all competition-warfighting domains – properly integrated with other forms of domain power. 


Endnotes:

[1] Joshua Klimas and Gian Gentile, Planning an Army for the 21st Century: Principles to Guide U.S. Army Force Size, Mix, and Component Distribution (Santa Monica, CA: RAND Corporation, 2018), https://www.rand.org/content/dam/rand/pubs/perspectives/PE200/PE291/RAND_PE291.pdf. 

[2] National Research Council, Board on Army Science and Technology, Commission on Engineering and Technical Systems, STAR 21: Strategic Technologies for the Army of the Twenty-First Century (Washington, DC: National Academy Press, 1992), https://apps.dtic.mil/dtic/tr/fulltext/u2/a275948.pdf. 

[3] William T. Johnsen, Redefining Land Power for the 21st Century (Carlisle Barracks, PA: Army War College, Strategic Studies Institute, 1998), https://apps.dtic.mil/sti/pdfs/ADA349014.pdf. 

[4] John Gordon IV, Igor Mikolic-Torreira, et al, Army Fires Capabilities for 2025 and Beyond (Santa Monica, CA: RAND Corporation, 2019), https://www.rand.org/pubs/research_reports/RR2124.html. 

[5] The United States Commission on National Security/21st Century, New World Coming: American Security in the 21st Century Major Themes and Implications, The Phase I Report on the Emerging Global Security Environment for the First Quarter of the 21st Century, September 15, 1999, https://www.hsdl.org/?view&did=2087. 

[6] James Mattis, Summary of the 2018 National Defense Strategy of the United States of America (Washington, DC: Department of Defense, 2018), https://www.hsdl.org/?view&did=807329. 

[7] John A. Shaud, Air Force Strategy Study 2020-2030 (Maxwell Air Force Base, AL: Air University Press, Air Force Research Institute, January 2011), https://apps.dtic.mil/dtic/tr/fulltext/u2/a540345.pdf. 

[8] Training and Doctrine Command, The Operational Environment, 2035-2050: The Emerging Character of Warfare (Fort Eustis, VA: United States Army Training and Doctrine Command, n.d.), https://community.apan.org/wg/tradoc-g2/mad-scientist/m/articles-of-interest/217736. 

[9] Richard Kaipo Lum, “A Map with No Edges: Anticipating and Shaping the Future Operating Environments,” Small Wars Journal, November 2020, https://smallwarsjournal.com/jrnl/art/map-no-edges-anticipating-and-shaping-future-operating-environments. 

[10] Cf. Nathan P. Freier, John Schaus, and William G. Braun III, An Army Transformed: USINDOPACOM Hypercompetition and U.S. Army Theater Design (Carlisle, PA: U.S. Army War College Press, 2020), https://press.armywarcollege.edu/monographs/912. 

[11] Shmuel Shmuel, “The American Way of War in the Twenty-first Century: Three Inherent Challenges,” Modern War Institute, June 30, 2020, https://mwi.usma.edu/american-way-war-twenty-first-century-three-inherent-challenges/. 

[12] National Defense Panel, Transforming Defense—National Security in the 21st Century, Report of the National Defense Panel, Arlington, VA, December 1997, https://www.hsdl.org/?view&did=1834. 

[13] See Prepared Statement by Dr. Mike Griffin, Senate Hearing 115-847, Accelerating New Technologies to Meet Emerging Threats, Hearing Before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, United States Senate, 115th Congress, 2nd Session, April 18, 2018, U.S. Government Publishing Office, https://www.govinfo.gov/content/pkg/CHRG-115shrg41257/html/CHRG-115shrg41257.htm. 

[14] Jim Garamone, “National Military Strategy Addresses Changing Character of War,” Department of Defense (website), July 12, 2019, https://www.defense.gov/Explore/News/Article/Article/1903478/national-military-strategy-addresses-changing-character-of-war/. 

[15] Joint Chiefs of Staff, Joint Operating Environment, JOE 2035: The Joint Force in a Contested and Disordered World (Washington, DC: Joint Chiefs of Staff, July 14, 2016), https://www.jcs.mil/Portals/36/Documents/Doctrine/concepts/joe_2035_july16.pdf?ver=2017-12-28-162059-917. 

Assessment Papers Capacity / Capability Enhancement Governing Documents and Ideas Marco J. Lyons U.S. Army

Assessing the Cameroonian Anglophone Crisis and Potential Impacts of U.S. Inaction

Sam Gitlitz is Lieutenant Commander in the U.S. Navy currently assigned in Washington D.C.  He previously was assigned in the Pentagon, where he supported OPNAV N2N6. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing the Cameroonian Anglophone Crisis and Potential Impacts of U.S. Inaction

Date Originally Written:  February 20, 2022.

Date Originally Published:  March 21, 2022.

Author and / or Article Point of View:  The author deployed to Cameroon in 2015-2016.  The instability caused by the Anglophone crisis threatens Cameroonian security and regional stabilization.  Based on his experience, the author believes that failure to recognize the strategic importance of the situation and plan accordingly will have negative, lasting second and third order effects.

Summary:  The Anglophone Conflict stems from 2016 when Anglophone teachers and lawyers mounted protests demanding better representation in Cameroon’s legal and educational systems.  The conflict is estimated to have killed thousands of people and displaced close to a million[1].  With the onset of the crisis, the U.S. reduced security assistance to the country with few other efforts to resolve the crisis.  Inaction by the U.S. could lead to further destabilization.

Text:  Cameroon is an amalgamation of former French and British territories combined into a single country in 1961. The North-West and South-West Regions (NWSW) of Cameroon are home to most of the country’s English-speaking population (Anglophones), roughly 20% of the total population.  The Anglophone Conflict stems from 2016 when Anglophone teachers and lawyers mounted protests demanding better representation in Cameroon’s legal and educational systems.  What started as peaceful protests quickly turned violent as demonstrators clashed with security personnel.  Cameroon President Paul Biya’s response included deploying U.S. trained special forces[2], curfews, and implementing regional communications blackouts. In 2017, Anglophone protestors switched tactics from wanting increased representation to demanding an independent state.  On October 1, 2017, Anglophone separationists unilaterally claimed independence from Cameroon creating the Federal Republic of Ambazonia which would be led by an interim government.

Ambazonia is now in quasi-civil war albeit with limited recognition from President Biya in Cameroon’s capital Yaoundé.  He maintains that the conflict is a terrorist/criminal issue, which he promises to resolve through bureaucratic maneuvering and force[3].  The struggle continues to grow deadlier, with more improvised explosive device attacks taking place in the first five months of 2021 than all other years of the conflict combined[4]. The situation continues to deteriorate with separatists beginning kidnap for ransom operations and the Cameroonian state conducting cross border operations of questionable legality into Nigeria. The Cameroonian government’s harsh tactics against its citizenry prompted allegations of human rights abuses.

The magnitude of the crisis and numerous filmed events obtained by international aid organizations lends strong credence to the allegations.  As a result of the abuses, the U.S. cut military aid to Cameroon in 2019[5]. The U.S. is in a difficult position as Cameroon is a key ally against Islamist terrorism in the region, through their contribution to the Multi-national Joint Task Force and allowing U.S. forces to operate from bases in the country[6].  

Little is likely to be resolved in the immediate future.  The government is unable to claim victory, and the separatists have not gained and held ground, leading to in-fighting[7]. The separatists seek to change their fortunes through an alliance with Nigerian separatists and the purchase of weapons from foreign powers[8]. Another element to consider is President Biya.  At 89, Biya is the oldest elected official on the continent and the second longest serving.  Many, if not most, Cameroonians do not know life without Biya.  He has no intention of ceding power, and more importantly does not have any clear succession plans.  Disorganization from Biya’s hospitalization, death, or cessation of power may give Amabazonia the relief it needs to find better footing.

For a country battling Islamist terrorists in the north and separatists in the south, the death of an autocrat may be the final straw.  The U.S. would be well advised to consider response options to the Anglophone crisis beyond advocating for human rights. If the U.S. continues to ignore the Anglophone crisis and does not develop solid response options, it risks ceding regional leadership and allowing the problem to spiral. Considering the NWSW regions’ coastline and other natural resources, the area will draw international attention for cocoa, oil, or an Atlantic Port. In 2019, China wrote off a substantial portion of Cameroon’s debt[9], and is building the region’s largest deep-water port[10].  China is presumably ready to and willing to fill any partnership void caused by U.S. inaction.

There are several possible outcomes.  The first, already underway, is the continued stagnation of the crisis.  With neither side moving towards peace and conflict increasing, the growth of criminal activity, extremism, and continued human rights abuses is likely.  Combined with other regional instability and increased piracy in the Gulf of Guinea, the equivalent of a West coast Somalia is an unattractive prospect.  

Second, should the crisis escalate, and Cameroon prove ineffective at containing the situation, say in the case of Biya’s death, would regional intervention be justified?  Is the U.S. prepared or able to, with Leahy Law requirements, support regional action to stabilize the area?  How would the U.S. react to Nigeria retaking the Bakassi peninsula under the premise of a responsibility to protect intervention?

Given the vast uncertainty facing Cameroon post-Biya, the U.S. and international community should not be shocked by  renewed claims of Ambazonian independence. Should Anglophone Cameroonians coalesce, they may prove more capable at maintaining security in the region than Yaoundé. The Anglophone Camerronians  would then have a solid footing for seeking recognition, which could prompt additional calls for succession from groups like the Movement for Emancipation of the Niger Delta in neighboring Nigeria. As evidenced by recent events, a country seeking de jure recognition has the potential to disrupt the international order, in this case that could occur in an already unstable region which could prove disastrous for U.S. regional efforts.

The current situation is the culmination of bad international politics in the 1960’s which amalgamated peoples regardless of their language and culture.  The crisis will not be resolved as is and risks creating a generation of disenfranchised, displaced people nursing a grievance.


Endnotes:

[1] International Crisis Group, “Cameroon,” Crisis Group, accessed February 20, 2022, https://www.crisisgroup.org/africa/central-africa/cameroon.

[2] Gareth Browne, “Cameroon’s Separatist Movement Is Going International – Foreign Policy,” Foreign Policy, May 13, 2019, https://foreignpolicy-com.proxyau.wrlc.org/2019/05/13/cameroons-separatist-movement-is-going-international-ambazonia-military-forces-amf-anglophone-crisis/.

[3] Paul Biya, “Head of State’s New Year Message to the Nation – 31 December 2021,” accessed February 3, 2022, https://www.prc.cm/en/news/speeches-of-the-president/5611-head-of-state-s-new-year-message-to-the-nation-31-december-2021.

[4] Global Centre for the Responsibility to Protect, “Populations at Risk: Cameroon,” Global Centre for the Responsibility to Protect, December 1, 2021, https://www.globalr2p.org/countries/cameroon/.

[5] Edwin Kindzeka, “Cameroon Is a Good Counterterrorism Partner, but US Cannot Ignore Alleged Atrocities, Says AFRICOM Head,” Military Times, February 7, 2019, https://www.militarytimes.com/news/pentagon-congress/2019/02/07/cameroon-is-a-good-counterterrorism-partner-but-us-cannot-ignore-alleged-atrocities-says-africom-head/.

[6] Joshua Hammer, “Hunting Boko Haram: The U.S. Extends Its Drone War Deeper Into Africa With Secretive Base,” The Intercept (blog), February 25, 2016, https://theintercept.com/2016/02/25/us-extends-drone-war-deeper-into-africa-with-secretive-base/.

[7] Moki Edwin Kindzeka, “Cameroon’s Rival Separatist Groups Clash, Kill Fighters,” VOA, February 16, 2022, https://www.voanews.com/a/cameroon-s-rival-separatist-groups-clash-kill-fighters-/6444121.html.

[8] Browne, “Cameroon’s Separatist Movement Is Going International.”

[9] Jenni Marsh, “China Just Quietly Wrote off a Chunk of Cameroon’s Debt. Why the Secrecy?,” CNN, February 4, 2019, https://www.cnn.com/2019/02/04/china/cameroon-china-debt-relief-intl/index.html.

[10] Xinhua, “From Blueprint to Reality, China-Africa Cooperation Bearing Rich Fruit,” From blueprint to reality, China-Africa cooperation bearing rich fruit, September 5, 2019, http://www.news.cn/english/2021-09/05/c_1310169378.htm.

Assessment Papers Cameroon Civil War United States

Assessing the Foundation of Future U.S. Multi-Domain Operations

Marco J. Lyons is a Lieutenant Colonel in the U.S. Army who has served in tactical and operational Army, Joint, and interagency organizations in the United States, Europe, the Middle East, Afghanistan, and in the Western Pacific. He is currently a national security fellow at Harvard Kennedy School where he is researching strategy and force planning for war in the Indo-Pacific. He may be contacted at marco_lyons@hks.harvard.edu. The author thanks David E. Johnson for helpful comments on an earlier draft. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessing the Foundation of Future U.S. Multi-Domain Operations 

Date Originally Written:  February 15, 2022. 

Date Originally Published:  March 14, 2022.

Author and / or Article Point of View:   The author believes that U.S. adversaries pose a greater threat if they outpace the U.S. in both technological development and integration.

Summary:  Both U.S. Joint Forces and potential adversaries are trying to exploit technology to lock in advantage across all domains. Through extensive human-machine teaming and better ability to exploit both initiative (the human quality augmented by AI/ML) and non-linearity, Army/Joint forces will lose the fight unless they perform better, even if only marginally better, than adversaries – especially at the operational level. 

Text:  The 2018 U.S. Army in Multi-Domain Operations (MDO) 2028 is a future operational concept – not doctrine – and not limited to fielded forces and capabilities[1]. A future operational concept consists of a “problem set,” a “solution set,” and an explanation for why the solution set successfully addresses the problem set[2]. Since 2018, there have been ongoing debates about what MDO are – whether they are revamped AirLand Battle or they are a next evolution of joint operations[3]. Before the Army finishes translating the concept into doctrine, a relook at MDO through historical, theoretical, and doctrinal lenses is necessary. 

The historical context is the 1990-1991 Gulf War, the Korean War, and the European and Pacific Theaters of World War Two. The theoretical basis includes Clausewitzian war, combined arms, attrition, and Maneuver Warfare. The doctrinal basis includes not just AirLand Battle, but also AirLand Battle – Future (ALB–F), Non-Linear Operations, and the 2012 Capstone Concept for Joint Operations. ALB–F was meant to replace AirLand Battle as the Army’s operational concept for the 1990s, before the end of the Cold War and dissolution of the Soviet Union interrupted its development. Never incorporated into Field Manual (FM) 100-5, Operations, ALB–F emphasized the nonlinear battlefield and conceived of combat operations through information-based technologies[4]. 

This assessment presupposes the possibility of great power war, defines potential enemies as the Chinese People’s Liberation Army (PLA) and Russian Armed Forces, assumes the centrality of major theater operations, and accepts that the Army/Joint force may still have to operate in smaller-scale contingencies and against enemy forces that represent subsets of the PLA and Russian Armed Forces. By assuming the PLA and Russian Armed Forces, this conceptual examination is grounded in the characteristics of opposing joint forces, mechanized maneuver, and primarily area fires. 

The Army/Joint force faces a core problem at each level of war. At the strategic level, the problem is preclusion, i.e., potential adversaries will use instruments of national power to achieve strategic objectives before the U.S./coalition leaders have the opportunity to respond[5]. At the operational level, the central problem is exclusion[6]. Anti-access/area denial is just one part of operational exclusion. Potential adversaries will use military power to split combined/joint forces and deny U.S./coalition ability to maneuver and mass. The tactical problem is dissolution. By exploiting advantages at the strategic and operational levels, potential adversaries will shape tactical engagements to be close-to-even fights (and potentially uneven fights in their favor), causing attrition and attempting to break U.S./coalition morale, both in fighting forces and among civilian populations. 

The best area to focus conceptual effort combines the determination of alliance/coalition security objectives of the strategic level of warfare with the design of campaigns and major operations of the operational level of warfare. The Army/Joint force will only indirectly influence the higher strategic-policy level. The problem of preclusion will be addressed by national-multinational policy level decisions. The tactical level of warfare and its attendant problems will remain largely the same as they have been since 1917[7]. If Army/Joint forces are not able to win campaigns at the operational level and support a viable military strategy that is in concert with higher level strategy and policy, the outcomes in great power war (and other major theater wars) will remain in doubt. 

The fundamentals of operational warfare have not changed substantially, but the means available have shrunk in capacity, become outdated, capabilities have atrophied, and understanding has become confused. Today’s Unified Land Operations (ULO) doctrine is, not surprisingly, a product of full-dimensional and full-spectrum operations, which were themselves primarily informed by a geopolitical landscape free of great power threats. Applying ULO or even earlier ALB solution sets to great power threats will prove frustrating, or possibly even disastrous in war. 

Given the primary operational problem of contesting exclusion by peer-adversary joint and mechanized forces, using various forms of multi-system operations, future Army/Joint forces will have to move under constant threat of attack, “shoot” at various ranges across multiple domain boundaries, and communicate faster and more accurately than the enemy. One way to look at the operational demands listed above is to see them as parts of command and control warfare (C2). C2 warfare, which has probably always been part of military operations, has emerged much more clearly since Napoleonic warfare[8]. Looking to the future, C2 warfare will probably evolve into something like “C4ISR warfare” with the advent of more automation, autonomous systems, artificial intelligence, machine learning, and deep neural networks. 

With technological advances, every force – or “node,” i.e., any ship, plane, or battalion – is able to act as “sensor,” “shooter,” and “communicator.” Command and control is a blend of intuition, creativity, and machine-assisted intelligence. Maximum exploitation of computing at the edge, tactical intranets (communication/data networks that grow and shrink depending on their AI-/ML-driven sensing of the environment), on-board deep data analysis, and laser/quantum communications will provide the technological edge leaders need to win tactical fights through initiative and seizing the offense. Tactical intranets are also self-defending. Army/Joint forces prioritize advancement of an “internet of battle things” formed on self-sensing, self-organizing, and self-healing networks – the basic foundation of human-machine teaming[9]. All formations are built around cross-domain capabilities and human-machine teaming. To maximize cross-domain capabilities means that Army/Joint forces will accept the opportunities and vulnerabilities of non-linear operations. Linear warfare and cross-domain warfare are at odds. 

Future major operations are cross-domain. So campaigns are built out of airborne, air assault, air-ground and air-sea-ground attack, amphibious, and cyber-ground strike operations – all enabled by space warfare. This conception of MDO allows service forces to leverage unique historical competencies, such as Navy’s Composite Warfare Commander concept and the Air Force’s concept of multi-domain operations between air, cyberspace, and space. The MDO idea presented here may also be seen – loosely – as a way to scale up DARPA’s Mosaic Warfare concept[10]. To scale MDO to the operational level against the potential adversaries will also require combined forces for coalition warfare. 

MDO is an evolution of geopolitics, technology, and the character of war – and it will only grow out of a complete and clear-eyed assessment of the same. Army/Joint forces require a future operational concept to expeditiously address emerging DOTMLPF-P demands. This idea of MDO could create a formidable Army/Joint force but it cannot be based on superiority, let alone supremacy. Great power war holds out the prospects for massive devastation and Army/Joint forces for MDO are only meant to deter sufficiently (not perfectly). Great power war will still be extended in time and scale, and Army/Joint forces for MDO are principally meant to help ensure the final outcome is never substantially in doubt. 


Endnotes:

[1] U.S. Department of the Army, Training and Doctrine Command, TRADOC Pamphlet 525-3-1, The U.S. Army in Multi-Domain Operations 2028 (Fort Eustis, VA: Government Printing Office, 2018). 

[2] U.S. Department of the Army, TRADOC Pamphlet 71-20-3, The U.S. Army Training and Doctrine Command Concept Development Guide (Fort Eustis, VA: Headquarters, United States Army Training and Doctrine Command, December 6, 2011), 5–6. 

[3] See Dennis Wille, “The Army and Multi-Domain Operations: Moving Beyond AirLand Battle,” New America website, October 1, 2019, https://www.newamerica.org/international-security/reports/army-and-multi-domain-operations-moving-beyond-airland-battle/; and Scott King and Dennis B. Boykin IV, “Distinctly Different Doctrine: Why Multi-Domain Operations Isn’t AirLand Battle 2.0,” Association of the United States Army website, February 20, 2019, https://www.ausa.org/articles/distinctly-different-doctrine-why-multi-domain-operations-isn’t-airland-battle-20. 

[4] Stephen Silvasy Jr., “AirLand Battle Future: The Tactical Battlefield,” Military Review 71, no. 2 (1991): 2–12. Also see Jeff W. Karhohs, AirLand Battle–Future—A Hop, Skip, or Jump? (Fort Leavenworth, KS: Army Command and General Staff College, School of Advanced Military Studies, 1990). 

[5] This of course reverses what the Army identified as a U.S. advantage – strategic preclusion – in doctrinal debates from the late 1990s. See James Riggins and David E. Snodgrass, “Halt Phase Plus Strategic Preclusion: Joint Solution for a Joint Problem,” Parameters 29, no. 3 (1999): 70–85. 

[6] U.S. Joint Forces Command, Major Combat Operations Joint Operating Concept, Version 2.0 (Norfolk, VA: Department of Defense, December 2006), 49–50. The idea of operational exclusion was also used by David Fastabend when he was Deputy Director, TRADOC Futures Center in the early 2000s. 

[7] World War I was a genuine military revolution. The follow-on revolutionary developments, like blitzkrieg, strategic bombing, carrier warfare, amphibious assaults, and information warfare, seem to be essentially operational level changes. See Williamson Murray, “Thinking About Revolutions in Military Affairs,” Joint Force Quarterly 16 (Summer 1997): 69–76. 

[8] See Dan Struble, “What Is Command and Control Warfare?” Naval War College Review 48, no. 3 (1995): 89–98. C2 warfare is variously defined and explained, but perhaps most significantly, it is generally included within broader maneuver warfare theory. 

[9] Alexander Kott, Ananthram Swami, and Bruce J. West, “The Internet of Battle Things,” Computer: The IEEE Computer Society 49, no, 12 (2016): 70–75. 

[10] Theresa Hitchens, “DARPA’s Mosaic Warfare — Multi Domain Ops, But Faster,” Breaking Defense website, September 10, 2019, https://breakingdefense.com/2019/09/darpas-mosaic-warfare-multi-domain-ops-but-faster/. 

Artificial Intelligence / Machine Learning / Human-Machine Teaming Assessment Papers Governing Documents and Ideas Marco J. Lyons United States

Assessing China as a Case Study in Cognitive Threats

John Guerrero is currently serving in the Indo-Pacific region. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing China as a Case Study in Cognitive Threats

Date Originally Written:  February 1, 2022.

Date Originally Published:  February 28, 2022.

Author and / or Article Point of View:  The author is currently serving in the Indo-Pacific region.  The author believes that China is more mature than the U.S. in projecting force in the cognitive space. This increased maturity is largely due to the China’s insistence on operating outside of the rules-based system. 

Summary:  China has largely been effective in pursuing their national interests through cognitive threats. In this cognitive space, China influences public opinion through propaganda, disinformation campaigns, censorship, and controlling critical nodes of information flow.  China’s understanding of U.S. politics, and its economic strength, will enable it to continue threatening U.S. national security. 

Text:  China is pursuing its national interests through its effective employment of cognitive threats- efforts undertaken to manipulate an adversary’s perceptions to achieve a national security objective. Cognitive threats generally include psychological warfare which target the enemy’s decision-making calculus causing him to doubt himself and make big blunders. Psychological warfare also includes strategic deception, diplomatic pressure, rumor, false narratives, and harassment[1].  Chinese actions illustrate their use of all of the above.  

The cognitive threat area illustrates the disparity between U.S. defensive efforts and China’s offensive actions below the threshold of war. The United States remains wedded to the state-versus-state construct that has kept strategists occupied since 1945. The stave-versus-state construct is antiquated and the commitment to it hamstrings the U.S. from pursuing more effective options.

China’s efforts in the cognitive space  exceed any other state. China understands the importance of influencing its competitors’ thinking. There are four lines of effort in China’s pursuit of favorable global public opinion. China aims to influence public opinion through propaganda, disinformation campaigns, censorship, and controlling critical nodes of information flow[2].

Globalization complicates problems in the cognitive space. Globalization creates opportunities, but it also creates multiple areas a nefarious actor can exploit. Corporations, as an example, are multi-national and have influence across borders. There are clear incentives for corporations to transact with the Chinese market. Chinese exposure for a corporation oftentimes translates into an uptick in revenue. However, there are consequences. Corporations are “expected to bend, and even violate, their interests and values when the Party demands[3].”

China’s reach into the United States is vast. One area of significant importance is the American pension plan. American pensioners are “underwriting their own demise” by contributing to their retirement accounts that may be tied to China[4]. Planning a financially stable future is noble, but it is not without unforeseen consequences. There are 248 corporations of Chinese origin listed on American stock exchanges[5]. The Chinese government enjoys significant influence over these corporations through their program called “Military-Civil Fusion[6].” Many index funds available to Americans include Chinese corporations. China’s economic strengths facilitate censorship over dissenters and any information aimed at painting the government in an unfavorable light. In another example of China’s expansive reach, they have recently placed an advertisement on digital billboards in Times Square attempting to sway onlookers into their favor[7].

The Chinese Communist Party (CCP) understands that while global opinion is important, they cannot ignore domestic public opinion. Despite reports on their treatment of ethnic minorities[8], the Party continues to push the idea that they enjoy “political stability, ethnic unity and social stability[9].” China’s domestic news agencies critical to Party and Party leadership are few and far between. There are incentives to march to the Party’s tune- corporate survival.  

China’s efforts, and the U.S. response, in cognitive threats will progress along the four lines of effort discussed. China’s economic strength enables their strategic efforts to sway global public opinion in their favor. Few state, and non-state, actors can do this at this scale, but it does not preclude them from partaking. These smaller states, and non-states, will serve as proxies for China. 

China understands U.S. domestic politics. This understanding is critical to their national interests. The current state of U.S. domestic politics is divisive and presents opportunities for China. For example, China has exploited the U.S. media’s coverage of brutal treatment by law enforcement officers on Americans. China widens the division between Americans over these tragic events and accuses the United States of hypocrisy[10]. 

China is attempting to control, curate, and censor information for Americans and the world. Hollywood is the latest node of influence. “China has leveraged its market to exert growing influence over exported U.S. films, censoring content that could cast China in a negative light and demanding the addition of scenes that glorify the country[11].” Movies are not the full extent of Hollywood’s reach and influence. Celebrities active on social media could be advancing China’s interests and influence unknowingly. China’s adversaries, peer governments, aren’t the target of these cognitive threats. Rather, they target the ordinary citizen. In a democratic government, the ordinary citizen is the center of gravity- a fact the Chinese know very well. 

The cognitive threat arena is dynamic and evolves at a staggering pace. Technological advancements, while beneficial, presents opportunities for exploitation. The PRC continues to advance their footprint in this space. This is dangerous as it has far-reaching effects on the United States and its ability to pursue its national interests. Strategists should keep a watchful eye at how this pervasive and omnipresent threat progresses. These threats will continue to influence future conflicts.  


Endnotes:

[1] Sean McFate, The New Rules of War: Victory in the Age of Durable Disorder, First edition (New York, NY: William Morrow, an Imprint of HarperCollins Publishers, 2019).

[2] Sarah Cook, “China’s Global Media Footprint,” National Endowment for Democracy, February 2021, 24.

[3] Luke A. Patey, How China Loses: The Pushback against Chinese Global Ambitions (New York: Oxford University Press, 2021).

[4] Joe Rogan, “General H.R. McMaster,” accessed January 27, 2022, https://open.spotify.com/episode/2zVnXIoC5w9ZkkQAmWOIbJ?si=p1PD8RaZR7y1fA0S8FcyFw.

[5] “Chinese Companies Listed on Major U.S. Stock Exchanges” (Washington, DC: U.S.-China Economic and Security Review Commission, May 13, 2021), https://www.uscc.gov/research/chinese-companies-listed-major-us-stock-exchanges.

[6] U.S. Department of State, “Military-Civil Fusion and the People’s Republic of China” (Department of State, 2021 2017), https://2017-2021.state.gov/military-civil-fusion/index.html.

[7] Eva Fu, “Chinese State Media Uses Times Square Screen to Play Xinjiang Propaganda,” http://www.theepochtimes.com, January 7, 2022, https://www.theepochtimes.com/chinese-state-media-uses-times-square-screen-to-play-xinjiang-propaganda_4200206.html.

[8] Adrian Zenz, “Uighurs in Xinjiang Targeted by Potentially Genocidal Sterilization Plans, Chinese Documents Show,” News Media, Foreign Policy, July 1, 2020, https://foreignpolicy.com/2020/07/01/china-documents-uighur-genocidal-sterilization-xinjiang/.

[9] PRC Government, “China’s National Defense in the New Era” (The State Council Information Office of the People’s Republic of China, July 2019), https://armywarcollege.blackboard.com/bbcswebdav/pid-25289-dt-announcement-rid-963503_1/courses/19DE910001D2/China-White%20Paper%20on%20National%20Defense%20in%20a%20New%20Era.pdf.

[10] Paul D. Shinkman, “China Leverages George Floyd Protests Against Trump, U.S. | World Report | US News,” June 9, 2020, https://www.usnews.com/news/world-report/articles/2020-06-09/china-leverages-george-floyd-protests-against-trump-us.

[11] Gabriela Sierra, “China’s Starring Role in Hollywood,” accessed January 28, 2022, https://www.cfr.org/podcasts/chinas-starring-role-hollywood.

Assessment Papers China (People's Republic of China) Governing Documents and Ideas Influence Operations John Guerrero United States

Assessing China’s Strategy to “Hide Capabilities and Bide Time”

Michael Losacco is a former active-duty U.S. Army officer who served in Afghanistan in 2017. He currently studies at Georgetown University’s Walsh School of Foreign Service where he focuses on U.S. National Security Policy and China relations. He can be found on Twitter @mplosacco. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing China’s Strategy to “Hide Capabilities and Bide Time”

Date Originally Written:  January 20, 2022.

Date Originally Published:  February 21, 2022.

Author and / or Article Point of View:   The author is a former U.S. Army combat arms officer who served in South Asia. He is currently pursuing a Master of Security Studies at Georgetown University. 

Summary:  Since 2008, China has emerged on the world stage as a global power. Its growth within the political, economic, and military domains in international affairs has caught the world off guard. China’s success resulted from efforts undertaken to manipulate perceptions in Washington D.C., known as “hiding capabilities and biding time,” to achieve its core national security objectives.

Text:  China has made major achievements in its economic, military, and political development. With a gross domestic product rising from 54 trillion to 80 trillion yuan, it has maintained its position as the world’s second-largest economy[1]. Militarily, the Peoples Liberation Army has increased its ability to implement a sea-control strategy in the Indo-Pacific by implementing new technology and structural reform. Politically and economically, China has created a favorable external environment through the Belt and Road Initiative and regional institutions. China’s core national security objective—to achieve a “community of common destiny”—drives its success[2].  Under this objective, Western powers do not dictate, influence, or shape China’s political, economic, or security domains.

China’s current success resulted from a deception strategy pursued at the end of the Cold War, designed to manipulate Chinese threat perceptions in Washington. This deception campaign kept U.S. attention away from China, while it focused on building its economic and political might at home. When the Soviet Union collapsed, the U.S. was the only superpower in the international system. If there was any perception that China wanted to challenge this status, the U.S. would have likely intervened and stopped it. As a result, it was in China’s interest to divert attention and mask its successes on the world stage.  

To understand China’s deception strategy, the reader must first consider the game-theory scenario of the Prisoner’s Dilemma. In Cooperation Under the Security Dilemma, Robert Jervis, Ph.D. explains the Prisoner’s Dilemma as an individual’s decision, after being arrested, on whether to cooperate with their co-prisoner and remain loyal or defect and testify on behalf of law enforcement[3]. Each choice can lead to varying levels of reward and punishment and is further compounded by the other party’s choice. Notably, neither prisoner is aware of the other’s intentions and, thus, fear of being exploited drives the decision-making process. 

Important to this decision-making process is how vulnerable the prisoner feels. Specifically, how each prisoner perceives the other prisoner’s likelihood to cooperate or defect. While neither prisoner will likely know the other’s true intentions, the perception of the other, based on previous history and actions, is critical in predicting the outcome of the dilemma. 

For example, if Prisoner A is predisposed to see Prisoner B as an adversary, Prisoner A will react more strongly and quickly than if either saw the other as benign. In this scenario, Prisoner A is more likely to readily testify against Prisoner B, capitalizing on the benefits of cooperating with law enforcement. Conversely, if perceptions stay hidden or are unknown, the playing field is equal, and neither prisoner can utilize their knowledge to take advantage of the other.

The Prisoner’s Dilemma directly reflects the strategy China pursued at the end of the Cold War. After the Tiananmen Square Massacre, the Gulf War, and the collapse of the Soviet Union, China went from viewing the U.S. as a potential partner to a potential adversary[4]. China knew it could not become powerful if it was perceived as a growing threat in Washington because the U.S. would intervene—economically, or perhaps militarily—to prevent it from challenging its position as a global hegemon. Thus, China began a deception campaign across political, military, and economic domains, coined under the phrase “hiding capabilities and biding time.” This campaign sought to mask growth and prevent the U.S. from predisposing China as an adversary. 

China focused on avoiding a security dilemma with the U.S. in the military domain by prioritizing its military strategy on sea denial, whereby China denies the enemy’s ability to use the sea without necessarily attempting to control the sea for its own use[4]. Sea denial was an inexpensive way to avoid setting off alarms and prevent the U.S. from traversing or intervening in the waters near China. China invested in inexpensive asymmetrical weapons such as the world’s largest mine arsenal, the world’s first anti-ship missile, and the world’s largest anti-submarine fleet. Compared to sea control, these efforts avoided a strategy focused on holding distant maritime territory that would raise concern in Washington. 

At the political level, China sought to join regional institutions to inhibit Washington from building an Asian order that could prevent China from growing[4]. China joined organizations such as the Asia-Pacific Economic Cooperation and Asian Nations Regional Forum under the guise that it was open to transitioning to the liberal order, with a hidden agenda to blunt American power. China’s membership in these organizations allowed it to stall progress, wield institutional rules to constrain U.S. freedom to maneuver, and persuade worried neighbors that a U.S. balancing coalition was not its only option. 

China moved to couple at the economic level rather than decoupling from U.S. economic institutions[4]. Recognizing its dependence on the U.S. market, and that a strategy of decoupling would weaken China and raise alarm, China sought to strengthen its economic relationship with the U.S. and lobby for the removal of annual congressional renewal of Most Favored Nation status. By eliminating this procedural rule and making it permanent, China was able to expand investment opportunities and strengthen economic and trade exchanges, while deconstructing potential economic leverage that could be imposed by the U.S., particularly with trade sanctions, tariffs, and technology restrictions.  

In sum, China’s path to sustained growth required a strategy that masked its true intent to become a great power. By “hiding capabilities and biding time,” China simultaneously grew politically, economically, and militarily, while avoiding actions that could lead to U.S. suspicions. Like the Prisoner’s Dilemma, China understood that if the U.S. became predisposed to think China had ulterior motives to become a power and challenge the U.S., the U.S. would have intervened and taken advantage of China’s weakened state following the Cold War. Thus, China’s ability to manipulate its adversary’s perceptions was critical to achieving its core national security objectives. 


Endnotes:

[1] Jinping, X. (2017). 19th National Congress of the Communist Party of China. In Secure a Decisive Victory in Building a Moderately Prosperous Society in All Respects and Strive for the Great Success of Socialism with Chinese Characteristics for a New Era (pp. 1–6). Beijing. 

[2] Rolland, N. (2020). (Rep.). China’s Vision for a New World Order (83rd ed., pp. 35–41). Seattle, WA: The National Bureau of Asian Research.

[3] Jervis, R. (1978). Cooperation Under the Security Dilemma. World Politics, 30(2), 167–214. https://doi.org/10.2307/2009958.

[4] Doshi, R. (2021). Introduction. In The Long Game (pp. 11–12). Essay, Oxford University Press. 

Assessment Papers China (People's Republic of China) Governing Documents and Ideas Michael Losacco

Assessing Strategy and Organized Crime

Juan Manuel Perez has served in the Guatemalan Army. He presently is retired. Throughout his military career, he took various military training courses as part of his professionalization including Strategic High Studies, War College, Command and Staff College, Human Rights, and Peacekeeping Operations. He can be found on Twitter @r_juanmanuel. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Strategy and Organized Crime

Date Originally Written:  September 15, 2021. 

Date Originally Published:  February 7, 2022.

Author and / or Article Point of View: The author is a retired military member. He believes the deep understanding of strategic theory helps people educate and discipline their thinking to align ends, ways, and means to protect national interests. 

Summary:  Organized crime organizations have stablished a global criminal system.  This influence and power wielded by this system has allowed them to damage the geopolitics, economic, social, and security situation in many countries. The deep understanding of both the threats posed by organized crime organizations, and the capabilities and limitations of strategy, will assure effectiveness when fighting these criminal organizations.

Text:  Illicit money is serious and appealing to criminals. Criminal activities pursuing illicit money progressively scale into criminal networks.  Drug trafficking also enables a criminal modality, establishing the core of organized groups where gangs, maras, and mafias play a starring role. 

The tracking and detection of illegal money into legal economies is a challenge.  Governments struggle to disrupt and cut off illicit capital flows.  This evil advances and progresses between a legal and illegal economy, resulting in a large-scale global network with geopolitical and geostrategic repercussions.  These criminal networks embedded into the financial system become practically undetectable, using technology, artificial intelligence, big data, social media, modern transportation, etc. to conceal and protect their activities[1].   

Criminal networks use geography to their advantage.  Robert D. Kaplan, in his book “The Revenge of Geography[2]” wrote about what the maps predict regarding coming conflicts and the battle against fate. In this sense, the mafia uses geography when it moves illicit shipments, controls multiple regions, zones, and places. The mafia’s global effect and quick process of replacement allow criminal partners to generate new routes and maps, and increase their criminal activity, including the movement and sale of illegal drugs.

The flow of illegal drugs is and will continue to be a critical social problem.  The use of drugs fuels the traffic of them leaving death and violence in its path.  American researchers Edwin Stier and Peter Richards write widely and rigorously about organized crime and point out its evolution in three fields of action.  Stier and Richards make an analogy of biological functions of living beings, where they describe the structural causes and reasons of gestation and development[3]. 

The first phase:  called the predatory phase, is the beginning and characterized by territorial reaffirmation of criminal groups that spread their power through violence, trying to defend their organizations, eliminate rivals, and gaining physical space and to hold their private monopoly on the use of force.  

The second phase:  called the parasitic phase, sees organized crime gain notable economic and political influence combined with a powerful capacity to corrupt public and private organizations.

The third phase:  called the symbiotic phase, is the final state and sees the political and economic system becoming so dependent on the parasite (the organized crime organization) that it expands its activity to satisfy the parasites needs.

Stier and Richards’ analogy symbolizes, in many ways, the features of Hydra, the fresh-water organisms, with many heads and the ability to regrow its tentacles when maimed. 

While Colin S. Gray, one of the great strategic thinkers of his age wrote: ‘’Strategy has a complex nature and a function that is unchanging over the centuries[4]’’, the development and execution of strategy in order to fight organized crime and the threats associated to it (i.e. illegal migration, drug trafficking, cybercrime, weapons trafficking, etc.) require constant reevaluation.  Harry R. Yarger’s book “Strategic Theory for the 21st Century: The little book on big Strategy[5],” aligns well with the dynamic threat posed by organized crime organizations.  As resources or budgets (means) are always limited, it is important to invest enough time defining, designing, and developing appropriate strategic guidance to reach the desired outcome. 

Finally, organized crime has taken advantage of the pandemic, increasing their criminal activities by others means. Right now, the organized crime is an authentic threat that affects the societies, governments, states, the security of financial institutions even the functioning of democracy and the international geopolitical equilibrium.  The security, defense, and protection of the citizens will continue one of the top priorities for the states.  


Endnotes:

[1] Phil Williams, “Crime Illicit Markets, and Money Laundering”

[2] Robert D. Kaplan, “The Revenge of Geography”

[3] Edwin Stier and Peter Richards, “Strategic Decision Making in Organized Crime Control: The Need for a Broadened Perspective”

[4] Colin S. Gray, “Modern Strategy,” Oxford: Oxford University Press

[5] Harry R. Yarger, “Strategic Theory for the 21st Century: The little book on big Strategy,” https://www.files.ethz.ch/isn/20753/Strategic%20Theory%20for%20the%2021st%20Century.pdf

Assessment Papers Criminal Activities Drug Trade Juan Manuel Perez

An Assessment of Nigeria’s Security Situation in 2021

Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He now works for a leading airline in Nigeria. He can be found on Twitter @DAOlawuyi. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  An Assessment of Nigeria’s Security Situation in 2021

Date Originally Written:  January 8, 2022.

Date Originally Published:  January 24, 2022.

Author and / or Article Point of View: The open-source data on Nigeria’s security-related casualties indicates that insecurity remains a persistent threat in the country. The high number of deaths recorded between October 2020 and September 2021 shows that the nation is at war with itself.

Summary:  Quantitative definitions of armed conflicts relies on measuring casualties over time to determine violence intensity. One of the most popular and influential approaches was developed by David Singer and Melvin Small in the framework of the ‘Correlates of War (COW)’ project at Michigan University. This defines war as an armed conflict where at least 1,000 combatants are killed annually. By this definition, it is indisputable that Nigeria is at war on multiple fronts.

Text:  The recent analysis of combatant casualties compiled by SBM Intelligence paints a grim picture of Nigeria’s security situation[1]. SBM’s report, compiled using open-source data, was summarised with an infographic that listed the number of dead personnel belonging to various security agencies of the Nigerian state and armed groups all over the country. It covers the calendar year period from Q4 2020 to Q3 2021. The findings are summarized in the table below:

SBM’s report correlates with data collected by the Council on Foreign Relations and analysed by HumAngle Media[2][3]. Between January 1 and December 27, 2021, 10,398 persons were killed across Nigeria. This count includes 4,835 civilians, 1,760 Boko Haram members, 890 security personnel, 107 robbers and 92 kidnappers. This count makes 2021 the deadliest year for Nigeria since 2015 when 12, 795 people were killed. The data also indicates that 5,287 people were kidnapped in 2021, almost double the number abducted in 2020.

The Nigerian government is unwilling to disclose accurate personnel losses, especially in areas of major combat operations[4]. This unwillingness has led to the arrest of members of the press[5][6] aside from other punitive measures[7]. There have also been calls on the Nigerian media to tone down their reporting on security matters regardless of the accuracy of such reports[8]. These efforts to stifle frank security discussions aren’t isolated to the military as other law enforcement and security personnel, and violent non-state actors, have violated the rights of journalists carrying out their constitutionally protected duties[9][10][11][12][13][14]. When coupled with the tyranny of landmass and geography, it is safe to conclude that Nigeria’s conflict tolls are underreported.

The casualty statistics tell a tale of a country that has failed to pull itself together after 61 years of independence. They also make clear the inability of the state to exercise its authority over every part of its domain. The availability of ungoverned spaces, coupled with a proliferation of illicit arms[15], have created no man’s lands in various portions of the country where bad actors can dominate and wreak havoc. Political maladministration means that socioeconomic issues are left to fester until they cause violence. Corruption and mismanagement in law enforcement and security agencies mean that these organisations are unable to fulfill their mandates as laid out in the law[16][17][18][19][20].

One feature of governance and security operations in Nigeria is that low-level violence is usually ignored when civil authority and social interventions might still prove useful. Often, the complete breakdown of law and order is reached, necessitating the deployment of the armed forces. The high number of casualties in the military points to the intensity of internal military operations. Despite the proliferation of security services across the country, they have failed to step up and contribute extensively to safeguarding the nation. That airstrikes have been needed to lead attacks on various bandit camps shows how entrenched these non-state actors have become, and the weakness of the ground forces that need to establish a persistent presence and deny them spaces to regroup[21].

Attacks on police stations and checkpoints have become a feature of the secession agitation in the South East and South-South of the country[22]. This inability to protect themselves shows inadequacies in the current policing structure of the country. The aftermath of the Lekki Tollgate Massacre, and continued police brutality, will hamper efforts to build stable relationships between the police and the communities they are supposed to protect. The recent rejection by President Muhammadu Buhari of the devolution of armed police institutions to the various states shows that the deep institutional reforms needed will face significant hurdles[23]. The rejection also ignores the various security arrangements already established across the country including Amotekun, Yan Sakai, Onyabo, Ebube Agu and the Civilian Joint Task Force. Any conversation about addressing the lingering security problems without a thoughtful examination of the problems of policing a country with the size and population of Nigeria will fail.

As general elections approach, Nigeria’s history of political violence, and the focus on the gaining and retaining of political office, means that security issues might be exacerbated by armed groups pledging allegiance and receiving protection from political contestants[24]. However, as a group that derives legitimacy from the conduct of elections, it is hoped that politicians will not allow violent events to disrupt actual election days.

Apart from dealing with security issues, society must identify and deal with the real issues underwriting them. Punishing bad actors, protecting communities, strengthening early warning systems, providing economic opportunities, and investing in physical, social and human infrastructure will go a long way in calming the polity and bringing an end to this current era of open conflict in Nigeria.


Endnotes:

[1] SBM Intelligence. (2021, December 16). Chart of the Week: Nigeria at War. Retrieved December 28, 2021 from https://www.sbmintel.com/2021/12/chart-of-the-week-nigeria-at-war/

[2] Campbell J. Nigeria Security Tracker. Retrieved January 7, 2022 from https://www.cfr.org/nigeria/nigeria-security-tracker/p29483 

[3] Adebanjo, K. (2022, January 4). Insecurity: Nearly 10,400 Killed In Nigeria In 2021, Worst Toll In 6 Years. Retrieved January 7, 2022 from https://humanglemedia.com/insecurity-nearly-10400-killed-in-nigeria-in-2021-worst-toll-in-6-years/ 

[4] Channel TV. (2018, November 27). ICYMI: All Over The World, The Military Rarely Discloses Figures Of Its Casualties – Adesina. Retrieved January 2, 2022 from https://www.channelstv.com/2018/11/27/all-over-the-world-the-military-rarely-discloses-figures-of-its-casualties-adesina/  

[5] Africanews. (2016, September 6). Nigeria Army Arrest Journalist with links to Boko Haram. Retrieved January 4, 2022 from https://www.africanews.com/2016/09/06/nigerian-army-arrests-journalist-with-links-to-boko-haram//

[6] Haruna, A. (2020, January 31). Nigerian soldiers arrest journalist ‘over Boko Haram report’. Retrieved January 4, 2022 from https://www.premiumtimesng.com/news/headlines/375256-nigerian-soldiers-arrest-journalist-over-boko-haram-report.htmlz

[7] Fatunmole, M (2021, April 3). Insurgency: Nigerian Army punishes journalist for asking questions on arms procurement. Retrieved January 4, 2022 from https://www.icirnigeria.org/insurgency-nigerian-army-punishes-journalist-for-asking-questions-on-arms-procurement/

[8] Onyedika-Ugoeze, M. (2021, October 26). Editors, security agencies, others chart ways to resolving rising spate of insecurity. Retrieved January 4, 2022 from https://guardian.ng/features/media/editors-security-agencies-others-chart-ways-to-resolving-rising-spate-of-insecurity/

[9] Akinpelu, Y. (2021, November 26). Nigerian journalist assaulted by Lagos task force for filming harassment of motorists. Retrieved January 7, 2022 from https://www.premiumtimesng.com/news/more-news/497543-nigerian-journalist-assaulted-by-lagos-task-force-for-filming-harassment-of-motorists.html 

[10] Adediran, I. (2020, September 10). How Nigeria police attacked, arrested journalists for covering protest. Retrieved January 7, 2022 from https://www.premiumtimesng.com/news/headlines/413685-how-nigeria-police-attacked-arrested-journalists-for-covering-protest.html 

[11] Okeoma, C. (2021, December, 7). NSCDC operatives brutalise PUNCH reporter, tag him ESN spy. Retrieved January 7, 2022 from https://punchng.com/nscdc-operatives-brutalise-punch-reporter-tag-him-esn-spy/ 

[12] Ekeanyanwu, O. (2016, February 23). Court to hear suit on ‘assault’ of journalist by customs. Retrieved January 7, 2022 from https://www.thecable.ng/suit-assault-journalist-customs-gets-hearing-date 

[13] Amnesty International (2019, October 14). Nigeria: Endangered voices: Attack on freedom of expression in Nigeria. Retrieved January 7, 2022 from https://www.amnesty.org/en/documents/afr44/9504/2019/en/ 

[14] International Press Center. Baseline Audit On State Of Safety Of Journalists In Nigeria. Retrieved January 7, 2022 from https://en.unesco.org/sites/default/files/jsi_report_for_nigeria_ipdc_project_0.pdf 

[15] SBM Intelligence. (2021, February 22). Small arms, mass atrocities and migration in Nigeria. Retrieved January 7, 2022 from https://www.sbmintel.com/2021/02/small-arms-mass-atrocities-and-migration-in-nigeria/ 

[16] Ayeni, D. (2021, August 7).  EXCLUSIVE: Egbunike, Head of Abba Kyari Probe Panel, Joined Others to Approve N1bn for Fake Police Camp Projects. Retrieved January 7, 2022 from https://fij.ng/article/exclusive-egbunike-head-of-abba-kyari-probe-panel-joined-others-to-approve-n1bn-for-fake-police-camp-projects/ 

[17] Orizu, U (2022, January 3). 2019 Audit Report: 178,459 Firearms, Ammunition Missing from Police Armoury. Retrieved January 7, 2022 from https://www.thisdaylive.com/index.php/2022/01/03/2019-audit-report-178459-firearms-ammunition-missing-from-police-armoury/ 

[18] Campbell, J. (2019, April 4). Former Director General of Nigeria’s National Intelligence Agency Arrested. Retrieved January 7, 2022 from https://www.cfr.org/blog/former-director-general-nigerias-national-intelligence-agency-arrested 

[19] Adepegba, A. (2021, December 24). Ex-NSCDC commandant forfeits 60 buildings, land to FG over corruption. Retrieved January 7, 2022 from https://punchng.com/ex-nscdc-commandant-forfeits-60-buildings-land-to-fg-over-corruption/ 

[20] News Agency of Nigeria. (2021, October 11). NSCDC boss dismisses fraud, corruption allegations. Retrieved January 7, 2022 from https://guardian.ng/news/nscdc-boss-dismisses-fraud-corruption-allegations/ 

[21] National Mail Online. Released Captives Reveal: Bandits Reeling Under Military Airstrike, Logistic Blockade. Retrieved January 7, 2022 from https://nationalmailonline.com/released-captives-reveal-bandits-reeling-under-military-airstrikelogistic-blockade/ 

[22] Adepegba, A. (2021, May 20). 127 South-South, South-East cops killed, 25 stations razed – Report. Retrieved January 7, 2022 from https://punchng.com/127-ssouth-seast-cops-killed-25-stations-razed-report/ 

[23] Ogundele, B. and Mordi, R. (2022, January 6). Insecurity: Buhari rejects state police. Retrieved January 7, 2022 from https://thenationonlineng.net/insecurity-buhari-rejects-state-police/ 

[24] Ibok, A.K. and Ogar, O.A. (2019, October 16). Political Violence in Nigeria and Its Implication for National Development. Retrieved January 8, 2022 from https://doi.org/10.5281/zenodo.3491888 

Assessment Papers Damimola Olawuyi Insurgency & Counteinsurgency Nigeria

Assessing the Cognitive Threat Posed by Technology Discourses Intended to Address Adversary Grey Zone Activities

Zac Rogers is an academic from Adelaide, South Australia. Zac has published in journals including International Affairs, The Cyber Defense Review, Joint Force Quarterly, and Australian Quarterly, and communicates with a wider audience across various multimedia platforms regularly. Parasitoid is his first book.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Cognitive Threat Posed by Technology Discourses Intended to Address Adversary Grey Zone Activities

Date Originally Written:  January 3, 2022.

Date Originally Published:  January 17, 2022.

Author and / or Article Point of View:  The author is an Australia-based academic whose research combines a traditional grounding in national security, intelligence, and defence with emerging fields of social cybersecurity, digital anthropology, and democratic resilience.  The author works closely with industry and government partners across multiple projects. 

Summary:  Military investment in war-gaming, table-top exercises, scenario planning, and future force design is increasing.  Some of this investment focuses on adversary activities in the “cognitive domain.” While this investment is necessary, it may fail due to it anchoring to data-driven machine-learning and automation for both offensive and defensive purposes, without a clear understanding of their appropriateness. 

Text:  In 2019 the author wrote a short piece for the U.S. Army’s MadSci website titled  “In the Cognitive War, the Weapon is You![1]” This article attempted to spur self-reflection by the national security, intelligence, and defence communities in Australia, the United States and Canada, Europe, and the United Kingdom.  At the time these communities were beginning to incorporate discussion of “cognitive” security/insecurity in their near future threat assessments and future force design discourses. The article is cited in in the North Atlantic Treaty Organization (NATO) Cognitive Warfare document of 2020[2]. Either in ways that demonstrate the misunderstanding directly, or as part of the wider context in which the point of that particular title is thoroughly misinterpreted, the author’s desired self-reflection has not been forthcoming. Instead, and not unexpectedly, the discourse on the cognitive aspects of contemporary conflict have consumed and regurgitated a familiar sequence of errors which will continue to perpetuate rather than mitigate the problem if not addressed head-on.  

What the cognitive threat is

The primary cognitive threat is us[3]. The threat is driven by a combination of, firstly, techno-futurist hubris which exists as a permanently recycling feature of late-modern military thought.  The threat includes a precipitous slide into scientism which military thinkers and the organisations they populate have not avoided[4].  Further contributing to the threat is the commercial and financial rent-seeking which overhangs military affairs as a by-product of private-sector led R&D activities and government dependence on and cultivation of those activities increasingly since the 1990s[5].  Lastly, adversary awareness of these dynamics and an increasing willingness and capacity to manipulate and exacerbate them via the multitude of vulnerabilities ushered in by digital hyper-connectivity[6]. In other words, before the cognitive threat is an operational and tactical menace to be addressed and countered by the joint force, it is a central feature of the deteriorating epistemic condition of the late modern societies in which said forces operate and from which its personnel, funding, R&D pathways, doctrine and operating concepts, epistemic communities and strategic leadership emerge. 

What the cognitive threat is not   

The cognitive threat is not what adversary military organisations and their patrons are doing in and to the information environment with regard to activities other than kinetic military operations. Terms for adversarial activities occurring outside of conventional lethal/kinetic combat operations – such as the “grey-zone” and “below-the-threshold” – describe time-honoured tactics by which interlocutors engage in methods aimed at weakening and sowing dysfunction in the social and political fabric of competitor or enemy societies.  These tactics are used to gain advantage in areas not directly including military conflict, or in areas likely to be critical to military preparedness and mobilization in times of war[7]. A key stumbling block here is obvious: its often difficult to know which intentions such tactics express. This is not cognitive warfare. It is merely typical of contending across and between cross-cultural communities, and the permanent unwillingness of contending societies to accord with the other’s rules. Information warfare – particularly influence operations traversing the Internet and exploiting the dominant commercial operations found there – is part of this mix of activities which belong under the normal paradigm of competition between states for strategic advantage. Active measures – influence operations designed to self-perpetuate – have found fertile new ground on the Internet but are not new to the arsenals of intelligence services and, as Thomas Rid has warned, while they proliferate, are more unpredictable and difficult to control than they were in the pre-Internet era[8]. None of this is cognitive warfare either. Unfortunately, current and recent discourse has lapsed into the error of treating it as such[9], leading to all manner of self-inflicted confusion[10]. 

Why the distinction matters

Two trends emerge from the abovementioned confusion which represent the most immediate threat to the military enterprise[11]. Firstly, private-sector vendors and the consulting and lobbying industry they employ are busily pitching technological solutions based on machine-learning and automation which have been developed in commercial business settings in which sensitivity to error is not high[12]. While militaries experiment with this raft of technologies, eager to be seen at the vanguard of emerging tech; to justify R&D budgets and stave off defunding; or simply out of habit, they incur opportunity cost.  This cost is best described as stultifying investment in the human potential which strategic thinkers have long identified as the real key to actualizing new technologies[13], and entering into path dependencies with behemoth corporate actors whose strategic goal is the cultivation of rentier-relations not excluding the ever-lucrative military sector[14]. 

Secondly, to the extent that automation and machine learning technologies enter the operational picture, cognitive debt is accrued as the military enterprise becomes increasingly dependent on fallible tech solutions[15]. Under battle conditions, the first assumption is the contestation of the electromagnetic spectrum on which all digital information technologies depend for basic functionality. Automated data gathering and analysis tools suffer from heavy reliance on data availability and integrity.  When these tools are unavailable any joint multinational force will require multiple redundancies, not only in terms of technology, but more importantly, in terms of leadership and personnel competencies. It is evidently unclear where the military enterprise draws the line in terms of the likely cost-benefit ratio when it comes to experimenting with automated machine learning tools and the contexts in which they ought to be applied[16]. Unfortunately, experimentation is never cost-free. When civilian / military boundaries are blurred to the extent they are now as a result of the digital transformation of society, such experimentation requires consideration  in light of all of its implications, including to the integrity and functionality of open democracy as the entity being defended[17]. 

The first error of misinterpreting the meaning and bounds of cognitive insecurity is compounded by a second mistake: what the military enterprise chooses to invest time, attention, and resources into tomorrow[18]. Path dependency, technological lock-in, and opportunity cost all loom large if  digital information age threats are misinterpreted. This is the solipsistic nature of the cognitive threat at work – the weapon really is you! Putting one’s feet in the shoes of the adversary, nothing could be more pleasing than seeing that threat self-perpetuate. As a first step, militaries could organise and invest immediately in a strategic technology assessment capacity[19] free from the biases of rent-seeking vendors and lobbyists who, by definition, will not only not pay the costs of mission failure, but stand to benefit from rentier-like dependencies that emerge as the military enterprise pays the corporate sector to play in the digital age. 


Endnotes:

[1] Zac Rogers, “158. In the Cognitive War – The Weapon Is You!,” Mad Scientist Laboratory (blog), July 1, 2019, https://madsciblog.tradoc.army.mil/158-in-the-cognitive-war-the-weapon-is-you/.

[2] Francois du Cluzel, “Cognitive Warfare” (Innovation Hub, 2020), https://www.innovationhub-act.org/sites/default/files/2021-01/20210122_CW%20Final.pdf.

[3] “us” refers primarily but not exclusively to the national security, intelligence, and defence communities taking up discourse on cognitive security and its threats including Australia, the U.S., U.K., Europe, and other liberal democratic nations. 

[4] Henry Bauer, “Science in the 21st Century: Knowledge Monopolies and Research Cartels,” Journal of Scientific Exploration 18 (December 1, 2004); Matthew B. Crawford, “How Science Has Been Corrupted,” UnHerd, December 21, 2021, https://unherd.com/2021/12/how-science-has-been-corrupted-2/; William A. Wilson, “Scientific Regress,” First Things, May 2016, https://www.firstthings.com/article/2016/05/scientific-regress; Philip Mirowski, Science-Mart (Harvard University Press, 2011).

[5] Dima P Adamsky, “Through the Looking Glass: The Soviet Military-Technical Revolution and the American Revolution in Military Affairs,” Journal of Strategic Studies 31, no. 2 (2008): 257–94, https://doi.org/10.1080/01402390801940443; Linda Weiss, America Inc.?: Innovation and Enterprise in the National Security State (Cornell University Press, 2014); Mariana Mazzucato, The Entrepreneurial State: Debunking Public vs. Private Sector Myths (Penguin UK, 2018).

[6] Timothy L. Thomas, “Russian Forecasts of Future War,” Military Review, June 2019, https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/MJ-19/Thomas-Russian-Forecast.pdf; Nathan Beauchamp-Mustafaga, “Cognitive Domain Operations: The PLA’s New Holistic Concept for Influence Operations,” China Brief, The Jamestown Foundation 19, no. 16 (September 2019), https://jamestown.org/program/cognitive-domain-operations-the-plas-new-holistic-concept-for-influence-operations/.

[7] See Peter Layton, “Social Mobilisation in a Contested Environment,” The Strategist, August 5, 2019, https://www.aspistrategist.org.au/social-mobilisation-in-a-contested-environment/; Peter Layton, “Mobilisation in the Information Technology Era,” The Forge (blog), N/A, https://theforge.defence.gov.au/publications/mobilisation-information-technology-era.

[8] Thomas Rid, Active Measures: The Secret History of Disinformation and Political Warfare, Illustrated edition (New York: MACMILLAN USA, 2020).

[9] For example see Jake Harrington and Riley McCabe, “Detect and Understand: Modernizing Intelligence for the Gray Zone,” CSIS Briefs (Center for Strategic & International Studies, December 2021), https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/211207_Harrington_Detect_Understand.pdf?CXBQPSNhUjec_inYLB7SFAaO_8kBnKrQ; du Cluzel, “Cognitive Warfare”; Kimberly Underwood, “Cognitive Warfare Will Be Deciding Factor in Battle,” SIGNAL Magazine, August 15, 2017, https://www.afcea.org/content/cognitive-warfare-will-be-deciding-factor-battle; Nicholas D. Wright, “Cognitive Defense of the Joint Force in a Digitizing World” (Pentagon Joint Staff Strategic Multilayer Assessment Group, July 2021), https://nsiteam.com/cognitive-defense-of-the-joint-force-in-a-digitizing-world/.

[10] Zac Rogers and Jason Logue, “Truth as Fiction: The Dangers of Hubris in the Information Environment,” The Strategist, February 14, 2020, https://www.aspistrategist.org.au/truth-as-fiction-the-dangers-of-hubris-in-the-information-environment/.

[11] For more on this see Zac Rogers, “The Promise of Strategic Gain in the Information Age: What Happened?,” Cyber Defense Review 6, no. 1 (Winter 2021): 81–105.

[12] Rodney Brooks, “An Inconvenient Truth About AI,” IEEE Spectrum, September 29, 2021, https://spectrum.ieee.org/rodney-brooks-ai.

[13] Michael Horowitz and Casey Mahoney, “Artificial Intelligence and the Military: Technology Is Only Half the Battle,” War on the Rocks, December 25, 2018, https://warontherocks.com/2018/12/artificial-intelligence-and-the-military-technology-is-only-half-the-battle/.

[14] Jathan Sadowski, “The Internet of Landlords: Digital Platforms and New Mechanisms of Rentier Capitalism,” Antipode 52, no. 2 (2020): 562–80, https://doi.org/10.1111/anti.12595.

[15] For problematic example see Ben Collier and Lydia Wilson, “Governments Try to Fight Crime via Google Ads,” New Lines Magazine (blog), January 4, 2022, https://newlinesmag.com/reportage/governments-try-to-fight-crime-via-google-ads/.

[16] Zac Rogers, “Discrete, Specified, Assigned, and Bounded Problems: The Appropriate Areas for AI Contributions to National Security,” SMA Invited Perspectives (NSI Inc., December 31, 2019), https://nsiteam.com/discrete-specified-assigned-and-bounded-problems-the-appropriate-areas-for-ai-contributions-to-national-security/.

[17] Emily Bienvenue and Zac Rogers, “Strategic Army: Developing Trust in the Shifting Strategic Landscape,” Joint Force Quarterly 95 (November 2019): 4–14.

[18] Zac Rogers, “Goodhart’s Law: Why the Future of Conflict Will Not Be Data-Driven,” Grounded Curiosity (blog), February 13, 2021, https://groundedcuriosity.com/goodharts-law-why-the-future-of-conflict-will-not-be-data-driven/.

[19] For expansion see Zac Rogers and Emily Bienvenue, “Combined Information Overlay for Situational Awareness in the Digital Anthropological Terrain: Reclaiming Information for the Warfighter,” The Cyber Defense Review, no. Summer Edition (2021), https://cyberdefensereview.army.mil/Portals/6/Documents/2021_summer_cdr/06_Rogers_Bienvenue_CDR_V6N3_2021.pdf?ver=6qlw1l02DXt1A_1n5KrL4g%3d%3d.

Artificial Intelligence / Machine Learning / Human-Machine Teaming Assessment Papers Below Established Threshold Activities (BETA) Cyberspace Influence Operations Information Systems Zac Rogers

Analyzing Social Media as a Means to Undermine the United States

Michael Martinez is a consultant who specializes in data analysis, project management and community engagement. has a M.S. of Intelligence Management from University of Maryland University College. He can be found on Twitter @MichaelMartinez. Divergent Optionscontent does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Analyzing Social Media as a Means to Undermine the United States

Date Originally Written:  November 30, 2021.

Date Originally Published:  December 27, 2021.

Author and / or Article Point of View:  The author believes that social media is not inherently good nor bad, but a tool to enhance discussion. Unless the national security apparatus understands how to best utilize Open Source Intelligence to achieve its stated goals, i.e. engaging the public on social media and public forums, it will lag behind its adversaries in this space.

Summary:  Stopping online radicalization of all varieties is complex and includes the individual, the government, social media companies, and Internet Service Providers. Artificial intelligence reviewing information online and flagging potential threats may not be adequate. Only through public-private partnerships can an effective system by created to support anti-radicalization endeavors.

Text:  The adage, “If you’re not paying for the product, you are the product[1],” cannot be further from the truth in the age of social media. Every user’s click and purchase are recorded by private entities such as Facebook and Twitter. These records can be utilized by other nations to gather information on the United States economy, intellectual property, as well as information on government personnel and agencies. This collation of data can be packaged together and be used to inform operations to prey on U.S. personnel.  Examples include extortion through ransomware, an adversary intelligence service probing an employee for specific national information by appealing to their subject matter expertise, and online influence / radicalization.

It is crucial to accept that the United States and its citizens are more heavily reliant on social media than ever before. Social media entities such as Meta (formerly Facebook) have new and yet to be released products for children (i.e., the “Instagram for Kids” product) enabling adversaries to prey upon any age a potential. Terrorist organizations such as Al-Qaeda utilize cartoons on outlets like YouTube and Instagram to entice vulnerable youth to carry out attacks or help radicalize potential suicide bombers[2]. 

While Facebook and YouTube are the most common among most age groups, Tik-Tok and Snapchat have undergone a meteoric arise among youth under thirty[3]. Intelligence services and terrorist organizations have vastly improved their online recruiting techniques including video and media as the platforms have become just as sophisticated. Unless federal, state, and local governments strengthen their public-private partnerships to stay ahead of growth in next generation social media platforms this adversary behavior will continue.  The national security community has tools at its disposal to help protect Americans from being turned into cybercriminals through coercion, or radicalizing individuals from overseas entities such as the Islamic State to potentially carry out domestic attacks.

To counter such trends within social media radicalization, the National Institutes of Justice (NIJ) worked with the National Academies to identify traits and agendas to facilitate disruption of these efforts. Some of the things identified include functional databases, considering links between terrorism and lesser crimes, and exploring the culture of terrorism, including structure and goals[4]. While a solid federal infrastructure and deterrence mechanism is vital, it is also important for the social media platform themselves to eliminate radical media that may influence at-risk individuals. 

According to the NIJ, there are several characteristics that contribute to social media radicalization: being unemployed, a loner, having a criminal history, a history of mental illness, and having prior military experience[5]. These are only potential factors that do not apply to all who are radicalized[6]. However, these factors do provide a base to begin investigation and mitigation strategies. 

As a long-term solution, the Bipartisan Policy Center recommends enacting and teaching media literacy to understand and spot internet radicalization[7]. Social media algorithms are not fool proof. These algorithms require the cyberspace equivalent of “see something, say something” and for users to report any suspicious activity to the platforms. The risks of these companies not acting is also vital as their main goal is to monetize. Acting in this manner does not help companies make more money. This inaction is when the government steps in to ensure that private enterprise is not impeding national security. 

Creating a system that works will balance the rights of the individual with the national security of the United States. It will also respect the rights of private enterprise and the pipelines that carry the information to homes, the Internet Service Providers. Until this system can be created, the radicalization of Americans will be a pitfall for the entire National Security apparatus. 


Endnotes:

[1] Oremus, W. (2018, April 27). Are You Really the Product? Retrieved on November 15, 2021, from https://slate.com/technology/2018/04/are-you-really-facebooks-product-the-history-of-a-dangerous-idea.html. 

[2] Thompson, R. (2011). Radicalization and the Use of Social Media. Journal of Strategic Security, 4(4), 167–190. http://www.jstor.org/stable/26463917 

[3] Pew Research Center. (2021, April 7). Social Media Use in 2021. Retrieved from https://www.pewresearch.org/internet/2021/04/07/social-media-use-in-2021/ 

[4] Aisha Javed Qureshi, “Understanding Domestic Radicalization and Terrorism,” August 14, 2020, nij.ojp.gov: https://nij.ojp.gov/topics/articles/understanding-domestic-radicalization-and-terrorism.

[5] The National Counterintelligence and Security Center. Intelligence Threats & Social Media Deception. Retrieved November 15, 2021, from https://www.dni.gov/index.php/ncsc-features/2780-ncsc-intelligence-threats-social-media-deception. 

[6] Schleffer, G., & Miller, B. (2021). The Political Effects of Social Media Platforms on Different Regime Types. Austin, TX. Retrieved November 29, 2021, from http://dx.doi.org/10.26153/tsw/13987. 

[7] Bipartisan Policy Center. (2012, December). Countering Online Radicalization in America. Retrieved November 29, 2021, from https://bipartisanpolicy.org/download/?file=/wp-content/uploads/2019/03/BPC-_Online-Radicalization-Report.pdf 

Assessment Papers Cyberspace Influence Operations Michael Martinez Social Media United States

McMaster, Afghanistan, and the Praetorian Mindset

Lieutenant Colonel John Bolton, U.S. Army, is a doctoral candidate at Johns Hopkins’ School of Advanced International Studies.  He previously commanded Bravo Company, 209th Aviation Support Battalion, served as the Executive Officer for 2-25 Assault Helicopter Battalion, and the Brigade Aviation Officer for 4/25 IBCT (Airborne). He is a graduate of the U.S. Army Command and General Staff College’s Art of War Scholars Program and holds degrees in military history and mechanical engineering. An AH-64D/E Aviator, he has deployed multiple times with Engineer, Aviation, and Infantry units. 


Title:  McMaster, Afghanistan, and the Praetorian Mindset

Date Originally Written:  November 20, 2021.

Date Originally Published:  December 20, 2021.

Author and / or Article Point of View:  The author believes some national security professionals are taking the wrong lessons from Afghanistan, blaming a non-existent lack of public support for the failure of the American campaign.

Summary:  Lieutenant General H.R. McMaster, USA(ret) recently blamed the U.S. public for a “lack of support” in Afghanistan.  McMaster’s claim evokes the legacy of dangerous “stabbed in the back” mentalities that emerged after Germany’s defeat in WWI and the U.S. Army’s withdrawal from Vietnam. Instead of blaming others, the U.S. military would benefit from a far-reaching study to discover the institutional lapses and shortcomings that precipitated failure. 

Text:  Retired U.S. Army Lieutenant General H.R. McMaster, former Assistant to the President for National Security Affairs (APNSA), has rightfully lambasted the U.S. withdrawl from Afghanistan as embarrassing. However, McMaster goes too far in calling the withdrawl a “defeat” with severe implications for American credibility[1]. More troubling, in a recent column, McMaster blamed the U.S. public and unnamed leaders who allegedly failed to back the American military[2]. According to McMaster, “There are a lot of people in senior positions in government who have never led anything… they’ve never done anything except maybe in academic environments or write policy papers[3].”

McMaster is wrong about Afghanistan and his narrative endorses a praetorian mindset – one dangerously close to the “stab in the back” dogmas that took hold in Weimar Germany after World War I and among the American Military Officer Corps after Vietnam[4]. Leaving Afghanistan will have few, if any, long-term effects on American security but the war’s impact on civil-military relations portends pernicious tensions, especially if military leaders adopt McMaster’s mentality. 

McMaster says America was fighting “one-year wars” in Afghanistan for two decades, obscuring the reality that the U.S. military chose this rotational model and often failed to adapt to local conditions[5]. But the 2017 Afghanistan “surge” engineered by McMaster while he was APNSA was more of the same. The McMaster Surge did not quell violence, deter the Taliban, nor generate effective (or loyal) Afghan Defense Forces[6]. From 2017-2020 Americans did more of the same: hunting the Taliban and training and foisting expensive equipment on poorly trained and often barely literate Afghan forces[7]. Americans were also dying. During the author’s 2017-18 tour, six Soldiers died during a time when Afghans were supposedly in the lead. “Bureaucratic capture” is the only way to explain how otherwise intelligent professionals can endorse logically inconsistent, sunk-cost arguments about a strategically unimportant place.

Rather than explain why Central Asia has relevancy at home, McMaster and others have made expansive credibility arguments – we must stay there because we are there. In doing so, McMaster bastardizes historian Zachary Shore’s “strategic empathy[8].” But instead of understanding the domestic and cultural sources of U.S. adversaries’ actions, McMaster’s “strategic empathy” justifies expansive American action by equating all challenges as likewise threatening. Better to employ a rational consideration of interests and achievable ends, especially amid a public justifiably skeptical of employing force[9]. Moreover, American credibility has shades – eschewing a non-vital commitment in Afghanistan is hardly relevant to the enduring North Atlantic Treaty Organization alliance, for example. Tellingly, according to McMaster, violating the 2019 U.S.-Taliban agreement and staying in Afghanistan would not have affected American credibility.

Despite the folly of throwing good Soldiers after bad policy, McMaster and the praetorians see no systemic failure in American national security institutions. Instead, McMaster blames the “defeatist” U.S. public for a lack of support – as if 20 years and trillions of dollars materialized without public consent and Congressional support[10]. If anything, the public and Congress were far too lenient with oversight of the Afghan efforts, largely bequeathing whatever national security leaders wanted. 

The irony of a former APNSA decrying “policy paper writers” is palpable but McMaster certainly knows better. An accomplished soldier-scholar, his doctoral thesis (later turned in the book Dereliction of Duty) savaged senior officers who allowed President Lyndon Johnson to lurch America toward tragedy in Vietnam. Once U.S. forces began fighting, the Joint Chiefs of Staff did little to question U.S. Army General William Westmoreland’s fundamentally flawed strategy. Consequently, Johnson felt boxed in by his own military advisors. Unfortunately, in an unnerving reprisal, American strategy in Afghanistan developed little beyond asking for “more time,” “more money,” “more troops,” while leaders proclaimed “great progress” or “being on the right azimuth[11].” To paraphrase the Afghanistan Special Investigator General John Sopko, “so many corners were turned, we were spinning[12].” When Americans did speak out, as in the case of a U.S. Army Special Forces officer who grew tired of his Afghan partner’s pederasty or an officer who described rampant false reporting in 2012, they were ignored[13].  

As documented by the Washington Post’s “Afghanistan Papers,” false hopes and false reporting were mainstays of Afghanistan strategy across multiple administrations[14]. A 2014 Army report demonstrated the war’s toll on the ethics of Army Officers, finding lying and false reporting had become “common place[15].” Officers, the report said, were often “lying to themselves.” Civil-military distrust arising from Afghanistan needs to be analyzed in this context. If the public shares blame, it is for being too credulous – treating soldiers like saints and senior leaders as anointed heroes, too pious to be questioned, let alone contradicted. Blaming the public is insipid at best and dangerous at worst. Here McMaster espouses a praetorian view of civil-military relations grossly out of step with the American tradition. 

Leaving Afghanistan is exactly the exactly the type of prioritization McMaster called for in his 2017 National Security Strategy. While the Afghanistan withdrawal was embarrassing[16], leaving demonstrates that United States can make unpleasant distinctions between what is long-standing and what is vital. A perpetual counter-terrorism mission in Afghanistan would (and did) distract from other regions. Rather than abandon a failed project, McMaster continues to advocate for doubling down on efforts that were often corrupt and ineffective[17]. It is foolhardy to adopt a national security paradigm predicated on long-term occupations and defense posture anathema to the American public and much of Congress. 

McMaster is an American hero, not only on the battlefield but in the war for the intellectual soul of the U.S. Army. His views on warfare helped shape a generation of officers, including the author. But his correct view of war’s nature has not translated into feasible policy. By failing to distinguish concerns from vital interests this worldview lacks the wherewithal to make difficult strategic decisions. 

America is and will remain the world’s sole superpower. But even massive reserves of power are finite, requiring an adept strategy based on a healthy understanding of the world as it is. Good strategy also requires an engaged but not overly deferential public. U.S. policy will succeed when it prioritizes threats and interests and aligns them with the resources available, not assuming it can do as it wishes abroad with no consequences to the nation’s budget, civil-military relationship, or moral standing. 


Endnotes:

[1] McMaster quoted in Hal Boyd, “Gen. H.R. McMaster on America’s withdrawal from Afghanistan,” Deseret News, October 27, 2021, https://www.deseret.com/2021/10/27/22747222/general-hr-mcmaster-on-americas-withdrawal-from-afghanistan-trump-national-security-adviser-biden.

[2] H.R. McMaster, “Honor Veterans by Having the Will to Win,” Wall Street Journal, November 10, 2021, https://www.wsj.com/articles/honor-vets-the-will-to-win-war-military-service-veterans-day-afghanistan-taliban-mcmaster-11636576955

[3] McMaster quoted at the 4th Great Power Competition Conference, https://www.youtube.com/watch?v=dvx1rmU-QAU&t=2093s

[4] See Summers, On Strategy and Evans, The Rise and Fall of the Third Reich for discussion of the “stabbed in the back” narratives.

[5] McMaster interviewed by Chuck Todd, Meet the Press, August 29, 2021, https://www.nbcnews.com/meet-the-press/video/mcmaster-afghanistan-a-one-year-war-fought-20-times-over-119712325910

[6] See Human Rights Watch, “Afghanistan: Events of 2018,” https://www.hrw.org/world-report/2019/country-chapters/afghanistan; Craig Whitlock, “Afghan Security Forces’ Wholesale Collapse Was Years in the Making,” The Washington Post, August 16, 2021, https://www.washingtonpost.com/investigations/afghan-security-forces-capabilities/2021/08/15/052a45e2-fdc7-11eb-a664-4f6de3e17ff0_story.html

[7] See Alexandra Kuimova and Siemon T. Wezeman, “Transfers of major arms to Afghanistan between 2001 and 2020,” SIPRI, September 3, 2021, https://www.sipri.org/commentary/topical-backgrounder/2021/transfers-major-arms-afghanistan-between-2001-and-2020.

[8] McMaster, lecture to George Washington University’s Elliot School of International Affairs, March 2021, https://gwtoday.gwu.edu/hr-mcmaster-stresses-strategic-empathy-effective-foreign-policy

[9] Anna Shortridge, “The U.S. War in Afghanistan Twenty Years On: Public Opinion Then and Now,” Council on Foreign Relations, October 7, 2021, https://www.cfr.org/blog/us-war-afghanistan-twenty-years-public-opinion-then-and-now

[10] Kyle Rempfer, “Trump’s former national security adviser says the public is fed ‘defeatist narrative’ that hurts the US in Afghanistan,” Military Times, May 9, 2019, https://www.businessinsider.com/hr-mcmaster-defeatist-narrative-hurting-us-afghanistan-strategy-2019-5

[11] See “Afghan ISAF commander John Allen sees ‘road to winning’,” BBC News, February 10, 2013, https://www.bbc.com/news/world-us-canada-21399805; Sara Almukhtar, “What Did the U.S. Get for $2 Trillion in Afghanistan?,” The New York Times, December 9, 2019, https://www.nytimes.com/interactive/2019/12/09/world/middleeast/afghanistan-war-cost.html; Chris Good, “Petraeus: Gains in Afghanistan ‘Fragile and Reversible’; Afghans Will Take Over in Select Province,” The Atlantic, March 15, 2011, https://www.theatlantic.com/politics/archive/2011/03/petraeus-gains-in-afghanistan-fragile-and-reversible-afghans-will-take-over-in-select-provinces/72507.

[12] Dan Grazier, “Afghanistan Proved Eisenhower Correct,” Project on Government Oversight, November 1, 2021, https://www.pogo.org/analysis/2021/11/afghanistan-proved-eisenhower-correct/

[13] See Joseph Goldstein, “U.S. Soldiers Told to Ignore Sexual Abuse of Boys by Afghan Allies,” The New York Times, September 20, 2015, https://www.nytimes.com/2015/09/21/world/asia/us-soldiers-told-to-ignore-afghan-allies-abuse-of-boys.html; Dan Davis, “Truth, Lies, and Afghanistan,” Armed Forces Journal, February 1, 2012, http://armedforcesjournal.com/truth-lies-and-afghanistan

[14]Craig Whitlock, “The Afghanistan Papers: A Secret History of the War,” The Washington Post, December 9, 2019, https://www.washingtonpost.com/graphics/2019/investigations/afghanistan-papers/afghanistan-war-confidential-documents/

[15] Leonard Wong and Stephen Gerras, “Lying to Ourselves,” Strategic Studies Institute, February 2015, https://press.armywarcollege.edu/monographs/466

[16] The White House, “National Security Strategy,” https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

[17] SIGAR, “Corruption in Conflict: Lessons from the U.S. Experience in Afghanistan,” September 2016, https://www.sigar.mil/pdf/lessonslearned/sigar-16-58-ll.pdf

Afghanistan Assessment Papers Governing Documents and Ideas John Bolton Policy and Strategy United States

Assessing Russian Use of Social Media as a Means to Influence U.S. Policy

Alex Buck is a currently serving officer in the Canadian Armed Forces. He has deployed twice to Afghanistan, once to Ukraine, and is now working towards an MA in National Security.  Alex can be found on Twitter @RCRbuck.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessing Russian Use of Social Media as a Means to Influence U.S. Policy

Date Originally Written:  August 29, 2021.

Date Originally Published:  December 13, 2021.

Author and / or Article Point of View: The author believes that without appropriate action, the United States’ political climate will continue to be exploited by Russian influence campaigns. These campaigns will have broad impacts across the Western world, and potentially generate an increased competitive advantage for Russia.

Summary:  To achieve a competitive advantage over the United States, Russia uses social media-based influence campaigns to influence American foreign policy. Political polarization makes the United States an optimal target for such campaigns. 

Text:  Russia aspires to regain influence over the international system that they once had as the Soviet Union. To achieve this aim, Russia’s interest lies in building a stronger economy and expanding their regional influence over Eastern Europe[1]. Following the Cold War, Russia recognized that these national interests were at risk of being completely destroyed by Western influence. The Russian economy was threatened by the United States’ unipolar hegemony over the global economy[2]. A strong North Atlantic Treaty Organization (NATO) has threatened Russia’s regional influence in Eastern Europe. NATO’s collective security agreement was originally conceived to counter the Soviet threat following World War II and has continued to do so to this day. Through the late 1990s and early 2000s, NATO expanded their membership to include former Soviet states in Eastern Europe. This expansion was done in an effort to reduce Russian regional influence [1]. Russia perceives these actions as a threat to their survival as a state, and needs a method to regain competitive advantage.

Following the Cold War, Russia began to identify opportunities they could exploit to increase their competitive advantage in the international system. One of those opportunities began to develop in the early-2000s as social media emerged. During this time, social media began to impact American culture in such a significant way that it could not be ignored. Social media has two significant impacts on society. First, it causes people to create very dense clusters of social connections. Second, these clusters are populated by very similar types of people[3]. These two factors caused follow-on effects to American society in that they created a divided social structure and an extremely polarized political system. Russia viewed these as opportunities ripe for their exploitation. Russia sees U.S. social media as a cost-effective medium to exert influence on the United States. 

In the late 2000s, Russia began experimenting with their concept of exploiting the cyber domain as a means of exerting influence on other nation-states. After the successful use of cyber operations against Ukraine, Estonia, Georgia and again in Ukraine in 2004, 2007, 2008, and 2014 respectively, Russia was poised to attempt utilizing their concept against the United States and NATO[4]. In 2014, Russia slowly built a network of social media accounts that would eventually begin sowing disinformation amongst American social media users[3]. The significance of the Russian information campaign leading up to the 2016 U.S. presidential election can not be underestimated. The Russian Internet Research Agency propagated ~10.4 million tweets on Twitter, 76.5 million engagements on Facebook, and 187 million engagements on Instagram[5]. Although within the context of 200 billion tweets sent annually this may seem like a small-scale effort, the targeted nature of the tweets contributed to their effectiveness. This Russian social media campaign was estimated to expose between 110 and 130 million American social media users to misinformation aimed at skewing the results of the presidential election[3]. The 2000 presidential election was decided by 537 votes in the state of Florida. To change the results of an American election like that of 2000, a Russian information campaign could potentially sway electoral results with a campaign that is 0.00049% effective.

The bifurcated nature of the current American political arena has created the perfect target for Russian attacks via the cyber domain. Due to the persistently slim margins of electoral results, Russia will continue to exploit this opportunity until it achieves its national aims and gains a competitive advantage over the United States. Social media’s influence offers Russia a cost effective and highly impactful tool that has the potential to sway American policies in its favor. Without coherent strategies to protect national networks and decrease Russian social influence the United States, and the broader Western world, will continue to be subject to Russian influence. 


Endnotes:

[1] Arakelyan, L. A. (2017). Russian Foreign Policy in Eurasia: National Interests and Regional Integration (1st ed.). Routledge. https://doi.org/10.4324/9781315468372

[2] Blank, S. (2008). Threats to and from Russia: An Assessment. The Journal of Slavic Military Studies, 21(3), 491–526. https://doi.org/10.1080/13518040802313746

[3] Aral, S. (2020). The hype machine: How social media disrupts our elections, our economy, and our health–and how we must adapt (First edition). Currency.

[4] Geers, K. & NATO Cooperative Cyber Defence Centre of Excellence. (2015). Cyber war in perspective: Russian aggression against Ukraine. https://www.ccdcoe.org/library/publications/cyber-war-in-perspective-russian-aggression-against-ukraine/

[5] DiResta, R., Shaffer, K., Ruppel, B., Sullivan, D., & Matney, R. (2019). The Tactics & Tropes of the Internet Research Agency. US Senate Documents.

Alex Buck Assessment Papers Cyberspace Influence Operations Russia Social Media United States

Assessing Contemporary Deterrence Parallel to Netflix’s Squid Game

Dr. Brooke Mitchell is a George Washington University Nuclear Security Working Group Fellow. She works on Capitol Hill for a member of the United States Congress and leads appropriation portfolios for defense, energy and water, and military construction and veteran’s affairs. Dr. Mitchell also serves as manager for the Congressional Nuclear Working Group. In addition, she is the Chief Academic Officer for the Small Business Consulting Corporation and principal investigator for Air Force Global Strike Command’s (AFGSC) National Nuclear Strategy and Global Security Workshop for Practitioners. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessing Contemporary Deterrence Parallel to Netflix’s Squid Game

Date Originally Written:  November 17, 2021.

Date Originally Published:  November 22, 2021.

Author and / or Article Point of View:  The United States Department of Defense (DoD) has placed an increased emphasis on the present era of strategic competition with Russia and China. The author uses the Netflix show Squid Game as a metaphor to draw attention to the value of understanding the players’ motivations as central to define the rules of the game in order to create clear focus around contemporary deterrence. 

Summary:  DoD’s view of deterrence is reminiscent of Netflix’s hit show, Squid Game[1]. Deterrence traditionally focuses on nation states implementing military actions which may deter adversary action[2]. Deterrence fails when the adversary proceeds anyway. Both deterrence and Squid Game involve players executing their free will to compete against the other players.  Deterrence becomes complicated today as players and game rules remain undiscovered.

Text:  It has historically been assumed that the strongest parties (i.e. individuals, groups, countries) have an advantage and can thus deter the weaker. Deterrence can be measured in terms of nuclear deterrence (including both weapons and weapons systems), along with conventional sources of warpower, and include additional forms of diplomatic, economic, or social variables that enhance one party’s ability to deny undesirable outcomes. 

The question remains though: how, in an era of strategic competition, do traditional deterrence theories or concepts hold true when many leaders, military strategists, and subject matter experts view the United States as facing near-peer competition with both Russia and China? If deterrence is still simply the ability to strategically maneuver strength, or capabilities, to the other parties than by this token the United States won this competition long ago. Yet, despite the present conundrum Russia and now China continues to grow their nuclear arsenals; are far outpacing the United States on the research, development, and fielding of hypersonic technologies; and exceed the United States in the militarization of space and other non-terrestrial warfighting domains[3]. 

In Squid Game players execute their free will to compete against the other players[4]. The idea is that these individuals have nothing to lose but their life and are gambling to both preserve their life and receive tangible gain. This idea pushes the competition to the brink. The game only ends if the majority agrees to stop playing. The psychological tug-of-war between the barbaric nature of the rules and then sentimental connection to the “fairness” of such a competitive (and lawless society made out to be equitable for all) by Squid Game leaders such as the Front Man, further exacerbates the rapidly shifting conclusions of the viewers. By the characters later chasing the money trail to the evil people funding the game, then pursuing the very master mind both controlling and holding the purse strings the viewer is left questioning, “How could I not see that coming?” or “Why did I miss that?” Only when there is crystal clear clarity around the rules and players of Squid Game can action in pursuit of strategically deterring the extreme nature of the game be confronted. 

The characters in Squid Game needing crystal clear clarity around the rules and players is very similar to the 21st century conditions surrounding deterrence. The United States and her allies are attempting to deter Russia and China in their respective activities that are nefarious to the well-being of the world. However, in this pursuit the convoluted, interwoven, sentiment to separate the motivations of how Russia and China are now playing the game from their priorities in how they are choosing to do so is vague and unclear. The money trail can certainly be traced and the United States’ ongoing efforts to modernize military capabilities and enhance its diplomacs capability with adversarial counterparts remains an option. Whether military and diplomatic modernization remain a viable, sustainable option against Russia and China in a contemporary context is a different question altogether. It is certainly feasible to continue building deterrence around existing frameworks but then again, if those frameworks were fool proof, then how on the United States watch did Russia and China gain both power and speed in their respective nuclear arsenals and in the contested domains of cyberspace and space? 

United States efforts to conduct thoughtful analysis and study the “game” within this era of strategic competition, will fail if it does not unpack the relationships and motivations of the players in order to effectively deter unwarranted outcomes on the homeland and abroad. While the conditions of strategic competition may appear intuitive, it is only by understanding the players, and their respective worldviews, that the rules can be effectively established and the turnabout path to maintaining a democratic, truly free, and just society preserved, as demonstrated in the Squid Game. 


Endnotes:

[1] Garamone, J. (2021, September 17) “DOD Policy Chief Kahl Discusses Strategic Competition with Baltic Allies,” https://www.defense.gov/News/News-Stories/Articles/Article/2780661/dod-policy-chief-kahl-discusses-strategic-competiton-with-baltic-allies. 

[2] Mazaar, M.J. (N.D.), “Understanding Deterrence,” RAND, https://www.rand.org/content/dam/rand/pubs/perspectives/PE200/PE295/RAND_PE295.pdf. 

[3] Congressional Research Service (19 October 2021), “Hypersonic Weapons: Background and Issues for Congress,” https://www.crsreports.congress.gov/product/pdf/R/R45811. 

[4] N Series, “Squid Game,” Netflix, https://www.netflix.com/title/81040344. 

Assessment Papers Competition Deterrence Dr. Brooke Mitchell

Assessing the Impact of U.S. Forces on Pearl Harbor Heeding Multiple Warnings on December 7, 1941

Scott Martin is a career U.S. Air Force officer who has served in a multitude of globally-focused assignments.  He studied Russian and International Affairs at Trinity University and received his Masters of Science in International Relations from Troy University.  He is currently assigned within the National Capitol Region. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Impact of U.S. Forces on Pearl Harbor Heeding Multiple Warnings on December 7, 1941

Date Originally Written:  October 27, 2021

Date Originally Published:  November 8, 2021

Author and / or Article Point of View:  The author believes that the U.S. did receive significant warnings on the morning of December 7th, 1941 before the Japanese attack on Pearl Harbor. If those warnings had been acted upon in a timely fashion, the author believes that it is likely that the U.S. could have mitigated some of the damage inflicted by the Japanese. However, this author contends that the limited warning time would not have been sufficient to completely defeat the Japanese raid, and thus, Pearl Harbor would still be the event that drew the U.S. into World War II. 

Summary:  A key “what if?” about the attack on Pearl Harbor centers on the lack of U.S. action on the two main warnings received that morning i.e. the USS Ward’s sinking of a Japanese submarine and the Opana Radar Station detection of the first wave of Japanese aircraft. Those warnings could have saved lives, but the limited warning time makes it unlikely the U.S. could have defeated the Japanese attack.

Text:  While most associate the Japanese attack on Pearl Harbor with the ultimate in surprise attacks, U.S. Forces did receive warnings of pending action, especially that morning. Chief among the warnings was the USS Ward sinking a Japanese mini-submarine at 0640L, nearly a full hour before the arrival of the first wave of Japanese aircraft. Additionally, at 0701L, an Army radar installation at Opana on the western part of the island of Oahu detected a large mass of possible inbound flying objects, later determined to be the first wave of Japanese carrier-based aircraft. What if the command at Pearl Harbor, instead of ignoring the warnings, decided instead that the Ward and the radar station were the indications of an imminent attack? 

The Ward’s  radioing in that it sank a Japanese sub at the entrance of the harbor was not the first report/sighting of a Japanese submarine that day. At 0357L, the minesweeper USS Condor, reported a periscope near Pearl Harbor during patrol[1]. That information was passed to the Ward for action. Also, U.S. forces throughout the Pacific had been on a war alert status for over two weeks. For most, that meant a likely Japanese strike against locations far to the west of Hawaii[2]. The accounts of the Ward fell into the trap of more warnings/sightings that leadership did not feel warranted additional responses. 

The reporting of the Ward might have increased warning for possible sub-related intrusions, which U.S. Navy Admiral (ADM) Husband E. Kimmel, Commander in Chief of the United States Pacific Fleet during the Japanese attack on Pearl Harbor, felt was a significant threat[3]. However, the sub sighting along might not warrant an increase in harbor air defense actions. The Opana Radar Station, powered on longer than its scheduled 0400-0700 shift, detected multiple inbound contacts to conduct additional training while they waited for transport to leave the station[4]. In the subsequent actions, the inexperienced radar operators, while able to determine several aircraft could be in route, could not positively identify the inbound tracks[5].  Another factor involves the Officer-in-Charge at the information center at Fort Shafter. Upon receiving the call from Opana, he did not seem unduly concerned, as he knew a flight of U.S.-based B-17 were due in that morning[6]. Thus, the first wave of Japanese carrier-based planes made their way towards the island unopposed. 

Where the impact of the Wards and any possible change in the assessment of the radar station reporting could have had on the events of that morning would start at approximately 0730L, when ADM Kimmel received the Wards report[7]. If ADM Kimmel had called for an increase in the alert status at that point, the fleet would have had nearly 15-20 minutes to prepare for any inbound aggressive actions. While that might not seem like a lot of time, especially on a Sunday morning, the Sailors on ship would have been able to ready their ship-mounted anti-aircraft guns. Of note is that the ships in harbor were preparing for a Monday morning inspection, meaning most of the hatches and doors were open, thus, some warning would see the crews batten down the hatches to secure the ships[8]. 

While the 15-20 minute warning does enable the readying of anti-aircraft guns and for hatches to be secured, it does not leave time for significant aircraft launching. While possible for some alert aircraft to take off, there would be little time for the ground crews to man or move most planes to more secure locations. The Japanese were also able to take advantage in the different threat perception between the U.S. Navy and the U.S. Army as U.S. Army Lieutenant General (LTG) Walter C. Short, Commander of the Hawaiian Department, deemed sabotage the greatest threat to the ground-based aircraft.  As such, the majority of the island’s fighters were parked wingtip to wingtip out in the open[9]. Additionally, most of the aircraft were on four-hour alert status, so minutes’ warning would make little impact[10].

A major factor in the confusion and lack of action on the reports from the Ward and the Opana radar station stemmed from the lack of poor communications between the Navy and Army commands. LTG Short did not receive notice of the Wards actions and ADM Kimmel did not receive word about the sighting from the radar station. While this disconnect speaks to larger communication issues, the shorter-term issue would be that if Kimmel and Short did speak on the issue of the submarine[11]. If Kimmel contacted Short following the submarine activity, and both men agreed to increase the alert, even with limited time before the Japanese planes entered Oahu airspace, more lives and materiel might have been saved. Given how quickly most Sailors and Soldiers scrambled to gun positions after the shock of the first wave and the response the second wave of Japanese aircraft, any pre-warning/alert before the first wave might have reduced American casualties/increased Japanese losses. 

While an earlier alert call from ADM Kimmel and LTG Short, from the time of the Wards actions and the reporting of many inbound aircraft would have further increased America’s defensive posture, it is still likely that the U.S. suffers losses at Pearl Harbor.  In this scenario the Japanese lose more aircraft and don’t inflict as much damage to the U.S. ships in harbor, while the damage to the aircraft parked on the ground remains. In this scenario Pearl Harbor remains a Japanese tactical victory, and the U.S. still enters World War II. However, people will recall the actions of the Ward and the Opana radar detection, and how much worse things might have been had the U.S. not acted on their reporting. 


Endnotes: 

[1] Slackman, M. (1990) Target: Pearl Harbor. University of Hawaii Press, Honolulu, p.74.

[2] Bar-Joseph, U. and McDermont, R.(2016) “Pearl Harbor and Midway: the decisive influence of two men on the outcomes.” Intelligence and National Security, Vol 31 (No.7), p.952. Most analysts at the time thought that the Japanese would attack either the Philippines, the Malay peninsula or other American island holdings in the Pacific.

[3] Slackman, M. Target: Pearl Harbor. P. 55. Of note, ADM Kimmel, prior to his assignment as Commander in Chief, US Pacific Fleet, held the rank of RADM (Two Star). The position was a 4-star billet, thus, he was addressed as ADM vs. RADM. After his dimissing from his position in the aftermath of Pearl Harbor, he reverted to his original 2-star rank (RADM). 

[4] Twoney, S. (2016). Countdown to Pearl Harbor. The Twelve Days to the Attack. Simon and Shuster, New York. P. XII.

[5] Ibid, P. 275. The radar operators, even as inexperienced as they were, would have been able to determine the presence of 50 airborne signatures, which, if reported to Fort Shafter, would have given the OIC pause, as the US was not sending near that many bombers to Hawaii that morning.

[6] Ibid

[7] Slackman, M. Target: Pearl Harbor, P. 76.

[8] Bar-Joseph and McDermont. “Pearl Harbor and Midway: the decisive influence for two men on the outcomes.” P. 954.

[9] Ibid

[10] Slackman, M. Target: Pearl Harbor, P.135.

[11] Prange, G. (1982) At Dawn We Slept. Penguin Books, New York, P. 497.

Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers Japan Scott Martin United States World War 2

Assessing Airborne Status in U.S. Army Special Operations Forces

Stuart E. Gallagher is a Special Operations Officer in the United States Army and a graduate of the National Defense University. He has previously served as a Commander, a Military Advisor to the United States Department of State, and Senior Observer Coach Trainer at the Joint Multinational Readiness Center. He currently serves as the Chief, G3/5 Plans and Analysis for the United States Army John F. Kennedy Special Warfare Center and School. Divergent Options content does not contain information of an official nature nor does the content represent the official position of any government, organization or group.


Title:  Assessing Airborne Status in U.S. Army Special Operations Forces

Date Originally Written:  August 26, 2021.

Date Originally Published:  October 18, 2021.

Author and / or Article Point of View: The author has spent the majority of his career in U.S. Army special operations and on airborne status. The author contends that although there are a significant and legitimate number of reasons airborne status should be removed from special operations units, maintaining this status is essential to the posterity of elite Army Special Operations Forces (ARSOF).

Summary:  Airborne operations date back to World War 2. During this time, airborne operations delivered large numbers of paratroopers and special operations personnel (Office of Strategic Services) into denied territories[1]. Today, despite improved technology and the rise of great power competition, there is still a place for this capability in the ARSOF as it still fosters “eliteness,” and camaraderie, and is an effective assessment and selection tool.

Text:  Since its humble beginnings, airborne operations have played a critical role in U.S. military operations throughout the world. From World War 2 to Vietnam to Grenada to Iraq, paratroopers answered the nation’s call. However, as the face of battle has changed over the last century, so too has the need for delivering large numbers of paratroopers behind enemy lines. As this metamorphosis has taken place, many senior military and civilian decision makers have begun to question the practice of maintaining large standing formations of airborne qualified troops. This practice is called further into question when applied to ARSOF, as their employment is even less probable.  

There are many compelling arguments against keeping special operations soldiers on airborne status such as: money, training time, injuries and lack of practical application. The first, and arguably most discussed is cost – a paratrooper on status is currently paid 150.00 dollars per month for hazardous duty pay. This equates to 1,800.00 dollars per year per soldier. Multiplying that number over a battalion sized element of 800 soldiers equates to 1.44 million dollars per year. If applied to an airborne brigade of 4,500 paratroopers this number swells to 8.1 million dollars. This is just airborne pay to the soldiers – this number does not account for the maintenance and employment of the airframes and equipment utilized to conduct airborne operations. 

Another argument often made pertains to training time required to maintain currency. On average it takes, conservatively, anywhere between four and twelve hours to conduct an airborne operation depending on the number of personnel, type of aircraft and weather conditions. In order to maintain currency, by regulation, a paratrooper must jump four times per calendar year. This is time that could arguably be used for other training that promotes soldier and unit readiness. 

Finally, jumping out of airplanes is a hazardous endeavor, which often leads to a litany of injuries – back, knees, hip, ankle, and head, just to name a few. Injuries of this nature directly impact readiness either temporarily (soldier gets injured, recovers and returns to duty) or permanently (soldier gets injured, cannot make a full recovery and is in turn discharged from the Army altogether).  

So why should ARSOF maintain airborne status? 

Although all of the above are legitimate and justifiable arguments as to why airborne forces should become a thing of the past, there are a multitude of reasons to maintain airborne status in both conventional and ARSOF units such as: elitism, camaraderie, and assessment and selection. One of the most important is elitism. Although in many circumstances elitism is construed in a negative light, when applied to elite military units, this is not the case. According to the Cambridge Dictionary, elitism is defined as “the belief that some things are only for a few people who have special qualities or abilities [2].”  By definition, being a paratrooper is being one of the elite in the Army. Elitism promotes esprit de corps, and esprit de corps promotes the good order, confidence and discipline required in military units to fight and win in battle. 

Another intangible that is invaluable in military formations is camaraderie. As counterintuitive as it may sound, engaging in activities that are life threatening forges a bond between soldiers that simply cannot be replicated anywhere else – jumping out of airplanes is one such activity. Soldiers put their lives in one another’s hands on a daily basis. As such, it is imperative that they trust one another implicitly – that they have a tight bond. Airborne units forge and promote that bond as it pays tremendous dividends in stressful situations such as combat. 

Finally, in order to become a paratrooper, a soldier must volunteer for airborne school. For ARSOF, airborne school serves as a form of early assessment and selection. It is not uncommon for ARSOF soldiers to face danger and be uncomfortable. In fact, this facing of danger is more often than not a common occurrence. As all ARSOF units are airborne units, if a solider is unable or unwilling to jump out of airplanes, they are probably not the right fit for special operations.   

Throughout United States history, airborne forces have played a key role in the nation’s defense. However, for various reasons, over the past two decades, airborne units were scaled back, hence decreasing the number of paratroopers on airborne status. Although understandable in an age of shrinking military budgets and increasing technologies, there is still a place for the airborne as it is an elite force providing both the tangibles and the intangibles necessary to fight and win the nation’s wars. Airborne! 


Endnotes:

[1] The Office of Strategic Services or OSS was a wartime intelligence agency of the United States during WWII. It was the predecessor of both the Central Intelligence Agency (CIA) and the Army Special Forces (Green Berets). The organization was disbanded at the conclusion of WWII.  

[2] Cambridge Dictionary. Retrieved August 26, 2021 from: https://dictionary.cambridge.org/us/dictionary/english/eltism

  

Assessment Papers Force Delivery Methods Special Operations Stuart E. Gallagher U.S. Army

Assessing Australia’s Cyber-Attack Attribution Issues


Jackson Calder is the Founder and CEO of JC Ltd., a futures modeling firm specialising in geopolitical risk advisory based in New Zealand, and holds a Masters of Strategic Studies from Victoria University of Wellington.  Divergent Optionscontent does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Australia’s Cyber-Attack Attribution Issues

Date Originally Written:  August 11, 2021.

Date Originally Published:  September 27, 2021.

Author and / or Article Point of View:  The author believes that without more proactive and novel thinking by decision makers, strategic competition in the grey-zone is likely to continue to outpace meaningful policy responses.

Summary:  Recent years have proven that China can prevail over Australia in the threshold below war, particularly through cyber-attacks that go without attribution. Without building trust between agencies, implementing the right training and education, and properly conceptualizing cyber warfare to bolster political will, Canberra will not strengthen attribution capabilities and achieve greater strategic agility in the cyber domain.

Text:  Making an official attribution of a cyber-attack is one of the key techno-political challenges faced by governments today. Using China-Australia tensions as a case study, one can analyse how capability gaps, technical expertise, and political will all play a role in shaping attribution and assess how one state prevails over another in the grey-zone of conflict below the threshold of war. Thus far Australia has favoured freeriding upon its more powerful allies’ attribution capability vis-à-vis China, rather than make attributions of its own[1]. Unless Canberra greatly expands its cyber security and attribution capabilities it will not accrue more agency, independence and, ultimately, strategic agility in this domain.

Over the past three years Australia has been the victim of numerous large-scale cyber campaigns carried out by China, targeting critical infrastructure, political parties, and service providers. While Australian Prime Minister Scott Morrison did state that a “sophisticated state-based actor” perpetrated these attacks, his government has thus far never made a public attribution to China[2]. Senior Australian officials have confirmed to media that they believe China is behind the attacks, raising questions around the lack of attribution[3].

Australia’s situation is representative of a wider strategic environment rife with frequent and sophisticated information operations, with China being a leading perpetrator of offensive cyber -attacks. Chinese hybrid warfare is undoubtedly inspired by Soviet political warfare dating back to the early 1920’s, but is perhaps grounded more in the concept of ‘unrestricted warfare’ posited by Liang and Xiangsui in 1999[4]. This concept manifested in the ‘Three Warfares’ doctrine of the early 2000’s, with offensive cyber operations being used as a key strategic tool since the PLA formed their Informatization Department in 2011[5]. Though described as ‘kinder weapons’, their ability to ‘strike at the enemy’s nerve center directly’ has indeed produced kinetic effects in recent years when used to sabotage critical infrastructure[6]. Whilst it is widely accepted that China is responsible for large-scale cyber operations, proving this can be a monumental task by virtue of cyber forensics being technically intensive and time-consuming.

In 2014, Thomas Rid and Ben Buchanan captured the nuance of cyber attribution excellently when they stated that ‘attribution is an art: no purely technical routine, simple or complex, can formalise, calculate, quantify, or fully automate attribution[7].’ While the art statement is true, technical routines exists to build attribution capability upon, and this is the crux of China’s prevailing over Australia in recent years. Canberra’s ‘freeriding’ on capabilities outside of the government and lack of streamlined inter-agency processes and accountability has severely limited their effectiveness in the cyber domain[8]. Attempts to remedy this have been made over the past two decades, with a number of agencies agreeing to communicate more and share responsibility for bringing an attribution forward, but they have been hamstrung by endemic underinvestment. Consequently, Australia’s response to a greatly increased threat profile in the cyber domain ‘has been slow and fragmented, thus ‘Australia’s play-book is not blank but it looks very different from those of pace-setter countries[9].’ 

Improving the speed and integrity of an attribution begins with ensuring that cyber security practitioners are not over-specialised in training and education. Though it may seem counterintuitive, evidence suggests that the most effective practitioners utilise general-purpose software tools more than others[10]. This means that organisational investment into specialised cyber security tools will not translate directly into improved capability without also establishing a training and work environment that pursues pragmatism over convoluted hyper-specialisation.

Attribution is less likely when there are low levels of trust between the government and civilian organisations involved in cyber security as this does not foster an operational environment conducive to the maturing of inter-agency responses. Trust is particularly important in Australia’s case in the relationship between more centralised intelligence agencies like the national Computer Emergency Response Team (CERT) based out of the Australian Cyber Security Centre and the civilian-run AusCERT. In 2017, Frank Smith and Graham Ingram addressed trust poignantly in stating that ‘the CERT community appears to have lacked the authority and funding needed to institutionalise trust – and thus depersonalise or professionalise it – enough to grow at scale[11].’ Trust between organisations, as well as between practitioners and the technology available to them, underpin the development of a robust and timely cyber security capability[12]. Without robust information sharing and clear lanes of responsibility failure will occur.

Attribution requires political will but competition in the cyber domain remains somewhat nebulous in its strategic conceptualisation, which constrains meaningful responses. If cyber war remains undefined, how do we know if we are in one or not[13]? Conceptualisation of the grey-zone as on the periphery of power competition, instead of at the centre of power competition itself, similarly confuses response thresholds and dampens political will. In 2016, James K. Wither stated that although information operations are non-kinetic, ‘the aim of their use remains Clausewitzian, that is to compel an opponent to bend to China’s will[14].’ Wither develops this point, arguing that within a rivalry dynamic where an ideological battle is also present, revisionist states wage hybrid warfare against the West ‘where, to reverse Clausewitz, peace is essentially a continuation of war by other means[15].’ Adopting this mindset is key to building political will, thus improving attribution external to technical capability. 

Finally, it is best to acknowledge Australia’s geopolitical environment may make attribution a less preferable course of action, even if a robust case is made. Foreign Minister Payne has stated that Australia ‘publicly attributes cyber incidents’ only ‘when it is in our interest to do so[16].’ Until attribution is tied to concrete consequences for the perpetrator, Canberra’s strategic calculus is likely to weigh potential Chinese economic and diplomatic retaliation as heavier than any potential benefits of making an official attribution. Nevertheless, it creates more options if Canberra possesses rapid and robust attribution capabilities, combined with political will to use them, to compete more effectively under the threshold of war.       


Endnotes:

[1] Chiacu, D., & Holland, S. (2021, July 19). U.S. and allies accuse China of global hacking spree. Retrieved from https://www.reuters.com/technology/us-allies-accuse-china-global-cyber-hacking-campaign-2021-07-19/

[2] Packham, C. (2020, June 18). Australia sees China as main suspect in state-based cyberattacks, sources say. Retrieved from https://www.reuters.com/article/us-australia-cyber-idUSKBN23P3T5

[3] Greene, A. (2021, March 17). China suspected of cyber attack on WA Parliament during state election. Retrieved from https://www.abc.net.au/news/2021-03-17/wa-parliament-targeted-cyber-attack/13253926

[4] Liang, Q., & Xiangsui, W. (1999). Unrestricted warfare. Beijing, CN: PLA Literature and Arts Publishing House Arts. https://www.c4i.org/unrestricted.pdf

[5] Raska, M. (2015). Hybrid Warfare with Chinese Characteristics. (RSIS Commentaries, No. 262). RSIS Commentaries. Singapore: Nanyang Technological University. https://hdl.handle.net/10356/82086 p.1.

[6] Liang, Q., & Xiangsui, W. (1999). Unrestricted warfare. Beijing, CN: PLA Literature and Arts Publishing House Arts. https://www.c4i.org/unrestricted.pdf p.27.

[7] Rid, T., & Buchanan, B. (2014). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1-2), 4-37. doi:10.1080/01402390.2014.977382 p.27.

[8] Smith, F., & Ingram, G. (2017). Organising cyber security in Australia and beyond. Australian Journal of International Affairs, 71(6), 642-660. doi:10.1080/10357718.2017.1320972 p.10.

[9] Joiner, K. F. (2017). How Australia can catch up to U.S. cyber resilience by understanding that cyber survivability test and evaluation drives defense investment. Information Security Journal: A Global Perspective, 26(2), 74-84. doi:10.1080/19393555.2017.1293198 p.1.

[10] Mcclain, J., Silva, A., Emmanuel, G., Anderson, B., Nauer, K., Abbott, R., & Forsythe, C. (2015). Human Performance Factors in Cyber Security Forensic Analysis. Procedia Manufacturing, 3, 5301-5307. doi:10.1016/j.promfg.2015.07.621 p.5306.

[11] Smith, F., & Ingram, G. (2017). Organising cyber security in Australia and beyond. Australian Journal of International Affairs, 71(6), 642-660. doi:10.1080/10357718.2017.1320972 p.14.

[12] Robinson, M., Jones, K., & Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers & Security. 49. 70-94. 10.1016/j.cose.2014.11.007. p.48.

[13] Ibid, p.12.

[14] Wither, J. K. (2016). Making Sense of Hybrid Warfare. Connections: The Quarterly Journal, 15(2), 73-87. doi:10.11610/connections.15.2.06 p.78.

[15] Ibid, p.79.

[16] Payne, M. (2018, December 21). Attribution of Chinese cyber-enabled commercial intellectual property theft. Retrieved from https://www.foreignminister.gov.au/minister/marise-payne/media-release/attribution-chinese-cyber-enabled-commercial-intellectual-property-theft

Assessment Papers Australia Below Established Threshold Activities (BETA) Cyberspace Jackson Calder

Assessing the Alignment of U.S. Diplomatic and Military Power to Forestall Armed Conflict

Michael D. Purzycki is an analyst, writer, and editor based in Arlington, Virginia. He has worked for the United States Marine Corps, the Department of the Navy, and the United States Army. In addition to Divergent Options, he has been published in Charged Affairs, Merion West, the Center for International Maritime Security, the Washington Monthly, Braver Angels, France 24, the Truman National Security Project, and Arc Digital. He can be found on Twitter at @MDPurzycki, and on Medium at https://mdpurzycki.medium.com/.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title: Assessing the Alignment of U.S. Diplomatic and Military Power to Forestall Armed Conflict

Date Originally Written:  August 12, 2021.

Date Originally Published:  September 20, 2021.

Author and / or Article Point of View:  The author believes an expansion of the Department of State’s Foreign Service, and closer alignment of the efforts of the Departments of State and Defense, can help the United States forestall international conflicts before they turn violent, and give the U.S. military time to modernize and prepare for future conflicts.

Summary:  Regardless of whether the U.S. maintains its military edge, unless it invests in other forms of national power, armed conflict is very likely.  Without closer alignment between the Department of State and Department of Defense, on a long enough timeline, unnecessary wars will occur.

Text:  The United States has the world’s most powerful military. The U.S. military’s budget ($778 billion in 2020, compared to $252 billion for second-largest-spender China)[1], its global reach, and the skills of its personnel[2], are unmatched. Twenty-first century conflict, however, will not always require conventional military strength to win.  While there are steps the U.S. military can take to prepare, civilian power can help forestall conflict in the meantime.

The Foreign Service includes approximately 8,000 Foreign Service Officers (FSOs)[3]. Past FSOs have included some of America’s most renowned diplomats. Perhaps most famously, George Kennan, stationed in the U.S. embassy in Moscow, was one of the first observers to comprehensively analyze the Soviet threat to post-World War II peace. His 1946 “Long Telegram[4]” and 1947 “X-Article[5]” were key in forming the basis for the U.S. policy of containment throughout the Cold War.

Later FSOs perceptively analyzed the weaknesses of U.S. foreign policy. Richard Holbrooke, who would later negotiate the Dayton Accords ending the Bosnian War, began his diplomatic career as an FSO in South Vietnam, where he was skeptical that U.S. support could save the regime in Saigon[6]. In 1971, when Pakistani forces began to commit genocide during the Bangladesh War of Independence[7], FSO Archer Blood warned Washington of the massacres the American-supported Pakistani military was carrying out[8].

A large increase in the number of FSOs could give the U.S. many more diplomatic eyes and ears in potential conflict zones. More FSOs could increase the chance of the U.S. brokering peace deals between warring parties, or of better judging early on whether a conflict is one the U.S. military should stay out of. Early involvement by diplomats could preempt later involvement by troops.

Even with a much larger Foreign Service, there is still a chance the U.S. will be drawn into conflict. The foreign policy goals of Russia and China, powers not content to live in a U.S.-dominated international system, may overwhelm attempts to keep the peace. Nonetheless, an investment in diplomatic power, in building relationships with other countries’ leaders and policymakers, could pay off in the form of wars avoided.

Closer collaboration between the diplomatic and military arms of U.S. power would also have benefits. Even if the U.S. chooses to have a less militarized foreign policy, reducing the military’s absolute strength need not be the solution. Ensuring that diplomats and military commanders work closely together, and making clear that U.S. policymakers do not inherently favor one over the other, could increase the relative strength of civilian power without weakening the military. 

Both the Department of State (DoS) and the Department of Defense (DoD) divide the world into six regions (see first map below) for their operations[9]. DoS activities in each region are directed by an assistant secretary, while each DOD regional combatant command is headed by a four-star general or admiral. Additionally, the world’s oceans are divided among the U.S. Navy’s numbered fleets, some of whose boundaries correspond to those of the combatant commands (see second map below)[10]. However, DoS and DoD regions are not always aligned with each other. Aligning them, by shifting countries between regions, could better integrate civilian and military power.

 

For example, of the countries in DoS’ Bureau of South and Central Asian Affairs (SCAA), those with coastlines are in DoD’s U.S. Indo-Pacific Command (USINDOPACOM) and the U.S. Navy’s 7th Fleet – except for Pakistan in U.S. Central Command (USCENTCOM), whose coast is under the 5th Fleet. Meanwhile, the Navy has discussed bringing back its deactivated 1st Fleet and giving it responsibility for part of the Indian Ocean[11].

Suppose 1st Fleet were established under the aegis of USINDOPACOM (as 7th Fleet currently is), and were to align with the coasts of the SCAA countries. Pakistan could move from USCENTCOM to USINDOPACOM, and from the 5th to the 1st Fleet. When DoS officials needed to work closely with DoD officials with regard to, for example, India and Pakistan — two nuclear-armed states with a rivalry dating back to their creation in 1947 — there would be one combatant commander and one Navy flag officer for them to communicate with, not two of each.

Similarly, Algeria, Libya, Morocco, and Tunisia could be moved from U.S. Africa Command (USAFRICOM) to USCENTCOM, which already includes Egypt. This would align the DoS and DoD maps of North Africa as all five North African countries are currently in DoS’ Bureau of Near Eastern Affairs. Egypt, a long-time ally of the U.S. and a recipient of more than $1 billion in U.S. military aid annually[12], has taken sides in such events as the recent civil war in Libya[13] and domestic political turmoil in Tunisia[14]. If the U.S. wanted to leverage its relationship with Egypt to resolve conflicts in North Africa, it could benefit from such overlap between DoS and DoD.

Changes like these will be limited in what they can accomplish. For example, if part of the Indian Ocean is allocated to 1st Fleet, the southern boundary of the fleet’s waters will still have to be drawn. Furthermore, USINDOPACOM is already geographically large, and already includes three of the world’s four most populous countries: China, India, and Indonesia[15]. Adding Pakistan, the fifth most populous country [16], could stretch its burdens beyond the ability of its officers to manage them. Nevertheless, if this or similar changes increase collaboration between DoS and DoD, enabling the U.S. to better manage crises and avoid deployments of U.S. forces to conflict zones, they are worthy of consideration.

With the American public weary of extended overseas military deployments, and U.S. President Joseph Biden seeking to maintain America’s global power status without straining financial and military resources, a larger Foreign Service and a DoS in sync with DoD are worth discussing.


Endnotes:

[1] Statista. “Countries with the highest military spending worldwide in 2020.” https://www.statista.com/statistics/262742/countries-with-the-highest-military-spending/

[2] Greer, Col. Jim, U.S. Army (Ret.). “Training: The Foundation for Success in Combat.” Heritage Foundation, October 4, 2018. https://www.heritage.org/military-strength-topical-essays/2019-essays/training-the-foundation-success-combat

[3] Nutter, Julie. “The Foreign Service by the Numbers.” Foreign Service Journal, January/February 2020. https://afsa.org/foreign-service-numbers

[4] Wilson Center. “George Kennan’s ‘Long Telegram.’” February 22, 1946. https://digitalarchive.wilsoncenter.org/document/116178.pdf

[5] Office of the Historian, U.S. Department of State. “Kennan and Containment, 1947.” https://history.state.gov/milestones/1945-1952/kennan

[6] Isaacson, Walter. “Richard Holbrooke, the Last Great Freewheeling Diplomat.” New York Times, May 9, 2019. https://www.nytimes.com/2019/05/09/books/review/george-packer-our-man-richard-holbrooke-biography.html

[7] Boissoneault, Lorraine. “The Genocide the U.S. Can’t Remember, But Bangladesh Can’t Forget.” Smithsonian Magazine, December 16, 2016. https://www.smithsonianmag.com/history/genocide-us-cant-remember-bangladesh-cant-forget-180961490/

[8] Barry, Ellen. “To U.S. in ’70s, a Dissenting Diplomat. To Bangladesh, ‘a True Friend.’” New York Times, June 27, 2016. https://www.nytimes.com/2016/06/28/world/asia/bangladesh-archer-blood-cable.html

[9] “Joint Guide for Interagency Doctrine.” Joint Chiefs of Staff, November 4, 2019. https://www.jcs.mil/Portals/36/Documents/Doctrine/Interorganizational_Documents/jg_ia.pdf?ver=2020-02-03-151039-500

[10] “USN Fleets (2009).” Wikimedia Commons. https://commons.wikimedia.org/wiki/File:USN_Fleets_(2009).png

[11] Eckstein, Megan. “SECNAV Braithwaite Calls for New U.S. 1st Fleet Near Indian, Pacific Oceans.” USNI News, November 17, 2020. https://news.usni.org/2020/11/17/secnav-braithwaite-calls-for-new-u-s-1st-fleet-near-indian-pacific-oceans

[12] Project on Middle East Democracy. “Fact Sheet – U.S. Military Assistance to Egypt: Separating Fact from Fiction.” July 2020. https://pomed.org/fact-sheet-u-s-military-assistance-to-egypt-separating-fact-from-fiction/

[13] Harchaoui, Jalel. “The Pendulum: How Russia Sways Its Way to More Influence in Libya.” War on the Rocks, January 7, 2021. https://warontherocks.com/2021/01/the-pendulum-how-russia-sways-its-way-to-more-influence-in-libya/

[14] Saied, Mohamed. “Cairo backs Tunisian president’s actions against Brotherhood.” Al-Monitor, August 10, 2021. https://www.al-monitor.com/originals/2021/08/cairo-backs-tunisian-presidents-actions-against-brotherhood

[15] “Population, total.” World Bank. https://data.worldbank.org/indicator/SP.POP.TOTL?most_recent_value_desc=true

[16] Ibid

Assessment Papers Defense and Military Reform Diplomacy Governing Documents and Ideas Major Regional Contingency Michael D. Purzycki United States

Assessing Shortcomings of the U.S. Approach for Addressing Conflict Below the Threshold of War

Joe McGiffin has served in the United States Army for seven years. He is currently pursuing a M.A. in International Relations prior to teaching Defense and Strategic Studies at the United States Military Academy at West Point. He can be found on Twitter @JoeMcGiffin. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Shortcomings of the U.S. Approach for Addressing Conflict Below the Threshold of War.

Date Originally Written:  August 13, 2021.

Date Originally Published:  September 6, 2021.

Author and / or Article Point of View: The author is an active-duty service member. This article is written from the point of view of the U.S. toward the anticipated operating environment of the next thirty years.

Summary:  The current U.S. national security approach is not suitable for addressing threats below the threshold of war. This approach focuses on achieving security through military superiority.  A more effective approach would achieve national security objectives derived from an analysis of geopolitical trends. This new approach will allow for more unified, synergistic use of national resources in the defense of U.S. interests.

Text:  By its own estimate, the United States is losing global influence as a result of strategic atrophy, permitting other actors the freedom to reshape the weakening world order through “all-of-nation long-term strategy[1].”  However, myopia, not atrophy, has eroded U.S. advantages. A new approach, one that can frame its national security problems within the changing geopolitical context, will result in a more resilient and agile security strategy.

The current U.S. approach is a dangerous misinterpretation of the Revolution in Military Affairs (RMA) theory that originated from Soviet observations of the United States’ Second Offset Strategy which ended the Cold War[2]. Nuclear weapons created a conflict threshold, which neither power would cross, and spurred a race to tactical dominance in conflict below that level. Between their own success and the proliferation of assets which promised dominant battlefield knowledge, maneuver, and precision[3], the United States concluded that military supremacy was synonymous with national security. Though the defense community rebrands it as a new concept every decade (i.e., Transformation and Defense Innovative Initiative), the intellectual underpinnings do not change[4].

While RMA theory is appealing, history proves two points: that superior weaponry rarely equates directly to a strategic advantage; and that overemphasis on such advances disregards other critical factors of national security[5]. While military advancements have had profound impacts on the rise and fall of global powers in the past, those innovations were seldom developed in isolation from revolutionary change in society or culture[6]. For example, it was the socioeconomic isolation of the East and West that created the conditions for an arms race to determine the victor of the Cold War, not the weapons themselves. Near-exclusive focus on the military aspect of national security has left the United States committed to the pursuit of tactical superiority at the expense of strategic flexibility.

The Third Offset Strategy (3OS) and F-35 Joint Strike Fighter Program both illustrate this issue. The 3OS hinges entirely on having a technological advantage to negate adversary Anti-Access/Area Denial Operations: industrial espionage or an adversary’s own disruptive innovations could plausibly neutralize the 3OS rapidly enough to significantly disrupt U.S. foreign policy[7]. The F-35, for its part, demonstrates another issue. While the apex of air power for now, it came at exorbitant cost and will continue to be a resource strain on the U.S. defense budget[8]. Furthermore, whether or not the F-35 was worth the price is an important question with implications for future strategy. While military supremacy has continued to fill a pivotal role in deterring war between major actors, it is not a fungible advantage; that is, military innovations can be used only in military conflicts or to deter them. While the F-35 may be the best fighter available, it is important to consider what measurable security advantages it has or has not achieved for the United States and its other investors.

Today’s environment requires the United States to adopt a more inclusive framework for achieving security goals. Instead of focusing resources into a single element of power (i.e., the military), it could use a more comprehensive approach grounded in geopolitical analysis. Instead of preparing for future war, it could focus on the threats posed by the present: subversive tactics and strategic maneuvers by aggressors deliberately avoiding the overt use of military force. The new paradigm would strive for synergy across as many public and private stakeholders as possible in order to achieve a unified effort to secure national interests.

As an example, use of space assets, because of their extreme expense, has only been possible through close cooperation of the private and public sector. Co-usage of platforms between the military, government, and private sector continues to be a hallmark of this domain[9]. That synergistic use of resources to achieve specific goals, if applied to national security means across the other domains, will offer far more flexibility and resiliency than strict reliance on what military power can achieve.

While conventional war is the purview of the military, conflict below that threshold is far more calculated and nuanced. In order to retain its position of power and influence in the future, the United States will be required to synchronize its national resources in pursuit of security goals within the greater geopolitical context. The RMA-inspired Cold War paradigm will be supplanted by one with renewed emphasis on operating environment variables instead of arbitrary strategic means.


Endnotes:

[1] United States Department of Defense (2018). Summary of the 2018 National Defense Strategy of the United States of America (NDS 2018). https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf United States Department of Defense. See also; Biden, J. (2021). Interim National Security Strategic Guidance. The White House. https://www.whitehouse.gov/wp-content/uploads/2021/03/NSC-1v2.pdf.  

[2] Beier, J.M. (2006). Outsmarting Technologies: Rhetoric, Revolutions in Military Affairs, and the Social Depth of Warfare. International Politics, 43(2), 266-280. DOI:10.1057/palgrave.ip.8800144. See also; Louth, J. & Taylor T. (2016) The US Third Offset Strategy. The RUSI Journal, 161(3), 66-71. DOI: 10.1080/03071847.2016.1193360

[3] Mowthorpe, M. (2005). The Revolution in Military Affairs (RMA): The United States, Russian and Chinese Views. The Journal of Social, Political, and Economic Studies, 30(2), 137-153.

[4] Jensen, B.M. (2018). The Role of Ideas in Defense Planning: Revisiting the Revolution in Military Affairs, Defence Studies, 18(3), 302-317. DOI: 10.1080/14702436.2018.1497928

[5 Gray, C.S. (2003). Strategy for Chaos: Revolutions in Military Affairs and the Evidence of History. Routledge.

[6] Murray, W. (1997). Thinking About Revolutions in Military Affairs. Joint Forces Quarterly, unk. https://apps.dtic.mil/sti/pdfs/ADA354177.pdf

[7] Wellman, A. (2019). Parity Avoidance: A Proactive Analysis of the Obsolescence of the Third Offset Strategy. Homeland Security Affairs. https://www.hsaj.org/articles/15337 

[8] United States Government Accountability Office (2021). F-35 Sustainment: DOD Needs to Cut Billions in Estimated Costs to Achieve Affordability. Report to the Committee on Armed Services, House of Representatives. https://www.gao.gov/products/gao-21-505t 

[9] Madry, S. (2020). Disruptive Space Technologies and Innovations: The Next Chapter. Springer Nature.

 

Assessment Papers Below Established Threshold Activities (BETA) Defense and Military Reform Governing Documents and Ideas Joe McGiffin United States

An Assessment of Capability Gaps that Contribute to Fighting Below the Threshold of War

Shri is from India. The views expressed and suggestions made in the article are solely of the author in his personal capacity and do not have any official endorsement. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Capability Gaps that Contribute to Fighting Below the Threshold of War

Date Originally Written:  August 9, 2021.

Date Originally Published:  August 30, 2021.

Author and / or Article Point of View:  The article analyses a current situation playing out in a very important part of the world which is a nuclear flashpoint as well.  While the reader can likely guess which countries the author is referring to, indirect references are used to appeal to the audiences living this situation day-to-day.

Summary:  Fighting below the threshold of war happens only due to inadequacies of the stronger power.  These inadequacies may be based in law, policy, doctrine, political preferences, and corruption.  Unless these inadequacies are addressed, stronger powers will dilute their true combat capability by acting as police forces either locally, regionally, or globally.

Text:  The countries of IN and PK have over seven decades of animosity between them. In the 1970s, PK was comprehensively defeated during a war with IN and in the process, lost almost half of its territory. Thereafter, based on experience PK gained as Country UA’s proxy in the fight against Country RU in Country AF, PK realised in its fight against IN, direct war is not the way ahead.  This realisation started something different in which PK waged a conflict below the threshold of war against Country IN by simply harboring, arming, and supporting terrorists. PK, where the military is the de-facto ruler, acts as a client state of Country CN, another adversary of IN, and all three possess nuclear weapons.

It is now three decades since PK began to carry out nefarious activities against IN. In other words, PK prevails over IN below the threshold of war and keeps IN tied down through a low cost and low risk method. This success is despite the fact that IN is larger than PK in every possible metric – economy, territory, armed forces, population etc. PK is taking advantage of some inherent weaknesses and capability gaps of IN and is prevailing.

IN’s capability gaps begin with it still believing in outdated definitions of war, and therefore believing that only armed forces fight wars, and is waiting for PK’s Armed Forces to start one. PK is not obliging IN, knowing well that PK cannot win. IN, not wanting to be labeled as an aggressor, is not waging war on PK, little realizing that IN has been under attack for many decades. A doctrinal change by IN could perhaps settle matters regarding what constitutes aggression and what will be IN’s response. This doctrinal change would amply warn PK and, if PK did not change its behavior, the change would give IN the required casus belli. Threshold of war is not something that has been defined by nature as each country decides according to each unique circumstance. In 1914, assassination of a sovereign led to the First World War[1]. Without an adjustment to current below threshold realities, IN will not get the better of PK. 

IN’s armed forces have been engaged in counterinsurgency operations against PK sponsored terrorists for several decades. This fight without end continues due to an undefined military end-state. The armed forces of a country is it’s last resort and therefore it should not be distracted from it’s main role of war-fighting.  PK understands this well and therefore does everything possible to tie down IN’s armed forces in operations below the threshold of war, which are essentially policing duties. Establishing an end state allowing the military to exit counterinsurgency operations and return to preparing for war is perhaps the only thing that will deter PK from continuing what it does below the threshold of war. Many in IN’s armed forces talk about the United States’ two decade long engagement in Afghanistan to justify IN’s continued presence in counterinsurgency operations. It is worth noting that the United States sent in its armed forces to Afghanistan because its police, perhaps as potent as some armies, have no global mandate. Moreover, while the US always had the luxury of pulling out, as it subsequently did[2], IN doesn’t.

IN is also ineffective below the threshold of war because fighting below the threshold is a comfortable place to be in- no national mobilization, limited death and destruction, life and fighting goes on hand in hand. There would always be many interest groups apart from the IN Armed Forces that have a stake in the fight. While the IN Armed Forces get brass, budget allocations, and a disproportionate say in matters otherwise in the realm of governance, others who benefit include the Military Industrial Complex (about whom U.S. President Eisenhower had warned five decades ago[3]), war contractors and also politicians, most of whom thrive on divisive agendas. History illustrates that whenever a country has resolved to finish a fight, it happened – Sri Lanka being the best example[4]. So next time when any country thinks of finishing the fight, it is good to know who are directly and indirectly benefiting from the fight continuing.

Sun Tzu has said that, “The supreme art of war is to subdue the enemy without fighting.” Present day militaries have wrapped this very thought in many definitions and names to include grey zone warfare, hybrid warfare etc. However, war is war.  PK added its own touch by trying to subdue IN, taking advantage of IN’s inhibitions, and some weaknesses, by fighting, albeit below the threshold of war. Until IN wakes up to PK, and demonstrates that IN is ready for a major war with PK, IN will continue to be stuck in the quagmire of fighting below the threshold of war.


Endnotes:

[1] Greenspan, J. (2014, June 26). The assassination of Archduke Franz Ferdinand. History.com. https://www.history.com/news/the-assassination-of-archduke-franz-ferdinand

[2] The United States Government. (2021, July 8). Remarks by President Biden on the drawdown of U.S. forces in Afghanistan. The White House. https://www.whitehouse.gov/briefing-room/speeches-remarks/2021/07/08/remarks-by-president-biden-on-the-drawdown-of-u-s-forces-in-afghanistan/

[3] Farewell address by President Dwight D. Eisenhower, January 17, 1961; Final TV Talk 1/17/61 (1), Box 38, Speech Series, Papers of Dwight D. Eisenhower as President, 1953-61, Eisenhower Library; National Archives and Records Administration. https://www.eisenhowerlibrary.gov/sites/default/files/research/online-documents/farewell-address/1961-01-17-press-release.pdf

[4] Layton, P. (2015, April 9). How sri lanka won the war. The Diplomat. https://thediplomat.com/2015/04/how-sri-lanka-won-the-war/

Assessment Papers Below Established Threshold Activities (BETA) India Pakistan Shri

Assessing the Effect of the United Kingdom’s Integrated Review on Operations Below the Threshold of War

Bombardinio is the nom de plume of a staff officer who has served in the British armed forces, with operational experience in Northern Ireland, the Balkans, Iraq, and Afghanistan. She presently works for the Ministry of Defence in London where she looks at Defence policy. She has been published in the UK, USA and further afield. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Effect of the United Kingdom’s Integrated Review on Operations Below the Threshold of War

Date Originally Written:  August 10, 2021.

Date Originally Published:  August 23, 2021.

Author and / or Article Point of View:  The author is a serving staff officer in the British military. The author believes in the importance of a well-resourced standing military that underpins defense policy for both national spending plans, international policies, and allied engagements.

Summary:  The United Kingdom government’s decision, articulated in the Integrated Review 2021, to concentrate on operating below the threshold of war, with insufficient resource to also maintain an effective warfighting capability is a folly, formulated without regard either to historical precedent or to the contemporary international scene. In these failings, it risks national and international security and Britain’s global position of influence.

Text:

Speak softly and carry a big stick – you will go far.
Theodore Roosevelt

‘Global Britain in a Competitive Age, the Integrated Review of Security, Defense, Development, and Foreign Policy’ describes the United Kingdom (UK) government’s approach to contemporary international relations[1]. For UK Defense, it marks a de facto move from an emphasis on warfighting to one which privileges operating below the threshold of war. International competition below the threshold of war is neither new nor wholly unwelcome, the UK military have operated in this manner for centuries and this new policy recognizes the need for adaptation to reflect the changing character of warfare. The Integrated Review’s weakness lies in its ignorance of both historical experience and contemporary realities, these lacunae risk both national and international security and Britain’s global position.

The Grey Zone, that nebulous and ill-defined no-man’s land between peace and armed conflict, is fundamental to the nature of war[2]. If war is a continuation of politics by violent means, then military operations in the Grey Zone are part of that political continuum, just short of war. The width of the Zone is variable; while at times a personal affront or assault may form sufficient pretext for war – the War of Jenkin’s Ear (1739-48)[3] – on other occasions it will not – the Salisbury Nerve Agent Attack of 2018[4]. This variability is determined by political appetite informed by strategic balance. Political will is not purely the domain of politicians and statesmen, public opinion can affect the resolve of leaders considering armed conflict as a political tool; conversely, the public can be, and often have been, manipulated to support a resort to armed conflict. Whilst the will to fight provides the motivation for war, this is generally tempered by an analysis of the likelihood of success; in 1739, an eight-year old incident was allowed to presage war because Great Britain was confident of military superiority over Spain, in the 2018 nerve agent attack the advantage lay with the culprit.

The decision to concentrate on operating below the threshold of war will fail without considering the danger of crossing that threshold and understanding that the threshold is not self-determined, that freedom of decision is in the hands of the opposition, which will be making its own contiguous calculations with respect to its options. In 1861, the U.S. Navy seized the British ship ‘Trent’ in international waters and arrested two Confederate emissaries heading for Europe. This event led to the deployment of significant British land forces to Canada and naval units along the American east coast. War was only averted by a rapid apology by the Lincoln administration. While not a deliberate operation below the threshold of war, the Trent Affair is illustrative of the danger posed by military operations in a heightened political environment. Those who decided to risk the ire of the British had miscalculated both the appetite of the UK government to go to war and, more significantly, Britain’s military superiority.

The key to operating below the threshold of war is thus two-fold: understanding the adversary, their policy, strategy, risk calculus and appetite for armed conflict and maintaining sufficient credible military power to deter the adversary from retaliating through a resort to war. The Integrated Review identifies two systemic competitors, Russia and China, making it clear that the United Kingdom will seek to confront these nations below the threshold of war. Much of this confrontation will be done through enhancing the ways in which the UK protects itself and its interests and by engaging internationally in an attempt to persuade other countries that the West is a more attractive partner than either Vladimir Putin’s Russia or Communist China. These activities are relatively benign; the problem for UK Defense is that, despite a significant budget, it has failed to achieve value for money; the changed emphasis must hence be financed by significant cuts to conventional capability and thus deterrent effect[5]. In ‘robbing Peter to pay Paul’, the lightweight UK has chosen to enter a tag-team wrestling match, without its heavyweight partner.

Of course, it could be argued that as part of the North Atlantic Treaty Organization (NATO), the UK retains significant deterrent mass through the Alliance, theoretically this is true – the UK’s activities below the threshold of war are protected by the Treaty – but is that a practical reality[6]? The UK’s strategic decision to confront Russia is a reaction to widespread interference and subversion in Western societies, the perceived aim of which is to weaken and divide political resolve. The problem for the UK is that Russian interference and influence has succeeded in weakening resolve: although limited sanctions have been used by Western nations in response to Putin’s worst excesses, military action has never been in question except in protection of the territorial integrity of NATO nations. If German dependence on Russian gas[7], international tensions caused by Brexit[8], and NATO’s internal disagreements are taken into account, the likelihood of support in reaction to a targeted military strike by Russia begins to look shaky.

Recently, a British destroyer conducting a freedom of navigation mission off the coast of the Crimea was confronted by Russian ships and aircraft and ordered to leave what the Russians define as their territorial waters[9]. Shortly after, Putin threatened that a reoccurrence would be met by weapons against which the Royal Navy would have no defense[10]. If the recent confrontation in the Black Sea were to be repeated, at a time in the near future when the United Kingdom’s conventional deterrent is even more denuded, and a Royal Navy vessel were lost to a Russian hypersonic missile, would NATO nations go to war[11]? Russia may calculate that it has sufficiently eroded the Western will to fight, that outside of alliance borders most allies would be unwilling to enact NATO’s Article V, and that the UK has insufficient credible fighting power to respond, unless by resort to a strategic counterstroke by nuclear or offensive cyber operations, both of which would be irrationally escalatory. In such an instance, the UK would be isolated, her global position weakened, and NATO exposed as a paper tiger. The UK can only avoid this by listening to the wisdom of ages and bolstering her conventional forces, using the other levers of power to stiffen Western resolve, and exercise caution in operating below the threshold of war.


Endnotes:

[1] ‘Global Britain in a Competitive Age’, UK Govt (July 2021). https://www.gov.uk/government/collections/the-integrated-review-2021 

[2] ‘Understanding the Grey Zone’, IISS Blog (April 2019). https://www.iiss.org/blogs/analysis/2019/04/understanding-the-grey-zone

[3] ‘The War of Jenkin’s Ear 1739-48’, Oxford Reference (August 2021). https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100019496 

[4] ’Salisbury poisoning: What did the attack mean for the UK and Russia’, BBC Website (March 2020).  https://www.bbc.co.uk/news/uk-51722301  

[5] ‘UK second biggest defence spender in NATO’, UK Defence Journal (March 2021). https://ukdefencejournal.org.uk/britain-second-biggest-defence-spender-in-nato/

[6] ‘NATO 2030: “A global Alliance for all seasons”, reality or rhetoric?, European Leadership Network (June 2021). https://www.europeanleadershipnetwork.org/commentary/nato-2030-a-global-alliance-for-all-seasons-reality-or-rhetoric/  

[7] ‘Why Nordstream 2 is the world’s most controversial energy project’, The Economist (July 2021). https://www.economist.com/the-economist-explains/2021/07/14/why-nord-stream-2-is-the-worlds-most-controversial-energy-project 

[8] ‘The UK and European Defence: will NATO be enough?, The Foreign Policy Centre (December 2020). https://fpc.org.uk/the-uk-and-european-defence-will-nato-be-enough/ 

[9] ‘British warship deliberately sailed close to Crimea, UK officials say’, The New York Times (24 June 2021).  https://www.nytimes.com/2021/06/24/world/europe/russia-uk-defender-crimea.html  

[10] ‘Putin says Russian Navy can carry out ‘unpreventable strike’ if needed’, Reuters (25 June 2021. https://www.reuters.com/world/europe/putin-says-russian-navy-can-carry-out-unpreventable-strike-if-needed-2021-07-25/

[11] ‘No peace – no war. The future of the Russia-NATO relationship’, European Leadership Network (September 2018. https://www.europeanleadershipnetwork.org/commentary/no-peace-no-war-the-future-of-the-russia-nato-relationship/ 

Assessment Papers Below Established Threshold Activities (BETA) Bombardinio Defense and Military Reform Governing Documents and Ideas United Kingdom

Assessing the April 2021 Conflict Between Tajikistan and Kyrgyzstan and the Impotency of Regional International Organizations

Sarah Martin is the 2021 Eurasia Fellow for Young Professionals in Foreign Policy (YPFP). She is Washington D.C.-based and works in human rights development in Europe and Eurasia. Prior to this, she was a Research Fellow at the Secretariate of the Parliamentary Assembly of the Organization for Security and Cooperation in Europe (OSCE), where she covered the first dimension of political-military affairs. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the April 2021 Conflict Between Tajikistan and Kyrgyzstan and the Impotency of Regional International Organizations

Date Originally Written:  July 15, 2021.

Date Originally Published:  August 9, 2021.

Author and / or Article Point of View:  This article is written from the point of view of someone assessing the value of regional international organizations based on their actions and inactions in relation to the conflicts that occur in their respective regions.

Summary:  Violence between Kyrgyzstan and Tajikistan in April 2021 led to tens of dead, hundreds wounded, and a fractured interstate relationship. Domestic politics headed by an authoritarian in Tajikistan and an ascending authoritarian in Kyrgyzstan exacerbated the situation. International organizations such as the OSCE or the Collective Security Treaty Organization (CSTO) were designed to respond but fails to do so.

Text:  On April 28, 2021, in an exclave between Kyrgyzstan and Tajikistan, a skirmish over the installation of a security camera escalated from throwing stones to employing live ammunition. On the Kyrgyzstan side, approximately 34 people were killed, 132 wounded and more than 800 evacuated, while Tajikistan suffered 15 casualties[1]. On May 1, the countries signed a peace treaty, although, according to political scientist Emil Dzhuraev, it is unlikely relations between the two countries will ever be peaceful[2]. This latest surge of violence ended swiftly and with no intervention from one of the three international organizations to which either country claims membership. This assessment reflects on the conflict itself, and also the weakness of the international organizations that could have made an impact but failed to do so.

Under the Soviet Union, the lines between the Central Asian Republics did not matter, but independence following the end of the Cold War brought out old maps, mandates, and memories, each blurred from time[3]. Such interpretation has left Kyrgyzstan, the smallest of the five Republics, with exclaves of both Uzbekistan and Tajikistan within its southern panhandle. Relations among these ethnic groups and citizenships have been peaceful since the 1990s, though relations have soured in the past decade. Three issues are intensifying relations further — increasingly scarce water; the withdrawal of NATO forces from Afghanistan, with whom Tajikistan borders; and the volatility of the autocratic leaders of all three countries[4].

Sadyr Japarov was recently elected to Kyrgyzstan’s presidency, following the ouster of the previous president by way of coup[5]. He is the fifth president of independent Kyrgyzstan and the fifth to reach that position through revolt. Although not technically an autocrat, Japarov is well on his way to becoming one[6][7]. Notably, he recently amended the constitution to shift powers from Parliament into his hands, and most of his cabinet is staffed by personal friends[8]. On the other side of the border is Emomali Rahmon, who has been in power since Tajikistan’s gained independence in 1991 and is an autocrat[9]. Prior to the outbreak of COVID-19, he had designated Tajikistan’s last independent news site as extremist and had its website blocked within the country[10]. During the initial outbreak of COVID-19 in the spring of 2020, Tajikistan was one of the last countries to admit they had cases of the virus[11]. For both Rahmon and Japarov, a small victorious war in the contested areas would have given them enough points to pursue their political interests. Japarov could use the small war to solidify his new regime; Rahmon to ensure the continuity of his decades-old one.

A flare-up of violence along contentious borders should make for a logical submission to an international organization. After all, conflict management is theoretically a core objective of such a union. Tajikistan and Kyrgyzstan are members to three: the OSCE, the CSTO, and the Shanghai Cooperation Organization (SCO). Each organization maintains a unique approach to internationalism. Each organization uniquely failed to respond to this crisis, and each uniquely demonstrated its waning relevance through inaction.

The OSCE is neither a military alliance like the North Atlantic Treaty Organization (NATO) nor a legislative body like the European Union (EU), but rather a forum for its 57 participating States to convene on matters of the military, environment and economics, and human rights[12]. Despite its amorphous nature, the OSCE is still built with human rights as a foundational tenant. In fact, if the OSCE is known for anything these days, it is for its election monitoring missions. The human rights component of the OSCE has long been a source of ire among some of the participating states—and Tajikistan is one of the louder complainants. In 2020 the organization faced a leadership crisis among key chairmanships of the Secretariat, and Tajikistan played a crucial role in instigating that crisis by blocking nominations[13].

Kyrgyzstan and Tajikistan are also represented in the CSTO, a Russian-built NATO equivalent [14][15], and the SCO, a Chinese-established sort-of EU analogue[16]. Both the CSTO and SCO claim to be alternatives to the Western models[17]: strictly economic and political agreements, respectively, without the hypocrisy inherent within a regime that claims to be based on human rights, as the OSCE’s does. Although one might expect to find it in Central Asia, there is not much competition between Russia, China, or their organizations. There is much speculation as to why there are not more hostilities, but it would not be outlandish to posit their détente is due to mutual competitors in the United States and EU.

April’s outbreak of violence between Kyrgyzstan and Tajikistan demonstrates the impotency of both approaches. Conflict mitigation is supposed to be one of the mandates of the political-military dimension of the OSCE, but it has failed to keep the tenuous peace between Armenia and Azerbaijan, and the Trilateral Contact Group has yet to yield sustainable results between Ukraine, Russia and the so-called Donetsk and Luhansk People’s Republics. Russian Foreign Minister Sergei Lavrov offered the CSTO as a venue of deliberation, but Kyrgyzstan and Tajikistan refused, preferring to, and ultimately coming to, an agreement amongst themselves[18]. China provided statements calling for the peaceful resolution of the conflict but offered no role in facilitating peace[19]. The SCO also had little to say; in fact, members of the SCO met in May and the violence was not even mentioned[20].

The violence between Kyrgyzstan and Tajikistan highlights the clashing of two systems—one that claims it ought to address conflict with human rights as its basis, but ultimately cannot; and another that does not seem particularly interested in trying. Given that none of them, the OSCE, the CSTO or the SCO, were able to provide solutions for a relatively small conflict, they can likely do little in the shadow of larger regional crises, or the modern era’s border-transcending issues: pestilence, war, famine and the climate crisis that will exacerbate all.


Endnotes:

[1] Reuters. (2021, May 1). Kyrgyzstan, Tajikistan agree ceasefire after border clashes. https://www.reuters.com/world/asia-pacific/kyrgyzstan-accuses-tajikistan-amassing-troops-near-border-2021-05-01

[2] Radio Azattyk. (2021, May 7). Kyrgyzstan-Tajikistan Conflict: How to Reconcile and Prevent It in The Future, Expert Opinions (Russian) https://rus.azattyq.org/a/31241010.html

[3] Ayzirek Imanaliyeva. (2021, May 2). Tempers flaring as Kyrgyzstan, Tajikistan come to deadly blows. Eurasianet. https://eurasianet.org/tempers-flaring-as-kyrgyzstan-tajikistan-come-to-deadly-blows

[4] Aliyev, N. (2021, May 25). Russia’s Power Play in Central Asia. The Oxus Society for Central Asian Affairs. https://oxussociety.org/russias-power-play-in-central-asia

[5] Pikulicka-Wilczewska, A. (2021, January 12). Kyrgyzstan’s Sadyr Japarov: From a prison cell to the presidency. Kyrgyzstan News | Al Jazeera. https://www.aljazeera.com/features/2021/1/12/sadyr-japarov-from-a-prison-cell-to-the-presidency

[6] Umarov, T. (2021, May 19). Are There Any Winners of the War on the Kyrgyz-Tajik Border? Carnegie Moscow Center. https://carnegie.ru/commentary/84569

[7] Radio Azattyk. (2021, May 7). Kyrgyzstan-Tajikistan Conflict: How to Reconcile and Prevent It in The Future, Expert Opinions (Russian) https://rus.azattyq.org/a/31241010.html

[8] Eurasianet. (2021, May 5). Kyrgyzstan: President signs new constitution into law. https://eurasianet.org/kyrgyzstan-president-signs-new-constitution-into-law

[9] RFE/RL. (2021, May 26). Tajik Election Sees Autocratic Leader Rahmon Set to Extend Rule. https://www.rferl.org/a/tajikistan-s-autocratic-leader-rahmon-seen-extending-rule-as-voters-head-to-polls/30886412.html

[10] Pannier, B. (2020, July 20). How Tajikistan Blocked Term Extensions for Key OSCE Officials. RadioFreeEurope/RadioLiberty. https://www.rferl.org/a/how-tajikistan-blocked-term-extensions-for-key-osce-officials/30738021.html

[11] Eurasianet. (2020, April 20). Tajikistan says it has no COVID-19, attributes new death to swine flu. https://eurasianet.org/tajikistan-says-it-has-no-covid-19-attributes-new-death-to-swine-flu

[12] Epkenhans, T. (2007). The OSCE’s Dilemma in Central Asia. OSCE Yearbook 2006, 211–222. https://ifsh.de/file-CORE/documents/yearbook/english/06/Epkenhans-en.pdf

[13] Pannier, B. (2020), Tajikistan

[14] Aliyev, N. (2021), Russia

[15] Radio Azattyk. (2021, May 7). Kyrgyzstan-Tajikistan Conflict

[16] BBC News Кыргыз Кызматы (Kyrgyz Service). (2021, May 1). Чек ара жаңжалыбы же агрессиябы? эл аралык эксперттердин пикири (Border conflict or aggression? Opinion of international experts). https://www.bbc.com/kyrgyz/kyrgyzstan-56956928

[17] Wolff, S. (2021, April 28). China: A Challenge or an Opportunity for the OSCE? | SHRM. Security and Human Rights Monitor. https://www.shrmonitor.org/china-a-challenge-or-an-opportunity-for-the-osce-shrm

[18] BBC News Кыргыз Кызматы (Kyrgyz Service)

[19] kaktus.media. (2021, April 30). Китай отреагировал на конфликт на границе Кыргызстана и Таджикистана (China reacted to the conflict on the border of Kyrgyzstan and Tajikistan). https://kaktus.media/doc/437308_kitay_otreagiroval_na_konflikt_na_granice_kyrgyzstana_i_tadjikistana.html

[20] Sheng, Y. (2021, May 12). China, Central Asian countries to strengthen cooperation on Afghan issue, counterterrorism and diversify energy sources. Global Times. https://www.globaltimes.cn/page/202105/1223313.shtml

Assessment Papers Collective Security Treaty Organization (CSTO) Kyrgyzstan Organization for Security and Cooperation in Europe (OSCE) Sarah Martin Tajikistan

Assessing a Situation where the Mission is a Headline

Samir Srivastava is serving in the Indian Armed Forces. The views expressed and suggestions made in the article are solely of the author in his personal capacity and do not have any official endorsement.  Divergent Opinions’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing a Situation where the Mission is a Headline

Date Originally Written:  July 5, 2021.

Date Originally Published:  July 26, 2021.

Author and / or Article Point of View:  The author is serving with the Indian Armed Forces.   The article is written from the point of view of India in its prevailing environment.

Summary:  While headlines in news media describe the outcome of military operations, in this information age, the world could now be heading towards a situation where military operations are the outcome of a desired headline.  In situations like this, goals can be achieved by taking into assured success, the target audience, connectivity in a retaliatory context, verifiability, and deniability.

Text:  When nations fight each other, there will be news media headlines. Through various mediums and platforms, headline(s) will travel to everyone – the belligerents, their allies/supporters and also neutral parties. Conflict will be presented as a series of headlines culminating in one headline that describes the final outcome. Thus, when operations happen, headlines also happen. Yet to be considered is when  an operation  is planned and executed to make a headline happen.

In nation versus nation conflict, the days of large scale wars are certainly not over, but as trends suggest these will be more of an exception rather than rule. The future war in all likelihood will be fought at a level without a formal war declaration and quite localised. The world has seen wars where each side endeavours to prevail upon the adversary’s bodies and materiel, but already greater emphasis is being laid on prevailing upon the enemy’s mind. In that case, a decision will be required regarding what objective is being pursued – attrition, territory or just a headline.

Today, a military operation is more often than not planned at the strategic level and executed at a tactical level. This model is likely to become a norm because if a strategic outcome is achievable through a standalone tactical action, there is no reason to let the fight get bigger and more costly in terms of blood and treasure. The Balakote Airstrike[1] by the Indian Air Force is a case in point. It has been over two years since that strike took place but there is nothing to show a change in Pakistan’s attitude, which continues to harbour terrorists on its soil who would very well be plotting the next strike on India. However, what has endured is the headlines of February 26-28, 2019, which carried different messages for different people and one for Pakistan as well.

Unlike propaganda where a story is made out of nothing, if the mission is to make a headline, then that particular operation will have taken place on ground.  In this context, Headline Selection and Target Selection are two sides of the same coin but the former is the driving force.  Beyond this, success is enhanced by taking into account the probability of success, the target audience, connectivity in a retaliatory context, verifiability and deniability.  

Without assured success, the outcome will be a mismatch between the desired headline and  target selection. Taking an example from movies, in the 1997 film  “Tomorrow Never Dies[2],” the entire plot focuses on  the protagonist, Agent 007,  spoiling antagonist Carver’s scheme of creating headlines to be beamed by his media network. Once a shot is fired or ordnance dropped, there will be a headline and it is best to make sure it is the desired one.

Regarding the target audience, it is not necessary that an event gains the interest of the masses. The recipient population may be receptive, non-receptive or simply indifferent.  A headline focused on  the largest receptive group who can further propagate it has the best chance of success. 

If the operation is carried out in a retaliatory context,  it is best to connect  the enemy action and friendly reaction. For example, while cyber-attacks or economic sanctions may be an apt response to an armed attack, the likelihood of achieving the desired headline is enhanced if there is something connecting the two- action and reaction.

The headline will have much more impact if the event and its effects can be easily verified, preferably by neutral agencies and individuals. A perfect headline would be that which an under resourced freelance journalist can easily report. To that end, targets in inaccessible locations or at places that don’t strike a chord with the intended audience will be of little use. No amount of satellite photos can match one reporter on ground.   

The headline cannot lend itself to any possibility of denial because even a feeble denial can lead to credibility being questioned. It therefore goes without saying that choice of target and mode of attack should be such. During U.S. Operation NEPTUNE SPEAR[3], the raid on Osama bin Laden’s compound in Abbotabad, Pakistan,  the first sliver of publicly available information was a tweet by someone nearby. This tweet could have very well closed any avenue for denial by Pakistan or Al Qaeda.

A well thought out headline can be the start point when planning an operation or even a campaign. This vision of a headline however needs different thinking tempered with a lot of imagination and creativity. Pre-planned headlines, understanding the expertise of journalists and having platforms at the ready can be of value.      

Every field commander, division and above should have some pre-planned headlines to speak of that their organization can create if given the opportunity. These headlines include both national headlines flowing out of the higher commander’s intent, and local headlines that are more focused on the immediate engagement area.

There is benefit to be gained from the expertise of journalists – both Indian and Foreign. Their practical experience will be invaluable when deciding on the correct headline and pinpointing a target audience. Journalists are already seen in war zones and media rooms as reporters, and getting them into the operations room as planners is worthy of consideration.

An array of reporters, platforms amd mediums can be kept ready to carry the desired headline far and wide. Freelance journalists in foreign countries coupled with internet will be a potent combination. In addition, the military’s public information organization cannot succeed in this new reality without restructuring.

Every battle in military history has name of some commander(s) attached to it. Hannibal crossing the Alps, U.S. General George S. Patton’s exploits during Battle of the Bulge, and then Indian Colonel Desmond Hayde in the Battle of Dograi. The day is not far when some field commander will etch his or her name in history fighting the Battle of the Headline or, more apt, the Battle for the Headline.      


Endnotes:

[1] BBC. (2019, February 26). Balakot: Indian air strikes target militants in Pakistan. BBC News. https://www.bbc.com/news/world-asia-47366718.

[2] IMDb.com. (1997, December 19). Tomorrow Never Dies. IMDb. https://www.imdb.com/title/tt0120347.

[3] Olson, P. (2011, August 11). Man Inadvertently Live Tweets Osama Bin Laden Raid. Forbes. https://www.forbes.com/sites/parmyolson/2011/05/02/man-inadvertently-live-tweets-osama-bin-laden-raid.

Assessment Papers India Influence Operations Information and Intelligence Samir Srivastava Social Media

Assessing Agile Gaming: War is Hard, Wargames Don’t Have to Be

Philip S. Bolger-Cortez is a Wargame Director with the LeMay Center for Doctrine Development and Education at the Air University whose previous job was in Agile Gaming at Headquarters Air Force (HAF) A5.  Alexandria Brill is an Agile Gamer with HAF A5.  Divergent Opinions’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessing Agile Gaming: War is Hard, Wargames Don’t Have to Be

Date Originally Written:  June 12, 2021. 

Date Originally Published:  July 12, 2021. 

Author and / or Article Point of View:  The authors are professional wargamers and Agile Gaming practitioners. 

Summary:  With Department of Defense leaders so busy, they can rarely participate in large-scale wargames.  Agile Wargames approach a large problem by taking small bites rather than swallowing the whole elephant.  While a large-scale and highly detailed wargame may be viewed as perfection, perfection can be the enemy of good enough.  A tightly focused Agile Wargame that actually takes place, is superior to a large-scale wargame that can never fit into a schedule.

Text:  The most valuable commodity for any military commander is time. On any given day, a typical flag officer has a wall-to-wall schedule packed with meetings, decisions, more meetings, inspections, presentations, yet more meetings, and precious little time for anything that isn’t scheduled weeks or months in advance. Getting a full day of a general’s time is a Herculean task. Getting a full week is impossible without a signature from a higher ranking general or a congressional mandate. Getting the same amount of time out of field grade officers is not much easier.

Officers still want, and need, wargames. Discussions around large games run by the Air Force[1] have driven discussions in the defense community, in Congress, and at Headquarters Air Force[2][3]. 

Wargames are an essential step for military leaders to ensure confidence in plans, decisions, and concepts. Stakeholders, sponsors, and players agree that wargames can answer certain questions or problem sets. Yet, the average player’s demanding schedule remains an obstacle for participation.

Large wargames can account for the needs of many stakeholders and organizations. In a large game, hundreds of moving pieces compete for attention from many players. In an agile game, the focus is narrower—much of the war is abstracted out into a series of mechanics designed to show how the broader war impacts a narrow slice, without needing to focus on these other parts. Players often face only three to four decisions in a turn, such as where to place resources, what to use for operations, or who should conduct an action. The result is a lower fidelity game—but one easy to play, in only a few hours[4]. Similar fidelity games in the commercial space include Axis & Allies[5], World at War ’85[6], and Thunderbolt Apache Leader[7].

For concept writers looking to develop immature concepts, low fidelity games are helpful. The low time demand and ease of learning means the game can be played multiple times.  This increase in repetition of iterative low fidelity games feeding higher fidelity games in an event series has previously been identified as useful by wargaming grandmaster Matt Caffrey in his work On Wargaming[8]. 

It is the aim of agile games to use time wisely and concisely without sacrificing objectives and outputs. The goal of agile games is to approach any problem by taking small bites rather than swallowing the whole elephant, ideally leading to further concept refinement through either more detailed games, modeling and simulation, or concept writers using game insights to further their writing.

Agile gaming answers questions that are pressing or urgent—not completely, but just enough to set the decision makers in the right direction. Agile gaming requires being comfortable with sacrificing total fidelity to focus on a more playable, approachable game—for many nascent defense concepts, a 70% solution in three hours may be more useful than a 95% solution in a week of gameplay. Compare the commercial games Afrika Korps and Campaign for North Africa—the former is not perfectly realistic, but it is easily teachable and playable in a few hours, compared to the latter, which while more realistic, requires an excessive amount of table space, players, and time[9][10].

In the agile gaming methodology, a series of three or four iterations of the same game or topic may be necessary, with one difference between them. These multiple iterations could allow the gaming team to conduct difference-in-difference analyses. For example, an agile game might give players slightly more resources between iterations would allow for conversation and insights about how priorities change, or how resource allocation decisions are made under certain budgetary conditions[11]. 

To keep games quick and intuitive, agile gaming leverages gaming mechanics from the world of commercial recreational board gaming. The commercial gaming world is both broad and deep—thousands of designers have come up with game mechanics for everything from how to assemble a hamburger[12] to how to outfit an F/A-18 Hornet[13] to how to manufacture a car under the Kanban Just In Time manufacturing system[14].  Leveraging knowledge of these mechanics can shape the effectiveness of an agile game, showing how to translate complex systems to easily learnable game mechanics. 

With games varying in topic, complexity, and required expertise, the ideal agile gaming team will be a small footprint, modular team able to operate independently or with additions from external agencies. A small team allows for quick turns for gaming, while the modularity ensures that the team consults subject matter experts to ensure sufficient fidelity.

Agile gaming is not a perfect solution, more than any other approach to wargaming is—but agile gaming is a way to conduct rapid, iterative games. While agile gaming will not provide conclusive answers to national security problems, it can refine concepts and provide insights on how the US will conduct warfare today and tomorrow, as well as provide valuable stage setting for more detailed wargames.


Endnotes:

[1] Both authors adjudicated a Title 10 USAF game last year

[2] Insinna, V. (2012, April 12). A US Air Force war game shows what the service needs to hold off — or win against — China in 2030. Retrieved from Defense News: https://www.defensenews.com/training-sim/2021/04/12/a-us-air-force-war-game-shows-what-the-service-needs-to-hold-off-or-win-against-china-in-2030

[3] Trevethick, J. (2021, April 12). Today’s F-35As Not Worth Including In High-End War Games According To Air Force General. Retrieved from The Drive: https://www.thedrive.com/the-war-zone/40142/air-force-general-says-current-generation-f-35as-not-worth-including-in-high-end-wargames

[4] Of the more than 15 games the Foxes conducted in 2020, the mean time of a game was below three hours

[5] Harris, L. (1981). Axis & Allies. USA: Milton Bradley.

[6] Tracton, K. (2019). World at War ’85: Storming the Gap. USA: Lock ‘n Load Publishing.

[7] Verssen, D. (2012). Thunderbolt Apache Leader. USA: Dan Verssen Games (DVG)

[8] Caffrey, M. (2019). On Wargaming. Newport, RI: Naval War College Press. Pg. 318

[9] Roberts, C. (1964). Afrika Korps. USA: Avalon Hill, Inc.

[10] Berg, R. (1979) Campaign for North Africa. USA: Simulations Publications, Inc.

[11] Observed by the authors in multiple agile games at HAF A5.

[12] Parkes, M. (2016). Burger Up. Australia: Greenbrier Games.

[13] Verssen, D. (2010). Hornet Leader: Carrier Air Operations. USA: Dan Verssen Games (DVG).

[14] Lacerda, V. (2014). Kanban Driver’s Edition. Stronghold Games.

Alexandria Brill Assessment Papers Georgetown University Wargaming Society (GUWS) Philip S. Bolger-Cortez U.S. Air Force Wargames and Wargaming

Assessing Wargame Effectiveness: Using Natural Language Processing to Evaluate Wargaming Dynamics and Outcomes

Dr. Leah C. Windsor is a Research Associate Professor in the Institute for Intelligent Systems at The University of Memphis.   Dr. Windsor can be found on Twitter @leahcwindsor.  Dr. Susan Allen is an Associate Professor at the University of Mississippi.  Dr. Allen can be found on Twitter at @lady_professor.  Divergent Opinions’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessing Wargame Effectiveness: Using Natural Language Processing to Evaluate Wargaming Dynamics and Outcomes

Date Originally Written:  October 1, 2020.

Date Originally Published:  July 5, 2021.

Author and / or Article Point of View:  The article is written from a neutral point of view to evaluate the conversational dynamics during wargames that are predictive of wargaming outcomes.

Summary:  Group decision-making research, while well-established, is not applied in wargames with a win / lose focus.  The deliberative data within wargaming can yield predictive metrics for game outcomes. Computational text analysis illuminates participant effects, such as status, gender, and experience. Analyzing participants’ language can provide insight into the intra-group and inter-group dynamics that exclude or invite potential solutions. 

Text:  The outcome of wargames reveals who wins and loses – but how do participants and strategists know if this is the optimal outcome from the range of potential outcomes? To understand why groups make particular decisions that lead to success or failure in wargames, the authors focus on the intra-group and inter-group communication that transpires during the wargame itself. The processes of group dynamics influence the outcomes of wargaming exercises, yet little attention is paid to these deliberations. Implicit biases manifest in language and other multimodal signals that influence participants and shape the process of negotiations [1][2]. 

A novel approach to analyzing wargames would include a process that informs the outcome, and models communicative interchanges computationally by examining linguistic features of participants’ deliberations. Participants’ exchanges and deliberations influence the dynamics within and across wargaming exercises and rounds of play. At present, the authors are aware of no computational models of wargaming deliberations exist that assess the intra-group and inter-group deliberations. A wealth of research using computational text-as-data approaches has established that language has predictive power in analyzing attributes like hierarchy, deception, and closeness [3][4][5]. 

Examining group dynamics is essential for understanding military and foreign policy decision-making because such choices are rarely made by individuals, particularly in democracies, but also within the winning coalition in autocracies. Despite the fact that deliberative group dynamics are affected by emotions, pride, status, reputation, and communication failures, these dynamics are seldom studied[6]. Natural language processing (NLP) approaches can help reveal why teams arrive at various outcomes, how power structures evolve and change within groups during deliberations, what patterns of group deliberation emerge across iterations, and how biases, whether implicit or through participant selection, affect the process of deliberations and outcomes. Because the dialogue patterns of participants have not been evaluated using the multimodal methods proposed, the authors anticipate that NLP will provide agenda-setting contributions to both the scientific and DoD communities.

To illustrate this point, the authors analyzed some of the communications from a wargaming exercise, Counter-Da’esh influence operations: Cognitive space narrative simulation insights[7]. Using computational linguistics techniques, the authors analyzed the use of language related to positive emotion over time, by rounds, across teams in this wargaming simulation. NLP can explore several aspects of between-group and within-group communications, as shown in Figure 1. First, NLP can compare the patterns of language between teams that lead to different outcomes, such as which team wins or loses. 

Second, NLP can model the language relationship between teams to understand which team is leading, and which team is following. Lexical entrainment, semantic similarity, and linguistic style-matching all refer to the process of speakers aligning their language as they collaborate and interact more [8][9][10]. This is visible especially in Rounds 2 and 3 where the Red and Blue teams show similar patterns of positive emotion language use, although with different magnitudes. 

Third, this analysis can be approached with more granularity to examine the individual participants within groups, over time, and between rounds, to determine who are the thought leaders, influencers, and idea entrepreneurs with the greatest power of persuasion. Sentiment analysis has been used to explain how leaders use emotionally evocative language to persuade followers, where positive emotion leads to improved public opinion ratings[11].

       Figure 1. Positive emotion by round, over time, and across teams for ICONS wargaming exercise

One of the critiques of wargaming has been that it is not always cross-culturally representative, which may introduce unintended cultural biases that lead to sub-optimal outcomes. Linguistic analysis of wargaming transcripts using cutting edge natural language processing approaches like Bidirectional Encoder Representations from Transformers aka BERT[12] can help reveal how word meanings vary across issue area, culture, and context, and in doing so, provide objective metrics of language and cultural bias. Computational linguistics approaches can help reveal what people mean when they refer to particular concepts, and how this meaning is interpreted differently by other audiences. Figure 2 illustrates this point well: Windsor[13]  plots the use of two semantically related terms, conflict and war, over time between 1900 and 2000 in six different languages. While the use of these terms generally follow similar patterns, they vary in three different ways: over time; by language; and by term. 

In practice, war and conflict can be used interchangeably, but they also demonstrate remarkable differences over time and between languages. This means that when speakers use these terms, listeners may broadly share related interpretations of the words’ meanings, but room for misinterpretation clearly exists. The Sapir-Whorf Hypothesis suggests that language makes different interpretations of the world available based on the structure of language and lexicon available to speakers[14][15]. Using the BERT process on wargaming transcripts can help reveal instances where participants in the wargaming exercise misunderstand each other, and which concepts provide the most ambiguity and need the most clarification. In the field, understanding the opponent is part and parcel of the “winning hearts and minds” strategy. Gaps in cultural and linguistic understanding can create potentially dangerous, and unnecessary, chasms between people in conflict zones[16]. Computational linguistics approaches can help to identify these gaps so that military personnel, strategists, policymakers – and scholars – can better understand the optimal conditions for negotiating mutually beneficial outcomes. 

Figure 2. Trends in Google NGram for “War” and “Conflict” by Language (1900-2018), taken from Windsor (2021)

Theories of group decision-making are becoming more sophisticated as scholars of international relations and foreign policy re-embrace and return to the foundations of behavioral psychology. While Janis[17]  hypothesized about group-think a generation ago, more recently scholars focused on political psychology have highlighted the importance of experience, poly-think, and framing effects for groups[18]. While this research has advanced ideas about the nature of group decision-making, in practice the group dynamics that shape foreign policy decision-making are more opaque. Wargaming exercises prove a unique opportunity for exploring such theories. This approach builds on the extant literature on wargaming[19][20][21], and offers a path forward for advancing the study of wargaming using theoretically-grounded computational social science methods. 


Endnotes:

[1] Greenwald AG, Krieger LH. Implicit Bias: Scientific Foundations. Calif Law Rev. 2006;94: 945–967. doi:10.2307/20439056

[2] Jones HM, Box-Steffensmeier J. Implicit Bias and Why It Matters to the Field of Political Methodology. In: The Political Methodologist [Internet]. 31 Mar 2014 [cited 6 Jun 2018]. Available: https://thepoliticalmethodologist.com/2014/03/31/implicit-bias-and-why-it-matters-to-the-field-of-political-methodology

[3] Hancock JT, Curry LE, Goorha S, Woodworth M. On lying and being lied to: A linguistic analysis of deception in computer-mediated communication. Discourse Process. 2007;45: 1–23.

[4] Gonzales AL, Hancock JT, Pennebaker JW. Language style matching as a predictor of social dynamics in small groups. Commun Res. 2010;37: 3–19.

[5] Pennebaker JW, Chung CK, others. Computerized text analysis of Al-Qaeda transcripts. Content Anal Read. 2008; 453–465.

[6] Lin-Greenberg E, Pauly R, Schneider J. Wargaming for Political Science Research. Available SSRN. 2020.

[7] Linera R, Seese G, Canna S. Counter-Da’esh Influence Operations. May 2016 [cited 10 Jan 2021]. Available: https://nsiteam.com/counter-daesh-influence-operations

[8] Rogan RG. Linguistic style matching in crisis negotiations: a comparative analysis of suicidal and surrender outcomes. J Police Crisis Negot. 2011;11: 20–39.

[9] Taylor PJ, Thomas S. Linguistic Style Matching and Negotiation Outcome. Negot Confl Manag Res. 2008;1: 263–281. doi: https://doi.org/10.1111/j.1750-4716.2008.00016.x

[10] Taylor PJ, Dando CJ, Ormerod TC, Ball LJ, Jenkins MC, Sandham A, et al. Detecting insider threats through language change. Law Hum Behav. 2013;37: 267.

[11] Love G, Windsor L. Populism and Popular Support: Vertical Accountability, Exogenous Events, and Leader Discourse in Venezuela. Polit Res Q. 2017.

[12] Devlin J, Chang M-W, Lee K, Toutanova K. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. ArXiv181004805 Cs. 2019 [cited 20 Sep 2020]. Available: http://arxiv.org/abs/1810.04805

[13] Windsor L. Linguistic and Political Relativity: AI Bias and the Language of Internatioanl Relations. AI Ethics. Routledge; 2021.

[14] Whorf BL. Science and linguistics. Bobbs-Merrill Indianapolis, IN; 1940.

[15] Kay P, Kempton W. What is the Sapir-Whorf hypothesis? Am Anthropol. 1984;86: 65–79.

[16] Morrison T, Conaway WA. Kiss, Bow, Or Shake Hands: The Bestselling Guide to Doing Business in More Than 60 Countries. Adams Media; 2006.

[17] Janis IL. Victims of groupthink: A psychological study of foreign-policy decisions and fiascoes. 1972.

[18] Hermann MG. Foreign policy role orientations and the quality of foreign policy decisions. Role Theory Foreign Policy Anal. 1987; 123–140.

[19] Asal V, Blake EL. Creating simulations for political science education. J Polit Sci Educ. 2006;2: 1–18.

[20] Brynen R. Virtual paradox: how digital war has reinvigorated analogue wargaming. Digit War. 2020; 1–6.

[21] Reddie AW, Goldblum BL, Lakkaraju K, Reinhardt J, Nacht M, Epifanovskaya L. Next-generation wargames. Science. 2018;362: 1362–1364.

Assessment Papers Dr. Leah C. Windsor Dr. Susan Allen Georgetown University Wargaming Society (GUWS) Wargames and Wargaming

Assessing Wargaming in Turkey

M. Fatih BAS is a lecturer in the Department of History at the Turkish Military Academy in Ankara, Turkey.  He is currently pursuing a PhD in modern military history at Gazi University and can be found on Twitter @mefaba.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Wargaming in Turkey

Date Originally Written:  June 7, 2021.

Date Originally Published:  June 21, 2021. 

Author and / or Article Point of View:  The author is a lecturer of military history in the Turkish Military Academy. The author believes that the absence of a wargaming culture in Turkey can be overcome by a close cooperation between the Turkish military and the academia.

Summary:  Wargaming in Turkey has a long history but it has always been confined to military circles. Wargaming was never a civilian hobby or educational tool for academics. Even in the military, wargaming is reserved almost exclusively for staff officers and higher echelons. Civilian-military cooperation to establish a wargaming community will improve the wargaming capacity of Turkish military and academia.

Text:  When the young Prussian Captain Helmuth von Moltke arrived in Istanbul as a military advisor in 1835, he was received by the Ottoman Minister of War Hüsrev Pasha who showed him a wargame kit and asked for his help with the rules. Hüsrev Pasha’s game was almost definitely a copy of Kriegsspiel designed by von Reisswitz the younger[1]. Hüsrev Pasha, being apparently enthusiastic about this new tactical training tool, could never have implemented it in the Ottoman Army at the time. The army was already going through a massive reform and the quality of the officer corps was far from ideal. 

It would take nearly half a century for the Ottoman professional military education to produce officers who would appreciate wargaming as a useful tool for training. Ottoman re-discovery of wargaming came soon after the first large-scale German military mission’s arrival in Istanbul, in 1882. The same year, Senior Captain Ömer Kâmil Efendi translated and published Colonel Verdy du Vernois’s wargame rules, which was the first appearance of wargaming in Turkish military literature[2]. 

During the Ottoman military modernization under German supervision, wargaming entrenched itself in Ottoman military regulations and manuals which were mostly word-by-word translations of the German ones. With the implementation of the so-called application method of the German professional military education, wargaming became an important part of the Army War College curriculum[3]. Meanwhile, the Ottoman Navy seemed not to be interested in wargaming, as the first ever mention of wargames in the Ottoman naval literature appeared in 1916 when Lieutenant Nail Efendi translated and published the wargaming conferences delivered in 1887 by William McCarty Little in the U.S. Naval War College[4]. 

Though the Ottoman Army tried to implement wargaming as a valid training tool, this never went beyond the classroom exercises in the War College, and does not seem to have been adopted by regular officers. Staff rides -another Prussian tradition- are known to have been regularly held with the attendance of staff officers from all ranks but there is no mention of wargames conducted by army headquarters or by the Ottoman Ministry of War. 

Things did not quite change after the proclamation of the Turkish Republic in 1923. But still, the first ever recorded large-scale Turkish wargame was conducted in 1924. The Turkish General Staff, with the attendance of army commanders and President Mustafa Kemal Atatürk, tested various strategies to be employed in case of a joint aggression by Italy and Greece in Western Anatolia and Thrace[5]. In the modern Turkish Army, just like it was the case with its Ottoman predecessor, wargaming was confined to the halls of the War College. Wargaming remained an integral part of staff officer training and army regulations recommended it to staff officers as a useful training tool but the rest of the officer corps remained almost entirely oblivious to wargaming[6]. 

Wargaming habits of the Turkish Army changed very little in the past hundred years. While wargaming solutions developed by the government agencies such as the Presidency of Defense Industries (SSB), government affiliated corporations such as HAVELSAN or private software companies appear regularly in defense news[7], references to wargaming in Turkish military journals and official documents have always been extremely limited. Army field exercises regularly make the headlines of major national news outlets[8] but there is almost no open access information about regular wargaming activities of any branch of the Turkish Armed Forces. Currently, wargaming seems to remain almost exclusively as a training activity for staff officer candidates in the War College which has its own wargaming center in its campus. 

According to current military exercise regulation, each army headquarters of the Turkish Army is required to conduct wargames regularly[9]. Strategic-level political-military wargames seldomly take place and they are widely reported by the media when they do[10]. Also, every operational and tactical level headquarters is required to conduct regular command post exercises which are simulated with various software[11]. Such exercises are held exclusively as a headquarters readiness tests, rather than tactical training exercises. So, it is debatable if these exercises count as wargames. It is safe to assume that the majority of the Turkish officer corps complete their careers without participating in any kind of wargaming activity. 

Despite all its shortcomings, a tradition of professional wargaming exists in Turkey. One cannot say the same about hobby wargaming. Apart from a small minority who mostly play fantasy themed tabletop games, there is no wargaming hobby society known to have ever existed in Turkey. Strategy themed video games have always been popular, but realistic military simulations which can be categorized as wargames are virtually unknown to the Turkish gamers. The main reason for that is the language barrier. The need to digest lengthy rule sets written in English is not an appealing feature for the average Turkish gamer, even for the ones who are interested in military matters. 

Today, wargaming is creating its own academic field and it surely is not entirely a military activity any more[12]. Wargaming societies in academia are known to benefit initially from commercial wargames and hobby wargaming base in their respected countries[13]. The absence of the hobby aspect of wargaming in Turkey, naturally hinders wargaming in academia, and the academics remain mostly unaware of wargaming activities conducted by their colleagues in other countries. 

Developing a wargaming culture in Turkey would definitely be an uphill struggle. But a civilian-military cooperation may overcome this challenge. The current situation in Turkey is quite suitable for civilian-military cooperation in various subjects, and wargaming can be one of them. A jointly established wargaming community would be the first step in developing a wargaming culture that would benefit both the military and the academia. If this community receives adequate support, it would also be an excellent solution for increasing wargaming capabilities of the Turkish Armed Forces. 


Endnotes:

[1] Von Moltke, H. (1969). Moltkenin Türkiye Mektupları. (H. Örs, Translator). İstanbul: Remzi Kitabevi, p. 29.

[2] İhsanoğlu,E. et al. (2004). Osmanlı Askerlik Literatürü Tarihi, I. Cilt. İstanbul: İslam Tarih, Sanat ve Kültür Araştırma Merkezi, p. 195.

[3] İskora, M. M. (1944). Türk Ordusu Kurmaylık (Erkânıharbiye) Tarihçesi. Ankara: Harp Akademisi Matbaası, p. 57.

[4] Kıdemli Yüzbaşı Nail. (1916). “Sevkülceyşî Harb Oyunu Yahud Harita Manevrası”, Risâle-i Mevkute-i Bahriye 2/6, p. 273-288.

[5] Özkurt, F. (2017). Gazi Mustafa Kemal Atatürk ve Askerî Manevra ve Tatbikatlar (1909-1938) Ankara: Genelkurmay Basımevi, p. 71-81.

[6] Mehmed Nihad. (1925). Zabitin Harb Çantası Üçüncü Cüz’ü. İstanbul: Matbaa-i Askerî, p. 183-185. İskora, M. M. (1966). Harp Akademileri Tarihçesi 1846-1965 1inci Cilt. Ankara: Genelkurmay Basımevi, p. 80.

[7] For a piece on HAVELSAN’s Joint Wargame and Education Center see: MSI. (2019, June 11). HAVELSAN Müşterek Harp Oyunu ve Eğitim Merkezi. Retrieved June 5, 2021, from https://www.savunmahaber.com/havelsan-musterek-harp-oyunu-ve-egitim-merkezi-2/. For a piece on Turkish private corporation JEY Defense’s Joint Wargame Simulation see: Görgülü, E. (2018, October 19). TSK için ürettiler! Tatbikatlarda bir ilk. Retrieved June 5, 2021, from https://www.hurriyet.com.tr/gundem/tsk-icin-urettiler-tatbikatlarda-bir-ilk-40991754.

[8] For a piece on recent joint exercise conducted with Azerbaijani Army see: Rehimov, R. (2021, May 22). Azerbaycan ve Türk askerleri ortak tatbikat yaptı. Retrieved June 5, 2021, from https://www.aa.com.tr/tr/dunya/azerbaycan-ve-turk-askerleri-ortak-tatbikat-yapti/2250886

[9] Kara Kuvvetleri Komutanlığı. (2010). KKT 190-1 (B) Tatbikatların Sevk ve İdaresi. Ankara: KK Basımevi ve Basılı Evrak Depo Müdürlüğü, 3. Bölüm. 

[10] For a piece on the Joint/Combined Wargame conducted in İstanbul, in 2016 see: DHA. (2016, May 17). Yıldız 2016 Harp Oyunu. Retrieved June 5, 2021, from https://www.hurriyet.com.tr/gundem/yildiz-2016-harp-oyunu-40105395

[11] Akkaya, S. (2003). “MUHSİMLEM Komutanlığının Görev ve Fonksiyonları”, Kara Kuvvetleri Dergisi Sayı: 5, p. 54-57.

[12] Brynen, R. (2019, 8 May). Wargaming as an academic discipline. Retrieved June 5, 2021, from https://paxsims.wordpress.com/2019/08/05/wargaming-as-an-academic-discipline/

[13] Sabin, P. (2012). Simulating War: Studying Conflict Through Simulation Games. London: Bloomsbury, Introduction.

Assessment Papers Georgetown University Wargaming Society (GUWS) M. Fatih BAS Turkey Wargames and Wargaming

Assessing Practical Educational Wargaming

Mitch Reed has served in the United States Air Force since 1986 as both a commissioned officer and a government civilian. He presently works at Headquarters U.S. Air Force as wargamer and is also a hobby wargamer who runs the website NoDiceNoGlory.com. He can be reached at iprop27@gmail.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Practical Educational Wargaming 

Date Originally Written:  June 8, 2021.

Date Originally Published:  June 14, 2021.

Author and / or Article Point of View:  The author is a retired U.S. Air Force (USAF) officer and a wargamer in both the USAF and the hobby communities. The article is written from the basis that wargaming is the perfect laboratory for social science students and helps develop leaders with critical decision-making skills. 

Summary:  Hard science educators use laboratory environments to assess student progress.  Social sciences and other areas of endeavor can do the same via wargaming.  While one may assume wargaming focuses solely on war, its applications are both for war and beyond, including nearly any context in which an organization or individual desires to determine the cost of action or inaction.  

Text:  Educators continuously seek means to validate the progress of their students. In hard science curriculums, educators often use a laboratory environment where the students can apply and hone their knowledge in a controlled manner. Subsequently, educators can truly assess the level of learning of their students – beyond a student’s ability to retain and recite the coursework. In contrast, social science courses lack a laboratory environment where knowledge transforms into practical application.  Within the Department of Defense, wargaming is used a practical exercise to validate learning.  A wargame creates a specific environment where the players face challenges and will need to apply their knowledge to come up with decisions to solve the problems that the game presents. 

In 2021, the author supported a global wargame at the Marine Corps University (MCU) where the War College students played the roles of various nations involved in a major conflict. The students were all senior Field Grade Officers with 16-18 years of military experience and various positions of leadership during their military career. Despite their years of experience, students consistently stated how the wargame enabled them to utilize what they learned over the preceding eight months in a manner where they were able to test the concepts in a simulated environment. This “eureka” moment was not evident at first. Initially, the students relied on concepts they felt most comfortable with, often reverting to knowledge they had before attending the course. Yet, the students quickly recognized that by synthesizing and applying the coursework, they could solve the problems that game presented. The students were able to leverage military capabilities and execute them across warfighting domains to generate the effects they desired to “win” the game. 

These observations validated two concepts; the first is that the students grasped the coursework and secondly, they were able to use what they learned during the wargame. This second point is critical because it indicates that after the students graduate the War College at MCU they will have the capability to apply the knowledge they have gained in a manner which will benefit the military operations they are involved in for the rest of their careers. These observations validate not only what the students learned at MCU but also the need for professional military education and the need for wargaming to play a major role in these courses. 

The author’s experience at MCU was not a singular. When teaching concepts such as military operational planning and execution as an instructor or mentor war-games are invaluable to reinforce the curriculum.  

It should be no mystery on why wargaming provides such a robust means of validating learning. Through a wargame, an instructor can tailor the environment of the game in such a manner where students apply the newly learned concepts in a pressure-filled environment[1]. Unlike a test where each question usually has only one correct answer, a wargame offers no simple answers, but a multitude of paths forward. Students possess several means to solve a problem and the outcome is not predetermined if the game uses a stochastic methodology. A risky gamble may succeed, a thorough plan may fail or vice versa – reflective of capricious reality. Ultimately, students must contend with decisions and their consequences.  

Seemingly counter intuitive, failure serves to illustrate several factors, which are often out of the control of the players that can affect the game’s outcome, which proves that the lessons of a game may be quite indirect[2] and gives the players a sense of uncertainty when making their decisions. Within its artificial environment, a wargame can pull a student out of their comfort zone and force them to make sound decisions rapidly to prevent a negative outcome in the game. Wargames also emulate the environment the students will have to make decisions in when in an operational assignment. 

The military is not the only benefactor of wargaming and the benefits of wargaming translates very well to other fields. Students learning about the failure of the Weimar government in 1930s Germany can use a game to examine a ‘What if” scenario that can uncover the events that lead to the election of the National Socialists in 1933. In business, a wargame can gain insight into how best to market a product or execute a product recall. The uses of wargaming in social science matters is endless and is worthy of inclusion in any course of study or decision-making process. 

Despite their value, war-games are not often included in the educational environment.  Wargames are not always the easiest of things to create and making a wargame that achieves all desired objectives is as much of an art and science.  No matter how tough the challenge, educators can gain by seeking out avenues in which wargaming can enrich the academic environment. 

Wargamers are the best ambassadors for wargames as an educational tool and are well positioned to describe the benefits of war-games and wargaming to the uninformed or curious.   Grassroots advocacy will ensure that wargaming grows and plays a major role in academia. 


Endnotes:

[1] Elg, Johan Erik, “Wargaming in Military Education for Army Officers and Officer Cadets,” King’s College London, September 2017.

[2] Wong, Bae, Bartels, Smith (2019) Next-Generation Wargaming for the U.S. Marine Corps, retrieved 21 May 2021; from https://www.rand.org/pubs/research_reports/RR2227.html 

Assessment Papers Georgetown University Wargaming Society (GUWS) Mitch Reed Wargames and Wargaming

Assessing U.S. Army Diversity Efforts in the Context of Great Power Competition

Louis Melancon, PhD has served in the U.S. Army around the globe for 25 years. He presently represents the U.S. Army to the Joint Hard Targets Strategies program. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing U.S. Army Diversity Efforts in the Context of Great Power Competition

Date Originally Written:  May 21, 2021. 

Date Originally Published:  June 7, 2021. 

Author and / or Article Point of View:  The author is an active duty military member who believes diversity of work force is a potential asymmetric advantage in great power competition. 

Summary:  The heuristics (mental shortcuts that ease the cognitive load of making a decision) that people rely on matter.  Relying on outdated heuristics can be problematic. While U.S. Army talent management efforts have been important in realizing increased diversity, the effort to create matching heuristics is lacking. The result will likely undermine the U.S. Army’s efforts at achieving diversity. 

Text:  On May 20, 2021, U.S. Senator Ted Cruz made comments about U.S. Army recruiting advertisements[1]. Twitter users responded to the senator’s tweet quickly and in a highly negative manner.  Beyond these twitter responses, the situation Senator Cruz’s comments created highlights a larger implication of similar behaviors in the U.S. Army. The issue at hand is a reliance on flawed heuristics; approximations of knowledge that are useful in making immediate, though not necessarily the most efficient, decisions. 

Despite Senator Cruz’s attempts to back away from his position about the efficacy of the U.S. Army compared to the Russian military[2], the heuristic that he used is clear: efficacy of a military is defined by its ability shape its members into a similar, unthinking mold; a vessel to contain violence, unleashed automatically in response to a command given by their masters. The senator’s tweet illustrates a belief that soldiers are identical cogs in the machine of an army; when a cog breaks, it is replaced, and the machine grinds on. This heuristic echoes the industrial revolution and does an adequate job of describing Queen Victoria’s army[3], but is not useful today.

The nature of war remains constant, but the character of war changes[4]. The characteristics of an industrial revolution army are not useful in modern, great power competition. Senator Cruz’s heuristic is outdated. However, his foible highlights a similar problem of similar heuristics that are often used within the U.S. Army regarding talent management. 

The U.S. Army, over the past several years, has taken great steps to leverage the diversity of its force and should be applauded for this effort. A large talent management effort has created a web-based market place to match soldiers to units based on preferences. Official photos have been removed from personnel files in an attempt to reduce bias by units and in central selection boards. Gender neutral pronouns are now used in evaluations. New methods of selecting battalion and brigade leadership are in place[5]. These  steps improve diversity but by themselves will take too long, perhaps a full work generation of 15-20 years, to effectively address and correct biases that emerge from old, outdated heuristics. 

Breaking and replacing heuristics is hard; it takes energy, thoughtfulness, and leadership focus. Diversity of a population, and by the transitive property, the military force it raises, can be an asymmetric advantage in competition and conflict justifying that energy and leadership focus. Context matters in competition and conflict; strength only has value when placed in the context of an opponent and that opponent’s weakness. The goal is always to create an advantage and a successful military engages an opponent at their weakness. A military is deceiving itself if it relies on its self-assessed strength in isolation of an opponent.  Success in both competition and conflict comes from turning interactions with an opponent into an asymmetric engagement where the balance is not in the opponent’s favor.  For the U.S. Army, in this era of great power competition, this strength rests in the children of the American people, all the American people with all their diverse backgrounds. New technologies can be duplicated, new weapons can and will be countered, but a diverse people, bringing their unique perspectives and experiences to problems, cannot be easily replicated. The longer the U.S. Army waits to break its talent management- related heuristics and fully utilize its soldiers, the more behind it falls in competition, especially with China.  

As a society, and as a military force, the U.S. and U.S. Army have significantly greater ethnic and gender diversity than either China or Russia. China’s People’s Liberation Army is a monument to glass ceilings for those that are not ethnic Han or male[6]. The picture is not better in the Russian military for those who are not ethnic Russian or male[7]. This is not to say either military force is monolithic in their outlook, but near homogeneity tends to create predictability, inflexibility, and an inability to identify self-weakness[8]. There is an opportunity here for the U.S. Army to truly find and leverage talent management as an asymmetric advantage against the Chinese and Russian military personnel systems, and so by extension their militaries as a whole. 

The U.S. Army has not been as effective in breaking and replacing old heuristics in conjunction with the active steps to increase diversity. Anecdotal evidence is emerging that new heuristics are naturally emerging within the force that will slow down the efforts to improve diversity; this is a result of not deliberately seeking to replace heuristics at pace with new diversity initiatives. As an example, rather than focus on matching skills needed for a position with a candidate, some units are seeking out personnel whose career trajectory closely matches previous concepts of a successful soldier. Preferring a concept of what makes a good soldier over recognized skills needed for mission success goes against what the U.S. Army desires with talent management. There is no maliciousness here, humans rely on heuristics and so older, flawed concepts are tweaked on the margins if nothing is provided to replace them. The units are seeking to do the right thing, but are limited by what the individuals within them know. Without a deliberate effort to shape heuristics that support new policies, the ones which emerge in the force will inevitably and inadvertently buttress the old biases.  

Senator Cruz provided a teachable moment. His constituents will decide with the ballot if he will have to pay a price for having outdated and flawed heuristics. Were the U.S. Army to share Senator Cruz’s outlook, the price paid in both competition and conflict with peer competitors will be much higher for soldiers if the issue of heuristics is not addressed now.


Endnotes:

[1] Cruz, Rafael E. [@tedcruz]. (20 May, 2021). “Holy crap. Perhaps a woke, emasculated military is not the best idea…” Twitter. https://twitter.com/tedcruz/status/1395394254969753601

[2] Cruz, Rafael E. [@tedcruz]. (20 May, 2021). “I’m enjoying lefty blue check marks losing their minds over this tweet, dishonestly claiming I’m “attacking the military.” Uh, no. We have the greatest military on earth, but Dem politicians & woke media are trying to turn them into pansies. The new Dem videos are terrible.” Twitter. https://twitter.com/tedcruz/status/1395586598943825924 

[3] Brown, M. (2017). Cold Steel, Weak Flesh: Mechanism, Masculinity and the Anxieties of Late Victorian Empire. Cultural and Social History, 14(2), 155-181.

[4] Johnson, R. (2017). The Changing Character of War: Making Strategy in the Early Twenty-First Century. The RUSI Journal162(1), 6-12.

[5] The variety of in-place and future initiatives can be seen at https://talent.army.mil

[6] Kania, E. (4 October 2016). “Holding Up Half the Sky? (Part 1)—The Evolution of Women’s Roles in the PLA.” China Brief. https://jamestown.org/program/holding-half-sky-part-1-evolution-womens-roles-pla

[7] Chesnut, M. (18 September 2020) “Women in the Russian Military.” The Post-Soviet Post. Center for Strategic and International Studies, https://www.csis.org/blogs/post-soviet-post/women-russian-military

[8] Cooke, A., & Kemeny, T. (2017). “Cities, Immigrant Diversity, and Complex Problem Solving.” Research Policy46(6), 1175-1185.

Assessment Papers Diversity Louis Melancon Readiness U.S. Army

Assessing Wargaming in New Zealand

Michael Gardiner is completing a Masters in Strategic Studies at the S. Rajaratnam School of International Studies (RSIS) at Nanyang Technological University. He is also a co-founder of the Victoria University of Wellington Wargaming Society which designs, implements, and teaches wargaming to students and other stakeholders within New Zealand. He can be found on Twitter @Mikey_Gardiner_. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Wargaming in New Zealand

Date Originally Written:  May 19, 2021.

Date Originally Published:  May 31, 2021.

Author and / or Article Point of View:  The author is a co-founder of the Victoria University of Wellington Wargaming Society. The author believes that New Zealand’s national security community, businesses and other organisations can benefit from using wargaming as an educational and analytical tool. 

Summary:  While New Zealand has a strong wargaming history, the country has a heavy reliance on tactical-level wargames that limits the scope of wargame utility to hobbyist and defence force practitioners. Contemporary practitioners such as the VUW Wargaming Society can plug the gap by providing strategic level thinking to policymakers and other actors. Wargaming will grow in popularity as New Zealand’s threat environment changes. 

Text:  New Zealand’s wargaming history is primarily one at the hobbyist level. ‘Miniature wargaming’ which focuses on assembling, painting, and playing with figurine armies became increasingly popular from the early 20th Century. Wargaming societies and suppliers soon established themselves across the country from Auckland to Dunedin. Founded in 1972 as the Wellington Wargames Section, the Wellington Warlords is one of New Zealand’s oldest wargaming societies and still attracts hundreds of members with an interest in miniature wargaming[1]. While the focus remains entrenched in building, painting, and playing with miniature armies, the philosophies of hobbyist wargames in New Zealand’s wargaming culture remain relevant to wider applications. Writing in the 1980s, Wellington wargamer Andrew Hatt notes “the charm of wargaming lies in its infinite adaptability[2].”  This practicality stemming from the country’s population of “do it yourselfers[3]” suggests New Zealand has a foundational hobbyist culture that would lend itself well to more professional wargaming ventures. 

New Zealand’s Defence Force also has experience participating in wargames. Computer wargames are important for simulating battlefield developments at the operational and tactical levels, particularly in training contexts. The New Zealand Army uses video games, such as those run by Bohemia Interactive’s Arma 3 engine for tactical training[4]. Inspired by the United States Marine Corps, the New Zealand Army’s Wargaming Battlelab in 2017 involved a series of tactical-level decision-making wargames that would culminate in the creation of a New Zealand specific module[5]. In terms of joint exercises, the New Zealand Army has significant experience wargaming with the United States military, such as in the 1978 exercise ‘First Foray[6].’ Meanwhile, the New Zealand Navy has participated in numerous joint exercises such as a humanitarian focused operation with Vanuatu[7] and more large-scale exercises such as RIMPAC[8]. International exercises to improve interoperability in space such as through the Schriever wargame, have also included New Zealand[9]. 

Outside of the tactical level, wargaming in New Zealand has failed to take off. A kaleidoscope of stakeholders can stand to reap the benefits of strategic level wargames. Providing the predictive capabilities of wargaming are not overestimated[10], the advantages of strategic level wargames include:

  • Strategic level wargames embrace the messiness of reality. The immersive nature of wargames allows participants to gain insights into situational complexities. These complexities are particularly useful for crisis simulations[11].  
  • Strategic level wargames enable interactions within a wargaming environment that promotes robust discussions and debates over key variables, information, and insights. Wargame disagreements, when handled effectively, lead to stronger policy and strategic recommendations[12].
  • Strategic level wargames can bring to light previously missed weak signals and whispers from the ‘grey zone[13].’ 

The newly created VUW Wargaming Society (VUWWS) seeks to fill the gap at the strategic level. Specialising in futures-casting and strategic tradecraft, VUWWS recognises the importance for wargaming as an analytical and educational tool[14]. In its nascent form, VUWWS could soon occupy an important position within New Zealand’s small national security apparatus. Works such as the soon-to-be-published Emperor Penguin report – which focuses on great power competition in the Antarctic region – will add important insights to New Zealand’s foreign policy and future strategic planning. Given the revived debate over New Zealand’s relationships with the United States and China, testing New Zealand’s strategy within the safe container of a strategic level wargame has never been more valuable. As such, VUWWS could become a significant force given its competitive advantage, the emerging confluence of strategic threats, and a return of national security concerns to New Zealand discourse. 

Naturally, wargaming does not have to focus explicitly on traditional threats and military power. New Zealand’s security is becoming increasingly challenged from a wide variety of sources, particularly from non-conventional threats. Consistent with New Zealand’s “all hazards – all risks” approach to national security[15], wargaming’s adaptability means it can be a useful tool for assessing national responses to issues like climate change, cyber-security, trans-national crime, natural disasters, etc. For example, while New Zealand has mitigated the threat from Covid-19, wargaming could have been used to identify blind spots in the response strategy to prevent more lockdowns and community transmission[16]. As “trade is not just about trade[17],” New Zealand’s geographic reality as a small island reliant on trade would significantly benefit from wargaming issues such as the impacts of policy decisions on supply chain resilience, especially given recent initiatives to diversify away from dependence on China. Businesses, non-governmental organisations, think tanks and other actors can also leverage the power of wargaming to test strategies, draw insights and act with more confidence despite future uncertainty.

The accessibility of wargaming knowledge and practice also improves the transparency of national security issues. Keeping constituencies and stakeholders in the dark around strategic issues and threat landscapes gives national security apparatuses ‘shadowy’ reputations[18]. While some information must remain classified for security reasons, more public debates around national security issues are valuable. New Zealand’s national security ecosystem and general public would stand to benefit from more enriching conversations about New Zealand’s place in the world, supported by publicly accessible wargaming tools and information created from it’s use. A student-oriented club like VUWWS uses open-source information, and as a result could find itself contributing to more national discussions. 

Finally, a thriving wargaming community within New Zealand offers the potential for greater security cooperation. A well-established and supported wargaming community within New Zealand’s national security apparatus signals a willingness to engage seriously regarding security concerns, particularly within the Indo-Pacific. Furthermore, working together with regional partners on joint-exercises and sharing wargaming best practice can become an important facet of Track II discussions. Relationships and cooperative outcomes can be developed through wargaming, with improved ties across governments, defence forces, academia, and wider society.  


Endnotes:

[1] History of the Club. Wellington Warlords. (n.d.). Retrieved May 18 2021, from  https://warlords.org.nz/history-of-the-club. 

[2] Hatt, A. (1981). Wargaming: A New Zealand handbook. Wellington: Wellington Wargames Society, p. 3

[3] Millar, A. (1975). So you want to play wargames. Wellington: Wellington Wargames Society, p. 4

[4] Curry, J. (2020). Professional wargaming: A flawed but useful tool. Simulation & Gaming, 51(5), 612-631. doi:10.1177/1046878120901852, p. 626

[5] Wargaming Battlelab. New Zealand Defence Force (2017, December 11). Army News. Retrieved May 18, 2021, from https://ndhadeliver.natlib.govt.nz/delivery/DeliveryManagerServlet?dps_pid=IE31102363, pp. 32-33

[6] Caffrey Jr., M. B. (2019). On Wargaming: How Wargames Have Shaped History and How They May Shape the Future. Newport, Rhode Island: Naval War College Press. https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1043&context=newport-papers, p. 114

[7] Corby, S. (2018, May 01). New Zealand wargames Pacific intervention in Vanuatu. Retrieved May 18, 2021, from https://ukdefencejournal.org.uk/new-zealand-wargames-pacific-intervention-in-vanuatu

[8] Thomas, R. (2020, June 10). Rimpac war GAMES exercise: New Zealand government urged to withdraw. Retrieved May 18, 2021, from https://www.rnz.co.nz/news/national/418720/rimpac-war-games-exercise-new-zealand-government-urged-to-withdraw

[9] Ministry of Defence. (2018). Strategic Defence Policy Statement 2018. Wellington: Ministry of Defence. https://www.defence.govt.nz/assets/Uploads/8958486b29/Strategic-Defence-Policy-Statement-2018.pdf, p. 38

[10] Curry, J. (2020). Professional wargaming: A flawed but useful tool. Simulation & Gaming, 51(5), 612-631. doi:10.1177/1046878120901852, p. 612

[11] Schechter, B., Schneider, J., & Shaffer, R. (2021). Wargaming as a Methodology: The International Crisis Wargame and Experimental Wargaming. Simulation & Gaming, doi:10.1177/1046878120987581

[12] Nagle, T. (2021, May 11). Conflicts in wargames: Leveraging disagreements to build value. Retrieved May 18, 2021, from https://warontherocks.com/2021/05/conflicts-in-wargames-leveraging-disagreements-to-build-value

[13] Rubel, R. C. (2021, March 08). Whispers from Wargames about the Gray Zone. Retrieved May 18, 2021, from https://warontherocks.com/2021/03/whispers-from-wargames-about-the-gray-zone

[14] VUW Wargaming Society. Bio and contact details. Retrieved May 18, 2021, from https://www.wgtn.ac.nz/students/campus/clubs/directory/wargaming-society 

[15] Department of Prime Minister and Cabinet. New Zealand’s national security system. Retrieved May 18, 2021, from https://dpmc.govt.nz/our-programmes/national-security-and-intelligence/national-security/new-zealands-national-security 

[16] Dyer, P. (2021). Policy & Institutional Responses to COVID-19: New Zealand. Brookings Doha Center. https://www.brookings.edu/wp-content/uploads/2021/01/MENA-COVID-19-Survey-New-Zealand-.pdf, p. 16

[17] Sachdeva, S. (2021, May 13). UK diplomat: ‘Trade is never just about trade’. Retrieved May 18, 2021, from https://www.newsroom.co.nz/laura-clarke-trade-is-never-just-about-trade

[18] Manch, T. (2021, March 24). New Zealand’s national security apparatus remains shadowy, two years on from the March 15 terror attack. Retrieved May 18, 2021, from https://www.stuff.co.nz/national/politics/124611960/new-zealands-national-security-apparatus-remains-shadowy-two-years-on-from-the-march-15-terror-attack

Assessment Papers Georgetown University Wargaming Society (GUWS) Michael Gardiner New Zealand Wargames and Wargaming

Assessing the Impact of a Kriegsspiel 2.0 in Modern Leadership and Command Training

This article is published as part of a Georgetown University Wargaming Society and Divergent Options Call for Papers on Wargaming which ran from May 1, 2021 to June 12, 2021.  More information about this Call for Papers can be found by clicking here.


Colonel (Generalstaff) Soenke Marahrens has served in the German Airforce since 1987.  Now he serves as Head of Research for Strategy and Forces.  He presently works at the German Institute for Defense and Strategic Studies in Hamburg.  He can be found on Twitter at @cdr2012neu. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Impact of a Kriegsspiel 2.0 in Modern Leadership and Command Training.

Date Originally Written:  May 1, 2021.

Date Originally Published:  May 17, 2021.

Author and / or Article Point of View:  The author is an active German military member with General Staff officer training. The author believes in wargaming as tool to teach leadership and command. He has written two master theses on the topic of the Prussian Wargame at the Royal Military College of Canada (RMC) in Kingston, Ontario, and the University of the Armed Forces in Hamburg. Over the last four years the author observed and took part in a multiple Prussian-Kriegsspiel-sessions with civilian and military students run by the University of Würzburg[1]. The article is written from the point of view of a senior German officer towards military education and training and reflect his personal views.

Summary:  The Prussian Kriegsspiel was introduced in 1824 to educate and train officers in leadership and command in an interactive setting. Providing a fair and unbiased platform, it allows for modern forms of tutoring, mentoring, self-learning, and competence-based learning. However, without a moderate digitalization and conceptual makeover, the Kriegsspiel will not reach its full potential.

Text:  When Lieutenant v. Reisswitz[2] presented his Kriegsspiel[3] to the Chief of Defence General von Müffling in 1824[4], he couldn’t know, that his ideas would last forever. His Kriegsspiel allowed two parties of one or more players to solve military tasks under the adjudication of a neutral umpire. This neutral umpire oversaw running the simulation on a master map, executing orders of the parties, resolving battles, creating reports and providing feedback after the game.

Reisswitz’ Kriegsspiel wasn’t the first of its kind. In his introduction he mentioned military games back to the old Greeks, but his “Kriegsspiel” – war game is the direct translation of the German word – was new in two regards: a. using a real-world map in 1:8000 scale and b. rolling dice to decide outcomes and losses. Reisswitz’ Kriegsspiel challenged its players with a geographically correct battlefield merged with dice-driven randomness, what Clausewitz would 1832 call friction and the fog of war[5]. Reisswitz’ intent was to create an instructional tool rather than a game, he wrote: “Anyone, who can manoeuvre naturally and calmly, can quickly appreciate the idea of a plan, and follow it through logically, can make the most of good luck and adjust to bad luck, fully deserves approval. The winning or losing, in the sense of a card or board game, does not come into it[6].”

Following the dissemination of the Kriegsspiel to all Prussian Regiments by personal order of the king, Reisswitz’ rule set was revised. The first revision was by a group of young Prussian officers from 1826 – 1827, who published their findings as a Supplement in 1828[7]. The next revision came around 1846-1848, when the Wargaming-Societies of Magdeburg and Berlin updated the von Reisswitz rules in accordance with the technological advancements for artillery guns and infantry rifles[8][9]. In 1862[10], Lieutenant von Tschischwitz merged both rule sets into one abbreviated new rule set and published updates in 1867[11], 1870[12] and 1874[13]. Tschischwitz’ rule set started a renaissance of the Kriegsspiel in Prussia, which was attributed to the Prussian Victories[14]. Around 1873 Lieutenant von Meckel, a lecturer at the Kriegsschule in Hannover, criticised publicly, that the rigid use of dice and rules would diminish the personality of the umpire[15]. Lieutenant von Meckel’s criticism led to the creation of the “free” Kriegsspiel by Colonel Count Verdy du This Vernois[16], who discarded the dice.

Despite the discarding, the use of the dice and strict rules make the “rigid” Kriegsspiel a “fair” game for all players, unfortunately, adjudication by dice is a complex and time-consuming task for the umpire, deeming it almost unplayable. The freeplay -without dice and rules- Kriegsspiel occurs much faster but has become dependent on the personality and bias of the umpire, increasing the risk of fostering flattering behavior instead of intellectual debate amongst the players. The Kriegsspiel, even with its rigid use of dice, remains valuable for a variety of reasons.

1. The Kriegsspiel creates more immersion, engagement, and sustainability than any other classroom teaching on leadership and command.

2. While its use of historic artillery, infantry, and cavalry seems a rather artefactual approach to war, this approach:

a. Creates enough complexity to demonstrate the challenges to leadership and command as the coordination of space, time, and forces through information.

b. Minimizes discussions on the realism of rules, assets, and capabilities in its rigid version.

c. Is still close enough to war to discuss moral factors like impact of losses or moral hazards like winning for any price. Despite this

d. Risks “gamer mode behavior,” where players use game features like rules or limits of the underlying model to reach their given aims[17].

3. The Kriegsspiel allows players to experience a real Observe-Orient-Decide-Act loop without a determined outcome while confronting a smart enemy, which fosters and promotes creative thinking. While the Kriegsspiel was traditionally just for officers, it can be used today to train all ranks.

4. The Kriegsspiel is particularly valuable as it reinforces the vanishing skills of map reading.

5. Through simple modifications, like adding levels of command or using staff setups, any aspects of leadership and command competencies can be self-experienced. Through Kriegsspiel the philosophy and principles of Auftragstaktik (which is more than leader centric mission command) can be taught and trained effectively.

6. Beyond its military applicability, Reisswitz’ Kriegsspiel is a military cultural property like Carl von Clausewitz “On War,” and should be preserved as a part of history.

However, to be relevant as a training tool for a modern environment and to overcome above-mentioned deficiencies, Kriegsspiel requires get a careful makeover through digitalization and some didactical concept work. A Kriegsspiel 2.0 would include a digital messaging system and digital umpire support system to accelerate move adjudication to that rules such as “One move equals two minutes” can be permanently observed. Kriegsspiel 2.0 would have an instructor’s book with specific (didactical) concepts and proposals for e.g. “How to teach Auftragstaktik” or objective skill assessment tables for superiors, tutors, mentors, or human resource evaluators, to prevent single impression evaluations. Due to its proven stability, Kriegsspiel 2.0 will have a rule set from around 1870 (e.g., v. Tschischwitz, 1870), also translated into English by Baring 1872. In this modern version of Kriegsspiel the rule sets can be further simplified due to the absence of expert knowledge on tactics and procedures on the player level. Moving beyond these envisioned minimums for Kriegsspiel 2.0, eventual versions could use augmented reality and virtual reality technologies. These technologies would:

1. Reduce the efforts of providing and maintaining a physical Kriegsspiel apparatus.

2. Enable the players to learn the basics of how to act, fight and lead in a modern virtual environment, and possibly enable experimentation with artificial intelligence as a part of leadership and command and control.

History has proven the value of the Kriegsspiel. An evolving security environment will force its adaptation to a modern world. Beyond this article, the author is working on a prototype for Kriegsspiel KS 2.0, and his results and experience will be reported.


Endnotes:

[1] Prof. Dr Jorit Wintjes, University of Würzburg is currently the only German Professor researching the Prussian Wargame. He was the scientific supervisor for the two co-master thesis’ of the author of this article. He has published a variety on articles on the Prussian Kriegsspiel e.g. Wintjes, Jorit (2017). When a Spiel is not a Game: The Prussian Kriegsspiel from 1824 to 1871, in: Vulcan 5., 5-28. 22.

[2] Georg Heinrich Rudolf Johann v. Reisswitz (1794 -1827)

[3] Reisswitz, B. G. (1824). Anleitung zur Darstellung militaerischer Manoever mit dem Apparat des Kriegs-Spieles. Berlin: Trowitzsch und Sohn.

[4] Dannhauer, E. (1874), Das Reißwitzsche Kriegsspiel von seinem Beginn bis zum Tode des Erfinders, in Militair Wochenblatt 59, Berlin , P. 527–532.

[5] Clausewitz, C. v. (1991), Vom Kriege. (W. Hahlweg, Editor) Bonn: Ferdinand Dümmler, P. 233-234.

[6] Reisswitz (1824), P. 5, translated by Bill Leeson 1989. Anleitung zur Darstellung militairische Manover mit dem Apparat des Kriegsspiels. 2nd rev. ed, .Hemel Hempstead.

[7] Decker, C. v., & Witzleben, F. v. (1828), Supplement zu den bisherigen Kriegsspiel-Regeln. Zeitschrift für Kunst, Wissenschaft, und Geschichte des Krieges, Band 13. Berlin : Mittler, Editor, P. 68-105.

[8] Anonymus (1846), Anleitung zur Darstellung militärischer Manöver mit dem Apparat des Kriegsspiels. Berlin, Posen, Bromberg: Ernst Siegfried Mittler.

[9] v. Tschischwitz mentions the Berlin rules -collated by a Colonel Weigelt, in his foreword to his 1862 rules set.

[10] Tschischwitz, W. v. (1862). Anleitung zum Kriegsspiel. Neisse: Joseph Graveur.

[11] Tschischwitz, W. v. (1867). Anleitung zum Kriegsspiel (2. Auflage). Neisse: Graveur.

[12] Tschischwitz, W. v. (1870). Anleitung zum Kriegsspiel (3. Auflage). Neisse: Graveur, translated and applied to the British Force structure by Baring, E. (1872). Rules for the conduct of the War-Game. London: Superintendence by her Majesty’s Office.

[13] Tschischwitz, W. v. (1874). Anleitung zum Kriegs-Spiel (4. verbesserte Auflage). Neisse: Joseph Graveur (Neumann).

[14] Löbell, H. K. (1875), Jahresberichte über die Veränderungen und Fortschritte im Militairwesen 1874, Band 1. Berlin: Mittler und Sohn, P. 723

[15] Meckel, J. (1873). Studien ueber das Kriegsspiel. Berlin: Mittler und Sohn, P. 17.

[16] Verdy du Vernois, A. F. (1876). Beitrag zum Kriegsspiel. Berlin: Mittler und Sohn.

[17] Frank, Anders (2011). Gaming the Game: A Study of the Gamer Mode in Educational Wargaming. Research Article https://doi.org/10.1177/1046878111408796.

Assessment Papers Georgetown University Wargaming Society (GUWS) Soenke Marahrens Wargames and Wargaming

Assessing the Application of a Cold War Strategic Framework to Establish Norms in the Cyber Threat Environment

Jason Atwell is an officer in the U.S. Army Reserve and a Senior Manager with FireEye, Inc. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Application of a Cold War Strategic Framework to Establish Norms in the Cyber Threat Environment

Date Originally Written:  December 28, 2020.

Date Originally Published:  March 29, 2021.

Author and / or Article Point of View:  The article is written from the point of view of the United States and its Western allies as they seek to impose order on the increasingly fluid and frequently volatile cyber threat environment.

Summary:  The continued growth and maturity of cyber operations as a means of state sponsored espionage and, more recently, as a potential weapon of war, has generated a need for an “accepted” strategic framework governing its usage. To date, this framework remains unestablished. Cold War strategic frameworks could help govern the future conduct of cyber operations between nation states and bring some semblance of order to this chaotic battlespace.

Text:  The cyber threat environment continues to evolve and expand. Threat vectors like ransomware, a type of malicious software designed to block access to a computer system until a sum of money is paid, are now daily subjects for discussion among leaders in the public and private sectors alike. It is against this backdrop that high-level initiatives like the Cyberspace Solarium Commission have sought to formulate comprehensive, whole-of-government strategies for dealing with cyber threats and developing capabilities. The U.S. Department of Commerce’s National Institute for Standards in Technology issues a steady stream of best practices for cyber risk management and hygiene. Yet, no comprehensive framework to govern cyber operations at the macro, nation-to-nation level, has emerged and been able to achieve buy-in from all the affected parties. In fact, there are not even useful norms limiting the risk in many of these cyber interactions[1]. Industry leaders as well have lamented the lack of a coherent doctrine that governs relations in cyberspace and discourages the violating of doctrinal norms[2]. In some ways the Cold War norms governing armed conflict, espionage, and economic competition can be used to provide much needed stability to cyber and cyber-enabled operations. In other ways, the framing of current problems in Cold War vocabulary and rhetoric has proved unworkable at best and counterproductive at worst. 

Applying the accepted framework of great power interactions that was established during the Cold War presents both opportunities and challenges when it comes to the cyber threat environment. The rules which governed espionage especially, however informal in nature, helped to ensure both sides knew the red lines for conduct and could expect a standard response to common activities. On the individual level, frameworks like the informal “Moscow Rules” governed conduct and helped avoid physical confrontations[3]. When those rules were violated, and espionage came into the open, clear consequences were proscribed via precedent. These consequences made the use of persona-non-grata expulsions, facility closures, the use of neutral territories, exchanges and arrests were predictable and useful controls on behavior and means to avoid escalation. The application of these consequences to cyber, such as the closure of Russian facilities and expulsion of their diplomats has been used[4], however to little or no apparent effect as administrations have changed their approach over time. This uneven application of norms as cyber capabilities have advanced may in fact be leading the Russians in particular to abandon the old rules altogether[5]. In other areas, Cold War methods have been specifically avoided, such as the manner in which Chinese cyber operators have been indicted for the theft of intellectual property. Lowering this confrontation from high-level diplomatic brinkmanship to the criminal courts both prevents a serious confrontation while effectively rendering any consequences moot due to issues with extradition and prosecution. The dynamics between the U.S. and China have attracted a lot of discussion framed in Cold War terminology[6]. Indeed, the competition with China has many of the same hallmarks as the previous U.S.-Soviet Union dynamic[7]. What is missing is a knowledge of where the limits to each side’s patience lie when it comes to cyber activity. 

Another important component of Cold War planning and strategy was an emphasis on continuity of operations and government authority and survivability in a crisis. This continuity was pursued as part of a deterrence model where both sides sought to either convince the other that they would endure a confrontation and / or decisively destroy their opposition. Current cyber planning tends to place an emphasis on the ability to achieve overmatch without placing a similar emphasis on resilience on the friendly side. Additionally, deterrence through denial of access or geophysical control cannot ever work in cyberspace due to its inherently accessible and evolving nature[8]. Adopting a mindset and strategic framework based on ensuring the ability of command and control networks to survive and retaliate in this environment will help to impose stability in the face of potentially devastating attacks involving critical infrastructure[9]. It is difficult to have mutually assured destruction in cyberspace at this phase, because “destruction” is still nebulous and potentially impossible in cyberspace, meaning that any eventual conflict that begins in that domain may still have to turn kinetic before Cold War models begin to function.

As cyber capabilities have expanded and matured over time, there has been an apparent failure to achieve consensus on what the red lines of cyber confrontation are. Some actors appear to abide by general rules, while others make it a point of exploring new ways to raise or lower the bar on acceptable actions in cyberspace. Meanwhile, criminals and non-aligned groups are just as aggressive with their operations as many terrorist groups were during the height of the Cold War, and they are similarly frequently used or discarded by nation states depending on the situation and the need. However, nation states on the two sides were useful bulwarks against overzealous actions, as they could exert influence over the actions of groups operating from their territory or abusing their patronage. Espionage in cyberspace will not stop, nor can a framework anticipate every possible scenario that my unfold. Despite these imperfections, in the future an issue like the SolarWinds breach could lead to a series of escalatory actions a la the Cuban Missile Crisis, or the cyber threat environment could be governed by a Strategic Arms Limitation Talk-like treaty which bans cyber intrusions into global supply chains[10]. Applying aspects of the Cold War strategic framework can begin to bring order to the chaos of the cyber threat environment, while also helping highlight areas where this framework falls short and new ways of thinking are needed.


Endnotes:

[1] Bremmer, I., & Kupchan, C. (2021, January 4). Risk 6: Cyber Tipping Point. Retrieved February 12, 2021, from https://www.eurasiagroup.net/live-post/top-risks-2021-risk-6-cyber-tipping-point 

[2] Brennan, M., & Mandia, K. (2020, December 20). Transcript: Kevin MANDIA on “Face the Nation,” December 20, 2020. Retrieved February 12, 2021, from https://www.cbsnews.com/news/transcript-kevin-mandia-on-face-the-nation-december-20-2020/ 

[3] Sanger, D. (2016, December 29). Obama Strikes Back at Russia for Election Hacking. Retrieved February 13, 2021, from https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html 

[4] Zegart, A. (2021, January 04). Everybody Spies in Cyberspace. The US Must Plan Accordingly. Retrieved February 13, 2021, from https://www.defenseone.com/ideas/2021/01/everybody-spies-cyberspace-us-must-plan-accordingly/171112/

[5] Devine, J., & Masters, J. (2018, March 15). Has Russia Abandoned the Rules of Spy-Craft? Retrieved February 13, 2021, from https://www.cfr.org/interview/are-cold-war-spy-craft-norms-fading 

[6] Buchanan, B., & Cunningham, F. (2020, December 18). Preparing the Cyber Battlefield: Assessing a Novel Escalation risk in A Sino-American Crisis. Retrieved February 13, 2021, from https://tnsr.org/2020/10/preparing-the-cyber-battlefield-assessing-a-novel-escalation-risk-in-a-sino-american-crisis/ 

[7] Sayers, E. (2021, February 9). Thoughts on the Unfolding U.S.-Chinese Competition: Washington’s Policy Towards Beijing Enters its Next Phase. Retrieved February 13, 2021, from https://warontherocks.com/2021/02/thoughts-on-the-unfolding-u-s-chinese-competition-washingtons-policy-towards-beijing-enters-its-next-phase/ 

[8] Borghard, E., Jensen, B., & Montgomery, M. (2021, February 05). Elevating ‘Deterrence By Denial’ in U.S. Defense Strategy. Retrieved February 13, 2021, from https://www.realcleardefense.com/articles/2021/02/05/elevating_deterrence_by_denial_in_us_defense_strategy_659300.html 

[9] Borghard, E. (2021, January 04). A Grand Strategy Based on Resilience. Retrieved February 13, 2021, from https://warontherocks.com/2021/01/a-grand-strategy-based-on-resilience/ 

[10] Lubin, A. (2020, December 23). SolarWinds as a Constitutive Moment: A New Agenda for International Law of Intelligence. Retrieved February 13, 2021, from https://www.justsecurity.org/73989/solarwinds-as-a-constitutive-moment-a-new-agenda-for-the-international-law-of-intelligence/

Arms Control Assessment Papers Below Established Threshold Activities (BETA) Cold War Cyberspace Governing Documents and Ideas Jason Atwell Soviet Union Treaties and Agreements United States

Assessing the Fungibility of U.S.-Soviet Competitive Strategies

James P. Micciche is a U.S. Army Strategist and Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific. He is currently the G5 at the Security Forces Assistance Command and can be found on Twitter @james_micciche. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Fungibility of U.S.-Soviet Competitive Strategies 

Date Originally Written:  February 13, 2021.

Date Originally Published:  March 22, 2021.

Author and / or Article Point of View:  The author believes that replicating Soviet Cold War strategy will not guarantee the United States success vis-à-vis China in 2021.  Rather than simply replicating Cold War strategy, the United States’ time would be better spent developing a deeper understanding of itself, its rival, and the operating environment. 

Summary:  Nations build successful competitive strategies around a comprehensive understanding of themselves, their rivals, and the environment in which they compete. As the United States and China enter a geopolitical rivalry there is merit in studying the strategy the United States implemented against the Soviet Union during the Cold War. Albeit earlier success, the geopolitical environment of 2021 limits core tenets of U.S. Soviet strategy, requiring a more precise knowledge of the modern milieu to succeed.

Text:  Over the past decade U.S. foreign policy has increasingly focused on a rising geopolitical rivalry between the United States and the People’s Republic of China (PRC). In 2011, the Obama administration implemented a “pivot to the pacific[1],” establishing a cooperative policy to counter rising Chinese influence throughout the region. The Trump administration’s 2017 National Security Strategy, which mentions China 36 times, directly outlined both the global and regional challenges China represents to “American security and prosperity[2].” In his first foreign policy speech President Biden declared his administration will, “take on directly the challenges posed to our prosperity, security, and democratic values by our most serious competitor, China[3].”  

Sino-focused policy and rhetoric from three consecutive U.S. Presidential administrations has led policymakers, academics, and even the media to declare the United States and China are entering, or already in, a new Cold War. Codifying the relationship between the two powers as Cold War 2.0 creates a dangerous perception that implementing the same strategies used throughout the U.S.-Soviet Cold War will lead to a successful outcome for the United States over China.  While there is much utility in studying the competitive strategy utilized by the United States that contained Soviet expansion and facilitated the collapse of the Union of Soviet Socialist Republics (USSR) one cannot simply re-operationalize previous USSR-focused tenets against China and expect similar results.  J.C. Wylie warns of crafting strategy based solely on past success, “such a theory does not necessarily account for what could have happened but did not, and the theory cannot be applied to future events with consistent rigor[4].”  

The lack of fungibility of Soviet-era U.S. Policy to modern Sino-U.S. competition is predicated on the vast differences in the strategic operating environment between the two time periods. Due to the information age, hyper globalization, geographical differences, and the decreasing utility of military force many of the domain-specific advantages that the United States enjoyed in its 40-year struggle with the Soviet Union no longer exist or are in fact now beneficial to the PRC. This lack of domain-specific advantages nullifies portions of the successful U.S. competitive strategy utilized against the USSR which according to Gordon S. Barrass “was based on exploiting America’s sustainable comparative advantage[5].” 

To craft a comprehensive competitive strategy against China U.S. policy makers must understand the USSR and the PRC are different agents, as is the modern United States compared to the United States during the Cold War. Most importantly though, any successful strategy must first define and then operationalize the constraints, challenges, and opportunities that the strategic operating environment presents. 

The Cold War began in the aftermath of the Second World War in which most of Europe and large parts of Asia had suffered immense damage to infrastructure and staggering loss of life. Out of this geopolitical situation emerged a bipolar balance of power between the two nations best positioned at the end of the war: the USSR and the United States. Inversely, the rise of the Sino-U.S. rivalry has occurred in one of the most stable and peaceful time periods in modern history in terms of the number of interstate conflicts. Japan and Germany highlight how dissimilar the starting points between these two rivalries are as those two nations barely had functioning economies in 1947 and now represent the 3rd and 4th largest in terms of Gross Domestic Product[6].  In fact, scholars debate the very balance of power of the modern paradigm with scholastic descriptions ranging from unipolarity[7] to nonpolarity[8],a drastic difference from the bipolarity of 1947-1991. 

The development and expansion of the liberal rules base international order following World War 2 created an underlying hegemonic structure the Soviets were not part of. Instead, the USSR championed an ideological alternative system. Due to hyper globalization and its inclusion in multiple organizations and instruments of the liberal world order, China has become an integral and interdependent part of the global economic and diplomatic network. A revisionist actor who benefits from the same system as its primary competitor will attempt “rules-based revision[9]” by changing the system internally for its benefits, something the USSR could not attempt in the Cold War due to its isolation from and competition against the American led system. For example, in 2019 China accounted for the largest amount of U.S. imports and was the third largest destination for U.S. exports[10], a level of economic interdependence that was unheard of between the U.S. and the Soviet Union during the Cold War and a limiting factor to the types of strategies the U.S. can use against China, particularly in an environment in which military force is not as fungible as it once was[11].

Another marked difference is the ideological exportation of the USSR and the PRC. Throughout the Cold War the USSR and its allies attempted to export communism and while China is a “communist” nation it has not taken up the charge of fomenting a global socialist revolution since the USSR’s fall and in fact been a major part of global capitalism.  Rather, China exports a form of autocratic ideology through loans, projects, and technology enabling authoritarian regimes and leaders to stay in power and establishing corrupt and beneficial relationships for China across the globe especially in developing nations.

The final variance between the two periods is the diffusion of national barriers in the information age. Propaganda and information operations were significant facets of U.S. and Soviet strategies, but their effects were mitigated and diffused by national barriers.  In 2021 states bypass borders directly targeting select populations of rival states. This capability is not uniform and creates a glaring asymmetry between democracies and autocracies as the latter uses the former’s inherent liberties to “cut, razor-like, into the fabric of a society, stoking and amplifying existing divisions[12].” 

The successful competitive strategy the United States operationalized against the USSR in the latter half of the Cold War was predicated on detailed understanding of not just the adversary but more importantly the strategic environment. As the United States reenters a period that some are labeling a new Cold War, it will not succeed as it did against the USSR without redeveloping a comprehensive understanding of itself, its adversary, and the paradigm before it applies any previously successful framework.


Endnotes:

[1] Manyin, M. E., Daggett, S., Dolven, B., Lawrence, S. V., Martin, M. F., O’Rourke, R., & Vaughn, B. (2012, March). Pivot to the Pacific? The Obama Administration’s” Rebalancing” Toward Asia. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE.

[2] Trump, D. J. (2017). National security strategy of the United States of America. Executive Office of The President Washington DC Washington United States.

[3] Biden, Joseph, (2021, February 4). Remarks by President Biden on America’s Place in the World (transcript). The White House. https://www.whitehouse.gov/briefing-room/speeches-remarks/2021/02/04/remarks-by-president-biden-on-americas-place-in-the-world/

[4] Wylie Jr, J. C. (2014). Military strategy: a general theory of power control. Naval Institute Press. Pg. 58

[5] Barrass, Gordon. (2012) U.S. Competitive Strategy During the Cold War. Mahnken, T. G. (Ed.). (2012). Competitive strategies for the 21st Century: Theory, history, and practice. Stanford University Press. 86-87

[6] World Bank, World Development Indicators, (2019), GDP (current US$){Data file}. https://data.worldbank.org/indicator/NY.GDP.MKTP.CD?most_recent_value_desc=true&year_high_desc=true

[7] Sears, Nathan A. (2016). China, Russia, and the Long ‘Unipolar Moment.’ The Diplomat, https://thediplomat.com/2016/04/china-russia-and-the-unipolar-moment/

[8] Haass, R. N. (2008). The age of nonpolarity: what will follow US dominance. Foreign affairs, 44-56.

[9] Goddard, S. E. (2018). Embedded revisionism: Networks, institutions, and challenges to world order. International Organization, 72(4), 763-797.

[10] Office of the United States Trade Representatives. (2019). The People’s Republic of China. Country and Regions. https://ustr.gov/countries-regions/china-mongolia-taiwan/peoples-republic-china#:~:text=China%20is%20currently%20the%20United,was%20%24345.2%20billion%20in%202019.

[11] Baldwin, D. A. (1999). Force, fungibility, and influence.

[12] Walker, C., & Ludwig, J. (2017). From ‘soft power’to ‘sharp power’: Rising authoritarian influence in the democratic world. Sharp power: Rising authoritarian influence, 8-25

 

Assessment Papers China (People's Republic of China) Cold War Competition Economic Factors Governing Documents and Ideas James P. Micciche Soviet Union United States

Cold War Transferability, or Not: Assessing Industrial Constraints and Naval Power After Long Land Wars

Michael D. Purzycki is a researcher, analyst, writer and editor based in Arlington, Virginia. He is a former communications and media analyst for the United States Marine Corps. He writes regularly for Charged Affairs (the journal of Young Professionals in Foreign Policy) and Braver Angels, and has also been published in Merion West, Washington Monthly, the Truman National Security Project, France 24, and Arc Digital. He can be found on Twitter at @MDPurzycki and on Medium at https://medium.com/@mdpurzycki. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Cold War Transferability or Not: Assessing Industrial Constraints and Naval Power After Long Land Wars

Date Originally Written:  February 10, 2021.

Date Originally Published:  March 21, 2021.

Author and / or Article Point of View:  The author believes the role of naval power to the United States in confronting China in the 2020s is similar to its role in confronting the Soviet Union in the 1980s. He also sees economic and geopolitical similarities between the two eras.

Summary:  U.S. policymakers can learn from the last decade of the Cold War as they consider how to respond to China’s military, geopolitical, and economic ambitions. There are significant similarities between America’s situation forty years ago and its situation today, especially regarding manufacturing, trade, the defense industrial base (DIB), the exhaustion of U.S. land forces, and the importance of naval strength.

Text:  The United States in the 2020s finds itself in a position in relation to China similar to its position in relation to the Soviet Union in the 1980s. The wars in Afghanistan and Iraq have soured most Americans on extended land conflicts, much as the Vietnam War had by its conclusion in 1975. Likewise, U.S. worries about an aggressive and revisionist Chinese foreign policy (territorial claims in the South China Sea, harassment of Japanese vessels, attacks on Indian troops) parallel worries about Soviet foreign policy four decades ago (invasion of Afghanistan, continued grip on Eastern Europe, support for militant leftist forces like the Sandinistas in Nicaragua and the Farabundo Martí National Libération Front or FMLN in El Salvador). In both cases, there are reasons to worry armed conflict will break out between the U.S. and its rival power.

However, there are also differences. While China’s military threat to U.S. interests parallels the Soviet Union’s, China’s economic position differs greatly. The Soviet economy in the 1980s was stagnant[1]. China, on the other hand, while it faces long-term economic challenges, has enjoyed decades of rapid growth[2]. China’s wealth has allowed it not only to greatly expand its military, but also to engage in economic statecraft on a massive scale, most notably through the Belt and Road Initiative.

In some regards, the U.S. faces economic difficulties today similar to those of forty years ago, including ways that affect national security. The loss of millions of manufacturing jobs in the 21st century[3] has, among other effects, weakened the DIB[4][5]. Similarly, defense experts in the early 1980s expressed concern that America’s manufacturing sector would be unable to meet the military’s needs[6].

The reasons for America’s manufacturing struggles, however, are different now, as is the relationship between those struggles and America’s geopolitical concerns. Four decades ago, America’s main economic rivals were military allies, Japan and West Germany. While there were several reasons for the relative decline of U.S. manufacturing in the 1970s and 1980s, one was the outsourcing of U.S. jobs to friendly countries (partly as a result of U.S. trade policy)[7]. While the U.S.-Chinese economic rivalry now is somewhat similar to U.S.-Japanese rivalry then, it is one thing for American jobs to go to an ally, and another for them to go to a potential foe.

China’s gains relative to the U.S., unlike Japan’s, have been both military and economic. And while Japan’s economic boom after World War II was possible because it enjoyed U.S. military protection[8], factors in China’s rise have included U.S. policy (the granting of Permanent Normal Trade Relations in 2000, paving the way for China’s entry into the World Trade Organization)[9], and hostile actions (forcing U.S. companies to share intellectual property with the Chinese government, or else simply stealing it)[10][11], as well as Beijing’s policies of national development.

The perceived shortfalls of the DIB forty years ago led some observers to emphasize U.S. naval power as the most efficient, effective way to check a possible Soviet attack[12]. With the U.S. Army dispirited after the Vietnam War, and the Red Army strengthening its presence and power in Eastern Europe[13], a greater reliance on naval power made sense. While this emphasis on U.S. naval power was coupled with a Western misperception of Soviet naval intentions – the U.S. expected the Soviet Navy to venture far from home during a war, which it did not plan to do[14] – America’s historic position as a maritime nation positioned it well for a reliance on maritime might.

Similarly, the stresses places on U.S. land forces by nearly two decades of war in the greater Middle East lend weight to the idea of emphasizing naval strength when confronting China. Also, the difference in the nature of America’s treaty allies (i.e., North Atlantic Treaty Organization members directly bordering the Warsaw Pact compared to Japan and the Philippines near China but offshore) makes naval preeminence sensible. The fact that the Pacific is wider and takes longer to cross from the continental United States than the Atlantic is also a driving force.

Then as now, there are different schools of thought as to what precise shape the U.S. Navy should take. Proposals for a 355-ship navy, and then a 500-ship navy, put forward in the past few years parallel U.S. President Reagan’s goal of a 600-ship navy. However, an attempt at a rapid buildup has downsides. The huge increases in the costs of the F-35 and the Littoral Combat Ship illustrate the perils of trying to buy too much, too quickly[15][16].

Convinced that the DIB’s weakness in the early 1980s would not allow the U.S. to overwhelm the Soviets with conventional forces in a war, some defense observers, such as U.S. Senator Gary Hart, sought to emphasize Maneuver Warfare, with the goal of outthinking the Soviets[17]. The Maneuver Warfare camp worried about a U.S. overreliance on large aircraft carriers, and suggested complementing them with smaller carriers[18]. This is strikingly similar to former Secretary of the Navy Richard V. Spencer’s talk of using America-class amphibious assault ships as “lightning carriers[19].” A 2017 report from the Center for Strategic and Budgetary Assessments also recommended construction of small carriers (CVLs) and continued building of larger ones[20]. The Navy’s decision to decommission the amphibious assault ship Bonhomme Richard after its damage by a fire, combined with Marine Corps Commandant General David H. Berger’s expressed interest in deemphasizing the Marines’ reliance on large ships for amphibious operations, provide an opportunity to put the lightning carrier concept to the test[21].

As the Biden administration considers how to approach the challenge of China, it can learn from a past period of superpower rivalry, but must also bear differences between the two eras in mind. 


Endnotes:

[1] Trachtenberg, Marc. “Assessing Soviet Economic Performance During the Cold War: A Failure of Intelligence?” Texas National Security Review, February 2018. https://tnsr.org/2018/02/assessing-soviet-economic-performance-cold-war/

[2] Purdy, Mark. “China’s Economy, in Six Charts.” Harvard Business Review, November 29, 2013. https://hbr.org/2013/11/chinas-economy-in-six-charts#:~:text=China’s%20economy%20has%20entered%20a,China’s%20GDP%E2%80%9D%20chart%20below)

[3] Long, Heather. “U.S. has lost 5 million manufacturing jobs since 2000.” CNN Business, March 29, 2016. https://money.cnn.com/2016/03/29/news/economy/us-manufacturing-jobs/

[4] Herman, Arthur. “Bringing the Factories Home.” Wall Street Journal, July 19, 2020. https://www.hudson.org/research/16236-bringing-the-factories-home

[5] Tadjdeh, Yasmin. “Report Finds U.S. Defense Industrial Base in Decline.” National Defense, February 5, 2020. https://www.nationaldefensemagazine.org/articles/2020/2/5/defense-industrial-base-earns-c-grade-in-new-report

[6] Rothenberg, Randall. The Neoliberals: Creating the New American Politics. New York: Simon and Schuster, 1984, pp. 114-120. https://www.amazon.com/neoliberals-Creating-new-American-politics/dp/0671458817

[7] Atkinson, Robert D. and Michael Lind. “National Developmentalism: From Forgotten Tradition to New Consensus.” American Affairs, Summer 2019. https://americanaffairsjournal.org/2019/05/national-developmentalism-from-forgotten-tradition-to-new-consensus/

[8] Ibid

[9] Salam, Reihan. “Normalizing Trade Relations With China Was a Mistake.” Atlantic, June 8, 2018. https://www.theatlantic.com/ideas/archive/2018/06/normalizing-trade-relations-with-china-was-a-mistake/562403/

[10] Shane, Daniel. “How China gets what it wants from American companies.” CNN Business, April 5, 2018. https://money.cnn.com/2018/04/05/news/economy/china-foreign-companies-restrictions/index.html

[11] Rosenbaum, Eric. “1 in 5 corporations say China has stolen their IP within the last year: CNBC CFO survey.” CNBC, March 1, 2019. https://www.cnbc.com/2019/02/28/1-in-5-companies-say-china-stole-their-ip-within-the-last-year-cnbc.html

[12] Rothenberg, pp. 114-120

[13] Federation of American Scientists. “Soviet Military Power: Chapter III – Theater Forces.” 1984. https://fas.org/irp/dia/product/smp_84_ch3.htm

[14] Alman, David. “Convoy Escort: The Navy’s Forgotten (Purpose) Mission.” War on the Rocks, December 30, 2020. https://warontherocks.com/2020/12/convoy-escort-the-navys-forgotten-purpose-mission

[15] Insinna, Valerie. “Inside America’s Dysfunctional Trillion-Dollar Fighter-Jet Program.” New York Times, August 21, 2019. https://www.nytimes.com/2019/08/21/magazine/f35-joint-strike-fighter-program.html

[16] Roblin, Sébastien. “The Navy spent $30B and 16 years to fight Iran with a littoral combat ship that doesn’t work.” NBC News, July 19, 2019. https://www.nbcnews.com/think/opinion/navy-spent-30b-16-years-fight-iran-littoral-combat-ship-ncna1031806

[17] Rothenberg, pp. 114-120

[18] Ibid

[19] Eckstein, Megan. “Marines Test ‘Lightning Carrier’ Concept, Control 13 F-35Bs from Multiple Amphibs.” USNI News, October 23, 2019. https://news.usni.org/2019/10/23/marines-test-lightning-carrier-concept-control-13-f-35bs-from-multiple-amphibs

[20] Clark, Bryan, Peter Haynes, Jesse Sloman, Timothy A. Walton. “Restoring American Seapower: A New Fleet Architecture for the United States Navy.” Center for Strategic and Budgetary Assessments, February 9, 2017. https://csbaonline.org/research/publications/restoring-american-seapower-a-new-fleet-architecture-for-the-united-states-

[21] “Commandant’s Planning Guidance: 38th Commandant of the Marine Corps.” https://www.hqmc.marines.mil/Portals/142/Docs/%2038th%20Commandant%27s%20Planning%20Guidance_2019.pdf?ver=2019-07-16-200152-700

Assessment Papers China (People's Republic of China) Cold War Economic Factors Maritime Michael D. Purzycki United States

Assessing Early Cold War Overestimations of Soviet Capabilities and Intent and its Applicability to Current U.S.- China Relations

Major John Bolton is a U.S. Army officer and doctoral candidate at the Johns Hopkins’ School of Advanced International Studies. He previously commanded Bravo Company, 209th Aviation Support Battalion, served as the Executive Officer for 2-25 Assault Helicopter Battalion, and the Brigade Aviation Officer for 4/25 IBCT (Airborne). He is a graduate of the U.S. Army Command and General Staff College’s Art of War Scholars Program and holds degrees in military history and mechanical engineering. An AH-64D/E Aviator, he has deployed multiple times with Engineer, Aviation, and Infantry units. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Early Cold War Overestimations of Soviet Capabilities and Intent and its Applicability to Current U.S.- China Relations

Date Originally Written:  January 5, 2021.

Date Originally Published:  February 22, 2021.

Author and / or Article Point of View:  The author is an Active Duty U.S. Army Officer attending a PhD program focused on American Foreign Policy. The author believes America tends to overestimate threat capabilities and too quickly resorts to military analysis or responses without considering better Whole of Government approaches. 

Summary:  Though it can illuminate adversaries’ worldview, when predicting actions, analyzing ideology is less effective than traditional balance of power frameworks. During the Cold War, American assumptions about a monolithic Communist block controlled by Moscow blinded American policymakers to opportunities (and challenges) from China to Vietnam. Even in ideological conflicts, states tend to act rationally in the international sphere.

Text:

“When it comes to predicting the nature and location of our next military engagements, since Vietnam, our record has been perfect. We have never once gotten it right[1].

– Robert Gates, former Secretary of Defense

A paramount transferable Cold War lesson is the need to disconnect ideology from assessment of state behavior. During the initial stages of the Cold War (1947-1953), American administrations habitually overestimated Soviet military capability and viewed Soviet and Chinese actions through an East vs. West ideological lens that was often inaccurate. Moreover, American policymakers assumed ideological agreement easily translated into operational coordination, even when America and its allies could hardly manage to do so. As a result of this ideological focus, the United States expended resources and energy building far more nuclear weapons than balance required and unnecessarily shunned Communist China for over 20 years. Today this pattern is repeating as scholars and defense planners increasingly ascribe China’s actions to ideological, rather than geopolitical factors[2]. Or, failing to see the obvious, policymakers have coined new monikers such as “revisionist” toward normal, if aggressive, behavior. 

Ideology does far better in explaining a state’s domestic rather than international actions. Viewed using Waltz’s 3rd image (interstate interactions), states consider their interests and the balance of power, rather than what their domestic ideology demands[3]. As a result, interstate behavior is remarkably consistent with the balance of power. To be sure, some states are more aggressive than others due to ideology, governmental structure, or individual leaders. However, according to defense analysis geopolitical factors remain predominant as they have since the Peloponnesian War[4].

British Prime Minister Neville Chamberlain’s capitulation to Adolph Hitler’s demand at Munich in 1938 is widely considered to have contributed to the German invasion of Poland the following year. However, Chamberlain’s acquiesce to Hitler’s demands came as much from balance of power analysis based on British and French weakness as a desire for peace or pacifist leanings at home[5]. Had the Allies been better prepared for war; a more stable balance of power could have preempted, or at least stalled, Nazi aggression. 

American policy during the Cold War drew heavily from George Kennan’s 1946 “Long Telegram” and 1947 “X” article. Kennan, based on extensive personal experience, depicted the insular, paranoid nature of Soviet Stalinism. Such a state could not be changed but would eventually collapse as a result of a defunct government and sclerotic body politic[6]. As a result, Kennan recommended that the United States “contain” the Soviets within their current sphere of influence in Eastern Europe. Though he stood by his description of Soviet society and his prognosis for the eventual demise of the Soviet System, Kennan would later distance himself from the aggressive form of containment adopted in his name[7].

Two brief examples illustrate the perils of assuming too much regarding an opponent’s ideology: the U.S.-Soviet “Missile Gap” and the American failure to foresee the Sino-Soviet Spilt. The “Missile Gap” was the alleged insufficiency of American nuclear forces relative to Soviet missiles that became a major talking point after the 1957 Soviet launch of Sputnik. Despite officials under U.S. President Dwight Eisenhower repeatedly providing intelligence demonstrating U.S.-Soviet parity, and a general qualitative and quantitative American superiority, then-senator John F. Kennedy and defense hawks lambasted the Eisenhower Administration as “weak” for the supposed failure to match Soviet arms[8]. The “gap,” however, never existed. Robert McNamara, President Kennedy’s Secretary of Defense later called the missile gap a “myth…[created] by emotionally guided but nonetheless patriotic individuals in the Pentagon[9].”

Likewise, American policy toward Communist China took a hard turn toward the ideological, isolating Communist China even more so than the Soviet Russia. Though a dedicated Marxist-Leninist, Chinese leader Chairman Mao Tse-tung was foremost a patriot, focused on restoring a strong, independent China. Soviet influence, much less command and control, was limited, especially when compared to communist movements in Europe. From the Chinese Communist (CCP) takeover in 1949 until the Korean War, many State Department officials believed that after 2-3 years the U.S. and China could renew relations – that Mao could function as an Asian counterpart to Tito’s relatively moderate communism in Yugoslavia[10]. After the Korean War, however, with Cold War frameworks hardened, American policymakers failed to see clear indications of the forthcoming Sino-Soviet split, despite ample evidence from as early as the end of WWII[11]. The net result was delaying for nearly forestalling for 20 years what became a highlight of American diplomacy, the U.S.-China rapprochement under Nixon.

For a nation so heavily committed to freedom, Americans have shown a strange persistent tendency to simplify other states to ideological stereotypes we discount for ourselves. This has terribly clouded the contemporary China debate. China as a competitor is a function of geopolitics, namely structural and geographic factors, more so than ideology[12]. This conclusion does not discount the importance of CCP ideology, but provides context. While Chinese President Xi Jinping and the CCP have espoused the “China Dream” and embraced a particularly aggressive form of Chinese Nationalism, this has not necessarily translated into China’s international actions, which are much better explained by balance of power analysis. As a growing state in a competitive environment, China’s actions make sense as it seeks to flex its power and establish regional supremacy. China’s history of foreign intrusion and suffering during the “Century of Humiliation” of course color its contemporary maneuvers, but they are not substantially different from what we would expect any emerging power to do. It is also worth considering that Xi’s use of nationalism is largely focused on domestic audiences as a means to consolidate CCP power[13].

Nothing in the previous paragraph discounts the very real challenge China presents to the United States and smaller states of Southeast Asia, two of which are American allies. However, Xi’s development of a Chinese sphere of influence, largely built on bilateral trade agreements is not necessarily about “freezing out” the United States. In short, China is not a Communist state focused on world domination; in fact, its xenophobic nationalism of late is detrimental to that end. China is focused on its own exceptionalism, not ending America’s[14]. 

A clear lesson of the Cold War is the danger of oversimplification. Doing so makes caricatures of real conflicts and leads to poor policy. In the examples above the United States lost 20 years of exploiting the Sino-Soviet Split and spent billions on arguably useless extra nuclear weapons. Moreover, a presumption that ideological coherence between disparate adversaries leads operational coordination is foolhardy without evidence. Even in the midst of an ideological conflict, it is best the United States detaches an overly simplistic ideological lens to properly respond with the most effective means at our disposal[15]. Analysis requires rationality. 


Endnotes:

[1] Zenko, Micah (October 12, 2012). 110% Right 0% of the Time, from https://foreignpolicy.com/2012/10/16/100-right-0-of-the-time.

[2] Huang, Yanzhong. (September 8, 2020). America’s Political Immune System Is Overreacting to China. From https://foreignpolicy.com/2020/09/08/america-overreacting-to-china-political-immune-system; Colby, Elbridge, discussion regarding State Department’s May 2020 China Policy Paper, from https://youtu.be/KyBVmSaua5I.

[3] Waltz, K. N. (2018). Man, the State and War: A Theoretical Analysis. New York: Columbia University Press.159-170.

[4] Kaplan, R. D. (2013). The Revenge Of Geography: What The Map Tells Us About Coming Conflicts And The Battle Against Fate.

[5] Munich Agreement, Encyclopedia Britannica, https://www.britannica.com/event/Munich-Agreement.

[6] See https://www.trumanlibraryinstitute.org/this-day-in-history-2/; Kennan, (July 1947). The Sources of Soviet Conduct, https://www.foreignaffairs.com/articles/russian-federation/1947-07-01/sources-soviet-conduct.

[7] Hogan, M. J. (1998). A Cross of Iron: Harry S. Truman and the Origins of the National Security State, 1945–1954. Cambridge University Press. https://doi.org/10.1017/CBO9780511664984

[8] Preble, Christopher (December 2003). “Who Ever Believed in the ‘Missile Gap’?”: John F. Kennedy and the Politics of National Security. Presidential Studies Quarterly 33, no. 4. 

[9] McNamara quoted in Ibid. 

[10] See Foreign Relations of the United States, 1947, The Far East: China, Volume VII, Documents 6, 270, 708, 617; Finkelstein, D. M. (1993). Washington’s Taiwan Dilemma, 1949-1950: From Abandonment to Salvation. George Mason University Press. https://books.google.com/books?id=8RW7AAAAIAAJ

[11] Butterworth, Walton. (May 1950). China in Mid-Revolution, Speech at Lawrenteville, NJ, May 1950, Butterworth Papers, George Marshall Library, Lexington, VA. Box 3, Folder 13.

[12] Lester, Simon. (January 6, 2019). Talking Ourselves into a Cold War with China. From https://www.cato.org/publications/commentary/talking-ourselves-cold-war-china; Wang, Z. (2012). Never Forget National Humiliation: Historical Memory in Chinese Politics and Foreign Relations. Columbia University Press.

[13] Colby, Elbridge, discussion regarding State Department’s May 2020 China Policy Paper, from https://youtu.be/KyBVmSaua5I.

[14] Bacevich, Andrew. (January 4, 2021). America’s Defining Problem In 2021 Isn’t China: It’s America, from https://www.theamericanconservative.com/articles/americas-defining-problem-in-2021-isnt-china-its-america.

[15] Herring, George. (2002). America’s Longest War: The United States and Vietnam, 1950-1975. McGraw-Hill, 225-235.

Assessment Papers China (People's Republic of China) Cold War Governing Documents and Ideas John Bolton Policy and Strategy Russia Soviet Union

Assessment of the Use of Poisons as the Weapon of Choice in Putin’s Russia

Rylee Boyd is an incoming MSc candidate in Strategic Studies at the University of Aberdeen. Her areas of focus are Russia, CBRN weapons, and human security. She can be found on twitter @_RyleeBoyd. Divergent Option’s content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Use of Poisons as the Weapon of Choice in Putin’s Russia

Date Originally Written:  November 3, 2020.

Date Originally Published:  December 28, 2020.

Author and / or Article Point of View:  The author believes that the use of poison as an assassination weapon is a strategic choice by Russian President Vladimir Putin due to several different factors beyond just the goal of inflicting death on political enemies. Understanding these choices is important to countries hoping to respond with consequences for Russia when such poisonings do occur.

Summary:  Poison is the weapon of choice in Putin’s Russia as it makes attack attribution challenging. This attribution challenge is especially true for Putin, as even if he did not order a poisoning, these attacks certainly don’t get carried out without his approval or at least his passive acceptance. Both of these factors make it difficult to leverage sanctions or other consequences against the perpetrators of the attacks. The availability of poison also makes it a keen choice for use.

Text:  Russia’s chemical weapons program dates back to the early 20th century when it created a laboratory solely dedicated to creating different poisons. During the time of the Soviet Union, the government commonly used poison on political prisoners. Though Russia claims that the poison program was dissolved along with the dissolution of the Soviet Union, the 21st century poisonings certainly raise questions about the credibility of that claim[1]. Moscow made news on August 20th when Alexei Navalny, a prominent critic of Putin and someone who exposed corruption within the Russian government, had to be transported to a hospital in Omsk due to a suspected poisoning[2]. It has now been confirmed that Navalny has been poisoned with Novichok, a chemical nerve agent from the Soviet-era chemical weapons program, that was also used in the poisoning of Sergei Skripal and his daughter in the United Kingdom in 2018[3]. Navalny is the latest victim in a long line of poisonings of Putin critics and supposed threats to the Kremlin, which brings about the recurring question of why poison seems to be a common weapon of choice.

The use of poison by Moscow is a strategic decision that results in the ability to feign ignorance by Putin and the difficulty in attributing the attack to anyone specific. Because poisons are only detectable in one’s system for a certain amount of time, Moscow uses its ability to prevent victims from leaving Russia for a period of time after the attack in order to prevent detection. In the case of the Activist Pyotr Verzilov who fell ill in 2018, he was kept in a Russian intensive care ward for a few days before being allowed to be released to Berlin[4]. German doctors suspected that Verzilov was poisoned, but they were not able to find a trace of it, and Verzilov blamed the Russian authorities for the attack and keeping him quarantined in Russia for a period of time[5]. This delay tactic can also be exemplified through the recent poisoning of Alexei Navalny, when Russia initially refused to allow him to be transferred to Berlin for treatment. Russia eventually ceded to the request to move to Germany, and thankfully by the time Navalny got to Berlin doctors were still able to find traces of Novichok in his system[6].

The fact that the poison cannot always be detected by the time of hospital admittance in another country, and that it can be difficult to determine how the victim came into contact with the poison, makes attack attribution extremely difficult. This attribution challenge in turn makes it difficult to leverage consequences against the perpetrators of the attacks. This attribution challenge has not stopped many countries though, for the use of diplomatic expulsions and sanctions have been used to bring ramifications against specific members of the Kremlin apparatus[7].

Another reason for the use of poisons is the ease with which they seem to be accessed. While the use of any chemical weapon, especially poison, requires precise expertise and intricate devising, the history of the Soviet chemical weapons program and recent poisonings make it clear that Russia still has quite the stockpile of poisons. The experience of using poison against people both in and outside of Russia also has a history dating back to Soviet times[8]. Even though Russia is a member of the Organization for the Prohibition of Chemical Weapons, which bans the use of any toxic agents as chemical weapons, over seven poisonings in the past two decades suggest that Russia clearly still has some store of chemical weapons[9]. Poisons are not easy to make from scratch, and the manner of poisonings and frequency of the attacks suggest that the security services are invariably involved in such onslaughts.

The use of poison is also to make a symbolic point. Poison usage shows that Putin or someone else high up in the Kremlin apparatus can more or less get away with poisoning critics without any serious consequences. And while these attacks do not always result in death, they still serve as a success for Russia, as the attack may likely scare the victim enough to prevent them from continuing any work or activism against Putin and his cronies. However, it is notable that evidence suggests that poison as a deterrence is not always successful. Navalny has already stated that he plans to return to Moscow, even though he has to know that he is at quite a risk now[10]. The poisoning of Anna Politkovskaya in 2004 occurred as she was making her way to report on the hostage situation of a school in Beslan. She survived the poisoning and continued her work as a journalist reporting honestly on issues of corruption and human rights, but was later shot in her apartment building elevator two years later[11].

The use of poison as the weapon of choice against Moscow’s political enemies is a strategic choice as a weapon that causes more than just death or serious illness. While denying Russia its stores of chemical weapon stores and ensuring poison attacks can be attributed and followed by consequences, is an obvious solution, this is easier said than done.


Endnotes:

[1] Herman, E. (2018, June 23). Inside Russia’s long history of poisoning political enemies. Retrieved November 03, 2020, from https://nypost.com/2018/06/23/inside-russias-long-history-of-poisoning-political-enemies

[2] Chappell, B., & Schmitz, R. (2020, August 24). Navalny Was Poisoned, But His Life Isn’t in Danger, German Hospital Says. Retrieved November 03, 2020, from https://www.npr.org/2020/08/24/905423648/navalny-was-poisoned-but-his-life-isnt-in-danger-german-hospital-says

[3] Halasz, S., Jones, B., & Mezzofiore, G. (2020, September 03). Novichok nerve agent used in Alexey Navalny poisoning, says German government. Retrieved November 03, 2020, from https://www.cnn.com/2020/09/02/europe/alexey-navalny-novichok-intl/index.html

[4] Groch, S. (2020, August 30). Beware the tea: Why do Russians keep being poisoned? Retrieved November 03, 2020, from https://www.smh.com.au/world/europe/beware-the-tea-why-do-russians-keep-being-poisoned-20200827-p55poy.html

[5] Miriam Berger, A. (2020, August 30). Why poison is the weapon of choice in Putin’s Russia. Retrieved November 03, 2020, from https://www.washingtonpost.com/world/2020/08/21/why-poison-is-weapon-choice-putins-russia

[6] Chappell, B., & Schmitz, R.

[7] Shesgreen, D. (2018, August 09). Trump administration to impose new sanctions on Russia for attempted assassination of ex-Russian spy. Retrieved November 03, 2020, from https://www.usatoday.com/story/news/politics/2018/08/08/russia-sanctions-trump-team-responds-poisoning-sergei-skripal/938147002

[8] Factbox: From polonium to a poisoned umbrella – mysterious fates of Kremlin foes. (2018, March 06). Retrieved November 03, 2020, from https://www.reuters.com/article/us-britain-russia-factbox/factbox-from-polonium-to-a-poisoned-umbrella-mysterious-fates-of-kremlin-foes-idUSKCN1GI2IG

[9] Arms Control Today. (n.d.). Retrieved November 03, 2020, from https://www.armscontrol.org/act/2020-11/news/novichok-used-russia-opcw-finds

[10] Bennhold, K., & Schwirtz, M. (2020, September 14). Navalny, Awake and Alert, Plans to Return to Russia, German Official Says. Retrieved November 03, 2020, from https://www.nytimes.com/2020/09/14/world/europe/navalny-novichok.html

[11] Anna Politkovskaya. (2018, October 23). Retrieved November 03, 2020, from https://pen.org/advocacy-case/anna-politkovskaya

Assessment Papers Chemical, Biological, Radiological, and Nuclear Weapons Russia Rylee Boyd

Assessing Ukraine’s Return to Stability

Stuart E. Gallagher is a United States Army Officer and a graduate of the National Defense University. He served as a Military Advisor to the United States Department of State during the outset of the Ukraine crisis and is a recognized subject matter expert on Russian-Ukrainian affairs. He currently serves as the Chief, G3/5 Plans and Analysis for the United States Army John F. Kennedy Special Warfare Center and School. Divergent Options content does not contain information of an official nature nor does the content represent the official position of any government, organization or group.


Title:  Assessing Ukraine’s Return to Stability

Date Originally Written:  September 22, 2020.

Date Originally Published:  December 9, 2020.

Author and / or Article Point of View:  The author maintains a keen interest in Russian-Ukrainian affairs. The author contends that Ukraine will not return to a position of stability as long as the West continues to seek a military solution to the conflict – the military instrument of national power will only serve as a supporting effort. Stability in Ukraine will only be attained through thoughtful and effective diplomacy.

Summary:  Russia sees Ukraine as critical to its security and economy. Viewing Ukraine as a zero sum game, Russia will continue to destabilize it, to prevent Ukraine’s inclusion into the North Atlantic Treaty Organization and the European Union. The solution to Russian destabilization of Ukraine is not military means – this situation will require diplomatic intervention with compromise by both sides – if there is to be any enduring peace and stability in the region.

Text:  Throughout history, Ukraine has played a critical role in Russia’s security and economy. The Soviet Union collapse in 1991 led to a techtonic change in the security environment that endures to this day. This change also opened the door to self-determination, enabling Ukraine to become a state of its own. Since that time Russia has remained intent on keeping Ukraine in it’s orbit as Ukraine plays a crucial role in providing a geographic buffer between Russia and the West.

When the former President of Ukraine Yanukovych fled the country in February of 2014, Ukraine began to gravitate increasingly more towards the West. As a result, Russia took immediate action. In 2014, Russia occupied eastern Ukraine and invaded Crimea ultimately destabilizing the country and effectively blocking its inclusion into the North Atlantic Treaty Organization (NATO) and the European Union. Russia’s actions relied heavily on information and the military as their primary instruments of national power.

When considering the Ukraine conflict, one of the first questions one must ask is why? Why does Russia care so much about western expansion? The first part of this answer derives from the country’s history. More specifically, Russia has consistently survived existential threats through defense in depth. That is to say, Russia maintained a geographical buffer zone between itself and that of its adversaries, which provided a level of stand-off and protection critical to its survival[1]. The second part of this answer is a perceived broken promise by the West that NATO would not expand. As some recently declassified documents illustrate, “Soviet leader Mikhail Gorbachev was given a host of assurances that the NATO alliance would not expand past what was then the German border in 1990[2].” This point is one that Vladimir Putin reminded western leaders about during the Munich Conference on Security Policy in 2007 when he stated, “What happened to the assurances our Western partners made after the dissolution of the Warsaw Pact? Where are those declarations today[3]?” The third part of this answer lies in the Russian perception of the West taking advantage of Russia after the fall of the Soviet Union, which included and continues to include Western encroachment on Russian borders. Debating the merits of whether or not this perception is a reality is beyond the scope of this article, but suffice to say that in the Russian mind, when it comes to NATO expansion and encroachment, perception is reality thus justifying any and all Russian actions in the near abroad.

The warnings concerning Russia’s actions in Ukraine over the course of the past five years have been voiced on multiple occasions since the 1990s. In 1997, Zbigniew Brzenzinski, former counselor to President Lyndon B. Johnson and National Security Advisor to President Jimmy Carter stated, “If Moscow regains control over Ukraine, with its 52 million people and major resources as well as access to the Black Sea, Russia automatically again regains the wherewithal to become a powerful imperial state, spanning Europe and Asia[4].” In a similar vein, George Kennan, former American diplomat and historian, professed that pushing ahead with expansion “would inflame the nationalistic, anti-Western, and militaristic tendancies in Russian opinion,…have an adverse effect on the development of Russian democracy,” and “restore the atomosphere of Cold War to East-West relations[5].” Considering Russia’s actions, it would appear that these warnings were ignored until 2014.

Today the situation in eastern Ukraine remains grim. Despite the litany of economic sanctions placed on Russia by the West, over 1 billion dollars of military aid to Ukraine and a multitude of diplomatic engagements to include the Minsk agreements, the conflict in Ukraine endures with no end in sight – a conflict that has claimed more than 10,300 lives, 24,000 injuries and displaced over 1.5 million people since April of 2014[6]. To exacerbate matters, the conflict has for the most part fallen out of the media, eclipsed by other events deemed more pressing and newsworthy.

Although the Ukrainian military is making great strides in training, manning and equiping their force with Western assistance, they are still a long way from unilaterally standing up to a military power like Russia with any sort of positive outcome. Even if Ukraine could stand up militarily to Russia, a land war between Russia and Ukraine would be catastrophic for all involved. Hence, the solution to the conflict in Ukraine and the future stability of the region does not lie with the military. On the contrary, it will ultimately be resolved through diplomacy and compromise. The question is when?

It is safe to assume that no western leader wants to see the conflict in Ukraine escalate. However, as it sits, the frozen conflict in the region is likely to endure as the West continues to struggle with the new geopolitical landscape that Russia instigated. “The prospect of [the West] recognizing Russia as an aggressor is too scary. It means that a country that was a founding or key member for setting up the world’s post-World War II security and diplomatic institutions has undermined those institutions and deemed them redundant. The world has no idea how to deal with this massive shift in Russia’s international relations[7].” Further, “Modern diplomacy presumes that everyone plays by the same rules, which include at least some political will to negotiate once you sit at the round table, and the readiness to implement agreements once they are signed[8].” Unfortunately, Russia and the West’s interests continue to be mutually exclusive in nature. In order for diplomacy to work, the West will need to understand and admit to this paradigm shift and adapt its diplomatic efforts accordingly. However, the Kremlin does not want Ukraine to slip into a Western orbit as it threatens their economic and security interests in the region. The result… diplomatic gridlock.

Albert Einstein once surmised that, “We cannot solve our problems with the same thinking we used when we created them[9].” This is a thought that aptly applies to the conflict in Ukraine. Ukraine simply cannot be viewed as a zero-sum game and/or a prize between Russia and the West. Moreover, although the military will play a role, the situation will not be solved with shear military might alone. The long-term solution to this in Ukraine will only be realized through meaningful, informed diplomatic dialogue and compromise on both sides of the conflict. This road less traveled will take time and be fraught with disagreement and frustration, but the alternative is much worse. It is one riddled with more death, more destruction and an enduring instability that will impact Russian and European interests for years to come.


Endnotes:

[1] Gallagher, Stuart. Assessing the Paradox of NATO Expansion. Real Clear Defense (2020). Retrieved September 14, 2020 from: https://www.realcleardefense.com/articles/2020/06/02/assessing_russias_pursuit_of_great_power_115341.html

[2] Majumdar, Dave. Newly Declassified Documents: Gorbachev Told NATO Wouldn’t Move Past East German Border. The National Interest (2017). Retrieved September 15, 2020 from: https://nationalinterest.org/blog/the-buzz/newly-declassified-documents-gorbachev-told-nato-wouldnt-23629

[3] Ibid.

[4] Zbignew Brezezinski. The Grand Chessboard: American Primacy and its Geostrategic Imperitives (1997). Retrieved September 14, 2020 from: https://www.cia.gov/library/abbottabad-compound/36/36669B7894E857AC4F3445EA646BFFE1_Zbigniew_Brzezinski_-_The_Grand_ChessBoard.doc.pdf

[5] Menon, Rajan and William Ruger. “NATO Enlargement and U.S. Grand Strategy: A Net Assessment.” Springer Link (2020). Retrieved September 15, 2020 from: https://doi.org/10.1057/s41311-020-00235-7

[6] Council on Foreign Relations. Global Conflict Tracker (2020). Retrieved September 11, 2020 from: https://www.cfr.org/global-conflict-tracker/conflict/conflict-ukraine

[7] Gorchinskaya, Katya. “A Deadly Game of Hide-and-Seek: Why a Diplomatic Solution in Russia/Ukraine War is Nowhere in Sight.” Institute for Human Sciences (2015). Retrieved October 1, 2020 from: https://www.iwm.at/transit-online/deadly-game-hide-seek-diplomatic-solution-russiaukraine-war-nowhere-sight.

[8] Ibid.

[9] Einstein, Albert. Brainy Quote. Retrieved September 16, 2020 from: https://www.brainyquote.com/quotes/albert_einstein_121993

Assessment Papers Diplomacy Russia Stuart E. Gallagher Ukraine

An Assessment of Realism in American Foreign Policy

Brandon Patterson is a graduate student of International Affairs at the School of Global Policy and Strategy at the University of California San Diego.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Realism in American Foreign Policy

Date Originally Written:  September 21, 2020.

Date Originally Published:  December 7, 2020.

Author and / or Article Point of View:  The author believes that neither realism nor its traditional opponent, Wilsonianism, can stand on their own, and must be linked for a coherent concept of the national interest, fusing America’s strategic necessities, its power, and its values.

Summary:  The existence of realism as a school of thought is a product of America’s unique sense of security. Realism, emphasizing what in other countries is taken for granted, cannot stand as an independent school of thought; yet, as a component in a comprehensive policy taking into account both power and values, it is vital. Realism absent values tempts constant tests of strength; idealism unmoored from strategy is sterile. The two are likely best when blended.

Text:  The intellectual tradition in American foreign policy is without parallel. Whereas most of the world found itself navigating the international system with narrow margins of survival, the United States, driven by a belief in the universal applicability of its values, conceived the objective of American engagement abroad not as traditional foreign policy, but the vindication of the nation’s founding values to the betterment of mankind. Such high-minded ideals have time and again collided with the contradictions of the international system, creating a friction that tugged at the American psyche throughout the twentieth century and into the present.

Symptomatic of this intellectual blight is the existence of “realism” — a focus on power and the national interest — as an independent school of thought, fabricating a purely theological dialectic in which realism and idealism are presented as opposing perceptions rather than components of a shared existence, just as human agency and material factors merge to conceive history itself. In systems which have developed geopolitical traditions, realism requires no definition. Since Cardinal de Richelieu first filtered foreign policy through the prism of Raison D’état, the requirements of survival were axiomatic, spontaneous even[1]. By contrast, the notion of the national interest in American thought is defined by its self-consciousness. Only in the United States can there be a debate about what precisely the national interest is and only in a system with such an idealistic tradition can “realism” be employed as a label.

Realism poses a number of impediments to a thoughtful and creative foreign policy. For instance, realism as a school of thought is inherently vacuous. Accepting the overriding necessities of geopolitics does not constitute a philosophy any more than accepting the existence of the inherent laws of the natural world constitutes a science. What is more important in both cases is the implications of these realities as they affect human free will. In other words, realism treats factors which can be assumed as given as though it is a worldview subject to debate, which in fact blunts its objective rather than serving it. Hans Morgenthau was not wrong when he noted that the world is “the result of forces inherent in human nature[2].” In fact, Morgenthau was profoundly correct. But he and his ideological adherents capture only part of the reality of international affairs. Such facts are self-evident; their interpretation by statesmen are not.

Despite its hard edges, or perhaps because of them, realism often becomes a subterfuge for avoiding difficult action. For example, the men tasked with upholding the rickety Post-World War I Versailles Order — United Kingdom Prime Minister Neville Chamberlain chief among them — fancied themselves as “realists” in their justification for presiding over the dismemberment of Czechoslovakia, when in fact, a more sound geopolitical assessment would have urged rapid action against Germany as it reoccupied the Rhineland, when the threat remained ambiguous. Though Morgenthau and Walt Lippmann, the great thinkers of the American realist tradition, were correct in their critiques of American involvement in Vietnam[3], their advocacy for unilateral withdrawal rebelled against strategic analysis[4].

Realism, moreover, when unmoored from basic values, has a tendency to turn on itself[5]. Witness German Chancellor Otto Von Bismarck, perhaps the greatest statesmen of his day. Whatever the moderation of his policy or the dexterity of his maneuvers, because he had no moral foundation for his policies — in this case, what purpose a unified Germany would serve in Europe — every move he made became an act of sheer will[6]. No statesman, not even the master, could have sustained such an effort indefinitely. Power, however vital, cannot be conceived as its own justification. A philosophical basis for the outcomes one seeks is imperative.

Inevitably, realism produces a counterpoise in idealism, in this case drawn from the Wilsonian tradition of American foreign policy. Wilsonianism, with its overriding emphasis on self-determination, democracy, and international law, is equally dissolving when unleavened by geopolitics. Each camp emphasizes its own perception at the expense of the other. This perception emphasis is only possible in the academy, as upon entering government, the “idealists” are awakened to geopolitical realities; while “realists” are likely to find that perfect flexibility in policy is an illusion; the range of choice is limited not only by physical but cultural factors — the basic values of the American people.

For instance, during the Suez Crisis, U.S. President Dwight Eisenhower refused to face down the strategic challenge posed by Egyptian President Gamal Abdel Nasser on the basis of opposition to colonialism[7]; while that same year, Eisenhower was forced to succumb to geopolitical realities as the pro-democracy upheaval in Hungary was brutally suppressed[8]. The supposed distinction between the ideal and the real is not as stark as the adherents of each pretend. Indeed, Chamberlain tolerated German excesses on the basis of self-determination; the absence of such a pretense is what finally brought London to oppose Nazi expansion, never mind the dictates of the balance of power[9]. Morgenthau’s opposition to America’s involvement in Vietnam, moreover, placed him in league with the highly ideological peace movement. Thus, even those most dedicated to one school find themselves grappling with the realities of the other.

The solution to this quandary then, is to realize that the choice between the ideal and the real is a chimera. The two are best when blended. The most coherent policy is one that manages the friction between what is physically achievable and what the society will view as legitimate in accordance with its fundamental values. Ideals are absolute; strategy is subject to condition. The factors relevant to making a decision require careful reflection; ideals require no reinterpretation calibrated to circumstance — indeed, they become inconsistent with it. Friction is therefore inherent. Policy makers, and academics can strike this balance, and accept that the relative emphasis of each strain will depend on the specific situation one confronts. The tragedy of American foreign policy is the struggle between a desire for moral perfection and the inherent imperfection which defines the world we inhabit. Tragedy, of course, is in the very nature of statesmanship.


Endnotes:

[1] Hill, H.B. (Translator) (1954). The political Testament of Cardinal de The Significant Chapters and Supporting Selections (1st ed). University of Wisconsin Press.

[2] Morgenthau, H (1948, 2006). Politics Among Nations: The Struggle for Power and Peace, Revised by Kenneth W. Thompson and W. David Clinton (p. 3). New York: McGraw Hill.

[3] Logevall, F. (1995). First Among Critics: Walter Lippmann and the Vietnam War. The Journal of American-East Asian Relations, 4(4), 351-375. Retrieved September 29, 2020, from http://www.jstor.org/stable/23612509

[4] Quoted in Podhoretz, N. (1982) Why We Were in Vietnam (p. 100). New York: Simon and Schuster., Bew, J. (2015) Realpolitik: A History (pp.261-62 ). Oxford University Press

[5] Bew, Ibid (pp.259-60 ).

[6] Kennan, G.F. (1979). The Decline of Bismarck’s European Order: Franco-Russian Relations 1875-1890. Princeton University Press

[7] Kissinger, H. (1994). Diplomacy (pp. 540-542). New York: Simon and Schuster.

[8] Ibid (566-67).

[9] Ibid (p. 317).

Assessment Papers Brandon Patterson International Relations Theories United States

Assessing the Impact of the Information Domain on the Classic Security Dilemma from Realist Theory

Scott Harr is a U.S. Army Special Forces officer with deployment and service experience throughout the Middle East.  He has contributed articles on national security and foreign policy topics to military journals and professional websites focusing on strategic security issues.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Impact of the Information Domain on the Classic Security Dilemma from Realist Theory

Date Originally Written:  September 26, 2020.

Date Originally Published:  December 2, 2020.

Author and / or Article Point of View:  The author believes that realist theory of international relations will have to take into account the weaponization of information in order to continue to be viable.

Summary:  The weaponization of information as an instrument of security has re-shaped the traditional security dilemma faced by nation-states under realist theory. While yielding to the anarchic ordering principle from realist thought, the information domain also extends the classic security dilemma and layers it with new dynamics. These dynamics put liberal democracies on the defensive compared to authoritarian regimes.

Text:  According to realist theory, the Westphalian nation-state exists in a self-interested international community[1]. Because of the lack of binding international law, anarchy, as an ordering principle, characterizes the international environment as each nation-state, not knowing the intentions of those around it, is incentivized to provide for its own security and survival[2]. This self-help system differentiates insecure nations according to their capabilities to provide and project security. While this state-of-play within the international community holds the structure together, it also creates a classic security dilemma: the more each insecure state invests in its own security, the more such actions are interpreted as aggression by other insecure states which initiates and perpetuates a never-ending cycle of escalating aggression amongst them[3]. Traditionally, the effects of the realist security dilemma have been observed and measured through arms-races between nations or the general buildup of military capabilities. In the emerging battlefield of the 21st century, however, states have weaponized the Information Domain as both nation-states and non-state actors realize and leverage the power of information (and new ways to transmit it) to achieve security objectives. Many, like author Sean McFate, see the end of traditional warfare as these new methods captivate entities with security interests while altering and supplanting the traditional military means to wage conflict[4]. If the emergence and weaponization of information technology is changing the instruments of security, it is worth assessing how the realist security dilemma may be changing along with it.

One way to assess the Information Domain’s impact on the realist security dilemma is to examine the ordering principle that undergirds this dilemma. As mentioned above, the realist security dilemma hinges on the anarchic ordering principle of the international community that drives (compels) nations to militarily invest in security for their survival. Broadly, because no (enforceable) international law exists to uniformly regulate nation-state actions weaponizing information as a security tool, the anarchic ordering principle still exists. However, on closer inspection, while the anarchic ordering principle from realist theory remains intact, the weaponization of information creates a domain with distinctly different operating principles for nation-states existing in an anarchic international environment and using information as an instrument of security. Nation-states espousing liberal-democratic values operate on the premise that information should flow freely and (largely) uncontrolled or regulated by government authority. For this reason, countries such as the United States do not have large-scale and monopolistic “state-run” information or media channels. Rather, information is, relatively, free to flow unimpeded on social media, private news corporations, and print journalism. Countries that leverage the “freedom” operating principle for information implicitly rely on the strength and attractiveness of liberal-democratic values endorsing liberty and freedom as the centerpiece for efforts in the information domain. The power of enticing ideals, they seem to say, is the best application of power within the Information Domain and surest means to preserve security. Nevertheless, reliance on the “freedom” operating principle puts liberal democratic countries on the defensive when it comes to the security dimensions of the information domain.

In contrast to the “freedom” operating principle employed by liberal democratic nations in the information domain, nations with authoritarian regimes utilize an operating principle of “control” for information. According to authors Irina Borogan and Andrei Soldatov, when the photocopier was first invented in Russia in the early 20th century, Russian authorities promptly seized the device and hid the technology deep within government archives to prevent its proliferation[5]. Plainly, the information-disseminating capabilities implied by the photocopier terrified the Russian authorities. Such paranoid efforts to control information have shaped the Russian approach to information technology through every new technological development from the telephone, computer, and internet. Since authoritarian regimes maintain tight control of information as their operating principle, they remain less concerned about adhering to liberal values and can thus assume a more offensive stance in the information domain. For this reason, the Russian use of information technology is characterized by wide-scale distributed denial of services attacks on opposition voices domestically and “patriot hackers” spreading disinformation internationally to achieve security objectives[6]. Plausible deniability surrounding information used in this way allows authoritarian regimes to skirt and obscure the ideological values cherished by liberal democracies under the “freedom” ordering principle.

The realist security dilemma is far too durable to be abolished at the first sign of nation-states developing and employing new capabilities for security. But even as the weaponization of information has not abolished the classic realist dilemma, it has undoubtedly extended and complicated it by adding a new layer with new considerations. Whereas in the past the operating principles of nation-states addressing their security has been uniformly observed through the straight-forward build-up of overtly military capabilities, the information domain, while preserving the anarchic ordering principle from realist theory, creates a new dynamic where nation-states employ opposite operating principles in the much-more-subtle Information Domain. Such dynamics create “sub-dilemmas” for liberal democracies put on the defensive in the Information Domain. As renowned realist scholar Kenneth Waltz notes, a democratic nation may have to “consider whether it would prefer to violate its code of behavior” (i.e. compromise its liberal democratic values) or “abide by its code and risk its survival[7].” This is the crux of the matter as democracies determine how to compete in the Information Domain and all the challenges it poses (adds) to the realist security dilemma: they must find a way to leverage the strength (and attractiveness) of their values in the Information Domain while not succumbing to temptations to forsake those values and stoop to the levels of adversaries. In sum, regarding the emerging operating principles, “freedom” is the harder right to “control’s” easier wrong. To forget this maxim is to sacrifice the foundations that liberal democracies hope to build upon in the international community.


Endnotes:

[1] Waltz, Kenneth. Realism and International Politics. New York: Taylor and Francis, 2008.

[2] Ibid, Waltz, Realism.

[3] Ibid, Waltz, Realsim

[4] Mcfate, Sean. The New Rules Of War: Victory in the Age of Durable Disorder. New York: Harper Collins Press, 2019.

[5] Soldatov, Andrei and Borogan, Irina. The Red Web: The Struggle Between Russia’s Digital Dictators and the New Online Revolutionaries. New York: Perseus Books Group, 2015.

[6] Ibid, Soldatov.

[7] Waltz, Kenneth Neal. Man, the State, and War: A Theoretical Analysis. New York: Columbia University Press, 1959.

Assessment Papers Cyberspace Influence Operations Scott Harr

An Assessment of the National Security Implications of First Contact

Lee Clark is a cyber intelligence specialist who has worked in the commercial, defense, and aerospace sectors in the US and Middle East. He can be found on Twitter at @InktNerd. He holds an MA in intelligence and international security from the University of Kentucky’s Patterson School. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the National Security Implications of First Contact

Date Originally Written:  September 23, 2020.

Date Originally Published:  November 30, 2020.

Author and / or Article Point of View:  The author is a cyber intelligence professional in the aerospace industry. This paper will assess the hypothetical international security fallout and nuances of first contact with alien life. The paper assumes that no human-extraterrestrial interaction has ever occurred. Thus, Unidentified Flying Object (UFO) and Unidentified Aerial Phenomena (UAP) reports are not considered evidence of contact. The author does not believe humans have ever encountered aliens, but does not rule out the possibility that life may exist elsewhere in the universe.

Summary:   Despite fictional portrayals of first contact, it is most likely that alien life encountered by humanity would be so different from any life encountered by people on earth that it would be inconceivable to plan for, and possibly even unrecognizable. First contact protocols in this scenario would likely be led by scientists. In the unlikely event that humanity encounters intelligent / communicative life, the response would more resemble a whole-of-society approach.

Text:  The main precedent for managing contact with intelligent alien life in the public space is the post-contact policy of the Search for Extraterrestrial Intelligence institute (SETI), once a NASA program and now a privately-funded research entity[1]. SETI focuses on radio signals, and their protocol is designed on the premise that aliens would send them a deliberate signal. Under SETI’s protocol, initial response to the revelation of intelligent alien life via radio signal would be guided primarily by the astrophysics community.

The SETI model, laudable though their mission is, has two key weaknesses. First, the likelihood that alien life would have developed along a similar enough trajectory and timeline to human civilization that the two societies would both have compatible radio technology is so small as to be negligible. If there is alien life with sentience and societal construction, their biology, ecology, sociology, and technology would be adapted to their unique home environment, as humans have adapted to the realities and limitations of Earth. Alien life is much less likely to resemble a little green man in a spaceship than, for instance, a jellyfish, anemone, or perhaps a sentient cloud of gas. The possibility of alien life, having developed in an alien environment, evolving to produce sentience, intelligence, and technology as humans conceive of them is extremely unlikely. If they do have technology, it would be adapted to their own needs, not ours. If humans find aliens first, it will likely not be because the aliens send humans a radio signal, or land on the White House lawn. If humanity wishes to find life elsewhere, it would most likely require a dedicated effort across the scientific community, including sending secondary sensors and exploration mission equipment on routine space missions.

Second, the implications of the existence of alien life, especially intelligent life or one or more developed societies, is so far-reaching that the first response cannot be responsibly left to the scientific community alone. A collaborative response by the international community would likely include a three-pronged approach: First, a group to handle contact consisting of an international team of civilian expertise such as linguists, engineers, astrophysicists, mathematicians, diplomats, and biologists. Second, an international defense team consisting of security expertise including tactical and strategic intelligence professionals, military strategists and leaders, and legal experts. Third and finally, an international team to manage public relations, likely a collaboration of civilian and military public affairs experts to determine if, when, and how much to reveal to the general public.

Even this approach has flaws: the likelihood that any nation discovering alien life would share it with other nations and coordinate a joint response is less than the likelihood of a nation concealing the information and attempting to use it to strategic advantage, as evidenced by the geopolitics surrounding the sharing of a potential COVID-19 vaccine between nations[2]. The internet, social media, and global disinformation campaigns would also make the calm, procedural, constructive handling of the revelation unlikely, and the potential for public panic or other severe obstacles is high[3].

If this article assumes no contact has ever occurred between humans and alien life (i.e. UFOs and television-style government conspiracies are fictitious or not related to actual alien existence), there are two overarching paths that first contact could take, both with numerous implications. The first is that alien life is intelligent and / or some form of sustained communication is possible. This is by far the least likely path. The second path is that alien life is not intelligent or sentient, or that no communication is possible.

If humanity were to discover intelligent aliens (or they were to discover us) and communication is possible, there are three basic possibilities that fall along a sliding scale of conflict. Relations between humans and intelligent aliens would either be peaceful and diplomatic, hostile and violent, or some fluctuation between the two over time. The possibilities within this framework are endless. Perhaps initial contact will be peaceful, only for hostilities to break out later into the relationship, or vise versa. Perhaps the aliens will be vastly more technologically sophisticated than humans, or vice versa, or perhaps the level of technological advancement between the two civilizations would be balanced. Unfortunately, these eventualities are largely impossible to prepare for, outside of potentially designating task forces to manage the situation should it ever arise.

The second path is overwhelmingly most likely, that any alien life encountered by humanity would be so different from any life encountered by people on earth that it would be inconceivable to plan for, and possibly even unrecognizable as life at all. Earlier the example of a jellyfish was used, but even this is a fallacy. A jellyfish, being alive and carnivorous, but lacking a skeleton, muscles, circulatory system, brain, or often deliberate motor functionality, is the closest approximation imaginable, since jellyfish evolved for a drastically different ecosystem. It is not difficult to imagine the first human to encounter a jellyfish not understanding that the creature was alive, and this would likely mirror the first time humans encounter an alien lifeform too different to be immediately recognized as alive. Human concept of life and biology is intrinsically shaped by the observable reality they exist in, but the environment of alien homeworlds would almost certainly be so different that life could never progress along similar lines to human civilization.

Along the second path, contact with non-intelligent life, the response would likely be driven much more by the scientific community: biologists, physicists, chemists, astronomers, and engineers. The potential for speculation of uses of this life, and it’s conservation, could be endless: military, pharmaceutical, aeroespacial?

The disappointing, if not bleak, reality is that humans will almost certainly never encounter alien life, much less intelligent life capable of sustained communication. The probability is simply too low. That said, the potential significance of the existence of aliens means that there may be value in investing limited funds and efforts into the search. Outside of the hard national security and scientific implications of alien life, there is another, perhaps equally important facet of the search and preparation: sociocultural. Aliens are so entrenched in the popular mind that dedicating some small resources to the search may have public affairs benefits. Put another way: people want to believe.


Endnotes:

[1] Paul Davies. The Eerie Silence: Renewing Our Search for Alien Intelligence. 2011. https://www.amazon.com/Eerie-Silence-Renewing-Search-Intelligence/dp/B005OHT0WS.

[2] Chao Deng. “China Seeks to Use Access to Covid-19 Vaccines for Diplomacy.” The Wall Street Journal. August 2020. https://www.wsj.com/articles/china-seeks-to-use-access-to-covid-19-vaccines-for-diplomacy-11597690215.

[3] Daniel Oberhaus. “Twitter Has Made Our Alien Contact Protocols Obsolete.” Motherboard. 2017. https://www.vice.com/en_us/article/z4gv53/twitter-has-made-our-alien-contact-protocols-obsolete.

Assessment Papers Extraterrestrial Life Lee Clark

Targeting North Atlantic Treaty Organization Article 5: Assessing Enhanced Forward Presence as a Below War Threshold Response

Steve MacBeth is a retired officer from the Canadian Forces. He recently transitioned to New Zealand and serves in the New Zealand Defence Force. He has deployed to Bosnia, completed three tours of duty in Khandahar, Afghanistan and most recently, as the Battle Group Commander of the NATO enhanced Forward Presence Battle Group in Latvia. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Targeting North Atlantic Treaty Organization Article 5: Assessing Enhanced Forward Presence as a Below War Threshold Response

Date Originally Written:  August 20, 2020.

Date Originally Published:  November 25, 2020.

Author and / or Article Point of View:  The author believes that the North Atlantic Treaty Organization’s (NATO) Article 5 does not provide the agility for forward deployed forces to effectively respond to challenges below the threshold of war. These challenges are also known as Grey Zone activities. This paper is a summation of a chapter the author wrote for publication at the NATO Staff College in Rome, regarding NATO in the Grey Zone, which was edited Dr Howard Coombes, Royal Military College of Canada.

Summary:  Russia has been careful, for the most part, to avoid direct confrontation with NATO. The Russian focus on indirect mechanisms targets the weaknesses of NATO’s conventional response and highlights the requirement to revisit Article 5 within context of the deployed enhanced Forward Presence Activities. Conflict through competitive and Grey Zone activities is omnipresent and does not follow the template that Article 5 was designed for[1] .

Text:  U.S. Army Major General Eric J. Wesley, Commander, U.S. Army Futures Command, has noted that western militaries and governments may need to adjust between a “continuum of conflict” that denotes “war” and “peace” to an age of constant competition and covert pressure punctuated by short violent overt struggle[2]. The Chief of the Russian General Staff, General Valery Gerasimov reflected upon this approach for the Russian military journal VPK in 2013. “Methods of conflict,” wrote Gerasimov, have changed, and now involve “the broad use of political, economic, informational, humanitarian and other non-military measures.” All of this, he said, could be supplemented by utilizing the local populace as a fifth column and by “concealed” armed forces[3]. These actions demonstrate a Russian philosophy of achieving political objectives by employing a combination of attributable/non-attributable military and other actions. Operating under the threshold of traditional warfare, these adversarial behaviours, known as Grey Zone activities, deliberately target the weaknesses of the traditional NATO responses.

Reactions to aggression are governed by Article 5 of the North Atlantic Treaty. Article 5 provides the Alliance’s collective defence paradigm, stating an “attack on one is an attack on all,” signaling the shared intent to deal with armed aggression vigorously[4]. Article 5 does not address Grey Zone activities that demand rapid, unified decision making and action. NATO crisis response is predicated on a system that acts in a predictable and deliberate manner to deal with overt aggression. Though NATO has recognized the Grey Zone there has been little adaption to this threat and NATO has not demonstrated that it is prepared to act decisively in the case of a Russian Grey Zone incursion. The NATO forces positioned to deter potential Russian aggression on the Alliance’s eastern flank are the enhanced Forward Presence (eFP) battle groups. This military commitment is structured and authorized to counter overt Article 5 threats. Paradoxically, the most likely danger they may encounter are Grey Zone challenges. Combine this capability to likely threat mismatch with the speed at which political and military decisions are required during crisis, like a limited Russian incursion with pre-conditions set by Grey Zone actions, and NATO may not be able to react effectively. Consequently, it may be time for NATO to re-visit its current Article 5 deterrence activities, in the context of Grey Zone activities. This re-visit would acknowledge the Eastern NATO nations require every opportunity to answer any form of threat to their security and fully enable the NATO forces arrayed within their countries.

Presently, the enhanced Forward Presence is an ‘activity’ and not an NATO mission. The forces remain under national control for all, but specifically pre-agreed tasks and lack common funding resources. For all intents and purposes NATO missions, with the exceptions of “operational limitations,” indicating national caveats or activities in which a contributing nation will not participate, contribute to a single military force under a unified NATO command structure. In the eFP context, this unified command structure does not exist. Outside of an invocation of an Article 5 response, the various elements of the eFP battle groups remain under national command. The Russian determination of conflict leans towards a state of constant, below the threshold of war competition utilizing deception, information, proxies, and avoiding attributable action. Russian efforts are focussed on NATO’s greatest vulnerability and, at times, source of frustration, lengthy centralized deliberation. At the best of times this need for consensus creates slow decision making and resultantly a diminution of strategic, operational, and tactical agility[6]. If the Russian trend of Grey Zone actions continue, Article 5 responses by the Alliance may become irrelevant due to this slowness of decision making. For the eFP battlegroups, which can react to conventional threats, the Grey Zone poses difficult challenges, which were not fully recognized when the eFP concept was originally proposed and implemented[7].

The Baltic countries are strengthened by having eFP forces garrisoned within their nations, but there is a capability gap in providing Article 5 deterrence. The lack of authority for eFP battle groups to compete below the threshold of conflict leaves Baltic allies uncertain if and how NATO can support them. Enhanced Forward Presence battle groups are not currently able to deal with Grey Zone eventualities. Consequently, in several important aspects, the Alliance response remains handicapped. Bringing about achieving rapid consensus for a crisis response operations in the face of an ambiguous attack, or in response to ostensibly unrelated low-level provocations, like those imbued in the Grey Zone, will not be an easy task in the current framework[8].


Endnotes:

[1] M. Zapfe. “Hybrid Threats and NATO’s Forward Presence”, Centre of Security Studies Policy Perspectives, Vol. 4, No. 7, 2016, pp. 1-4.

[2] E. Wesley, “Future Concept Centre Commander Perspectives – Let’s Talk Multi-Domain Operations”, Modern War Institute Podcast., 2019. https://podcasts.apple.com/us/podcast/lets-talk-multi-domain-operations/id1079958510 (accessed 15 March 2020)

[3] V. Gerasimov, “The Value of Science in Prediction”, Trans. R. Coalson, Military-Industrial Kurier, 2013, pp.

[4] “The North Atlantic Treaty Washington D.C. – 4 April 1949”, NATO, last modified 10 April 2019. https://www.nato.int/cps/en/natolive/official_texts_17120.htm (accessed 22 May 2020).

[5] The eFP Battle Group is an ad hoc grouping based upon an armoured or infantry battalion, which is normally commanded by a lieutenant-colonel (NATO O-4). It usually consists of a headquarters, a combination of integral and attached armour and infantry subunits, with their integral sustainment, elements. Also included are combat support organizations, which provide immediate tactical assistance, in the form of reconnaissance, mobility, counter-mobility or direct and indirect fire support, to combat elements. Additional sustainment elements may be attached as it is deemed necessary. eFP battle groups are integrated into host nation brigades. “Factsheet: NATO’s Enhanced Forward Presence”, NATO, 2017. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2017_05/1705-factsheet-efp.pdf (accessed 12 July 2020); C. Leuprecht. “The enhanced Forward Presence: innovating NATO’s deployment model for collective defence – NDC Policy Brief No. 22”, Rome, NATO Defense College, 2019, p. 3.

[6] J. Deni, “NATO’s Presence in the East: Necessary But Still Not Sufficient”, War on The Rocks Commentary, 2017. https://warontherocks.com/2018/06/natos-presence-in-the-east-necessary-but-still-not-sufficient (accessed 10 April 2020).

[7] For a synopsis of the apparent benefits of the eFP see C. Leuprecht. “The enhanced Forward Presence: innovating NATO’s deployment model for collective defence – NDC Policy Brief No. 22”, Rome, NATO Defense College, 2019.

[8] J. Deni, “The Paradox at the Heart of NATO’s Return to Article 5”, RUSI Newsbrief, Vol. 39, No. 10, 2019, p. 2. https://rusi.org/sites/default/files/20191101_newsbrief_vol39_no10_deni_web.pdf (accessed April 15 2020).

 

Assessment Papers Below Established Threshold Activities (BETA) Governing Documents and Ideas North Atlantic Treaty Organization Steve MacBeth

Simple Lethality: Assessing the Potential for Agricultural Unmanned Aerial and Ground Systems to Deploy Biological or Chemical Weapons

William H. Johnson, CAPT, USN/Ret, holds a Master of Aeronautical Science (MAS) from Embry-Riddle Aeronautical University, and a MA in Military History from Norwich University. He is currently an Adjunct Assistant Professor at Embry-Riddle in the College of Aeronautics, teaching unmanned system development, control, and interoperability. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Simple Lethality: Assessing the Potential for Agricultural Unmanned Aerial and Ground Systems to Deploy Biological or Chemical Weapons

Date Originally Written:  August 15, 2020.

Date Originally Published:  November 18, 2020.

Author and / or Article Point of View:  The author is a retired U.S. Naval Flight Officer who held command of the Navy’s sole unmanned air system squadron between 2001 and 2002. He has presented technical papers on unmanned systems, published on the same in professional journals, and has taught unmanned systems since 2016. The article is written from the point of view of an American analyst considering military force vulnerability to small, improvised, unmanned aerial or ground systems, hereby collectively referred to as UxS, equipped with existing technology for agricultural chemical dispersal over a broad area.

Summary:  Small, locally built unmanned vehicles, similar to those used in agriculture, can easily be configured to release a chemical or biological payload. Wide, air-dispersed agents could be set off over a populated area with low likelihood of either interdiction or traceability. Domestic counter-UAS can not only eliminate annoying imagery collection, but also to mitigate the growing potential for an inexpensive chemical or biological weapon attack on U.S. soil.

Text:  The ongoing development and improvement of UxS – primarily aerial, but also ground-operated – to optimize efficiency in the agricultural arena are matters of pride among manufacturers.  These developments and improvements are of interest to regulatory bodies such as the Federal Aviation Administration, and offer an opportunity to those seeking to inflict easy chemical or biological operations on U.S. soil. While the latter note concerning opportunity for enemies, may appear flippant and simplistic at first blush, it is the most important one on the list. Accepting the idea that hostile entities consider environment and objective(s) when choosing physical or cyber attack platforms, the availability of chemical-dispersing unmanned vehicles with current system control options make such weapons not only feasible, but ideal[1].

Commercially available UxS, such the Yamaha RMAX[2] or the DJI Agras MG-1[3], can be launched remotely, and with a simple, available autopilot fly a pre-programmed course until fuel exhaustion. These capabilities the opportunity for an insurgent to recruit a similarly minded, hobbyist-level UAS builder to acquire necessary parts and assemble the vehicle in private. The engineering of such a small craft, even one as large as the RMAX, is quite simple, and the parts could be innocuously and anonymously acquired by anyone with a credit card. Even assembling a 25-liter dispersal tank and setting a primitive timer for release would not be complicated.

With such a simple, garage-built craft, the dispersal tank could be filled with either chemical or biological material, launched anytime from a suburban convenience store parking lot.  The craft could then execute a straight-and-level flight path over an unaware downtown area, and disperse its tank contents at a predetermined time-of-flight. This is clearly not a precision mission, but it would be quite easy to fund and execute[4].

The danger lies in the simplicity[5]. As an historical example, Nazi V-2 “buzz bomb” rockets in World War II were occasionally pointed at a target and fueled to match the rough, desired time of flight needed to cross the planned distance. The V-2 would then simply fall out of the sky once out of gas. Existing autopilots for any number of commercially available UxS are far more sophisticated than that, and easy to obtain. This attack previously described would be difficult to trace and almost impossible to predict, especially if assembly were done with simple parts from a variety of suppliers. The extrapolated problem is that without indication or warning, even presently available counter-UxS technology would have no reason to be brought to bear until after the attack. The cost, given the potential for terror and destabilization, would be negligible to an adversary. The ability to fly such missions simultaneously over a number of metropolitan areas could create devastating consequences in terms of panic.

The current mitigations to UxS are few, but somewhat challenging to an entity planning such a mission. Effective chemical or weaponized biological material is well-tracked by a variety of global organizations.  As such, movement of any amount of such into the United States would be quite difficult for even the best-resourced individuals or groups. Additionally, there are some unique parts necessary for construction of a heavier-lift rotary vehicle.  With some effort, those parts could be cataloged under processes similar to existing import-export control policies and practices.

Finally, the expansion of machine-learning-driven artificial intelligence, the ongoing improvement in battery storage, and the ubiquity of UxS hobbyists and their products, make this type of threat more and more feasible by the day. Current domestic counter-UxS technologies have been developed largely in response to safety threats posed by small UxS to manned aircraft, and also because of the potential for unapproved imagery collection and privacy violation. To those, it will soon be time to add small scale counter-Weapons of Mass Destruction to the rationale.


Endnotes:

[1] Ash Rossiter, “Drone usage by militant groups: exploring variation in adoption,” Defense & Security Analysis, 34:2, 113-126, https://doi.org/10.1080/14751798.2018.1478183

[2] Elan Head, “FAA grants exemption to unmanned Yamaha RMX helicopter.” Verticalmag.com, online: https://www.verticalmag.com/news/faagrantsexemptiontounmannedyamaharmaxhelicopter Accessed: August 15, 2020

[3] One example of this vehicle is available online at https://ledrones.org/product/dji-agras-mg-1-octocopter-argriculture-drone-ready-to-fly-bundle Accessed: August 15, 2020

[4] ”FBI: Man plotted to fly drone-like toy planes with bombs into school. (2014).” CBS News. Retrieved from
https://www.cbsnews.com/news/fbi-man-in-connecticut-plotted-to-fly-drone-like-toy-planes-with-bombs-into-school Accessed: August 10, 2020

[5] Wallace, R. J., & Loffi, J. M. (2015). Examining Unmanned Aerial System Threats & Defenses: A Conceptual Analysis. International Journal of Aviation, Aeronautics, and Aerospace, 2(4). https://doi.org/10.15394/ijaaa.2015.1084

Artificial Intelligence / Machine Learning / Human-Machine Teaming Assessment Papers Chemical, Biological, Radiological, and Nuclear Weapons Unmanned Systems William H. Johnson

Assessing Morocco’s Below War Threshold Activities in Spanish Enclaves in North of Africa and the Canary Islands

Jesus Roman Garcia can be found on Twitter @jesusfroman. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group.


Title: Assessing Morocco’s Below War Threshold Activities in Spanish Enclaves in North of Africa and the Canary Islands

Date Originally Written:  August 10, 2020.

Date Originally Published:  November 16, 2020.

Author and / or Article Point of View:  The author believes that given the current economic and public health weakness and the climate of social instability in Spain, Morocco could try, once again, to execute activities below the threshold of war to achieve its strategic, political, and territorial objectives in the Spanish territories of North Africa.

Summary:  Spain is currently in a situation of economic and public health weakness and emerging social instability. Morocco, as a master of activities below the threshold of war, could take advantage of Spain’s situation to obtain political and territorial benefits in North of Africa and the Canary Islands. This risks escalation between the two countries and could decrease security for all near the Strait of Gibraltar.

Text:  The Strait of Gibraltar has always been an important strategic zone, and although it has been stable in the recent decades, it has not always been that way. The most recent relevant landmark between Moroccan-Spanish was the beginning of the Rif War in 1911. This war lasted until 1927 with the dissolution of the Rif Republic. Since then, what is known as the “Places of sovereignty” (Perejil Islet, Peñón de Vélez de la Gomera, Peñón de Alhucemas and the Chafarinas Islands) plus Ceuta, Melilla and the Alboran Islands, together with the former territory of Western Sahara and the Canary Islands, and the territorial waters of all the aforementioned territories have been the subject of disputes between Spain and Morocco. Morocco claims the territories or parts thereof as sovereign territory and does not recognize them as integral parts of Spain. This is the source of constant tension and conflict between the two countries.

There is little debate about the potential threat of a direct attack by Morocco on the enclaves of Ceuta and Melilla but, given that Spain has plans for a difficult defense of such territories, this option seems very unlikely[1]. Beyond direct attack though, Morocco has a long tradition of activities below the threshold of war. One of Morocco’s most successful movements below the threshold of war involved invading the territory of Western Sahara during the Green March in 1975 with the help of a peaceful march of some 350,000 civilians demonstrators accompanied by some 20,000 Moroccan troops. This below threshold activity expelled the Spanish administration and army from Western Sahara without the need to use a single bullet[2].

Jumping well ahead in time, the Perejil Islet was the scene of crisis between Morocco and Spain in July 2002. During this crisis, Morocco militarily occupied the uninhabited territory with 12 Marines under the pretext of fighting drug trafficking in the area and refusing to vacate the island afterwards. In this case, a bloodless action by the Spanish Army would solve the conflict and the situation would return to its previous status quo. In this case, the threshold of war was very close to being reached and the conflict de-escalated shortly afterwards[3].

Although Morocco also gets political advantage classified as peaceful competition in fields like immigration control, fishing agreements with Spanish fishers, or anti-terrorist cooperation, the Moroccan government also has tried to influence the Spanish territories by carrying out what some authors have described as hybrid actions which seek destabilization. Examples of these actions include:

-2007 Moroccan public condemnation of the visit of the Kings of Spain to Ceuta and Melilla.

-2010 issuing Moroccan passports of people originally born in Ceuta or Melilla which attributed the possession of both cities to Morocco.

-Since 2000 — selective regulation of the migratory flow of irregular immigrants who cross to Ceuta and Melilla and also to the peninsula by land or sea as a way of political pressure.

-2018-2020 unilateral closure of the commercial border between Ceuta and Melilla.

-2019 the Moroccan Government prohibits its officials with diplomatic or private passports from entering to Ceuta or Melilla.

-2020 veto at the entry of fresh fish into the city of Ceuta[4].

On other occasions, Morocco has frontally challenged Spanish sovereignty, as in the case of the new delimitation of its territorial waters[5]. In December 2014, Spain formally requested to the United Nations an extension of its Exclusive Economic Zone (EEZ) of the Canary Archipelago to 350 miles in accordance with the current legislation on Admiralty Law (International Maritime Law). In February 2020, Morocco approved a law on its parliament for the expansion of the EEZ of the militarily occupied territory of Western Sahara (which Morocco understands as its own), also of 350 miles, similar to the Spanish one, but with null international validity and colliding with the previous Spanish request. The object in dispute is the underwater mountain of Mount Tropic, where it is believed that there may be important deposits of Tellurium and cobalt, fundamental for the manufacture of electrical or solar panels. In this case, the main intention is not to directly dispute these waters, but to establish a lead position for future negotiation. In nearby waters there is also the low possibility of undersea oil fields[6].

Beyond the history of disputes between the Moroccan and Spanish governments in the area is growing destabilization due to different factors that could lead Morocco to a new attempt to try to obtain political or territorial revenue at the expense of Spain. These factors include: the demographic change in the cities of Ceuta and Melilla in favor of the population of Moroccan background, the COVID-19 crisis in both countries and the creation of social tension as a result of the mismanagement of the crisis, and the return of jihadists from the Middle East originally from the cities of Ceuta and Melilla. Further contributing factors include the fact that both cities are not protected by the North Atlantic Treaty Organizations’ Article 5, the rearmament of Algeria and the subsequent rearmament of Morocco, the migration crisis due to the civil war in Libya. Finally, the search for a common foreign enemy by the Moroccan authorities as a way to quell the growing internal discontent due to the lack of democratic freedoms combined with the departure from Spain of King Juan Carlos I with whom the Moroccan Royal Family maintained very good relations adds to the tensions.

One of the main keys is to understand that Morocco, due to its demographic, economic, and political weight, is currently in a situation of inferiority in relation to Spain. Based upon this inferiority, the most cost-effective scenario and maybe the only possible one in which Morocco can profit, is by continuing to pursue activities below the threshold of war. As described above, Morocco has mastered these below threshold activities and they have sometimes proved very successful. The current situation sets ideal conditions for Morocco to try once again to obtain some political (and territorial) benefit from the crisis that Spain is currently suffering. Therefore, it will depend on Spain’s preparation for these eventual activities that may probably occur when the country is the weakest. Avoiding falling into the trap of escalating the conflict, but directly and unambiguously addressing the challenges that may arise as result of such provocations, may be the only options for Spain to keep the current status quo in the area.


Endnotes:

[1] Gutiérrez, Roberto (2019, December 31) Ceuta y Melilla: ¿una defensa imposible? Retrieved August 10, 2020 https://www.revistaejercitos.com/2019/12/31/ceuta-y-melilla-una-defensa-imposible

[2] Villanueva, Christian D. (2018, September 27) La zona Gris. Retrieved August 10, 2020 https://www.revistaejercitos.com/2018/09/27/la-zona-gris

[3] Jordán, Javier (2018, June) Una reinterpretación de la crisis del Islote Perejil desde la perspective de la amenaza híbrida. https://www.ugr.es/~jjordan/amenaza-hibrida-perejil.pdf

[4] Jordán, Javier (2020, March 24) Ceuta y Melilla: ¿emplea Marruecos estrategias híbridas contra España? Retrieved August 10, 2020 https://global-strategy.org/ceuta-y-melilla-emplea-marruecos-estrategias-hibridas-contra-espana

[5] RTVE.es (2020, February 04) Marruecos da un paso más en la delimitación de sus aguas territoriales. https://www.rtve.es/noticias/20200204/marruecos-da-paso-mas-delimitacion-aguas-territoriales/1999044.shtml

[6] García, Rafael (2019, January 23) Canarias y la previsible ampliación de su plataforma continental: el difícil equilibrio entre España, Marruecos y Sáhara Occidental. https://revistas.uam.es/reim/article/view/reim2019.26.008/11212

Assessment Papers Below Established Threshold Activities (BETA) Jesus Roman Garcia Morocco Spain

Assessment of Opportunities to Engage with the Chinese Film Market

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Irk is a freelance writer. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Opportunities to Engage with the Chinese Film Market

Date Originally Written:  July 29, 2020.

Date Originally Published:  November 11, 2020.

Author and / or Article Point of View:  The author believes that the film industry remains a relatively underexploited channel that can be used to shape the soft power dynamic in the U.S.-China relationship.

Summary:  While China’s film industry has grown in recent years, the market for Chinese films remains primarily domestic. Access to China’s film market remains heavily restricted, allowing the Chinese Communist Party to craft a film industry that can reinforce its values at home and abroad. However, there are opportunities for the United States to liberalize the Chinese film market which could contribute to long-term social and political change.

Text:  The highest-grossing Chinese film is 2017’s Wolf Warrior 2, netting nearly $900 million globally. For the Chinese Communist Party (CCP), the only problem is that a mere 2% of this gross came from outside the country. For the CCP, this is a troubling pattern replicated across many of China’s most financially successful films[1]. Last year, PricewaterhouseCoopers predicted that the Chinese film market would surpass the United States’ (U.S.) in 2020, growing to a total value of $15.5 billion by 2023[2]. Despite tremendous growth by every metric – new cinema screens, films released, ticket revenue – the Chinese film industry has failed to market itself to the outside world[3].

This failure is not for lack of trying: film is a key aspect of China’s project to accumulate soft power in Africa[4], and may leave a significant footprint on the emergent film markets in many countries. The Chinese film offensive abroad has been paired with heavy-handed protectionism at home, fulfilling a desire to develop the domestic film industry and guard against the influence introduced by foreign films. In 1994 China instituted an annual quota on foreign films which has slowly crept upwards, sometimes being broken to meet growing demand[5]. But even so, the number of foreign films entering the Chinese market each year floats between only 30-40. From the perspective of the CCP, there may be good reasons to be so conservative. In the U.S., research has indicated that some films may nudge audiences in ideological directions[6] or change their opinion of the government[7]. As might be expected, Chinese censorship targets concepts like “sex, violence, and rebellious individualism”[8]. While it remains difficult to draw any definite conclusions from this research, the threat is sufficient for the CCP to carefully monitor what sorts of messaging (and how much) it makes widely available for consumption. In India, economic liberalization was reflected in the values expressed by the most popular domestic films[9] – if messaging in film can be reflected in political attitudes, and political attitudes can be reflected in messaging in film, there is the possibility of a slow but consistent feedback loop creating serious social change. That is, unless the government clamps down on this relationship.

China’s “national film strategy” has gone largely un-countered by the U.S., in spite of its potential relevance to political change within the country. In 2018, Hollywood’s attempt to push quota liberalization was largely sidelined[10] and earlier this year the Independent Film & Television Alliance stated that little progress had been made since the start of the China-U.S. trade war[11]. Despite all this, 2018 revealed that quota liberalization was something China was willing to negotiate. This is an opportunity which could be exploited in order to begin seriously engaging with China’s approach to film.

In a reappraisal of common criticisms levied against Chinese engagement in the late 1990s and early 2000s, Alastair Iain Johnston of Harvard University notes that Chinese citizens with more connections to the outside world (facilitated by opening and reform) have developed “more liberal worldviews and are less nationalistic on average than older or less internationalized members of Chinese societies”[12]. The primary market for foreign films in China is this group of “internationalized” urban citizens, both those with higher disposable income in Guangdong, Zhejiang, Shanghai, Jiangsu, Beijing, and Tianjin[13] and those in non-coastal “Anchor Cities” which are integrated into transport networks and often boast international airports[14]. These demographics are both likely to be more amenable to the messaging in foreign films and capable of consuming them in large amounts.

During future trade negotiations, the U.S. could be willing to aggressively pursue the offered concession regarding film quotas, raising the cap as high as possible. In exchange, the United States Trade Representative could offer to revoke tariffs imposed since the trade war. As an example, the “phase one” trade deal was able to secure commitments from China solely by promising not to impose further tariffs and cutting a previous tariffs package by 50%[15]. The commitments asked of China in this agreement are far more financially intensive than film market liberalization, but it is difficult to put a price tag on the ideological component of film. Even so, the party has demonstrated willingness to put the quota on the table, and this is an offer that could be explored as part of a strategy to affect change within China.

In addition to focusing on quota liberalization in trade negotiations, state and city governments in the U.S. could engage in local diplomacy to establish cultural exchange through film. In 2017, China initiated a China-Africa film festival[16], and a similar model could be pursued by local government in the U.S. The low appeal of Chinese films outside of China (compared to the high appeal of American films within China) means that the exchange would likely be a “net gain” for the U.S. in terms of cultural impression. Chinese localities with citizens more open to foreign film would have another avenue of engagement, while Chinese producers who wanted to take advantage of the opportunity to present in exclusive U.S. markets may have to adjust the overtones in their films, possibly shedding some nationalist messaging. Federal or local government could provide incentives for theaters to show films banned in China for failing to meet these messaging standards. Films like A Touch of Sin that have enjoyed critical acclaim within the U.S. could reach a wider audience and create an alternate current of Chinese film in opposition to CCP preference.

Disrupting the development of China’s film industry may provide an opportunity to initiate a process of long-term attitudinal change in a wealthy and open segment of the Chinese population. At the same time, increasing the market share of foreign films and creating countervailing notions of “the Chinese film” could make China’s soft power accumulation more difficult. Hollywood is intent on marketing to China; instead of forcing them to collaborate with Chinese censors, it may serve American strategic objectives to allow competition to consume the Chinese market. If Chinese film producers adapt in response, they will have to shed certain limitations. Either way, slow-moving change will have taken root.


Endnotes:

[1] Magnan-Park, A. (2019, May 29). The global failure of cinematic soft power ‘with Chinese characteristics’. Retrieved July 29, 2020, from https://theasiadialogue.com/2019/05/27/the-global-failure-of-cinematic-soft-power-with-chinese-characteristics

[2] PricewaterhouseCoopers. (2019, June 17). Strong revenue growth continues in China’s cinema market. Retrieved July 29, 2020, from https://www.pwccn.com/en/press-room/press-releases/pr-170619.html

[3] Do Chinese films hold global appeal? (2020, March 13). Retrieved July 29, 2020 from
https://chinapower.csis.org/chinese-films

[4] Wu, Y. (2020, June 24). How media and film can help China grow its soft power in Africa. Retrieved July 30, 2020, from https://theconversation.com/how-media-and-film-can-help-china-grow-its-soft-power-in-africa-97401

[5] Do Chinese films hold global appeal? (2020, March 13). Retrieved July 29, 2020 from
https://chinapower.csis.org/chinese-films

[6] Glas, J. M., & Taylor, J. B. (2017). The Silver Screen and Authoritarianism: How Popular Films Activate Latent Personality Dispositions and Affect American Political Attitudes. American Politics Research, 46(2), 246-275. doi:10.1177/1532673×17744172

[7] Pautz, M. C. (2014). Argo and Zero Dark Thirty: Film, Government, and Audiences. PS: Political Science & Politics, 48(01), 120-128. doi:10.1017/s1049096514001656

[8] Do Chinese films hold global appeal? (2020, March 13). Retrieved July 29, 2020 from
https://chinapower.csis.org/chinese-films

[9] Adhia, N. (2013). The role of ideological change in India’s economic liberalization. The Journal of Socio-Economics, 44, 103-111. doi:10.1016/j.socec.2013.02.015

[10] Li, P., & Martina, M. (2018, May 20). Hollywood’s China dreams get tangled in trade talks. Retrieved July 29, 2020, from https://www.reuters.com/article/us-usa-trade-china-movies/hollywoods-china-dreams-get-tangled-in-trade-talks-idUSKCN1IK0W0

[11] Frater, P. (2020, February 15). IFTA Says U.S. Should Punish China for Cheating on Film Trade Deal. Retrieved July 30, 2020, from https://variety.com/2020/film/asia/ifta-china-film-trade-deal-1203505171

[12] Johnston, A. I. (2019). The Failures of the ‘Failure of Engagement’ with China. The Washington Quarterly, 42(2), 99-114. doi:10.1080/0163660x.2019.1626688

[13] Figure 2.4 Urban per capita disposable income, by province, 2017. (n.d.). Retrieved July 30, 2020, from https://www.unicef.cn/en/figure-24-urban-capita-disposable-income-province-2017

[14] Liu, S., & Parilla, J. (2019, August 08). Meet the five urban Chinas. Retrieved July 30, 2020, from https://www.brookings.edu/blog/the-avenue/2018/06/19/meet-the-five-urban-chinas

[15] Lawder, D., Shalal, A., & Mason, J. (2019, December 14). What’s in the U.S.-China ‘phase one’ trade deal. Retrieved July 30, 2020, from https://www.reuters.com/article/us-usa-trade-china-details-factbox/whats-in-the-u-s-china-phase-one-trade-deal-idUSKBN1YH2IL

[16] Fei, X. (2017, June 19). China Africa International Film Festival to open in October. Retrieved July 30, 2020, from http://chinaplus.cri.cn/news/showbiz/14/20170619/6644.html

2020 - Contest: PRC Below Threshold Writing Contest Assessment Papers Film and Entertainment Influence Operations Irk

Assessing the Role of Civil Government Agencies in Irregular Warfare

Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He can be found on Twitter @DAOlawuyi. Paul Jemitola is a lecturer at the Air Force Institute of Technology. He can be reached on Linkedin. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing the Role of Civil Government Agencies in Irregular Warfare

Date Originally Written:  August 5, 2020.

Date Originally Published:  November 9, 2020.

Author and / or Article Point of View:  The authors believe that governments engaged in countering violent extremists must pair hard and soft power to consolidate gains and bring about lasting peace.

Summary:  There are no recent success stories of a multifaceted approach to irregular warfare as leaders have been unwilling to engage in the work required. Responses to militant non-state actors will be ineffective without a whole of government effort that emphasizes military and nonmilitary interventions in appropriate measures to defeat violent threats, stabilize territories and restore the lives of affected populations.

Text:  As the world resumes Great Power Competition, irregular warfare will continue to be a means for states and groups to project power beyond their conventional means[1][2]. As in the Cold War, powerful nations will continue to employ indirect means to counter adversaries and shape events in the wider world[3]. As political leaders deal with the new global order, states can move from a military-first model of countering violent non-state actors and move to a whole of government approach that encompasses every facet of state power[4][5].

Countries confronting irregular warfare usually have underlying socio-economic difficulties[6][7]. Often, the authority of governing structures has been discredited by discontentment[8]. Both terrorists and insurgents usually seek to achieve political objectives by violence, either against the civil population, representatives of government, or both[9]. This violence to political transition implies that while military forces may defeat the irregular combatants and shape events on the ground, other means of power projection options are required to bring about durable peace. Without integrated and synchronized political, economic, legal, security, economic, development, and psychological activities[6], strategies against guerrillas, insurgents, and militias will not be effective.

Law enforcement agencies are often the most visible symbols of a government’s authority and the target of most attacks by insurgents and terrorists[10]. Historically, police action is the most effective strategy that ends terrorist groups that don’t abandon violence for political action[11]. The police organization’s ability to maintain a significant presence on the ground undercuts any narrative of strength insurgents may seek to project. Police Officers may carry out their usual functions of enforcing the law, mediating in disputes between locals, and protecting the population from criminals looking to take advantage of security vacuums.

Paramilitary forces can protect critical infrastructure, assist in force protection, expand the capacity of law enforcement, and deter militant activity with expanded presence and routine patrols. As these groups are often made up of volunteers from the local population, they can also serve as invaluable sources of intelligence and are less intimidating than armed forces[12][13].

Intelligence agencies can gather information about the combatants to facilitate a proper understanding of what the government is confronting how best to address them[14]. Human Intelligence from interrogations and agents, Signals Intelligence from intercepted communications, and other means of data gathering can help develop the picture of the guerillas, their leadership structures, the forces, the equipment available to them, and their support system both local and international[15][16]. These intelligence activities will include working with financial authorities to cut off their sources of funding and supporting military, security, and law enforcement tactical and operational actions[17].

The government can deploy its diplomatic corps to ensure international support for itself while dissuading foreign actors from intervening in support of the insurgents. These diplomats will ensure that the government’s narrative finds receptive audiences in foreign capitals and populations. This narrative can be converted to concrete support in terms of aid for securing military materiel and social-economic interventions in areas affected by the conflict. These diplomats will also work to dissuade foreign actors from providing aid to the militants and prolonging the conflict unduly[18].

Government agencies may provide social and economic interventions to support refugees and returnees seeking to rebuild their societies. The provision of health care, nutritional aid, job training, and economic opportunities will go a long way to break the attraction of militants and ensure that the population is invested in keeping the peace[19].

The government may encourage well-spirited Non-Government Organizations (NGO) and international agencies seeking to assist people caught up in the conflict. These agencies usually have vast experience and technical knowledge operating the areas of conflict around the world. While ensuring that these groups are acting in good faith, the government does not unduly burden them with regulatory requirements. Security for NGOs can be guaranteed to the extent possible[20].

Political leaders can ensure their words and deeds do not inflame tensions. They can seek to forge national identities that transcend tribal and ethnic leanings. They can address the concerns of indigenous population in the areas under attack work to separate legitimate grievances from violent acts. The governed must be able to advocate peacefully for change without resorting to violence. Governing structures can be focused on meeting societal needs to ensure peace and prosperity. Military and nonmilitary forces can be properly resourced and adequately overseen. They can facilitate understanding and unity of purpose. Concerns raised by security agencies can get the desired attention and support for measured actions to address them. The advent of nationalism and the non-applicability of democracy to all cultures demands that peoples be given sufficient avenues and support to organize themselves and that their demands be respected.

The attacks of September 11, 2001, built up the appetite of politicians for military interventions at home and abroad. This emphasis on military powers was to the detriment of other levers of power. Unfortunately, the abuse of military power to achieve goals best left to civilian or political institutions unfairly discredited the use of force in the eyes of the general public. This discrediting made it harder for politicians to justify military interventions even in situations where its deployment could be justified. While the military may continue to have a legitimate and even necessary role in countering irregular warfare, any successful strategy requires every element of national power. There are no recent success stories of a multifaceted approach to irregular warfare. This is because national leaders have been unwilling to engage in the work required. Political leaders can lead the way to move from violent responses to civil but more effective means to address conflicts.


Endnotes:

[1] Vrolyk, J. (2019, December 19). Insurgency, Not War, is China’s Most Likely Course of Action. Retrieved July 02, 2020, from https://warontherocks.com/2019/12/insurgency-not-war-is-chinas-most-likely-course-of-action

[2] Goodson, J. (2020, May 20). Irregular Warfare in a New Era of Great-Power Competition. Retrieved July 02, 2020, from https://mwi.usma.edu/irregular-warfare-new-era-great-power-competition

[3] Fowler, M. (2019, November 4). The Rise of the Present Unconventional Character of Warfare. Retrieved July 02, 2020, from https://thestrategybridge.org/the-bridge/2019/11/4/the-rise-of-the-present-unconventional-character-of-warfare

[4] McDonnell, E. (2013, January 7). Whole-of-Government Support for Irregular Warfare. Retrieved July 03, 2020, from https://smallwarsjournal.com/jrnl/art/whole-of-government-support-for-irregular-warfare

[5] White, N. (2014, December 28). Organizing for War: Overcoming barriers to Whole-of-Government Strategy in the ISIL Campaign. Retrieved July 03, 2020, from https://cco.ndu.edu/Portals/96/Documents/Articles/White_Organizing-for-War-Overcoming-Barriers-to-Whole-of-Government-Strategy-in-the-ISIL-Campaign-2014-12-28.pdf

[6] US Government (2012). Guide to the Analysis of Insurgency. Retrieved July 03, 2020, from https://www.hsdl.org/?view&did=713599

[7] Cox, D., Ryan, A. (2017). Countering Insurgency and the Myth of “The Cause”. Retrieved July 03, 2020, from https://www.airuniversity.af.edu/Portals/10/ASPJ_French/journals_E/Volume-08_Issue-4/cox_e.pdf

[8] Nyberg, E. (1991). Insurgency: The Unsolved Mystery. Retrieved July 04, 2020, from https://www.globalsecurity.org/military/library/report/1991/NEN.htm

[9] Office of the Chairman of the Joint Chiefs of Staff. (2020, June). DOD Dictionary of Military and Associated Terms. Retrieved July 04, 2020, from https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf

[10] Celeski, J. (2009, February). Policing and Law Enforcement in COIN – the Thick Blue Line. Retrieved July 08, 2020, from https://www.socom.mil/JSOU/JSOUPublications/JSOU09-2celeskiPolicing.pdf

[11] Jones, S. and Libicki, M. (2008). How Terrorist Groups End: Lessons for Countering al Qa’ida. Retrieved July 08, 2020, from https://www.rand.org/content/dam/rand/pubs/monographs/2008/RAND_MG741-1.pdf

[12] Espino, I. (2004, December). Counterinsurgency: The Role of Paramilitaries. Retrieved July 14, 2020, from https://calhoun.nps.edu/bitstream/handle/10945/1269/04Dec_Espino.pdf

[13] Dasgupta, S. (2016, June 6). Paramilitary groups: Local Alliances in Counterinsurgency Operations. Retrieved July 14, 2020, from https://www.brookings.edu/wp-content/uploads/2016/06/06_counterinsurgency_dasgupta.pdf

[14] Clark, D. (2008, June 27). The Vital Role of Intelligence in Counterinsurgency Operations. Retrieved July 14, 2020, from https://apps.dtic.mil/sti/pdfs/ADA448457.pdf

[15] White, J. (2007, April 14). Some Thoughts on Irregular Warfare. Retrieved July 14, 2020, from https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/96unclass/iregular.htm

[16] Steinmeyer, W. (2011, August 5). The Intelligence Role in Counterinsurgency. Retrieved July 14, 2020, from https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol9no4/html/v09i4a06p_0001.htm

[17] Department of the Army. (2006, December) Counterinsurgency. Retrieved July 14, 2020, from https://www.hsdl.org/?view&did=468442

[18] Murray, S. Blannin, P. (2017, September 18). Diplomacy and the War on Terror. Retrieved July 14, 2020, from https://smallwarsjournal.com/jrnl/art/diplomacy-and-the-war-on-terror

[19] Godson, J. (2015, August 16). Strategic Development and Irregular Warfare: Lessons from the High Water Mark of Full-Spectrum COIN. Retrieved July 14, 2020, from https://smallwarsjournal.com/jrnl/art/strategic-development-and-irregular-warfare-lessons-from-the-high-water-mark-of-full-spectr

[20] Penner, G. (2014, July 07). A Framework for NGO-Military Collaboration. Retrieved July 14, 2020, from https://smallwarsjournal.com/jrnl/art/a-framework-for-ngo-military-collaboration

Assessment Papers Civilian Concerns Damimola Olawuyi Dr. Paul Jemitola Government Irregular Forces / Irregular Warfare

An Assessment of the American National Interest in Sino-American Competition

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Brandon Patterson is a graduate student at the School of Global Policy and Strategy at the University of California, San Diego, whose area of focus is China.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the American National Interest in Sino-American Competition

Date Originally Written:  July 21, 2020.

Date Originally Published:  November 2, 2020.

Author and / or Article Point of View:  The author believes the United States, in order to maintain a sense of proportion in dealing with China, must find criteria over which in must resist Beijing.  Additionally, wherever the U.S. makes practical accommodations, in order to transcend Cold War-like conditions, and to create a basic American approach to relations with China that can be passed from one administration to the next with a high degree of continuity, it should do so.

Summary:  As tensions rise between the United States and China, Washington requires a concept of the national interest to serve as a guide in navigating this new dynamic. Wearing ideological blinders nearly tore the American psyche apart at key moments during the Cold War. As competition with China develops, America can prevent itself from falling into the Cold War era Manichaeism that shook domestic consensus on the nature of its task.

Text:  In light of deteriorating relations between the United States and the People’s Republic of China, emphasis on so-called great power competition enters the American lexicon[1]. Competition implies a victor; yet great power relations are a process with no terminal point. Complicating matters is the fact that the relationship between Washington and Beijing has acquired ideological contours, which serve as a blight on the minds of American policymakers who tend to lose a sense of proportion when facing ideological opponents[2]. Under these conditions, competition becomes an end in itself as foreign policy becomes a struggle between good and evil rather than the threading together of various issues into a relationship neither entirely friendly nor wholly adversarial. A clear set of objectives on the American side of this competition, and how they are enmeshed in a grand strategy aimed at a concept of world order is necessary. In other words, before Washington acts, American policy makers ask themselves:

  • What is this supposed competition about and how should one define success?
  • What threat does China pose to international order?
  • What changes must the United States resist by forceful means?

Though unexceptional, these questions are uniquely crucial for a country lacking a geopolitical tradition. The United States can look beyond the aspects of China’s domestic structure which the U.S. rejects in order to retain a clear conception of how the United States may accommodate China without turning the world over to it. This is the space America is obliged to navigate. The national interest, still so vaguely defined in American strategic thought, will fail unless clearly articulated in order to provide criteria by which America’s relationship with China can be assessed and altered. The emphasis on “competition below the threshold of armed conflict” requires examination. To abjure from the use of force — or to define precisely where one is unwilling to go to war — is to define a limit to the national interest.

The United States is the ultimate guarantor of the global balance of power. In order for there to be stability in the world, equilibrium must prevail. This equilibrium is America’s most vital interest, its primary responsibility to international order, and is thus the limiting condition of its foreign policy. The United States cannot permit any power, or any grouping of powers, to attain hegemony over Eurasia, or any of its constituent sub-regions[3]. The People’s Republic of China, whatever its intentions, by the nature of its power, poses the greatest threat to global equilibrium. Tensions are therefore inherent.

It is equally true, however, that the United States and China are likely to be the twin pillars of world order, and that the peace and progress of mankind will likely depend on their conceiving order as a shared enterprise rather than a Cold War in which one perception emerges dominant. Of course, Beijing retains a vote, and if a Cold War becomes unavoidable, Washington requires a clear conception of its necessities to prevent the wild oscillations between overcommitment and over-withdrawal to which it is prone.

American foreign policy can reflect this Janus-like dynamic. This is when the national interest becomes imperative. The United States and China can convey to one another what interests they consider vital, the violation of which will result in conflict. For America, such a threat is more difficult to determine now than during even the Cold War. The Belt and Road initiative is the most awe inspiring example. This initiative represents a Chinese attempt to restructure Eurasia such that China reemerges as the Middle Kingdom[4]. America for its part cannot permit any single country to achieve hegemony over Eurasia; yet Belt and Road is not a military enterprise, and so the threat it poses remains ambiguous, and the best means of countering it is far from self-evident. It thus becomes imperative that American administrations establish what they consider to be a threat to equilibrium and find means of conveying this to the Chinese.

Keeping this competition below the threshold of armed conflict rests upon the ability of Washington to drive home to Beijing precisely what is likely to lead to war while such threats remain ambiguous, and thus manageable. This also implies an early response to Chinese probing actions — such as in the South China Sea — lest they acquire a false sense of security, prompting more reckless actions down the road.

Calculations of power become more complex for the United States than for China however, as America is steeped in a tradition of idealism for which no corresponding impulse can be found in China. The United States is an historic champion of human rights, spending blood and treasure in its defense on multiple occasions since the end of the Second World War. In order to be true to itself, the United States stands for its basic values — it too is a duty to the world. This finds expression in America’s support for the cause of Hong Kong’s protests[5], for the victims of China’s excesses in Xinjiang[6], and for political prisoners[7].

The question is not whether America should stand for these values, but rather the extent to which it does so, and at what cost. The United States cannot directly influence the internal evolution of an historic culture like China’s, and that attempting to do so will manufacturer tensions over issues with no resolution, which in turn renders practical issues within the realm of foreign policy less soluble, combining the worst of every course of action.

A wise course for American policy makers then, is to use the national interest as a compass in navigating what will be a journey without a clear historical precedent. Equilibrium is the obvious limiting condition and starting point for such an effort. Moral purpose guides pragmatic actions just as pragmatism makes idealism sustainable. Such an approach is not an abrogation of American values, rather it is the best means of vindicating them over a prolonged period. For, in Sino-American relations, there will be no ultimate victory nor final reconciliation.


Endnotes:

[1] Jones, B. (February 2020). China and the Return of Great Power Strategic Competition. Retrieved July 1, 2020, from https://www.brookings.edu/wp-content/uploads/2020/02/FP_202002_china_power_competition_jones.pdf

[2] Debate Over Detente. (1973, November 17). Retrieved July 1, 2020, from https://www.nytimes.com/1973/11/17/archives/debate-over-detente.html

[3] Spykman, N. J. (2007). America’s Strategy in World Politics: The United States and the Balance of Power (1st ed., pp. 194-199). Routledge.

[4] Kaplan, R.D. (March 6, 2018). The Return of Marco Polo’s World: War, Strategy, and American Interests in the Twenty-First Century. (pp.). New York: Random House.

[5] Edmundson, C. (2020, July 2). Senate Sends Trump a Bill to Punish Chinese Officials Over Hong Kong. Retrieved July 3, from https://www.nytimes.com/2020/07/02/us/politics/senate-china-hong-kong-sanctions.html

[6] Pranshu, V. & Wong, E. (2020, July 9). U.S. Imposes Sanctions on Chinese Officials Over Mass Detention of Muslims. Retrieved July 10, from https://www.nytimes.com/2020/07/09/world/asia/trump-china-sanctions-uighurs.html?searchResultPosition=1

[7] Puddington, A. (2018, July 26). China: The Global Leader in Political Prisoners. Retrieved July 10, from https://freedomhouse.org/article/china-global-leader-political-prisoners

2020 - Contest: PRC Below Threshold Writing Contest Assessment Papers Brandon Patterson China (People's Republic of China) Competition Policy and Strategy United States

An Assessment of Chinese Mercantilism as a Dual Circulation Strategy with Implications for U.S. Strategy

Patrick Knight is an active duty U.S. Army Officer and has served in a variety of tactical and force generation assignments. He is currently a student in the Army’s Command and General Staff College as part of a strategist training pipeline. He can be reached on LinkedIn or pjknight12@gmail.com. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.




Title:  An Assessment of Chinese Mercantilism as a Dual Circulation Strategy with Implications for U.S. Strategy

Date Originally Written:  October 16, 2020.

Date Originally Published:  October 30, 2020.

Author and / or Article Point of View:  The article is written from the point of view of China towards regional states and the U.S.

Summary:  China has become a dominant regional and global power through its export-centric mercantilist practices. This mercantilism underpins a larger expansionist foreign policy. China has reacted to U.S. and global economic pressure by instituting the Dual Circulation strategy, focusing on domestic consumption markets. U.S. strategies that do not take into account China’s Dual Circulation strategy will not be effective.

Text:  Mercantilism, specifically Chinese mercantilism, is the macroeconomic policy of emphasizing exports and minimizing imports, and relates to the broad long-term economic strategy of Chinese trade and supply chain management. Mercantilism is tied to the broader concepts of Chinese expansion strategy which underpin its foreign policy. That Chinese foreign economic policy is growing and seeks to become a dominant regional and global power has, at the time of this authorship, become a relatively elementary platitude. Chinese economic and larger foreign policy is more complex and nuanced. The 2020 introduction of a Dual Circulation policy calls into question the monolithic approach of mercantilism, and has critical implications for U.S. strategists[1].

For historical background, in 1987, a Chinese economic policy advisor, Yuon Geng, suggested to then de facto state leader Deng Xaopeng the concept of Dual Circulation. In that context, he meant relying on low labor costs within the Chinese labor market to develop export capabilities, building foreign investments which thus improve domestic financial resources[1]. This suggestion began an economic opening of China, and in the decades that followed, China developed into an export centric nation. The Chinese socialist system’s advantage in focusing and underwriting industrial capabilities allows China to, in Deng Xaopeng’s words, “concentrate power to do great things[2].” In this way, China emerged as the commonly understood world’s factory, especially after China’s admittance into the World Trade Organization in 2001.

With the now famous One Belt and One Road Initiative, China has devoted significant financial and diplomatic resources to developing infrastructure and trade relationships with dozens of states in the Indo-pacific region and beyond. This is a foundational tenet of Xi Jingping’s foreign policy.

One could thus assume that China uniformly pursues mercantilism strategy of concentrating all instruments of national power to develop a dominant, yet supporting, relationship in emerging markets and developing states and bolster an export economy.

However, the new reintroduction of a Dual Circulation Strategy adjusts the original meaning of Dual Circulation as intended by Yuon Geng. Here, China seeks to enhance its domestic markets and consumption over foreign investments, markets, and technology. It seeks to ease its dependence on foreign markets in favor of the domestic[1].

China’s policy goals of moving up the value chain, improving the overall wealth of China, and having a resilient economy are working under its export centric strategy, yet there has been an inward shift via Dual Circulation. China policy expert Andrew Polk believes that this inward shift is not a response to internal demand in China as much as it is a reaction to the external environment[1]. External variables have changed significantly in recent years. In one way, the global economy and its state actors have exerted pressure on Chinese technology companies, such as in the case of the semiconductor industry. Second, the massive impact of the COVID 19 pandemic on the global economy has not yet receded. The Chinese export industry has been negatively affected as consumer demand falls. Dual Circulation is a reaction of the vagaries of the external economy that China seeks to remain resilient.

For those familiar with the ways, means, and ends framework of strategic thinking, Chinese economic ends have not changed. The ways, relying on and enhancing domestic economic capabilities, has shifted within the national strategic framework.

Vice Premier Liu He, Xi Jingping’s top economic advisor, has developed the Dual Dirculation concept, and seeks to de-risk the oversupplied industrial sector. This de-risking is reminiscent of his proposed Supply Side Structural Reform strategy of 2015, in which Liu He feared China relied too much on the export industry[2].

Most imperatively, the introduction of Dual Circulation amidst China’s mercantilist tendencies signifies a fundamental inflection point in strategy and macroeconomic thinking. Proximately, Dual Circulation means that China is unified on restructuring its macroeconomic strategy, which directly challenges other high-end manufacturing economies. More broadly, Dual Circulation indicates that China is vulnerable, or at least reactive, to external pressure and environments. This new policy further demonstrates that China estimates that powerful western economies, such as the U.S. and U.K., have focused too much on services and consumer centric industries and have not adequately supported and developed their manufacturing capabilities[2]. China seeks to add the most value by dominating the high-end manufacturing sector in both its domestic and global economy, what Polk refers to as the German economic model of manufacturing.

Lingling Wei of the Wall Street Journal believes that Dual Circulation also exposes key defense industry implications in Chinese policy making. She argues that now is China’s “Sputnik moment” in that the recent U.S. trade war provides an opportunity to make significant policy shifts[2][3]. The Chinese defense industry has been a focus of Xi Jingping’s reforming attention in recent months, moving key political allies with defense industry background. The defense industry focus includes recently installing a new deputy of the National Development Reform Commission. Wei suggests that China acknowledges its exposure in the defense supply chain where competitors like the U.S. can exert pressure.

Dual Circulation is highly relevant to U.S. national security and economic strategists. Since March, U.S. President Donald Trump has increased pressure on China, significantly shifting his policy azimuth. The Trump administration has closed the Chinese consulate in Houston, Texas on charges of espionage, dispatched carrier strike groups to the South China Sea, blocked Chinese technology company activites, increased support to Taiwan, and made headlines with conflict and eventual merger with Tik Tok[3]. Numerous political factors contributed to President Trump’s decisions which are outside the scope of this assessment. However, U.S. and allied leadership needs to understand the degree and nature of the impact from President Trump’s efforts. Strategists use all elements of national power to impact the environment: diplomatic, informational, military, and economic. China has signaled it will adjust its ways, enhancing domestic economic consumer markets, in order to ensure its ends, a resilient and regionally dominant economy, based on the external environment. If China can successfully pivot away from a pure mercantilism economy to a more resilient, self-sustaining economy, U.S. strategists may calculate a diminishing effect of its pressure tactics.


Endnotes:

[1] Center for Strategic & International Studies. Online Event: The End of Chinese Mercantilism? YouTube.
https://www.youtube.com/watch?v=KQnyYbMPrBM&t=1080s

[2] Blanchette, J. & Polk, Andrew (24 August, 2020). Dual Circulation and China’s New Hedged Integration Strategy. Center for Strategic & International Studies. https://www.csis.org/analysis/dual-circulation-and-chinas-new-hedged-integration-strategy

[3] Davis, B., O’Keeffe, K, & Wei, L. (16 October, 2020). U.S.’s China Hawks Drive Hard-Line Policies After Trump Turns on Beijing. Wall Street Journal.

Assessment Papers China (People's Republic of China) Governing Documents and Ideas Patrick Knight Trade United States

Assessing the Impact of Dialectical Materialism on Xi Jinping’s Strategic Thinking

Coby Goldberg is a researcher with the Asia-Pacific Program at the Center for a New American Security. His writing has been published in The National Interest, World Politics Review, and The Wire China. Follow him on Twitter @CobyGoldberg. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Impact of Dialectical Materialism on Xi Jinping’s Strategic Thinking

Date Originally Written:  October 14, 2020.

Date Originally Published:  October 23, 2020.

Author and / or Article Point of View:  The author believes that Chinese President Xi Jinping sees himself at the helm of a boat pushed along by the tides of history. Today the tides carry that boat towards a more globalized, interconnected, and in many ways peaceful world, but the tides may be turning.

Summary:  Dialectical materialism – the belief that history has a force of its own beyond the power of human ideals or willpower, and that this force is not static throughout time, but always changing – provides insight into how the Chinese Communist Party thinks about its strategic options. While Xi Jinping tells Party members the tide of history points towards greater economic integration today, the dialectic teaches him the tides could turn against peace tomorrow.

Text:  For all the debates about the guiding ideology of the Chinese Communist Party (CCP), Chairman Xi Jinping has made his views rather plain to Party members. Take the opening lines of a speech to the CCP Central Committee on January 23, 2015, later re-published in Qiushi, the authoritative CCP journal of theory: “Dialectical materialism is the worldview and methodology of Chinese Communists[1].” The practical impact of this “worldview and methodology” can be significant for the average (non-CCP member) reader.

The CCP has a materialistic worldview, an inheritance from Karl Marx and Frederic Engels. Many of Marx’s and Engels’ contemporaries were idealists, who argued that adherence to a concept born of the mind, namely faith, could determine the reality of the world. Marx and Engels, by contrast, believed in the indomitable force of the material world. The material world shapes laws of history to which man must submit, like it or not. Or, as Xi put it in his 2015 speech: “The most important thing is that we proceed always from objective reality rather than subjective desire[2].”

If the ways of the world are governed not by the will of the individual but by external material conditions –by “objective reality rather than subjective desire” – then history’s arc can be read but not bent. Xi often compares material trends to the ocean. “The tide of the world is surging forward,” he told an audience in Russia. The people of the world must “rally closely together like passengers in the same boat[3].”

According to Xi, the two trends of his time are increasing multipolarity produced by the rise of the developing world, and ever-growing economic integration produced by globalization[4]. Together, these two trends form an inexorable movement that countries can either participate in and benefit or reject to the detriment of all. In the lens of this analogy, the United States has been rocking the collective boat with its recent complaints about a world order that has allowed many countries to flourish, none more so than China.

Military force is a detriment to a globalized economy. At the Party Congress in 2012, Xi’s predecessor, Hu Jintao, declared that “peace and development remain the underlying trends of our time[5].” This statement has held true amidst the downward spiral of the U.S.-China relationship. Xi and the CCP have taken to referring to “profound changes never seen in a century” underway on the world stage, “yet peace and development remain the underlying trend of the times,” Xi reaffirmed as recently as September 22, 2020[6].

These statements appear to be cheap talk offered up for foreign audiences, but the chief audience of Xi Jinping are those listening to his lectures, namely Party members who are habitually called to Beijing to imbibe the Party line. “One does not call every ambassador to Beijing just to bore them with the latest propaganda hacks,” Taiwan-based analyst Tanner Greer writes. “Addresses like these are less like stump speeches on the campaign trail than they are like instruction manuals[7].” For now, the instruction manual says that the underlying trend of the time is peace and development.

Through the materialist worldview of the CCP, Xi has concluded that history’s tides are moving towards economic integration, not military confrontation. However, dialectal materialism teaches Xi that the dialectic, – the state of permanent flux created as contradictions in the world emerge and resolve themselves, producing progress and new contradictions – requires that the CCP remain ever vigilant to the changing conditions of the material that forms reality.

Dialectical thinking helps explain what many observers describe as the CCP’s ideological flexibility. Material conditions might at one time dictate that the CCP must eradicate the capitalist class as it attempted under Mao Tse-tung, and the next year lead the CCP to welcome entrepreneurs into its ranks as members it officially did in the 1990s. Material conditions could make the United States the enemy in the 1950s, and a partner in the 1970s. The dialect effects such changes. “Objective reality is not fixed, but rather develops and changes all the time. Change is the most natural thing in the world,” Xi told Party members. “If we cling to our perception of China’s realities as they were in the past without adjustment, we will find it difficult to move forward[8].” Unfortunately, the material conditions that once set history on the path of economic integration across a multipolar world could evolve into the conditions of fragmentation and conflict. If the tide of history were blowing in that direction, expect China to behave very differently than it has for the past three decades.

As Americans seek to steer the US-China relationship through the “profound changes never seen in a century” that are powering China’s rise as a global competitor, Xi’s advice works for both parties. Both the U.S. and China will be required to balance perceptions of each other’s previous realities with adapting to material conditions today. The best both can consider, to quote Deng Xiaoping, might be to “cross the river by feeling for the stones.”


Endnotes:

[1] Xi Jinping (2019). Dialectical Materialism Is the Worldview and Methodology of Chinese Communists. Qiushi Journal, 11(38). Retrieved October 13 from http://english.qstheory.cn/2019-07/09/c_1124508999.htm?fbclid=IwAR32Q9zVU8NXgSu5UrFMP75srZoTV7lyggtTxLoGC5p_wJ4uKyI2w_QwY-s.

[2] ibid.

[3] Xi Jinping (2013, March 23). Follow the Trend of the Times and Promote Peace and Development in the World. Retrieved October 13 from https://www.fmprc.gov.cn/mfa_eng/wjdt_665385/zyjh_665391/t1033246.shtml.

[4] Greer, T. (2020, July 8). The Theory of History That Guides Xi Jinping. Retrieved October 13 from https://palladiummag.com/2020/07/08/the-theory-of-history-that-guides-xi-jinping.

[5] Hu Jintao. (2020, November 18). Full text of Hu Jintao’s report at 18th Party Congress. Retrieved October 13 from https://www.globaltimes.cn/content/744889.shtml.

[6] (2020, September 22). Peace, development remain underlying trend of times: Xi. Retrieved October 13 from http://www.xinhuanet.com/english/2020-09/22/c_139388433.htm.

[7] Greer, T. (2020, July 8). The Theory of History That Guides Xi Jinping. Retrieved October 13 from https://palladiummag.com/2020/07/08/the-theory-of-history-that-guides-xi-jinping.

[8] Xi Jinping (2019). Dialectical Materialism Is the Worldview and Methodology of Chinese Communists. Qiushi Journal, 11(38). Retrieved October 13 from http://english.qstheory.cn/2019-07/09/c_1124508999.htm?fbclid=IwAR32Q9zVU8NXgSu5UrFMP75srZoTV7lyggtTxLoGC5p_wJ4uKyI2w_QwY-s.

Assessment Papers China (People's Republic of China) Coby Goldberg Governing Documents and Ideas

Assessment of Sino-Russian Strategic Competition in Africa

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Rusudan Zabakhidze is an International Conference of Europeanists coordinator at Council for European Studies at Columbia University and a non-resident fellow at Middle East Institute’s Frontier Europe Initiative. She can be found on Twitter @rusozabakhidze. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Sino-Russian Strategic Competition in Africa

Date Originally Written:  July 31, 2020.

Date Originally Published:  October 12, 2020.

Author and / or Article Point of View:  The author believes that increasing Russian and Chinese influence in Africa is yet another external attempt to exploit African resources. The absence of democratic preconditions from cooperation agreements between African countries that work with Russia and China undermines U.S. democratization efforts in the region and create obstacles for international transparency and accountability.

Summary:  The Sino-Russian strategic competition in Africa is characterized by the complex interplay of mutual interests, yet divergent means and ways of achieving the strategic interests. In comparison to China, Russian economic cooperation with African countries is modest, however, deep military cooperation across the continent places Russia in an adventitious position to change the conditions for the economic development by stirring the local or regional instability, if desired.

Text:  Rapid urbanization and the economic rise of the African continent in the past decades have harnessed the potential for a redefined development path. Colonial legacy has earned the European powers a controversial status in contemporary affairs of African countries. Alternatively, China has grasped an opportunity to fill the vacuum and advance its strategic interests. The mainstream discourse around the geopolitical competition in Africa is mostly dominated by the U.S.-China rivalry, however, increasing Russian influence suggests that the current power dynamics across Africa are much more complex.

To assess the comparative advantage or disadvantage of the Russian position in Africa, it is helpful to delineate the key drivers of Russian strategic interests. As a resurgent power, Russia has been challenging the Western-centric world order globally; hence, the African continent represents yet another territory for projecting its global power status. While similar to other external actors in Africa Russia is interested in accessing natural resources[1], Russian connections with African countries are most notable in defense sector. The absence of democratic preconditions for various forms of cooperation serves the mutual interest of Russia and recipient African governments[2].

The Sino-Russian strategic competition in Africa is characterized by the interplay of similar interests, yet different means and ways towards attaining these goals. In terms of projecting the global power image, China and Russia share a common revisionist agenda based on offering an alternative to the western models of governance. Chinese and Russian discourses are built around emphasizing the superiority of their non-interference approach[3] that is based on respectful cooperation in contrast to the colonial practices of European powers. Patterns of rapid urbanization and accelerated economic growth of African countries enable China to draw comparisons to its own past in the 1990s[4]. Such parallels place China in an advantageous position to advocate for its governance model across the continent. China and Russia also try to use the cooperation with African governments as a supporting mechanism for their global power image in other parts of the world. Namely, African countries represent the largest voting bloc in the United Nations and regardless of the diversity of political positions of the national governments, both Russia and China have tried to use their influence over the voting behavior in favor of their positions within the UN system[5].

The differences between the Sino-Russian strategic competition is best visible in the economic cooperation trends. Russian economic engagement in African countries is relatively modest compared to large-scale Chinese investments. This difference is a logical amalgam of general economic trends in both countries and the retrospective of cooperative efforts. Unlike Russia, China has remained a steady interest in Africa since the decolonization period. The establishment of the Forum on China-Africa Cooperation in 2000 supported the facilitation of the cooperation efforts[6]. On the other hand, after the collapse of the Soviet Union, Russia temporarily detached itself from African politics. Belated Russian rapprochement was therefore met with a Chinese dominant presence. African markets with the fastest growing population and increased consumption needs, present an attractive venue for selling Chinese goods[7]. Almost all African countries are benefiting from diversified Chinese foreign direct investment. Oil and extractive natural resources account for a large share of investments, however, financial services, construction, transportation, and manufacturing make up half of Chinese FDI in Africa[8]. Against this backdrop, despite its own rich mineral resources, Russia has a shortage of certain raw materials, including chrome, manganese, mercury, and titanium that are essential for steel production[9]. Therefore, Russian economic interests in African countries mostly revolve around accessing these resources.

Russia’s strategic advantage over China is more visible in military cooperation with African countries. Russia has become the largest supplier of arms to Africa, accounting for 35% of arms exports, followed by China (17%), U.S. (9.6%), and France (6.9%)[10]. Besides arms trade, Russia provides military advice[11]. Reportedly, Wagner Group, a private military company with a history of fighting in Ukraine and Syria and has close ties to the Russian government has also shifted its focus towards Africa[12]. Even though Russia has a marginal advantage in military cooperation over China and western powers, Chinese actions in this direction should not be under-looked. Chinese defense strategy in Africa is based on a comprehensive approach, combining arms sales with other trade and investment deals, cultural exchanges, medical assistance, and building infrastructure. For instance, the package deal for building a Chinese military base in Djibouti covers the large non-military investment projects[13].

In support of the above-given strategic interests, Russia and China are actively using soft power tools. Confucius Institutes that promote Chinese language and culture are rapidly popping up across Africa and are now present in over 40 countries[14]. China is also becoming a popular destination for African students[15]. China also boosts its image through media cooperation. The Chinese Communist Party has organized four annual forums bringing together the representatives of Africa state-owned and private media agencies to discuss the global media environment and the state of African media[16]. These gatherings are unprecedented compared to China’s media-related efforts in other regions. On the other hand, Russia is also actively using the media as a medium for projecting its positive image. Russia Today and Sputnik – media agencies aligning with the discourses favorable to the Russian government, have expanded their reach to the African continent as well[17]. The number of the Russian World Foundation, known as Russkiy Mir, is also increasing in African countries[18]. Somewhat different from the Chinese approach is using the Russian Orthodox Church as the way to approach the Christian communities in Uganda, Kenya, Tanzania, and Ethiopia[19]. Even though current Chinese and Russian efforts to promote their image through media and cultural activities are not targeted at deterring the influence of each other, both actors have the potential to exploit the information space through controlled media platforms. Such developments can significantly undermine the social cohesion, as well as the trust and confidence in targeted actors.


Endnotes:

[1] Adlbe, J. (2019, November 14). What does Russia really want from Africa? Retrieved July 30, 2020, from https://www.brookings.edu/blog/africa-in-focus/2019/11/14/what-does-russia-really-want-from-africa

[2] Procopio, M. (2019, November 15). Why Russia is not like China in Africa. Retrieved July 30, 2020, from https://www.ispionline.it/en/pubblicazione/why-russia-not-china-africa-24409

[3] Ibid.

[4] Diop, M. (2015, January 13). Lessons for Africa from China’s growth. Retrieved July 31, 2020, from https://www.worldbank.org/en/news/speech/2015/01/13/lessons-for-africa-from-chinas-growth

[5] Spivak, V. (2019, October 25). Russia and China in Africa: Allies or Rivals? Retrieved July 30, 2020 from https://carnegie.ru/commentary/80181

[6] Nantulya, P. (2018, August 30). Grand Strategy and China’s Soft Power Push in Africa. Africa Center for Strategic Studies. Retrieved July 30, 2020, from https://africacenter.org/spotlight/grand-strategy-and-chinas-soft-power-push-in-africa

[7] Maverick, B. (2020, April). The three reasons why Chinese invest in Africa. Retrieved July 30, 2020 from https://www.investopedia.com/articles/active-trading/081315/3-reasons-why-chinese-invest-africa.asp

[8] Pigato, M. (2015). China and Africa: Expanding Economic Ties in and Evolving Global Context. The World Bank. Retrieved July 31, 2020, from https://www.worldbank.org/content/dam/Worldbank/Event/Africa/Investing%20in%20Africa%20Forum/2015/investing-in-africa-forum-china-and-africa.pdf

[9] Hedenskog, J. (2018, December). Russia is Stepping Up its Military Cooperation in Africa. FOI, retrieved July 31, 2020, from https://www.foi.se/rest-api/report/FOI%20MEMO%206604

[10] Adlbe, J. (2019, November 14). What does Russia really want from Africa? Retrieved July 30, 2020, from https://www.brookings.edu/blog/africa-in-focus/2019/11/14/what-does-russia-really-want-from-africa

[11] Russel, M & Pichon E. (2019, November). Russia in Africa. A new area for geopolitical competition. European Parliament’s Research Service, Retrieved July 30, 2020 from https://www.europarl.europa.eu/RegData/etudes/BRIE/2019/642283/EPRS_BRI(2019)642283_EN.pdf

[12] Hauer, N. (2018, August 27). Russia’s Favorite Mercenaries. The Atlantic. Retrieved July 30, 2020, from https://www.theatlantic.com/international/archive/2018/08/russian-mercenaries-wagner-africa/568435

[13] Benabdallah, L. (2018). China-Africa military ties have deepened. Here are 4 things to know. The Washington Post. Retrieved July 30, 2020, from https://www.washingtonpost.com/news/monkey-cage/wp/2018/07/06/china-africa-military-ties-have-deepened-here-are-4-things-to-know

[14] Nantulya, P. (2018, August 30). Grand Strategy and China’s Soft Power Push in Africa. Africa Center for Strategic Studies. Retrieved July 30, 2020, from https://africacenter.org/spotlight/grand-strategy-and-chinas-soft-power-push-in-africa

[15] Ibid.

[16] Ibid.

[17] Arbunies, P. (2019). Russia’s sharp power in Africa: the case of Madagascar, CAR, Sudan and South Africa, retrieved July 31, 2020, from https://www.unav.edu/web/global-affairs/detalle/-/blogs/russia-s-sharp-power-in-africa-the-case-of-madagascar-central-africa-republic-sudan-and-south-africa

[18] Ibid.

[19] Ibid.

2020 - Contest: PRC Below Threshold Writing Contest Africa Assessment Papers China (People's Republic of China) Option Papers Russia Rusudan Zabakhidze

Assessing the U.S. and China Competition for Brazilian 5G 

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Martina Victoria Abalo is an Argentinian undergrad student majoring in international affairs from The University of San Andres in Buenos Aires, Argentina. She can be found on Twitter as @Martilux. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the U.S. and China Competition for Brazilian 5G

Date Originally Written:  July 24, 2020.

Date Originally Published:  October 5, 2020.

Author and / or Article Point of View:  The author is an advanced undergrad student of International Affairs from Argentina.

Summary:  Brazilian President Jair Bolsonaro and U.S. President Donald Trump see the world similarly. At the same time, China’s investment in Brazil is significantly more than the U.S. investment. With China trying to put 5G antennas into Brazil, and the U.S. trying to stop China from doing the same worldwide, President Bolsonaro finds himself in a quandary and thus far has not decided to side with the U.S. or China.

Text:  When thinking about China and the U.S., most tend to see the big picture. However, often unseen are the disputes that are going in the shadows for alignment. This article will assess how U.S. tries to counterbalance China in Brazil, as China pursues the alignment of the South American power for 5G.

The relationship between China and Brazil must be understood in context. Before the impeachment of Brazil’s President Dilma Rousseff, China was Brazil’s most important ally economically and one of the closest politically[1]. However, with the assumption of the Presidency by Jair Bolsonaro in 2019, Brazil’s foreign policy towards China turned 180 degrees[2]. Although Brazil has been famous for having a foreign policy autonomous from their domestic one[3], Bolsonaro’s office changed that and started a close linkage with U.S. President Donald Trump.

Having a similar political outlook, Bolsonaro and Trump have made Brazil and the U.S. closer than they have ever been. Nevertheless, this closeness comes with a price, especially for Brazil, which seems to be playing the role of the second state in a bandwagon for survival relationship[4] with the United States. This role can be seen in the first months of 2019 when Jair tried to follow the U.S. lead in the international community. Though alignment with the U.S. may be well or poorly appreciated, it remains to be seen what impacts Brazil will feel from China following this alignment.

Brazil’s relationship with the U.S. did not last long because no matter how uncomfortable Bolsonaro feels with the Chinese political model, China remains Brazil’s first economic partner. In 2018 the Brazilian Gross Domestic Product GDP was 12,79%[5] and during 2019 China bought assets in Brazil for U.S. $62.871 billion and had total trade of U.S. $98.142 billion[6] between these two countries. In parallel with this, Brazil’s second-best trade partner, the U.S., was far behind China, with a two – way trade of U.S. $59.646 billion. As we know, the United States can not offer to Brazil the economic benefits that China does and clearly, this is no secret in Brazil. With this trade disparity, the question is whether the U.S. can offer something as powerful as China, to persuade Brazil from signing more agreements with China, such as installation of 5G antennas?

Even though 5G antennas are faster than the 4G, there are two concerns around this new technology. The first one is the privacy of the users because it is easy to get the exact user location. The second is that the owner of the 5G network or a hacker could spy on the internet traffic passing through said network[8].

In 2020, the United States is attempting to thwart China from signing agreements to place 5G antennas in countries worldwide. While the United Kingdom and France[9] rejected any kind of deal with China, in Brazil the official decision keeps on being delayed, and as of this writing nobody knows whether Bolsonaro align with China or the U.S.

China is trying to persuade Brazil to sign an agreement with Huawei which aims to develop 5G technology by placing 5G antennas all along Brazil[10]. This quest to convince Brazil to sign with Huawei has been going on for months. Despite the lack of a signed agreement Huawei, who has been operating in Brazil for a long time now, is opening a lab of 5G technology in Brasilia[11].

The U.S. does not have a viable counteroffer to Brazil for the placement of Huawei 5G antennas across the country[12]. The Trump administration keeps trying to persuade their political allies to not sign with Huawei, although the United States has not developed this kind of alternative technology. However, there are some companies interested in placing 5G on Brazil alike the Mexican telecommunications company Claro[13].

President Bolsonaro, in an effort to balance the U.S. and China’s interest in Brazil, will likely have to find a middle way. Regarding the influence of China when it comes to Brazil’s economy, it is naïve to think that there will not be any consequence if Brazil says no to Huawei. Of course, this possible “no” does not mean that China will break any economical entanglement with Brazil, but clearly, China would not be pleased by this decision. A yes decision by Bolsonaro might be a deal-breaker for the Trump-Bolsonaro relationship. Additionally, Bolsonaro started his presidency seeking to be Trump’s southern ally to ensure survival. Bolsonaro remains as hopeful as Jair that Brazil would be a secondary state[14], and that following the U.S. will help Brazil to change their political and economic allies. Finally, the close relationship between the U.S. and Brazil is quite good, and the U.S. can support Bolsonaro politically and diplomatically speaking in ways that China is simply not able.

In conclusion, Brazil is placed between a rock and a hard place and the solution to this matter will not satisfy all participants. It might be rather expensive for the future of Brazil if the U.S. does not back Bolsonaro if he says yes to China, and China might turn back on the Brazilian administration if they say no to Huawei.


Endnotes:

[1] Ferreyra, J. E. (n.d.). Acciones de política exterior de Brasil hacia organismos multilaterales durante las presidencias de Lula Da Silva [Grado, Siglo 21]. https://repositorio.uesiglo21.edu.ar/bitstream/handle/ues21/12989/FERREYRA%20Jorge%20E..pdf?sequence=1&isAllowed=y

[2] Guilherme Casarões. (2019, December 20). Making Sense of Bolsonaro’s Foreign Policy at Year One. Americas Quarterly. https://www.americasquarterly.org/article/making-sense-of-bolsonaros-foreign-policy-at-year-one

[3] Jacaranda Guillén Ayala. (2019). La política exterior del gobierno de Bolsonaro. Foreign Affairs Latinoamérica. http://revistafal.com/la-politica-exterior-del-gobierno-de-bolsonaro

[4] Matias Spektot, & Guilherme Fasolin. (2018). Bandwagoning for Survival: Political Leaders and International Alignments.

[5] Brasil—Exportaciónes de Mercancías 2019. (2019). Datos Macro. https://datosmacro.expansion.com/comercio/exportaciones/brasil

[6] World Integrated Trade Solutions. (2020, July 12). Brasil | Resumen del comercio | 2018 | WITS | Texto. World Integrated Trade Solutions. https://wits.worldbank.org/CountryProfile/es/Country/BRA/Year/LTST/Summarytext

[7] World Integrated Trade Solutions. (2020, July 12). Brasil | Resumen del comercio | 2018 | WITS | Texto. World Integrated Trade Solutions. https://wits.worldbank.org/CountryProfile/es/Country/BRA/Year/LTST/Summarytext

[8] Vandita Grover. (2019, October 16). In the Age of 5G Internet Is Data Privacy Just A Myth? | MarTech Advisor. Martech Advisor. https://www.martechadvisor.com/articles/mobile-marketing/5g-internet-and-data-privacy

[9] George Calhoun. (2020, July 24). Is The UK Ban On Huawei The “Endgame” For Free Trade? Forbes. https://www.forbes.com/sites/georgecalhoun/2020/07/24/is-the-uk-ban-on-huawei-the-endgame-for-free-trade/#6735924d46db

[10] Oliver Stunkel. (2020, June 30). Huawei or Not? Brazil Faces a Key Geopolitical Choice. Americas Quarterly. https://americasquarterly.org/article/huawei-or-not-brazil-faces-a-key-geopolitical-choice

[11] Huawei to open 5G lab in Brasília. (2020, July 23). BNamericas.Com. https://www.bnamericas.com/en/news/huawei-to-open-5g-lab-in-brasilia

[12] Gabriela Mello. (2020, July 7). Huawei says U.S. pressure on Brazil threatens long delays in 5G rollout. Reuters. https://www.reuters.com/article/us-huawei-tech-brazil-5g-idUSKBN2482WS

[13] Forbes Staff. (2020, July 8). Claro, de Carlos Slim, iniciará la carrera del 5G en Brasil. Forbes México. https://www.forbes.com.mx/tecnologia-claro-slim-5g-brasil

[14] Matias Spektot, & Guilherme Fasolin. (2018). Bandwagoning for Survival: Political Leaders and International Alignments.

Assessment Papers Below Established Threshold Activities (BETA) Brazil China (People's Republic of China) Competition Emerging Technology United States

Assessing How Countries Can Compete with Chinese Hybrid Tactics Below the Threshold of Armed Conflict

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


William Freer is currently reading at War Studies at King’s College London. He was a European finalist in the KF-VUB Korea Chair Writing Competition in 2018. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing How Countries Can Compete with Chinese Hybrid Tactics Below the Threshold of Armed Conflict

Date Originally Written:  July 24, 2020.

Date Originally Published:  September 28, 2020.

Author and / or Article Point of View:  The author is a soon to be graduated War Studies student reading at King’s College London who strongly believes in the upholding of the rules-based international order.

Summary:  Beijing’s continued use and development of coercive tactics below the threshold of armed conflict, sometimes referred to as ‘Hybrid’ or ‘Grey Zone’ conflict, threatens to undermine the existing rules-based international order. Rather than responding to Beijing at the tactical level, her competitors can instead develop their response on the strategic level and do so multilaterally.

Text:  Hybrid warfare is nothing new. States unable to compete (with the United States) in conventional military terms have long been evolving their capabilities below the threshold of armed conflict from cyber warfare to ‘Ambiguous’ warfare and everything in between[1]. The world has seen these tactics in use for decades in attempts by revanchist states to undermine the existing international order, yet there is little agreement on which tactics work best to counter them. In order to successfully compete with Beijing below the threshold of armed conflict, countries in South/East Asia can look to developing their responses on the strategic level and in a multilateral way.

The main problem this strategic level response poses is that it will require a great deal of multilateral cooperation. Beijing prefers to target states with its diplomacy and hybrid warfare individually rather than collectively[2]. By doing so, Beijing can maximise its coercive potential. When compared to Vietnam, Malaysia, Taiwan, the Philippines, Indonesia and even India or Japan, China’s economic and military strength is far greater[3]. These Chinese strengths have seen the placing of oil rigs in the claimed waters of other states or regular intrusions into the claimed waters of other states by Chinese naval vessels (from fishing boats to warships)[4]. These tactics are difficult to counter. The Vietnamese, for example, attempted to interfere with a Chinese oil drill’s operation in their waters through harassing it with coast guard cutters, but this did not prove effective in deterring Beijing’s activities. Simply responding in kind to Beijing’s tactics like this will in fact further serve to undermine the rules-based international order.

It is hard for individual states to counter these activities on the tactical level. The same cannot be said for the strategic level, however. Through more meaningful multilateral engagement, states can use their collective power to more effectively compete with Beijing, this multilateral engagement can (and must) come in many different forms.

The most important way in which states can help each other to compete with Beijing is through intelligence sharing. Good intelligence is vital in allowing for states to effectively combat tactics below the threshold of armed conflict. The less wealthy of China’s neighbours are severely restricted by the resources at their disposal and can therefore seek to pool their intelligence capabilities as much as possible. This pooling would not be a simple task; it will involve highly sensitive information and states typically jealously guard their secrets. To be able to stand a chance in competing against an adversary, especially in the use of hybrid warfare, knowledge of Chinese activities is essential. There is already a great deal of the necessary diplomatic framework in place for this sharing to happen. The Association of South East Asian Nations could provide a useful starting point for its members to better share intelligence. There is also talk of the Five Eyes program being expanded to include Japan, which is a step in the right direction[5].

Much of the competition between China and other countries is playing out across the Indo-Pacific region (from Japan and the central Pacific to the western end of the Indian Ocean), this is an inherently maritime region[6]. As such, any meaningful multilateral cooperation by those countries that compete with Beijing will need to include a maritime element.

This maritime angle presents many possibilities. For example, the joint patrolling of each other’s waters or joint responses to intrusions by Beijing’s naval assets is one way this could be done. Another would be to embed military personnel into each other’s forces. Actions like these would serve an important purpose in disabling Beijing’s ability to target countries bilaterally and thus minimise the leverage that Beijing could bring to bear on its competitors. If these actions were taken, Beijing would have to seriously re-evaluate when and where they employ coercive tactics. Already moves in this direction are being made as Japan, India, the United States and others conduct regular joint exercises[7]. These joint exercises could be taken to the next stage in the form of regular joint deployments and should even go as far as to include joint coast guard duties. This strategy could also include land-based options, military observers embedded with Indian forces along their contested borders with China for example.

The main problem in making a success out of multilateral engagement will be overcoming trust issues. Many of the countries that will need to support each other have their own disputes and complex histories. Take the Spratly Islands for example, it is not only China and Vietnam who have claims there, but also the Philippines, Malaysia and Taiwan[8]. Even so, these countries could learn to put aside their differences for now. Some countries appear to be trying to avoid competition with Beijing, but whether they like it or not Xi Jinping’s China will compete with them. Unless the countries of the Indo-Pacific work together, Beijing will be able to target them bilaterally at will.

The U.S. could encourage and support these actions and indeed this may be a necessary component for success. However, for it to work it is vital that the US does not take a leading role, but instead allows the regional countries to take these steps on their own initiative. In this way, these countries will not feel pressured towards an unwanted confrontation with Beijing by the US. If successful, this non-leading role for the U.S. will avoid tit-for-tat responses and the further undermining of international norms.

Beijing has become adept at making use of hybrid warfare, so why try and play them at their own game? By taking the competition with Beijing below the threshold of armed conflict to the strategic level, countries can prevent bilateral coercion from Beijing. If Beijing believes that actions against one country will result in involving many others into the situation, they will be far less likely to do so. Increased multilateral cooperation can have many different facets, in terms of competition with Beijing, the intelligence and maritime domains are the most important and so these would be the areas for countries to prioritise.


Endnotes:

[1] Connell, Mary Ellen and Evans, Ryan (2015, May). Russia’s “Ambiguous Warfare” and implications for the U.S. Marine Corps. Retrieved July 22, 2020, from https://www.cna.org/CNA_files/PDF/DOP-2015-U-010447-Final.pdf

[2] Miller, Tom (2019). Chapter 6. In China’s Asian Dream: Empire Building Along the New Silk Road (pp. 199-235). London: Zed Books.

[3] Blackwill, Robert D. & Harris, Jennifer M. (2016). Chapter 5. In War by Other Means: Geoeconomics and Statecraft (pp 129-152). Cambridge: Harvard University Press.

[4] Cole, Bernard D. (2016) Chapter 3. In China’s Quest for Great Power: Ships, Oil and Foreign Policy. (pp 85-114). Annapolis: Naval Institute Press.

[5] Howell, David (2020, June 30). Why Five Eyes should now become six. Retrieved July 22, 2020, from https://www.japantimes.co.jp/opinion/2020/06/30/commentary/japan-commentary/five-eyes-now-become-six

[6] Patalano, Dr Alessio (2019). UK Defence from the ‘Far East’ to the ‘Indo-Pacific’. London: Policy Exchange. Retrieved July 22, 2020, from https://policyexchange.org.uk/wp-content/uploads/2019/07/UK-Defence-from-the-%E2%80%98Far-East%E2%80%99-to-the-%E2%80%98Indo-Pacific%E2%80%99.pdf

[7] Oros, Andrew L (2017) Chapter 5. In Japan’ Security Renaissance: New Policies and Politics for the Twenty-First Century (pp 126-168). New York: Columbia University Press.

[8] Hawksley, Humphrey (2018) Part I. In Asian Waters: The Struggle over the Asia-Pacific and the Strategy of Chinese Expansion (pp 22-57). London: Duckworth Overlook.

2020 - Contest: PRC Below Threshold Writing Contest Assessment Papers Below Established Threshold Activities (BETA) China (People's Republic of China) William Freer

Assessing the Development of Chinese Soft Power in Central Asia

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


James Ridley-Jones is a PhD student at King’s College London currently researching Geostrategy in Central Asia. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Development of Chinese Soft Power in Central Asia

Date Originally Written:  July 15th 2020.

Date Originally Published:  September 23, 2020.

Author and / or Article Point of View:  The author believes that Chinese Soft Power, initiative failures are indicative of wider Chinese strategic engagement failures in the Central Asian region. For the purposes of this assessment Soft Power is defined as the use of investment diplomacy and cultural engagement to build relationships and project influence below the threshold of armed conflict.

Summary:  Chinese Soft Power initiatives remain key to facilitating relations alongside Chinese investment. Although China retains good bi-lateral relations with the Central Asian states, a closer examination of Chinese initiatives demonstrates failures amongst the region’s general populations comparative to the ruling elites.

Text:  The announcement of the Belt and Road Initiative by Xi Jinping in Kazakhstan 2013 led to the required development of Chinese Soft Power within the region. The purpose of this Soft Power is to enable political security alongside economic investment. The Belt and Road Initiative encompasses economic investment and diplomatic initiatives, which, when combined, develop working partnerships and economic corridors along projected routes. The initiative has also absorbed prior programs and investments into this framework.

Chinese investment in the region allows for key infrastructure developments that might improve economic and social capacities. Diplomatic and co-operative initiatives take the form of exhibitions, student engagement and the notorious Confucius Institutes. All of these aim to engage students, businessmen and key officials in cultural engagement for the promotion of relations.

Chinese Soft Power actions are not without a downside. High levels of one-sided investment can be, and are, perceived negatively. The often debated debt-trap diplomacy employed by China, together with the use of a Chinese workforce for such projects, leaves poor public perceptions of these investments, irrespective of the benefits.

Similarly, the potential reach of Soft Power initiatives is limited within the countries that China targets. This limitation is due to population dispersal and the extent of possible population engagement. Although there have been multiple exhibitions in Tashkent for example, they only reach a small percentage of the population.

Soft power through language learning to encourage engagement is increasing, but still falls behind state languages, the lingua franca Russian, and English for both tourism and business purposes. In Almaty Kazakhstan, the Confucius Institute remains one of the few places Mandarin can be learnt, compared with English which is far more prevalent in foreign language schools.

China, however, does attract significantly more students to its Universities (2017-2018), with approximately 12,000 Kazakh students currently studying in China[1]. Comparatively there are only 1,300 Kazahk students in the United Kingdom[2] and 1,865 in the United States[3]. Although distance can be included as a factor for this decision, there are also additional Chinese grants and scholarships given to Central Asian students to encourage their attendance at Chinese Universities. This Soft Power will go on to affect the next generation of Kazakhs in the future.

The effectiveness of Chinese diplomatic initiatives is impeded in Central Asia by two main factors:

The first is the disparity between key parts of the target countries’ political and financial elite and the general population.

Although policymakers and businessmen in Central Asia benefit from Chinese initiatives and as such look to engage with China on business, such perceptions remain different to those of the general population who do not benefit in such ways. This disconnect requires a two-tier Chinese approach to inter-country relations that currently does not exist.

The second is the Uyghur problem, where current Chinese policy and actions are perceived very negatively by Central Asian populations. These differences on the Uyghur problem are illustrated in the government support given to Chinese actions, compared to feelings amongst the general populace. An indicator of this is a lack of support from specific Central Asian nations. Only the Governments of Tajikistan and Turkmenistan (the two most closed off Central Asian nations) signed a letter in support of Chinese actions, suggesting the other countries are in more turmoil over the decision[4].

The Uyghur have ethnic, cultural and religious similarities to the other Turkic ethnic groups within Central Asia, as well as there being Uyghur minorities in Central Asia. Because of such ties Chinese attitudes in Xinjiang have significant negative connotations within the Central Asian general populace. Although this might not be demonstrated at a governmental level, Sinophobia can be noted across the general population.

Both of these issues take the form of anti-Chinese protests, such as those in Almaty, to even the car bombing of the Chinese embassy in Bishkek (2016). This car bombing, it was reported, was the action of an Islamist, but it has also been suggested that it was in retaliation for the mistreatment of the Uyghur people and Sinophobia.

In 2016, land reform protests revealed underlying concerns of potential Chinese control over agriculture in Kazakhstan[5]. In 2019, there were protests at a Kyrgyzstan mine over environmental quality concerns, greatly affecting the local population[6]. This issue is likely to be compounded with additional mines given or sold to Chinese investors.

More recent protests in Almaty and Nur Sultan, Kazakhstan and in Bishkek, Kyrgyzstan September 2019 suggest relations remain frayed. The Kazakhstan protests stem from a variety of reasons to do with increasing Chinese influence in the region[7]. Similarly, in Kyrgyzstan protests grew as a result of Chinese businesses side-lining existing Kyrgyz businesses in the capital[8].

All of these protests demonstrate the disconnect between Chinese investment and maintaining relations with the general populace through diplomatic initiatives.

Given the nature of the regimes in Central Asia, there is no available data on opinion polls of China, and if data was available the validity of results might also be questionable. Public protest in these countries becomes an available method of assessing public opinion, though it is limited in scope and nuance.

The increasing numbers of Central Asian students at Chinese Universities through both grants, scholarships and engagement programs, will most likely be the continued Soft Power tactic.

Although relatively ineffective currently, the Confucius Institutes will look to further develop language teaching capabilities and promote further cultural engagement.

Chinese exhibitions will most likely continue, but at a similar rate of engagement with the population, limiting their effectiveness.

Understanding and analysing Chinese Soft Power failures is important to the development of counter- Chinese strategy. Although inaction by others would allow for continued Chinese failure, these Chinese actions will eventually become successful as newer generations, specifically elites, are increasingly influenced by Chinese Soft Power initiatives, particularly through Universities.

Chinese Soft Power failure is a lack of ability to connect with the wider population beyond the national elites. Critically, Chinese Soft Power failure indicates a lack of cohesive strategy incorporating both investment and diplomacy.


Endnotes:

[1] Uatkhanov, Y. Kazakh Students Also Seek Education in the East – Edge : Kazakhstan. Edge : Kazakhstan. Retrieved 20 July 2020, from https://www.edgekz.com/kazakh-students-also-seek-education-in-the-east.

[2] Shayakhmetova, Z. (2019). Kazakh students seek degrees in best UK universities – The Astana Times. The Astana Times. Retrieved 20 July 2020, from https://astanatimes.com/2019/12/kazakh-students-seek-degrees-in-best-uk-universities.

[3] Kazakhstan – Education. Export.gov. (2019). Retrieved 20 July 2020, from https://www.export.gov/apex/article2?id=Kazakhstan-Education.

[4] Putz, C. (2019).Which Countries Are For or Against China’s Xinjiang Policies?. Thediplomat.com. Retrieved 20 July 2020, from https://thediplomat.com/2019/07/which-countries-are-for-or-against-chinas-xinjiang-policies.

[5] Why Kazakhstan’s protests are unusual. BBC News. (2016). Retrieved 20 July 2020, from https://www.bbc.co.uk/news/world-asia-36163103.

[6] Putz, C. (2019). Tensions Flare at Kyrgyz Gold Mine. Thediplomat.com. Retrieved 20 July 2020, from https://thediplomat.com/2019/08/tensions-flare-at-kyrgyz-gold-mine.

[7] Dozens detained in Kazakhstan at anti-China protests. reuters.com. (2019). Retrieved 20 July 2020, from https://www.reuters.com/article/us-kazakhstan-china-protests-detentions/dozens-detained-in-kazakhstan-at-anti-china-protests-idUSKBN1W60CS.

[8] Kruglov, A. (2019). Sinophobia simmers across Central Asia. Asia Times. Retrieved 20 July 2020, from https://asiatimes.com/2019/11/sinophobia-simmers-across-central-asia.

2020 - Contest: PRC Below Threshold Writing Contest Assessment Papers Below Established Threshold Activities (BETA) Central Asia China (People's Republic of China) Coercive Diplomacy Diplomacy James Ridley-Jones

Boxing Out: Assessing the United States’ Cultural Soft Power Advantage in Africa Over China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Scott Martin is a career U.S. Air Force officer who has served in a multitude of globally-focused assignments.  He studied Russian and International Affairs at Trinity University and received his Masters of Science in International Relations from Troy University.  He is currently assigned within the National Capitol Region. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Boxing Out: Assessing the United States’ Cultural Soft Power Advantage in Africa Over China

Date Originally Written:  July 16, 2020.

Date Originally Published:  September 14, 2020.

Author and / or Article Point of View:  The author believes that as a mechanism to counter China’s rising influence in Africa, the U.S. can leverage some of its soft power advantages. In particular, the popularity of American cultural offerings, such as the National Basketball Association (NBA) offers an opportunity for the U.S. to counter China and its soft power efforts in a geographically critical area of the globe.

Summary:  Chinese investment in hard and soft power in Africa over the past several decades presents a challenge to the U.S. role on the continent. While the Chinese focus in Africa is yielding positive results for China’s image and influence, there are still areas where the U.S. outpaces China. American advantages in soft power, such as the popularity of its cultural exports, like the NBA, offer an opportunity for the U.S. to counter Chinese efforts in Africa.

Text:  Since the Cold War, Chinese investment and engagement in Africa is a strong point of their foreign policy. For several decades, China has pumped billions in economic aid, estimated at over $100 billion[1]. The combination of presenting economic assistance on business terms only without dictating values and lack of historical barriers (ala Western Europe’s colonial past and American insistence on adherence to values such a human rights for economic assistance) has made China a formidable force on the African continent, offering an attractive “win-win” relationship[2]. However, while China dominates when it comes to economic engagement, they have not shut out the West when it comes to various forms of soft power. In particular, U.S.-based forms of entertainment, from movies to sporting events, still out-pace Chinese variants.

Since political scientist Joseph Nye first defined “soft power” in the 1990s as the concept of “when one country gets other countries to want what it wants…in contrast with the hard or command power of ordering others to do what it wants”, the concept has gained many political and academic converts[3]. The Chinese look to promote their soft power capabilities, and it is a stated goal of Chinese leaders since Hu Jintao in 2007[4]. These efforts appear to pay off, as surveys show Africans with positive opinions related to China[5].

Yet, while China makes strides in promoting its soft power, it still faces challenges. For all the positive responses it engenders with its efforts, it has not won over all Africans. In various surveys, many ordinary Africans do not always feel that China’s continued investment in their respective countries benefits them as much as it does political leaders[6]. Additionally, Chinese efforts for the promotion of soft power lack the impact of its Western/U.S. competitors. In cultural examples, to include entertainment, the Chinese lag far behind the U.S. It is in this area that the U.S. can leverage its soft power capabilities to help promote itself and counter some aspects of China power projection.

Many aspects of American culture and entertainment find a home in Africa. American cinematic offers dwarf all other international offering by a significant margin, to include China[7]. American music, especially hip-hop and rhythm and blues, dominate African music channels. An American traveling through the continent is considerably more likely to run across American music than the Chinese equivalent[8]. While the Chinese promote their educational capabilities, more African will look towards American colleges/universities if given the chance to attend[9]. While hard power economic and military investment numbers might favor China, the U.S. continues to hold a significant lead in soft power ratings over China in Africa[9].

In one key example, the U.S.-based NBA is arguably the most popular U.S.-based sports league on the continent. While professional football/soccer might be the most popular international sport, the NBA has grown in global popularity over the past 20 years, which includes Africa. Prior to the suspension of the NBA season due to COVID-19, 40 players born in Africa or descended African-born parents were on NBA rosters, to include reigning league Most Valuable Player Giannis Antetokounmpo and All-Star Joel Embiid[10]. Factor in NBA Hall of Famers such as Dikembe Mutombo and Hakeem Olajuwon, and the NBA has significant connections with Africa. Additionally, NBA merchandising and broadcasting takes in significant money, and previous games played in Africa posted sell-out crowds[11]. At the start of 2020, the NBA established an NBA Africa league for the continent, with participation from multiple countries. While COVID-19 disrupted plans for this league, the NBA will be eager to re-engage with Africa post-pandemic.

For the U.S., the NBA efforts offer an opportunity to counter Chinese activity, playing to America’s significant soft power advantage. While the NBA is becoming a more international game, the league is still an American corporation, with mainly American stars. While jersey sales focus on the individual names, which will include African players, the designs and logos are still from the American-based teams. Additionally, with the NBA’s current relationship with China severely curtailed after Houston Rockets’ General Manager Daryl Morey retweeted a message support Democratic protestors in Hong Kong, the NBA, facing a pre-COVID-19 shortfall of $400M from Chinese boycotting, is looking for additional revenue streams[12]. A U.S./NBA relationship in Africa can be a version of “win-win.”

While most view soft power as more effective when it is not directly promoted by the power projecting country, the U.S. can leverage its soft power advantages to counter Chinese actions in Africa. When it comes to the promotion of American cultural imports, U.S. officials, while not explicitly stating that the U.S. government supports that activity, can do things such as promote their attendance at such events via social media as well as take advantage of other communication forums to promote the successes of such ventures in Africa. Additionally, when applicable, the U.S. government can promote favorable messaging at efforts to expand U.S.-based cultural exports, such as the release of American-owned movies and music recordings and clear any governmental administrative hold-ups for entities like the NBA to promote their games and products in Africa.

Granted, promotion of American-based culture and entertainment, such as the NBA, cannot offset the extensive Chinese economic investment in Africa, and the U.S. will have to face its own challenges in soft power projection. However, by playing to its strengths, especially in soft power realm, the NBA in Africa can open the door towards showing a positive image and outreach of American and Western values. This NBA actions can also open the door toward future engagements that can both benefit Africa and challenge Chinese efforts. American cultural offerings are not a cure-all magic bullet, but the U.S. does have the ability to leverage them for soft power advantages, which could stem an increasingly powerful China whose influence across Africa is growing.


Endnotes:

[1] Versi, Anver (Aug/Sept 2017).“What is China’s Game in Africa?” New African, 18. https://newafricanmagazine.com/15707.

[2] Tella, Oluswaseun (2016) “Wielding Soft Power in Strategic Regions: An Analysis of China’s Power of Attraction in Africa and the Middle East” Africa Review, 8 (2) 135. https://www.academia.edu/30299581/Africa_Review_Wielding_soft_power_in_strategic_regions_an_analysis_of_Chinas_power_of_attraction_in_Africa_and_the_Middle_East.

[3] Lai, Hongyi (2019) “Soft Power Determinants in the World and Implications for China: A Quantitative Test of Joseph Nye’s Theory of Three Soft Power Resources and of the Positive Peace Argument.” The Copenhagen Journal of Asian Studies, 37(1) 10.

[4] Schmitt, Gary J (19 June 2014) “A Hard Look at Soft Power in East Asia” American Enterprise Institute Research, 5. https://www.aei.org/research-products/report/a-hard-look-at-soft-power-in-east-asia.

[5] Tella, Oluswaseun, “Wielding Soft Power in Strategic Regions” 137.

[6] Langmia, Kehbuma (2011). “The Secret Weapon of Globalization: China’s Activities in Sub-Saharan Africa” Journal of Third World Studies, XXVIII (2), 49. https://www.academia.edu/31196408/THE_SECRET_WEAPON_OF_GLOBALIZATION_CHINAS_ACTIVITIES_IN_SUB-SAHARAN_AFRICA_By_Kehbuma_Langmia.

[7] 2015-2020 Worldwide Box Office, IMDb Pro, Accessed 13 June 2020, https://www.boxofficemojo.com/year/world/?ref_=bo_nb_in_tab

[8] Tella, Oluswaseun. “Wielding Soft Power in Strategic Regions” 161.

[9] Lai, Hongyi. “Soft Power Determinants in the World and Implications for China” 29.

[10] Mohammed, Omar (2 April 2019) “NBA to Invest Millions of Dollars in New African League” Reuters. https://www.reuters.com/article/us-nba-africa-idUSKCN1RE1WB.

[11] Ibid.

[12] Young, Jabari (2020, 16 Feb). “NBA will Lose Hundreds of Millions of Dollars Due to Rift with China, Commissioner Says” CNBC. https://www.cnbc.com/2020/02/16/nba-will-lose-hundreds-of-millions-of-dollars-due-to-rift-with-china-commissioner-says.html.

2020 - Contest: PRC Below Threshold Writing Contest Africa Assessment Papers Below Established Threshold Activities (BETA) China (People's Republic of China) Private Sector Scott Martin United States

Assessment on the 2035 Sino-U.S. Conflict in Africa Below the Level of War

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


Major Thomas G. Pledger is a U.S. Army National Guard Infantry Officer and visiting military analyst at the Foundation for Defense of DemocraciesCenter on Military and Political Power. Tom has deployed to multiple combat zones supporting both conventional and special operations forces. He has been selected to the Secretary of Defense’s Strategic Thinkers Program and will be attending Johns Hopkins Paul Nitze School of Advanced International Studies. Tom has been a guest lecturer at the Department of State’s Foreign Service Institute. His current academic and professional research is focused on network targeting, stability operations, and unconventional/gray zone warfare. Tom holds a Master in Public Service and Administration from the Bush School of Government and Public Service at Texas A&M University, a Master of Humanities in Organizational Dynamics, Group Think, and Communication from Tiffin University, and three graduate certificates in Advanced International Affairs from Texas A&M University in Intelligence, Counterterrorism, and Defense Policy and Military Affairs.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment on the 2035 Sino-U.S. Conflict in Africa Below the Level of War

Date Originally Written:  July 7, 2020.

Date Originally Published:  September 7, 2020.

Author and / or Article Point of View:  The author believes that China’s male population bulge will cause conflict in Africa.

Summary:   The year is 2035 and the world’s major production facilities have shifted from China to Africa. In Africa, Western business interests and the interests of the People’s Republic of China have begun to intersect and interfere with one another. No government wants a conventional conflict where the goods are produced. This interference leads instead to gray-zone operations and information warfare.

Text:  The year is 2035 and over the last decade a landmark shift in the location of production and manufacturing facilities of the world occurred. China has suffered a self-inflicted population crisis. The One-Child Policy, established in 1980[1] and modified in 2016[2], created a Chinese population with a gender imbalance of 50 million excess males and a rapidly expanding older population bulge. By 2050 the median age in China is expected to be 50 years old[3]. Earlier this century, China recognized this demographic shift and began investing in Africa’s infrastructure to increase control and influence on global production means. China’s implementation of this policy through loan-debt traps to improve local infrastructure was complemented by the permanent movement of Han Chinese from China to Africa. Moving these populations served multiple purposes for China. First, it eased resource demands in China. Second, it increased the Chinese economic and political influence in African countries. Lastly, it allowed China to use Chinese workers instead of African workers, thus using the loans from the loan-debt traps to pay local African Chinese reinvesting these Chinese loans in Chinese workers and Chinese corporations, instead of the local African population or businesses. Once the Chinese populations had moved to the African countries, China rapidly implemented the Chinese Social Credit System in Africa. Chinese communities in Africa remained isolationist. These actions would disenfranchise most local African communities to direct Chinese influence in their countries.

Many international Western corporations, which depended on cheap labor in China, began to recognize this future shift in Chinese demographics around 2025. These corporations’ analysis of the world provided two likely locations for future labor markets, South America and Africa. In South America, those nations with low wages remained politically unstable and unlikely to support Western businesses. Africa was subject to impacts from local or regional Islamists, but governments were supportive of international business opportunities. Africa, in addition to low wages and a large working-age population, also provided many of the raw resources, to include rare earth metals[4]. The major hindrance to expansion in Africa was a lack of stable infrastructure.

Unlikely as it was, Chinese funded infrastructure in Africa would enable Western businesses. The proximity of Western economic interests and Chinese efforts to consolidate political influence and commercial control created a region in which no nation wanted a conventional conflict, but gray-zone and information warfare were dominant.

Complicating the efforts for Western influence operations were those advertising campaigns conducted by private industry occurring at the same time as Western government efforts, creating information fratricide for Western efforts. The Chinese Communist Party-controlled Chinese efforts were unified.

Chinese efforts targeted local infrastructure with cyberattacks to disrupt Western production facilities while simultaneously blaming the disruptions on Western companies’ energy demands. Chinese banking officials pressured local African governments to place undue taxes and administrative hardships on Western corporations, for the possibility of reduced interest rates and small portions of loan forgiveness against the Chinese loans. The use of the social credit system in Africa was challenging to implement. The Chinese built 6G communication systems were largely ignored by the local population, due to concerns for personal security, and access to space-based internet. U.S. Government messaging was one of the significant successes of the coordination between the Department of State’s Global Engagement Center, U.S. Cyber Command (USCYBERCOM), and the forward-deployed Military Information Support Operation (MISO) Teams. Another major win for USCYBERCOM was the deployment of Cyber Operation Liaison Officers (LNO). These LNOs were established to coordinate security, protection, and, if necessary, responses to support U.S. businesses with operations in foreign countries from attacks by any nation. This authority had occurred with the passing of legislation after the 2020 Pandemic, recognizing that many of America’s business interests, supported National Security Interests.

The U.S. government’s efforts were specifically designed and implemented to keep a light military footprint while enabling local security and governance to support the population and allow the local governments to be supported by the local community. U.S. Military training missions increased the capabilities of regional militaries to conduct security operations to improve border security and counter Islamist influence. These light military efforts were coordinated with the Department of State’s State Partnership Program (SPP). The SPP increased the number of involved African countries during the late ’20s from 15 countries to 49 countries[5]. This increase in SPP participation also created a rise in the Sister Cities Program[6]. These two programs created a synergistic relationship creating regular exchanges between U.S. State and local governments and African governments and cities in a concerted effort to increase local government efficiency and effectiveness. The U.S. Agency for International Development worked with the Department of State SPP to bring professional health care organizations and U.S. Army National Guard and U.S. Air National Guard capabilities to improve, build, and train locally sustainable healthcare facilities. Along the Chinese built roads and rails, microloans from Western sources began to flow in, creating local businesses, starting the foundation for local economies. The use of Foreign Military Sales was targeted not on tanks or U.S. weapons and aircraft, but rather engineering equipment. Engineering equipment was selected to enable the local African governments to repair the Chinese built and funded roads and rails.

The unsung hero for coordinating and supporting all these efforts was the Civil Affairs Officers and Bilateral Affairs Officers working diligently to synchronize and present a positive U.S. presence and counter Chinese dominance, enabled by the delegated approval authority. This field-based synchronization authority streamlined staffing times from over a year to months or weeks. These coordinations were with the Country Teams, the National Guard Bureau, the Department of State, non-governmental organizations, MISO Teams, and others.


Endnotes:

[1] Kenneth Pletcher, “One-Child Policy,” Encyclopædia Britannica, inc. , https://www.britannica.com/topic/one-child-policy.

[2] Feng Wang, Baochang Gu, and Yong Cai, “The End of China’s One-Child Policy,” Brookings Institution https://www.brookings.edu/articles/the-end-of-chinas-one-child-policy.

[3] Karen Zraick, “China Will Feel One-Child Policy’s Effects for Decades, Experts Say,” The New York Times, October 30, 2015 2015.

[4] JP Casey, “Into Africa: The Us’ Drive for African Rare Earth Minerals,” Verdict Media Limited, https://www.mining-technology.com/features/into-africa-the-us-drive-for-african-rare-earth-minerals.

[5] “The State Partnership Program (Spp),” National Guard Bue, https://www.nationalguard.mil/Leadership/Joint-Staff/J-5/International-Affairs-Division/State-Partnership-Program.

[6] “Sister Cities International,” Sister Cities International, https://sistercities.org.

2020 - Contest: Civil Affairs Association Writing Contest Africa Assessment Papers China (People's Republic of China) Civil Affairs Association Thomas G. Pledger United States

Assessing the Impact of Defining Lone Actor Terrorism in the U.S.

Jessa Hauck is a graduate of Suffolk University and an experienced analyst.  She has a passion for studying terrorism both at home and abroad.  Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Impact of Defining Lone Actor Terrorism in the U.S.

Date Originally Written:  July 8, 2020.

Date Originally Published:  September 4, 2020.

Author and / or Article Point of View:  The author believes a whole-of-society approach is needed to disrupt the rise of domestic terrorism.

Summary:  Since the 9/11 attacks, the U.S. Government (USG) has used substantial resources for overseas counterterrorism. With the rise of domestic terrorism, the USG has an opportunity to define Lone Actor Terrorism in law or policy. This definition would enable better recognition of behavior patterns related to the online radicalization process and enable the development of effective detection and prevention strategies.

Text:  Billions of dollars, material resources, and research have been dedicated to the overseas counterterrorism effort since 9/11. As a result, potential attacks were thwarted, terrorists were detained and tried, and Congress passed the Patriot Act of 2001 which provided law enforcement with tools to investigate terrorists, increased penalties for convicted terrorists, and addressed the lack of information sharing and coordination between government agencies. Yet, despite this success, domestic terrorism, in particular lone actor, has grown in significance. Some experts have suggested that prior mass killings committed by Jared Loughner, Dylann Roof and others should have, but were not labeled as Lone Actor Terrorism. As a consequence, standard detection and prevention strategies to combat future lone actor attacks have not received adequate attention from policymakers and law enforcement. However part of the problem is the lack of an established definition for the term.

Hamm and Spaaji’s 2015 research study defined Lone Actor Terrorism as “political violence perpetrated by individuals who act alone; who do not belong to an organized terrorist group or network; who act without the direct influence of a leader or hierarchy; and whose tactics and methods are conceived and directed by the individual without any direct outside command or direction[1].” This definition is a good starting point but individuals with no terrorism tendencies could also fit this description.

Without a standard definition detection efforts are diffused. Jeanine de Roy van Zuijdewijn and Edwin Bakker studied lone actors using character traits such as age, mental health disposition, employment status and education level to create a behavior profile. However their results showed no specific traits emerged significantly enough to establish a pattern[2]. Graduate students from the Georgetown National Security Critical Task Force also confirmed in their study that profiling potential actors was ineffective since most lone actors seem to fit a broad pattern of traits such as white, single male with a criminal record[3]. Georgetown did however, concur with Hamm and Spaaji’s 2015 study which focused more on lone actor behavior patterns. Hamm and Spaaji created a group of categories that accurately reflect a lone actor’s inability to fit into an already established network: lone soldiers, lone vanguard, loners and lone followers. Lone soldiers are supported by a terrorist network but act alone; lone vanguard acts alone to advance individual ideology and is not tied to a terrorist organization; a loner is an individual who acts alone to advance goals and is not accepted by network; and the lone followers who align with the ideology of a group, but aren’t socially competent enough for acceptance. These distinct categories provide a better methodology in which to bin behavior patterns. Alternatively, Bart Schuurman and colleagues advocated for a re-evaluation of the “lone wolf” terminology arguing its connotation was inaccurate. They concluded that individual actors were not socially alone but held some ties to networks and made their intent to attack publicly known early in the process[4]. Re-evaluation of the term is not widely discussed and perhaps it should be in order to develop a more complete picture.

Prevention of online radicalization and effective community outreach and engagement are key to disrupting the radicalization cycle. With the increased use of online resources, and isolated online social networks, lone actors have endless ways to be radicalized and discuss their intent to carry out an attack. Law enforcement, in coordination with social media companies have developed ways to identify these potential threats. However, not enough is being done with the resources available. Melanie Smith, Sabine Barton and Jonathan Birdwell argue that social media companies need to do a better job of reporting high risk behavior on their platforms to law enforcement and suggest they develop a coordinated approach to monitoring extremist groups and potential recruits[5]. Alternatively, Alison Smith suggests focusing on the radicalization process itself and cites work done by the New York City Police Department to do just that. She indicates there are four stages to radicalization including pre-radicalization, self-identification, indoctrination and jihadization[6]. The key stage in this model is self-identification or the introduction and acceptance of extremist views, but if potential lone actors are not identified at this stage, looking out for intent declarations is a solid second avenue. Emmet Halm in his review of prevention procedures focused on breaking the radicalization cycle and explained that since 9/11 76% of lone actors clearly communicated their intent in letters, manifestos and proclamations[7]. Although posting statements of intent are helpful to identify potential individuals at risk, law enforcement must be vigilant in determining where an individual is in their development since posting intentions can simply be an exercise in practicing their right to free speech.

Prevention of online radicalization has the potential to be incredibly effective in identifying at risk individuals, but community outreach and engagement cannot be forgotten[8]. Jeffrey Simon suggests it’s imperative that law enforcement not only learn and educate themselves about lone actor behavior patterns, they must educate the community as well. Many lone actors make their views and intentions to attack known to family members, friends, and other members of their unique communities, however most indications are never reported or are brushed aside.

Hampered by the lack of a standard definition, no universally acknowledged profile or behavior pattern, and prevention tactics that are not effectively enforced or discussed, Lone Actor Terrorism has the potential to become a major threat within the U.S., particularly within the current political climate. Lone Actor Terrorism could be defined in law, or policy, and provide a roadmap for government agencies, law enforcement and social media platforms on effective detection and prevention strategies to combat future attacks. Recent reports from both the Federal Bureau of Investigation and Department of Homeland Security acknowledge the rise of lone actor attacks and address their respective agency roles and abilities in detection and prevention efforts. These reports provide a glimmer of hope that further government efforts will soon follow.


Endnotes:

[1] Hamm, Mark S. and Ramón Spaaij. Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies. Terre Haute, IN: Indiana State University, 2015. https://www.ncjrs.gov/pdffiles1/nij/grants/248691.pdf

[2] Bakker, Edwin and Jeanine de Roy van Zuijdewijn. Lone-Actor Terrorism: Policy Paper 1: Personal Characteristics of Lone-Actor Terrorists. Countering Lone-Actor Terrorism Series No. 5. Hague: International Centre for Counter Terrorism – The Hague, 2016. http://icct.nl/wp-content/uploads/2016/02/201602_CLAT_Policy-Paper-1_v2.pdf

[3] Alfaro-Gonzales, Lydia, et al. Report: Lone Wolf Terrorism. Washington, DC: Georgetown University (2015)
https://georgetownsecuritystudiesreview.org/wp-content/uploads/2015/08/NCITF-Final-Paper.pdf

[4] Schuurman, Bart, et al. End of the Lone Wolf: The typology That Should Not Have Been: Journal Studies of Conflict and Terrorism Journal. Studies in Conflict &Terrorism. Volume 42, Issue 8, 2019. https://www.tandfonline.com/doi/full/10.1080/1057610X.2017.1419554

[5] Smith, Melanie, Sabine Barton and Jonathan Birdwell. Lone Wolf Terrorism Policy Paper 3: Motivations, Political Engagement and Online Activity. Countering Lone-Actor Terrorism Series No. 7. London: Institute for Strategic Dialogue, 2016. http://icct.nl/wp-content/uploads/2016/02/CLAT-Series-7-Policy-Paper-3-ISD.pdf

[6] Smith, Alison G., Ph.D. National Institute of Justice. How Radicalization to Terrorism Occurs in the United States: What Research Sponsored by the National Institute of Justice Tells Us. June 2018. https://www.ncjrs.gov/pdffiles1/nij/250171.pdf

[7] Halm, Emmet. Wolf Hunting: Unique Challenges and Solutions to Lone-Wolf Terrorism. Harvard Political Review. October 21, 2019. https://harvardpolitics.com/united-states/wolf-hunting

[8] Hunt, Leigh. Beware the Lone Wolf. Police. Police Magazine. October 17, 2013. https://www.policemag.com/341043/beware-the-lone-wolf

[9] National Center for the Analyses of Violent Crime. Federal Bureau of Investigation. Behavioral Threat Assessment Center. Behavioral Analysis Unit. Lone Offender: A Study of Lone OffenderTerrorism in the U.S. (1972-2015). November, 2019. https://www.fbi.gov/file-repository/lone-offender-terrorism-report-111319.pdf/view

[10] DHS Strategic Framework for Countering Terrorism and Targeted Violence. September, 2019. https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategic-framework-countering-terrorism-targeted-violence.pdf

Assessment Papers Governing Documents and Ideas Jessa Hauck United States Violent Extremism

An Assessment of the Irrelevance of State Borders in 2035

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


Specialist Brandon White is a Civil Affairs Non-Commissioned Officer at the 478th Civil Affairs Battalion, and recently served on a Civil Affairs Team in Tegucigalpa, Honduras. As a civilian, he presently works as a Consultant for National Security and Defense at Capgemini Government Solutions, and previously served as a Legislative Assistant in the U.S. House of Representatives. He can be found on Twitter @bwhiteofficial and LinkedIn at https://www.linkedin.com/in/bwhiteofficial/. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Irrelevance of State Borders in 2035

Date Originally Written:  June 29, 2020.

Date Originally Published:  September 2, 2020.

Author and / or Article Point of View:  The author believes that by 2035, the primary drivers of civil instability and the main threats to human security will be cross-border, rendering states functionally border-less.

Summary:  By 2035, the primary drivers of conflict and competition will transcend the system of state borders that traditionally define national security policy. These threats will center on the physical security of individuals and communities, environmental crises, and economic vulnerability, and will demand a problem-solving approach that is similarly cross-border in nature.

Text:  Throughout the course of human history, there have been eras of great contrast: of peace and war, prosperity and poverty, vibrancy and plague. One consistent theme throughout has been the trend towards greater interconnectedness among people and the formation of bonds across physical and cultural divides. The Peace of Westphalia in 1648 created the concept of territorial sovereignty[1] and the Montevideo Convention of 1933 required that a state have a defined territory and a permanent population[2]. The concept of territorial sovereignty has fundamentally shaped international relations and therefore every U.S. national security decision. Likewise, since the 1919 Paris Peace Conference, the world has approached problem-solving within the construct of state borders. This approach is increasingly detrimental to global security because populations and the threats they face can rarely be confined in that way, with cross-border threats growing in prominence. By 2035, states will be functionally border-less as the primary threats to human security transcend the system of borders first conceived in 1648 and demand a different approach to solving them. These threats include the physical security of individuals and communities, environmental crises, and economic vulnerabilities.

Personal and community security includes protection from physical violence from state and non-state actors such as Transnational Criminal Organizations (TCOs) or Violent Extremist Organizations (VEOs), sectarian or ethnic groups, or violent criminals[3]. VEOs such as the Islamic State and Al-Shabaab violently pursue ethnic or religious homogenization and operate freely across state borders in the Middle East and Africa. TCOs such as MS-13 threaten vulnerable populations across the Northern Tier of Central America, leaving civilians with few options but to flee. These groups often seek out areas that are challenging for states to govern or maintain a meaningful presence, showing how easily a state’s territorial sovereignty can be undermined. As authoritarianism rises across the world[4], state-based repression will likely also increase, prompting migration alongside state-sanctioned violence. The Syrian Civil War is one example of how domestic political repression can lead to regional instability, create global migration crises, and intensify the spread of extremism. By the time a threat to a population’s physical security becomes a U.S. national security concern, it is certain that the threat would have major cross-border implications requiring the attention of U.S.-led, joint security organizations such as the Combined Joint Task Forces supporting Operation Inherent Resolve or operations in the Horn of Africa, or Joint Task Force-Bravo in the U.S. Southern Command Area of Responsibility, or other regional and multilateral entities.

Environmental crises linked to climate change are inherently cross-border, such as rising sea levels, drought, and the frequency of severe storms. With these types of events, food supplies become less reliable and more expensive, a lack of clean water heightens hygiene and sanitation concerns and the spread of preventable disease, and vulnerable populations are pressed to relocate resulting in economic decline and cross-border displacement. As a result, it is wise to anticipate increased conflict over scarce resources, mass migration toward more habitable areas, and faster spread of disease. Some experts have already suggested climate change may have played a role in increasing the tensions which led to the Syrian Civil War[5]. The 2014 Quadrennial Defense Review highlighted the importance of addressing environmental threats because they act as “threat multipliers,” aggravating “political instability, and social tensions – conditions that can enable terrorist activity and other forms of violence”[6]. Additionally, the Intergovernmental Panel on Climate Change’s Fifth Assessment Report of 2014 detailed all aspects of human security, including economic, health, and food security, that will affect both rural and urban areas as a result of growing environmental threats[7]. For the Department of Defense (DoD), both Humanitarian Assistance/Disaster Response operations and longer term, interagency coordinated stability operations will require a cross-border approach.

Globally, economic instability is growing in the form of extreme poverty, severe wealth inequality, and an overall lack of economic opportunity. These factors increase civil instability by fueling migration and enabling the exploitation of vulnerable individuals and communities. Due to the global recession triggered by the COVID-19 pandemic[8], these economic threats to human security are likely to worsen by 2035. Competition between the U.S. and China will also shape the national security landscape, and the ability to increase economic opportunity domestically and among regional and global partners will be a critical factor in the U.S.’ ability to ensure its own security. Already, the U.S. and Europe have struggled to manage large numbers of migrants seeking work and economic opportunity, which has exacerbated the economic anxieties of domestic populations and distracted from addressing underlying vulnerabilities[9]. The solutions to these problems are inherently cross-border, demanding creative regional and multilateral approaches to trade and investment, and the promotion of new, less exploitative, and more sustainable industries.

Upon accepting that the threat landscape in 2035 will be predominantly cross-border, national security professionals can begin to shape regional and multilateral solutions that address the underlying human factors of conflict and competition that often fester in the blind spots of state-based strategic interests. First, the U.S. can strengthen and contribute to the reform of regional and multilateral security organizations like the North Atlantic Treaty Organization, political organizations like the Organization of American States, and economic organizations like regional development banks to ensure the U.S. has viable mechanisms for working with allies and partners to counter these cross-border threats. Second, the U.S. government can reassess its bureaucratic organization and associated legal authorities to ensure its efforts are not hindered by structural inefficiencies or limitations. Legal authorities and funding streams can be flexible enough to meet these challenges, and partnerships with multilateral institutions can be solidified. Whether in Syria, Central America, Afghanistan, or the Sahel, DoD is increasingly asked to address cross-border security threats stemming from human factors in conflict and competition. Therefore, in order to increase the likelihood of mission success across all theaters, DoD has a vested interest in working with interagency partners to drive the evolution of the U.S. approach to addressing the human factors of conflict and competition that will define the border-less 2035 threat landscape.


Endnotes:

[1] Treaty of Westphalia. (1648, October 24). Retrieved from The Avalon Project: Documents in Law, History, and Diplomacy: https://avalon.law.yale.edu/17th_century/westphal.asp

[2] Convention on Rights and Duties of States. (1933, December 26). Retrieved from Organization of American States, Department of International Law: http://www.oas.org/juridico/english/sigs/a-40.html

[3] (1994). Human Development Report, 1994. United Nations Development Programme. New York: Oxford University Press. Retrieved from http://www.hdr.undp.org/sites/default/files/reports/255/hdr_1994_en_complete_nostats.pdf

[4] Unit, E. I. (2020, January 21). Democracy Index 2019. Retrieved from Economist Intelligence Unit: https://www.eiu.com/topic/democracy-index

[5] Kelley, C. P., Mohtadi, S., Cane, M. A., Seager, R., & Kushnir, Y. (2015). Climate change in the Fertile Crescent and implications of the recent Syrian drought. Proceedings of the National Academy of Sciences, 112(11), 3241-3246. Retrieved from https://www.pnas.org/content/pnas/112/11/3241.full.pdf

[6] (2014). Quadrennial Defense Review. Washington, DC: Department of Defense. Retrieved from https://archive.defense.gov/pubs/2014_Quadrennial_Defense_Review.pdf

[7] (2014). Fifth Assessment Report, Climate Change 2014: Impacts, Adaptation, and Vulnerability. Geneva: Intergovernmental Panel on Climate Change. Retrieved from https://www.ipcc.ch/report/ar5/wg2

[8] Lu, J. (2020, June 12). World Bank: Recession Is The Deepest In Decades. Retrieved from NPR: https://www.npr.org/sections/goatsandsoda/2020/06/12/873065968/world-bank-recession-is-the-deepest-in-decades

[9] Karasapan, O. (2017, April 12). Refugees, Migrants, and the Politics of Fear. Retrieved from Brookings: Future Development: https://www.brookings.edu/blog/future-development/2017/04/12/refugees-migrants-and-the-politics-of-fear

2020 - Contest: Civil Affairs Association Writing Contest Assessment Papers Border Security Brandon White Civil Affairs Association Governing Documents and Ideas

Assessing the U.S. Shift to Great Power Competition and the Risk from North Korea

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


Richard McManamon is an U.S. Army Officer and a graduate student at the National Defense University. The views expressed are the author’s alone and do not represent the official position of the U.S. Army, the Department of Defense, or the United States Government. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the U.S. Shift to Great Power Competition and the Risk from North Korea

Date Originally Written:  July 3, 2020.

Date Originally Published:  August 31, 2020.

Author and / or Article Point of View:  Richard McManamon is an U.S. Army Officer and a graduate student at the National Defense University.

Summary:  U.S. President Donald Trump’s strategic shift towards Russia and China has de-prioritized North Korea. Following multiple summits between the two nations, minimal lasting progress has been made. As the U.S. shifts focus to great power competition, a comprehensive approach towards North Korea to protect U.S. interests will be of value.

Text:  Individual human factors, both behavioral and psychological, have played a critical role in countless global conflicts and the contemporary security environment is equally impacted by these factors. Following President Trump’s election, a new National Security Strategy (NSS) was published in 2017 that emphasized a shift from a counter-terrorism focused strategy to one that challenges near-peer threats from China and Russia. The Department of Defense implemented the NSS in the 2018 National Defense Strategy (NDS), where the document specifically labeled China “a strategic competitor using predatory economics to intimidate its neighbors” and highlighted Russia’s attempt to reshape the world through their authoritarian mode[1]l.

The NSS and NDS emphasizing Russia and China reduces focus on North Korea. President Trump’s relationship with North Korean leader Kim Jong Un has been highly volatile and the U.S. relationship with North Korea further destabilized as North Korea tested twenty-three rockets in 2017 alone[2]. Throughout 2017, President Trump expressed his feeling towards North Korea through multiple tweets, for example, labeling the North Korean ruler “Little Rocket Man[3].” Kim disregarded Trump’s emotionally driven responses and continued rocket testing, which escalated tensions even higher. As the situation escalated toward a breaking point, Trump and Kim met in 2018 and again in 2019. Furthermore, in June 2019 President Trump made a trip to the Korean peninsula for further nuclear negotiations, which marked the first time a U.S. sitting president entered North Korea[4].

Since 2017, both leaders applied various human factors that contributed to a bilateral relationship. Nevertheless, the promising start that followed multiple summits began to dramatically falter when North Korea conducted its first missile launch of 2020 on March 21st showcasing its desire to maintain its position in the global order[5]. The 2020 missile launch combined with new satellite imagery showing a possible expansion of a rocket launch facility signaled to the U.S. and other Western powers that North Korea is maintaining its hardened stance and attempting to portray an image of strength[6]. To Kim, the U.S. realignment of resources toward Russia and China may look like an opportunity. Moreover, this shift to China and Russia can provide enough space for North Korea to expand their rocket research and development. Further highlighting the North Korea challenge, a 2019 RAND report highlighted that North Korea is on a trajectory of nuclear development that has transformed it into a fundamentally different kind of strategic challenge[7].

While the U.S. transitions to China and Russia, it still maintains numerous sanctions on North Korea. For years the U.S. and United Nations Security Council have placed sanctions on the country ranging from export/import restrictions to economic restrictions[8]. The longer the sanctions are in place, the less effective they are. Furthermore, the continued U.S. use of sanctions can provide a false sense of security to the U.S. as it realigns its global strategy towards China and Russia. The U.S. prioritization of China and Russia allows North Korea to maintain its status within the global order without new pressure from western nations to promote change in governance.

President Trump has successfully communicated with Kim in the past by leveraging his attributes and finding common ground with the North Korean leader. While the complete dismantling of North Korea’s rocket and nuclear program may no longer be feasible, the U.S. can reestablish meaningful diplomatic relations with North Korea to influence Northern peninsula. This is not to suggest that if the U.S. were to extend an olive branch that North Korean missiles would be instantly dismantled. However, progress with North Korea can likely be increased through human interaction and an emotional connection versus harsher sanctions that may harm the population more than the senior leaders of the country. Lastly, the opportunity cost of the U.S. not meeting the challenge now is that inaction can embolden Kim Jong Un to develop a more capable missile program that threatens U.S. national interests and its allies globally.

As the U.S. continues a strategy shift to China and Russia, countries like North Korea are losing their much-needed prioritization within the U.S. government. While both China and Russia pose risks to U.S. interests, acknowledging such risk does not justify a neglect of other threats on the world stage. Small risks can quickly transition to substantial risks if not appropriately managed. The ramifications of not placing significant resources and attention on North Korea creates opportunities for Kim to exploit, with short and long-term costs for U.S. interests and regional security. President Trump has the tools to build a relationship with North Korea to achieve good governance and order. Moving forward, the U.S. can ensure a comprehensive strategy that effectively challenges China and Russia, but not at the cost of neglecting smaller countries. Such a strategy starts with increased diplomatic relations, revisits sanction negotiations with the input from key nations and lastly, works towards a manageable missile treaty with North Korea.


Endnotes:

[1] Department of Defense, National Defense Strategy (2018). Retrieved from https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf.

[2] Berlinger, J. (2017). North Korea’s missile tests: What you need to know. Retrieved from https://www.cnn.com/2017/05/29/asia/north-korea-missile-tests/index.html

[3] Hirsh, M. (2019). Trump just gave North Korea more than it ever dreamed of. Retrieved from https://foreignpolicy.com/2019/06/30/trump-has-already-given-north-korea-more-than-it-dreamed-of

[4] Ripley, W. (2019). Trump and Kim make history, but a longer and more difficult march lies ahead. Retrieved from https://www.cnn.com/2019/06/30/asia/trump-kim-history/index.html

[5] Masterson, J. (2020). North Korea tests first missiles of 2020 . Retrieved from https://www.armscontrol.org/act/2020-04/news/north-korea-tests-first-missiles-2020

[6] Brumfiel, G. (2020). North Korea seen expanding rocket launch facility it once promised to dismantle. Retrieved from https://www.npr.org/2020/03/27/822661018/north-korea-seen-expanding-rocket-launch-facility-it-once-promised-to-dismantle

[7] Gian Gentile, Yvonne K. Crane, Dan Madden, Timothy M. Bonds, Bruce W. Bennett, Michael J. Mazarr, Andrew Scobell. (2019). Four problems on the Korean peninsula. Retrieved from https://www.rand.org/pubs/tools/TL271.html

Schoff, J., & Lin, F. (2018). Making sense of UN sanctions on North Korea. Retrieved from https://carnegieendowment.org/publications/interactive/north-korea-sanctions

2020 - Contest: Civil Affairs Association Writing Contest Assessment Papers Civil Affairs Association North Korea (Democratic People’s Republic of Korea) Policy and Strategy Richard McManamon United States

Alternative History: The Newburgh Conspiracy Succeeds — An After-Action Review

Thomas Williams is a Part-Time member of the faculty at Quinnipiac University.  He is a retired Colonel in the U.S. Army Reserve, a member of the Military Writer’s Guild, and tweets at @twilliams01301.  Divergent Options content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Alternative History:  The Newburgh Conspiracy Succeeds — An After-Action Review

Date Originally Written:  June 15, 2020.

Date Originally Published:  August 24, 2020.

Author and / or Article Point of View:  The author is a retired Army Reservist and former member of the Distance Education Program at the U.S. Army War College.  This article is presented as a vehicle to discuss the vagaries of planning in open systems.

Summary:  March, 1783. General Washington and his closest advisors discuss the General’s inability to prevent the coup fomenting among Continental Army Officers camped in Newburgh, New York[1]. This alternative history teaches readers to recognize the capricious nature of plans and how it’s essential to be humble as sometimes the smallest and most irrational inputs can have unpredictable and disproportionate effects.

Text:  General George Washington was disgusted beyond measure. The Army was now commanded by his former deputy Horatio Gates, and Washington was in hiding. Gates and a faction of disgruntled officers and men were moving toward Philadelphia with the expressed purpose of intimidating the people, and by extension, Congress, into supporting its cause: backpay, pensions, and respect.

Sitting now with his closest associates, Alexander Hamilton and Henry Knox (whose own writings did not do much to help this current situation), and a few dozen other compatriots who comprised an after-action review team, Washington wanted to discuss how he lost control when the cabal met in Newburgh, NY.

What an irony, Washington bemoaned, as this move was likely to erase their eight-year struggle for freedom from the British. Although Yorktown was already two years past, the war wasn’t technically over, and no one present at this after-action review knew the status of negotiations in Paris. The British, who maintained an Army in New York, were showing signs of taking advantage of Gate’s burgeoning coup, including ending negotiations and resuming hostilities.

Hamilton wasn’t present in Newburgh, so he took the lead in asking questions. “How did it all unfold?” he needed to know.

Washington and Knox were the first to share. Knox said “The crowd was restless. Insolent, even.”

“The Continental Army officers at camped at Newburg, New York?” Hamilton asked.

“Yes,” Knox allowed, adding that many of the would-be conspirators were good, reliable men who had been with the Army for most of its eight years. “I suspect we could reason with any individual,” Knox continued, “but there was a madness to the crowd, whipped up, I suspect, by Horatio Gates himself.”

That Gates was a chief conspirator surprised no one, and as Knox told it, the man seethed with a personal resentment toward Washington. Every man in today’s discussion knew that this was not Gates’ first run at Washington. Back in 1777, and flush from his victory at Saratoga, Gates and a Brigadier General named Thomas Conway were secretly corresponding with members of Congress to have Gates named as the Army’s commander in chief. Ultimately, the “Conway Cabal” failed[2], but all the resentments lingered.

Hamilton now turned his attention to Washington who was not present at Newburgh for all that Knox described. By design, Washington entered the Newburgh meeting room in dramatic fashion, at the last possible minute. Hamilton asked Washington, “What happened when you entered the room?”

“The moment had the desired impact,” Washington replied. Washington wasn’t expected to attend the Newburgh conference, so his sudden entrance from a side door at the exact moment Gates rose to open the proceedings momentarily cooled the firebrands.

Washington knew the power of his position. He had been in command of the Army since 1775 and shared in all its deprivations. The General knew the majority of these conspiring officers and shared many of their frustrations.

Washington recollected that his remarks were logical, rational, and delivered solidly enough, but what he had to say also seemed insufficient.

Hamilton interjected, asking what the members of the after-action review team thought of this characterization. Many agreed with General Washington saying that they too thought there was an edgy, even sinister demeanor among the conspirators.

Washington continued with his story saying that at Newburgh he next intended to read a letter from a prominent Virginia congressman containing assurances that Congress was doing all in its power to redress the Army’s complaints.

Knox interrupted, noting to Hamilton that Washington seemed to struggle with the words of this letter and was reading haltingly.

“Let’s avoid any indictments, Henry,” Hamilton said. “That’s not what we’re here for.”

“Yes, that is correct,” Washington said. “I was reaching for my spectacles and fumbled as I did so. I decided to continue reading as I looked.”

“That wasn’t your plan,” Hamilton said. “It was less about the letter than the use of your spectacles as a deliberate prop.”

Washington’s faced flushed in anger. Hamilton was correct about the intended theatrics. “My hope,” Washington, intoned, “was to use my loss of sight as an appeal for sympathy.” Washington went on to say that he was going to beg the conspirators’ pardon, to forgive his hesitant reading with words about going gray and blind in his service.

“I never had the chance,” Washington said, recounting how the conspirators seized the initiative and leveled the most vile accusations toward him. “The invective tipped the balance in a room predisposed to anger,” he noted.

Hamilton spoke again, “What conclusions can we draw; what might have been done differently?”

Knox, an avid reader and bookshop owner before the war, started an impromptu lecture on Greek rhetoric. He opined about logos (logic), ethos (Washington’s character) and began talking about pathos (passion).

“General Washington needed to focus on his oratory. He was bland,” Knox said.

Hamilton thought about it for a moment and turned back at Knox saying, “Henry, you’re wrong—the answer is ‘nothing’.” “Nothing,” he repeated. “Humility and pathos were our aim. Our plan was right the first time. It simply went awry.”

Hamilton speculated out loud that this incalculably small moment may have made all the difference. Had Washington been able to produce his spectacles more quickly, he might have earned that planned sympathy.

“I got to my spectacles seconds later, but the moment was fleeting,” Washington said.
Knox banged the table, shouting, “No one can plan for this. And frankly from what you’re saying, even if General Washington succeeded with these theatrics, something else might have gone wrong.”

“Shakespeare,” whispered Washington. “Richard III.” How fickle our designs, how arrogant our plans when even a King cannot secure a needed horse,” he added[3].

“What’s to be done, then?” asked Hamilton. “Where do we go from here?”

No one had the chance to answer as the shouts of British officers began to echo across the courtyard just beyond their door. Washington, Knox, and Hamilton knew at once; they were found.

Knowledgeable readers will recognize the moment this story deviated from the historical record. In reality, Washington quickly found his glasses, and as he put them on, he said, “Gentlemen, you must pardon me. I have grown gray in your service and now find myself growing blind[4].”

In a way that’s hard for us to understand in our age of cynicism, this simple gesture brought men to tears and back into Washington’s camp, so to speak.

The conspirators dropped their demands and accepted their subordination to civilian authority, no matter how flawed. The revolution held fast, the Treaty of Paris was signed in September of that year, and the British evacuated their armies.


Endnotes:

[1] For a quick understanding of the Newburgh Conspiracy, see Martin, J. K. (2015, March 12). The Newburgh Conspiracy [Video]. George Washington’s Mount Vernon. https://www.mountvernon.org/video/playlist/36

[2] To know more, see Scythes, J (ND) The Conway Cabal. George Washington’s Mount Vernon.
https://www.mountvernon.org/library/digitalhistory/digital-encyclopedia/article/conway-cabal

[3] From Shakespeare’s Richard III, published circa 1593, Act 5, Scene 4. Richard exclaims, “A horse! a horse! my kingdom for a horse!” http://shakespeare.mit.edu/richardiii/full.html.

[4] Ferling, J. (2009). The ascent of George Washington: The hidden political genius of an American icon (p. 234). Bloomsbury Publishing.

Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers Thomas Williams United States

Assessing the Chinese Diaspora as Key to Southeast Asian Human Factor Influence Through 2035

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


Tom Perkins is a 2010 graduate of the United States Military Academy. He commissioned into the U.S. Army as an Infantry Officer and served at the Platoon, Company, and Battalion level. He is currently serving as a Southeast Asian Foreign Area Officer.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Chinese Diaspora as Key to Southeast Asian Human Factor Influence Through 2035

Date Originally Written:  June 17, 2020.

Date Originally Published:  August 17, 2020.

Article and / or Article Point of View:  This article is written from a U.S perspective concerning partnership in Southeast Asia vis-a-vis the People’s Republic of China (PRC).

Summary:  The Chinese Communist Party (CCP) is able to define the “Chinese” identity. This gives the CCP human factor influence over ethnic Chinese communities throughout Southeast Asia. The PRC can use these community relationships to influence and even manipulate nations throughout Southeast Asia. Chinese Americans, as credible Chinese voices, can build relationships and define cultural norms that are not dictated by the CCP.

Text:  The Chinese Diaspora, or Chinese abroad, is a concept that developed from Chinese immigration throughout history but particularly the 19th and 20th centuries. This concept created tight knit, and in some places, large communities outside of China. The largest of these communities are in Southeast Asia. These communities traditionally defined their identity based on family, language, business, food, and traditional practices such as Confucianism, Buddhism, Taoism etc. The large number of ethnic Chinese in various countries made the community a significant force for political mobilization. The most overt example of mobilization is the ethnic Chinese led Malayan Communist Party which waged a communist insurrection in Malaysia throughout the second half of the twentieth century[1].

Even when large scale political mobilization does not occur, the existence of these communities at times causes conflict in the host nations. Ethnic Chinese throughout Southeast Asia are perceived to be better connected in business than the local ethnic majorities of the countries they live in. As a result, distrust and resentment has occasionally erupted into the local ethnic majorities protesting and engaging in violence against the Chinese communities. There is no easy solution to such a conflict. Historically, efforts to force assimilation of these communities were generally unsuccessful at reducing conflict and erasing Chinese identity. Starting in 1966, under the Suharto presidency, Indonesia orchestrated a series of policies meant to discourage Chinese identity and culture in an attempt to forge a more nationalist Indonesian identity.  However, since the reform period in Indonesia, these policies have been rescinded[2]. These historical trends suggest overseas Chinese communities will continue to exist and grow as an independent cultural and social network into 2035.

The growth of China into the world’s second largest economy has given it a new level of prestige. China’s real economic power as well as soft and sharp power will continue to increase through 2035. The ability for the CCP to influence human factors among and through overseas Chinese is more favorable than it has ever been, and will continue to be more favorable into the future. The increased economic wealth of people in China makes them a natural source for business ties among the diaspora. It is conceivable that the CCP will leverage such relationships in the future to gain political influence throughout Southeast Asia. This leveraging can be an alarming prospect when one considers a long-term U.S partner, such as Thailand, has an ethnic Chinese population of around 7 million, which is approximately 10% of the population[3]. Actions by the CCP signal a desire to gain influence in Southeast Asia. Traditional soft power programs such as the Belt and Road Initiative promulgated by Xi Jinping are supplemented by more subtle gestures such as establishing Confucius Institutes. The latter being an example of the CCPs manipulation of human factors to increase political capital by using Confucius institutes as a communications platform for signaling Chinese cultural values.

The heart of the issue is that the CCP is able to define the Chinese identity. Thus, anyone who identifies as Chinese, will have an affinity for the culture, and will be more susceptible to CCP messaging. This is an old struggle in a new context. The Republic of China, aka Taiwan, has been raging against the CCP’s attempts to define what is and is not Chinese since the Chinese Civil War. The strategy throughout history was to lay claim to the terms “Chinese” and “China” with its own branding. The issue is that the CCP has been very successful at stamping out such branding attempts. This is why even well-traveled and educated Americans are surprised to learn that China Airlines is not based in China, it is based in Taiwan, and why there is nothing weird about some “Chinese” people marching into an Olympic stadium under a banner labeled “Chinese Taipei.”

The U.S is in a good position to address the CCP dominance of Chinese culture in Southeast Asia. The U.S is home to a large and relatively affluent ethnic Chinese population. The Department of State and accompanying agencies can make efforts to reach out to community and business leaders to empower them to define what it means to be overseas Chinese. By empowering ethnically Chinese Americans the United States can lead the overseas Chinese movement in Southeast Asia and prevent the business networks, family ties, social networks, and overall population from being tools of CCP sharp power. In popular culture influence, Chinese Americans could be leading the production of Mandarin language cinema and music. Southeast Asian Chinese could look to Chinese American businesses for capital investment as well as future markets. Additionally, U.S government messaging can reconsider usage of the term “Chinese” because of its implicit affiliation with the CCP. The word “Sino” sufficiently distinguishes the ethnic affiliations from national affiliations associated with the PRC. These actions are an effective start to neutralizing CCP appropriation of the ethnic Chinese identity.

As PRC state power grows, its ability to wield influence outside of its boarders increases. The State Department and supporting agencies can take initiative to combat messaging that implies the CCP monopolizes Chinese culture. The U.S can foster real relationships between Sino Americans and ethnic Sino populations throughout Southeast Asia. By doing this the U.S can deny the CCP human factor influence among partner nations in Southeast Asia.


Endnotes:

[1] Opper, M. (2020). People’s Wars in China, Malaya, and Vietnam. Washington D.C: University of Michigan Press.

[2] Kitamura, Y. (2019). The Re-recognition of Confucianism in Indonesia: An Example of China’s. In M. S. Dioko, H. M. Hsiao, & A. H. Yang, China’s Footprints in Southeast Asia (pp. 172-193). Singapore: NUS Press.

[3] Goodkind, D. (2019). The Chinese Diaspora: Historical Legacies and Contemporary Trends. Washington D.C: U.S Census Bureau.

2020 - Contest: Civil Affairs Association Writing Contest Assessment Papers China (People's Republic of China) Civil Affairs Association Minority Populations and Diasporas Thomas Perkins

Assessing the Chinese People’s Liberation Army’s Surreptitious Artificial Intelligence Build-Up

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Richard Tilley is a strategist within the Office of the Secretary of Defense. Previously, Richard served as a U.S. Army Special Forces Officer and a National Security Advisor in the U.S. House of Representatives. He is on Twitter @RichardTilley6 and on LinkedIn. The views contained in this article are the author’s alone and do not represent the views of the Department of Defense or the United States Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing the Chinese People’s Liberation Army’s Surreptitious Artificial Intelligence Build-Up

Date Originally Written:  July 6, 2020.

Date Originally Published:  August 14, 2020.

Author and / or Article Point of View:  The author is an unconventional warfare scholar and strategist. He believes renewed American interest in great power competition and Chinese approaches to unrestricted warfare require the United States national security apparatus to better appreciate the disruptive role advanced technology will play on the future battlefield.

Summary:  China’s dreams of regional and global hegemony require a dominant People’s Liberation Army that faces the dilemma of accruing military power while not raising the ire of the United States. To meet this challenge, the Chinese Communist Party has bet heavily on artificial intelligence as a warfighting game-changer that it can acquire surreptitiously and remain below-the-threshold of armed conflict with the United States.

Text:  President Xi Jinping’s introduction of the “The China Dream” in 2013 offers the latest iteration of the Chinese Communist Party’s (CCP) decades-long quest to establish China in its rightful place atop the global hierarchy. To achieve this goal, Xi calls for “unison” between China’s newfound soft power and the People’s Liberation Army’s (PLA) hard power[1]. But, by the CCP’s own admission, “The PLA still lags far behind the world’s leading militaries[2].” Cognizant of this capability deficit, Beijing adheres to the policy of former Chairman Deng Xiaoping, “Hide your strength, bide your time” until the influence of the Chinese military can match that of the Chinese economy.

For the PLA, Deng’s maxim presents a dilemma: how to build towards militarily eclipsing the United States while remaining below the threshold of eliciting armed response. Beijing’s solution is to bet heavily on artificial intelligence (AI) and its potential to upend the warfighting balance of power.

In simple terms, AI is the ability of machines to perform tasks that normally require human intelligence. AI is not a piece of hardware but rather a technology integrated into nearly any system that enables computing more quickly, accurately, and intuitively. AI works by combining massive amounts of data with powerful, iterative algorithms to identify new associations and rules hidden therein. By applying these associations and rules to new scenarios, scientists hope to produce AI systems with reasoning and decision-making capabilities matching or surpassing that of humans.

China’s quest for regional and global military dominance has led to a search for a “Revolution in Military Affairs (RMA) with Chinese characteristics[3].” An RMA is a game-changing evolution in warfighting that upends the balance of power. In his seminal work on the subject, former Under Secretary of Defense Michael Vickers found eighteen cases of such innovations in history such as massed infantry, artillery, railroad, telegraph, and atomic weapons[4]. In each case, a military power introduces a disruptive technology or tactic that rapidly and enduringly changes warfighting. The PLA believes that AI can be their game-changer in the next conflict.

Evidence of the PLA’s confidence in AI abounds. Official PRC documents from 2017 called for “The use of new generation AI technologies as a strong support to command decision-making, military deductions [strategy], and defense equipment, among other applications[5].” Beijing matched this rhetoric with considerable funding, which the U.S. Department of Defense estimated as $12 billion in 2017 and growing to as much as $70 billion in 2020[6].

AI’s potential impact in a Western Pacific military confrontation is significant. Using AI, PLA intelligence systems could detect, identify, and assess the possible intent of U.S. carrier strike groups more quickly and with greater accuracy than traditional human analysis. Then, PLA strike systems could launch swarming attacks coordinated by AI that overwhelm even the most advanced American aerial and naval defenses. Adding injury to insult, the PLA’s AI systems will learn from this engagement to strike the U.S. Military with even more efficacy in the future.

While pursuing AI the CCP must still address the dilemma of staying below the threshold of armed conflict – thus the CCP masterfully conceals moves designed to give it an AI advantage. In the AI arms race, there are two key components: technology and data. To surpass the United States, China must dominate both, but it must do so surreptitiously.

AI systems require several technical components to operate optimally, including the talent, algorithms, and hardware on which they rely. Though Beijing is pouring untold resources into developing first-rate domestic capacity, it still relies on offshore sources for AI tech. To acquire this foreign know-how surreptitiously, the CCP engages in insidious foreign direct investment, joint ventures, cyber espionage, and talent acquisition[7] as a shortcut while it builds domestic AI production.

Successful AI also requires access to mountains of data. Generally, the more data input the better the AI output. To build these data stockpiles, the CCP routinely exploits its own citizens. National security laws passed in 2014 and 2017 mandate that Chinese individuals and organizations assist the state security apparatus when requested[8]. The laws make it possible for the CCP to easily collect and exploit Chinese personal data that can then be used to strengthen the state’s internal security apparatus – powered by AI. The chilling efficacy seen in controlling populations in Xinjiang and Hong Kong can be transferred to the international battlefield.

Abroad, the CCP leverages robust soft power to gain access to foreign data. Through programs like the Belt and Road Initiative, China offers low-cost modernization to tech-thirsty customers. Once installed, the host’s upgraded security, communication, or economic infrastructure allows Beijing to capture overseas data that reinforces their AI data sets and increases their understanding of the foreign environment[9]. This data enables the PLA to better train AI warfighting systems to operate in anywhere in the world.

If the current trends hold, the United States is at risk of losing the AI arms race and hegemony in the Western Pacific along with it. Despite proclaiming that, “Continued American leadership in AI is of paramount importance to maintaining the economic and national security of the United States[10],” Washington is only devoting $4.9 billion to unclassified AI research in fiscal year 2020[11], just seven percent of Beijing’s investment.

The keep pace, the United States can better comprehend and appreciate the consequences of allowing the PLA to dominate AI warfighting in the future. The stakes of the AI race are not dissimilar to the race for nuclear weapons during World War 2. Only by approaching AI with the same interest, investment, and intensity of the Manhattan Project can U.S. Military hegemony hope to be maintained.


Endnotes:

[1] Page, J. (2013, March 13). For Xi, a ‘China Dream’ of Military Power. Wall Street Journal Retrieved June 20, 2020 from https://www.wsj.com/articles/SB10001424127887324128504578348774040546346

[2] The State Council Information Office of the People’s Republic of China. (2019). China’s National Defense in the New Era. (p. 6)

[3] Ibid.

[4] Vickers, M. G. (2010). The structure of military revolutions (Doctoral dissertation, Johns Hopkins University) (pp. 4-5). UMI Dissertation Publishing.

[5] PRC State Council, (2017, July 17). New Generation Artificial Intelligence Plan. (p. 1)

[6] Pawlyk, O. (2018, July 30). China Leaving the US behind on Artificial Intelligence: Air Force General. Military.com. Retrieved June 20, 2020 from https://www.military.com/defensetech/2018/07/30/china-leaving-us-behind-artificial-intelligence-air-force-general.html

[7] O’Conner, S. (2019). How Chinese Companies Facilitate Technology Transfer from the United States. U.S. – China Economic and Security Review Commission. (p. 3)

[8] Kharpal, A. (2019, March 5). Huawei Says It Would Never Hand Data to China’s Government. Experts Say It Wouldn’t Have a Choice. CNBC. Retrieved June 20, 2020 from https://www.cnbc.com/2019/03/05/huawei-would-have-to-give-data-to-china-government-if-asked-experts.html

[9] Chandran, N. (2018, July 12). Surveillance Fears Cloud China’s ‘Digital Silk Road.’ CNBC. Retrieved June 20, 2020 from https://www.cnbc.com/2018/07/11/risks-of-chinas-digital-silk-road-surveillance-coercion.html

[10] Trump, D. (2019, February 14). Executive Order 13859 “Maintaining American Leadership in Artificial Intelligence.” Retrieved June 20, 2020 from https://www.whitehouse.gov/presidential-actions/executive-order-maintaining-american-leadership-artificial-intelligence

[11] Cornillie, C. (2019, March 28). Finding Artificial Intelligence Research Money in the Fiscal 2020 Budget. Bloomberg Government. Retrieved June 20, 2020 from https://about.bgov.com/news/finding-artificial-intelligence-money-fiscal-2020-budget

2020 - Contest: PRC Below Threshold Writing Contest Artificial Intelligence / Machine Learning / Human-Machine Teaming Assessment Papers China (People's Republic of China) Richard Tilley United States

Alternative Future: The Perils of Trading Artificial Intelligence for Analysis in the U.S. Intelligence Community

John J. Borek served as a strategic intelligence analyst for the U.S. Army and later as a civilian intelligence analyst in the U.S. Intelligence Community.  He is currently an adjunct professor at Grand Canyon University where he teaches courses in governance and public policy. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Alternative Future: The Perils of Trading Artificial Intelligence for Analysis in the U.S. Intelligence Community

Date Originally Written:  June 12, 2020.

Date Originally Published:  August 12, 2020.

Author and / or Article Point of View:  The article is written from the point of view of a U.S. Congressional inquiry excerpt into an intelligence failure and the loss of Taiwan to China in 2035.

Summary:  The growing reliance on Artificial Intelligence (AI) to provide situational awareness and predictive analysis within the U.S. Intelligence Community (IC) resulted in an opportunity for China to execute a deception plan.  This successful deception plan resulted in the sudden and complete loss of Taiwan’s independence in 2035.

Text:  The U.S. transition away from humans performing intelligence analysis to the use of AI was an inevitable progression as the amount of data collected for analysis reached levels humans could not hope to manage[1] while machine learning and artificial neural networks developed simultaneously to the level they could match, if not outperform, human reasoning[2]. The integration of data scientists with analytic teams, which began in 2020, resulted in the attrition of of both regional and functional analysts and the transformation of the duties of those remaining to that of editor and briefer[3][4].

Initial successes in the transition led to increasing trust and complacency. The “Black Box” program demonstrated its first major success in identifying terrorist networks and forecasting terrorist actions fusing social media, network analysis, and clandestine collection; culminating in the successful preemption of the 2024 Freedom Tower attack. Moving beyond tactical successes, by 2026 Black Box was successfully analyzing climatological data, historical migration trends, and social behavior models to correctly forecast the sub-Saharan African drought and resulting instability, allowing the State Department to build a coalition of concerned nations and respond proactively to the event, mitigating human suffering and unrest.

The cost advantages and successes large and small resulted in the IC transitioning from a community of 17 coordinating analytic centers into a group of user agencies. In 2028, despite the concerns of this Committee, all analysis was centralized at the Office of the Director of National Intelligence under Black Box. Testimony at the time indicated that there was no longer any need for competitive or agency specific analysis, the algorithms of Black Box considered all likely possibilities more thoroughly and efficiently than human analysts could. Beginning that Fiscal Year the data scientists of the different agencies of the IC accessed Black Box for the analysis their decision makers needed. Also that year the coordination process for National intelligence Estimates and Intelligence Community Assessments was eliminated; as the intelligence and analysis was uniform across all agencies of government there was no longer any need for contentious, drawn out analytic sessions which only delayed delivery of the analysis to policy makers.

Regarding the current situation in the Pacific, there was never a doubt that China sought unification under its own terms with Taiwan, and the buildup and modernization of Chinese forces over the last several decades caused concern within both the U.S. and Taiwan governments[5]. This committee could find no fault with the priority that China had been given within the National Intelligence Priorities Framework. The roots of this intelligence failure lie in the IC inability to factor the possibility of deception into the algorithms of the Black Box program[6].

AI relies on machine learning, and it was well known that machines could learn biases based on the data that they were given and their algorithms[7][8]. Given the Chinese lead in AI development and applications, and their experience in using AI it to manage people and their perceptions[9][10], the Committee believes that the IC should have anticipated the potential for the virtual grooming of Black Box. As a result of this intelligence postmortem, we now know that four years before the loss of Taiwan the People’s Republic of China began their deception operation in earnest through the piecemeal release of false plans and strategy through multiple open and clandestine sources. As reported in the National Intelligence Estimate published just 6 months before the attack, China’s military modernization and procurement plan “confirmed” to Black Box that China was preparing to invade and reunify with Taiwan using overwhelming conventional military forces in 2043 to commemorate the 150th anniversary of Mao Zedong’s birth.

What was hidden from Black Box and the IC, was that China was also embarking on a parallel plan of adapting the lessons learned from Russia’s invasions of Georgia and the Ukraine. Using their own AI systems, China rehearsed and perfected a plan to use previously infiltrated special operations forces, airborne and heliborne forces, information warfare, and other asymmetric tactics to overcome Taiwan’s military superiority and geographic advantage. Individual training of these small units went unnoticed and was categorized as unremarkable and routine.

Three months prior to the October 2035 attack we now know that North Korea, at China’s request, began a series of escalating provocations in the Sea of Japan which alerted Black Box to a potential crisis and diverted U.S. military and diplomatic resources. At the same time, biometric tracking and media surveillance of key personalities in Taiwan that were previously identified as being crucial to a defense of the island was stepped up, allowing for their quick elimination by Chinese Special Operations Forces (SOF).

While we can’t determine with certainty when the first Chinese SOF infiltrated Taiwan, we know that by October 20, 2035 their forces were in place and Operation Homecoming received the final go-ahead from the Chinese President. The asymmetric tactics combined with limited precision kinetic strikes and the inability of the U.S. to respond due to their preoccupation 1,300 miles away resulted in a surprisingly quick collapse of Taiwanese resistance. Within five days enough conventional forces had been ferried to the island to secure China’s hold on it and make any attempt to liberate it untenable.

Unlike our 9/11 report which found that human analysts were unable to “connect the dots” of the information they had[11], we find that Black Box connected the dots too well. Deception is successful when it can either increase the “noise,” making it difficult to determine what is happening; or conversely by increasing the confidence in a wrong assessment[12]. Without community coordination or competing analysis provided by seasoned professional analysts, the assessment Black Box presented to policy makers was a perfect example of the latter.


Endnotes:

[1] Barnett, J. (2019, August 21). AI is breathing new life into the intelligence community. Fedscoop. Retrieved from https://www.fedscoop.com/artificial-intelligence-in-the-spying

[2] Silver, D., et al. (2016). Mastering the game of GO with deep neural networks and tree search. Nature, 529, 484-489. Retrieved from https://www.nature.com/articles/nature16961

[3] Gartin. G. W. (2019). The future of analysis. Studies in Intelligence, 63(2). Retrieved from https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol-63-no-2/Future-of-Analysis.html

[4] Symon, P. B., & Tarapore, A. (2015, October 1). Defense intelligence in the age of big data. Joint Force Quarterly 79. Retrieved from https://ndupress.ndu.edu/Media/News/Article/621113/defense-intelligence-analysis-in-the-age-of-big-data

[5] Office of the Secretary of Defense. (2019). Annual report to Congress: Military and security developments involving the People’s Republic of China 2019. Retrieved from https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdf

[6] Knight, W. (2019). Tainted data can teach algorithms the wrong lessons. Wired. Retrieved from https://www.wired.com/story/tainted-data-teach-algorithms-wrong-lessons

[7] Boghani, P. (2019). Artificial intelligence can be biased. Here’s what you should know. PBS / Frontline Retrieved from https://www.pbs.org/wgbh/frontline/article/artificial-intelligence-algorithmic-bias-what-you-should-know

[8] Angwin, J., Larson, J., Mattu, S., & Kirchner, L. (2016). Machine bias. ProPublica. Retrieved from https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing

[9] Fanning, D., & Docherty, N. (2019). In the age of AI. PBS / Frontline. Retrieved from https://www.pbs.org/wgbh/frontline/film/in-the-age-of-ai

[10] Westerheide, F. (2020). China – the first artificial intelligence superpower. Forbes. Retrieved from https://www.forbes.com/sites/cognitiveworld/2020/01/14/china-artificial-intelligence-superpower/#794c7a52f053

[11] National Commission on Terrorist Attacks Upon the United States. (2004). The 9/11 Commission report. Retrieved from https://govinfo.library.unt.edu/911/report/911Report_Exec.htm

[12] Betts, R. K. (1980). Surprise despite warning: Why sudden attacks succeed. Political Science Quarterly 95(4), 551-572. Retrieved from https://www.jstor.org/stable/pdf/2150604.pdf

Alternative Futures / Alternative Histories / Counterfactuals Artificial Intelligence / Machine Learning / Human-Machine Teaming Assessment Papers China (People's Republic of China) Information and Intelligence John J. Borek Taiwan

Alternative Future: Assessing Russian Reconnaissance Fire Complex Performance in the Third Chechen War

1LT Andrew Shaughnessy is a U.S. Army Field Artillery Officer and current Field Artillery Captain Career Course student. He commissioned out of Georgetown University in 2016 and previously served in 3rd Brigade Combat Team, 101st Airborne Division as a Fire Direction Officer, Platoon Leader, and Executive Officer. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Alternative Future: Assessing Russian Reconnaissance Fire Complex Performance in the Third Chechen War

Date Originally Written:  June 11, 2020.

Date Originally Published:  August 10, 2020.

Author and / or Article Point of View:  The author is a company-grade U.S. Army Field Artillery Officer interested in the military implications of emerging technologies. The author has previously written on the effects of additive manufacturing and predictive maintenance on the U.S. Army.

Summary:  The Russian Army’s artillery forces played a decisive role in the Third Chechen War due to the effectiveness of the Reconnaissance Fire Complex. Empowered by Target Acquisition Companies that employed Unmanned Aircraft Systems and Electronic Warfare, the Russian Army showcased a devastatingly fast artillery targeting cycle.

Text:  Beginning in 2014, the Russo-Ukrainian War created a laboratory for the Russian Army to develop new tactics on how to employ their artillery. The successful use of Unmanned Aircraft Systems (UAS) to coordinate artillery strikes in Ukraine[1] caused the Russian Army to make UAS a central element of their targeting process[2]. Electronic Warfare (EW) platforms also proved to be effective target acquisition systems by detecting electromagnetic signatures and then targeting them with artillery[3]. Learning from their experience in the Russo-Ukrainian War, the Russian Army significantly invested in these systems as part of their artillery modernization program. Ultimately, these systems would give the Russian Army a decisive advantage in their 2033 War in Chechnya.

Despite budgetary pressures in the 2020s, the Russian Army continued to invest in its advanced Reconnaissance Fire Complex due to it being a valued Soviet-era concept and its operational validation during the Russo-Ukrainian War[4]. This concept aimed to digitally link advanced target acquisition sensors, UAS, and Military Command systems to artillery platforms to provide incredibly responsive fires. The Russian investment in the Reconnaissance Fire Complex during the 2020s took the lessons learned from Ukraine and made them a permanent part of the Russian force structure.

In a 2028 reorganization, each Russian Brigade received a dedicated Artillery UAS Company and EW Target Acquisition Company. While the Brigade retained other UAS and EW assets, these companies existed for the sole purpose of continuously pulling targeting data to feed the largely autonomous Reconnaissance Fire Complex.

Major technology advances that supported the Reconnaissance Fire Complex included sophisticated UAS platforms, automated fire direction systems, and improved EW capabilities. The lethality of the Artillery UAS Companies improved substantially with the advent of autonomous UAS[5], drone swarming[6], and 3D-printed UAS[7]. Advances in military Artificial Intelligence programs allowed most UAS sensor to shooter loops to occur free of human intervention[8]. Electronic Warfare detection systems became more precise, mobile, and networked with other systems. These advances allowed Artillery UAS Companies to field hundreds of autonomous UAS platforms simultaneously while the EW Target Acquisition Company hunted for high-value targets based on electromagnetic signatures. The effective integration of autonomous UAS and EW companies played a decisive role in the 2033 War in Chechnya.

The 2033 War in Chechnya was the product of Chechen fighters returning from Syria, the assassination of Ramzan Kadyrov, the Head of the Chechen Republic, and the collapse of oil prices. Compounding instability and the inability of the Russian political establishment to respond allowed rogue paramilitaries to seize control of the republic and declare the new Chechen Republic of Ichkeria. Following several years of autonomy, a resurgent Russian state invaded Chechnya in April-2033.

While separatist Chechen forces had organized, they proved to be no match for the extraordinary performance of the Russian Army’s artillery and automated fire support network. In less than a month, the Russian army had destroyed all of Chechnya’s conventional forces and thoroughly depleted their ranks of irregular fighters. While the Russian Army performed adequately overall, it was their Reconnaissance Fire Complex that drove their successive victories.

During the Third Chechen War, the Chechen sky was continuously saturated with an enormous number of autonomous UAS platforms. Interwoven with each other and the broader Reconnaissance Fire Complex, these UAS platforms autonomously detected probable targets such as mechanized vehicles. Autonomy and swarming allowed the Russians to deploy hundreds of these UAS simultaneously. UAS coming from 3D-printed manufacturing meant that low cost made them expendable. Even when the Chechens successfully shot down a UAS, due to forward 3D-print capabilities, Russian forces would replace it within minutes.

Without human intervention, UAS pushed probable targets to Russian Fire Direction Centers (FDC) that further assessed targeting criteria using machine learning to avoid misidentification or fratricide. Within seconds, a UAS-detected target bounced from the sensor, to the FDC, to the artillery platform set to engage the target. The result was that as soon as any Chechen vehicles or heavy equipment began to move, Russian forces detected and engaged them with artillery, destroying them within minutes. While most of this artillery fire came in the form of massed thermobaric and cluster munition strikes, UAS would laser designate for guided Krasnopol artillery shells when Russian forces required precision[9]. Chechen forces could never escape the panopticon of Russian UAS, and given the Russian preference for long-range artillery, could always be engaged 10]. This perfect synchronization of sensors and firing assets allowed them to destroy all of Chechnya’s mechanized and motorized forces within days.

EW Target Acquisition Companies also played a major role. At the advent of the conflict, Russian forces remotely triggered kill switches within Chechnya’s Russian-made military radios, rendering them ineffective[11]. This forced Chechen forces to rely on less secure commercial off the shelf radios and cellphones as their primary communication systems. This commercial reliance proved to be an enormous vulnerability, as Russian forces were able to quickly pinpoint specific cellphone locations by using both social engineering and heat maps, allowing them to locate and target Chechen leadership[12].

EW Target Acquisition Companies forces would measure electromagnetic signatures for large swaths of an area, create heat maps of where signatures were emanating from, and then target what they believed to be enemy command nodes[13]. As soon as a large group of cellphones or radios began to concentrate outside of a city, Russian EW companies designated that as a possible target. While this method was imprecise, often generating considerable civilian causalities, Russian forces considered that a secondary concern. EW Target Acquisition Companies also targeted smartphone applications with malware to pull refined location data from probable combatants[14]. EW-based targeting proved highly effective against Chechnya’s cadre of irregular fighters, decimating them. By May-2033, with Chechnya’s forces defeated, the province capitulated and was back under Russian control.

The effectiveness of the Reconnaissance Fire Complex allowed Russian artillery to be an overwhelming force in the Third Chechen War. Without it, Russian maneuver forces would have been mired in a prolonged conflict. A devastatingly fast artillery targeting cycle, empowered by autonomous UAS, Artificial Intelligence, and EW systems resulted in a rapid and decisive Russian victory[15].


Endnotes:

[1] Freedberg, S. J., JR. (2015, November 23). Russian Drone Threat: Army Seeks Ukraine Lessons. Retrieved June 07, 2020, from https://breakingdefense.com/2015/10/russian-drone-threat-army-seeks-ukraine-lessons

[2] Grau and Bartles (2016). The Russian Way of War. Foreign Military Studies Office. (Pages 239, 373-377) https://www.armyupress.army.mil/special-topics/world-hot-spots/russia

[3] Asymmetric Warfare Group (2016). Russian New Generation Warfare Handbook. Asymmetric Warfare Group. https://www.awg.army.mil/AWG-Contributions/AWG-Recruiting/Article-View/Article/1809255/the-us-army-has-a-handbook-on-russian-hybrid-warfare

[4] Grau and Bartles (2018, May). The Russian Reconnaissance Fire Complex Comes of Age. The University of Oxford Changing Character Of War Centre. http://www.ccw.ox.ac.uk/blog/2018/5/30/the-russian-reconnaissance-fire-complex-comes-of-age

[5] Tucker, P. (2019, November 08). Russia Says It Used Autonomous Armed Strike Drones in a Wargame. Retrieved June 07, 2020, from https://www.defenseone.com/technology/2019/11/russia-were-testing-autonomous-armed-strike-drones-wargames/161187

[6] Atherton, K. (2019, December 18). Russia will test swarms for anti-robot combat in 2020. Retrieved June 07, 2020, from https://www.c4isrnet.com/unmanned/2019/12/13/russia-will-test-swarms-for-anti-robot-combat-in-2020

[7] Bartles, C. (2015). 3D Printers will “Bake” Future Russian UAVs. Foreign Military Studies Office OE Watch, Vol 5. (Issue 7), 48-49. https://community.apan.org/wg/tradoc-g2/fmso/m/oe-watch-past-issues/195454

[8] Konaev, M., & Bendett, S. (2019, July 30). Russian AI-Enabled Combat: Coming to a City Near You? Retrieved June 07, 2020, from https://warontherocks.com/2019/07/russian-ai-enabled-combat-coming-to-a-city-near-you

[9] Atlantic Council’s Digital Forensic Research Lab. (2019, May 20). The Use of Krasnopol Artillery Shells in Ukraine. Retrieved June 07, 2020, from https://medium.com/dfrlab/the-use-of-krasnopol-artillery-shells-in-ukraine-d185ef4743b7

[10] Collins, L., & Morgan, H. (2019, January 24). King of Battle: Russia Breaks Out the Big Guns. Retrieved June 07, 2020, from https://www.ausa.org/articles/king-battle-russia-breaks-out-big-guns

[11] Trevithivk, Joseph. (2019, October 30th). Ukrainian Officer Details Russian Electronic Warfare Tactics Including Radio “Virus.” The War Zone. Retrieved June 07, 2020, https://www.thedrive.com/the-war-zone/30741/ukrainian-officer-details-russian-electronic-warfare-tactics-including-radio-virus

[12] Collins, Liam. (2018, July 26th) Russia gives lessons in Electronic Warfare. AUSA. Retrieved June 07, 2020, from, https://www.ausa.org/articles/russia-gives-lessons-electronic-warfare

[13] Trevithivk, Joseph. (2020, May 11th) This is what Ground Forces look like to an Electronic Warfare System and why it’s a big deal. The War Zone. Retrieved June 07, 2020, from https://www.thedrive.com/the-war-zone/33401/this-is-what-ground-forces-look-like-to-an-electronic-warfare-system-and-why-its-a-big-deal

[14] Volz, Dustin. (2016, December 21). Russian hackers tracked Ukrainian artillery units using Android implant: report. Reuters. Retrieved June 07, 2020, from https://www.reuters.com/article/us-cyber-ukraine/russian-hackers-tracked-ukrainian-artillery-units-using-android-implant-report-idUSKBN14B0CU

[15] The author would like to extend his appreciation to Andrew Gibbs and Primo Ramirez for reviewing and giving feedback to the first draft of this paper.

Alternative Futures / Alternative Histories / Counterfactuals Andrew Shaughnessy Artillery / Rockets/ Missiles Assessment Papers Chechnya Russia Unmanned Systems

Assessing the Relationship Between the United States and Saudi Arabia –An Unethical Partnership with Multiple Purposes?

Matthias Wasinger is an Austrian Army officer. He can be found on LinkedIn. The views contained in this article are the author’s alone and do not represent the views of the Austrian Armed Forces, the Austrian Ministry of Defense, or the Austrian Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing the Relationship Between the United States and Saudi Arabia –An Unethical Partnership with Multiple Purposes?

Date Originally Written:  June 1, 2020.

Date Originally Published:  August 3, 2020.

Author and / or Article Point of View:  The author is an active General Staff Officer. Following Charles de Gaulle’s quote that nations do not have friends, but interests, he believes in the dominance of political realism over ethical considerations when it comes to vital national interests. This assessment is written from the author’s point of view on how economic considerations dominate U.S. foreign policy.

Summary:  “The end is the outcome or the effect, and if a prince wins and maintains a state, the means will always be judged honorable.” Niccolò Machiavelli described in this way the discrepancy between ethics, politics, and policy. The U.S. relationship with Saudi Arabia, illustrates the differences between its words that proclaim it as the lighthouse of liberty and democracy, and how it acts when torn between ethics, ambition, and necessity.

Text:  The Iranian attack on a Saudi Arabian oil production facility in September 2019 was, so far, the peak of continuously growing hostilities between these two regional powers. Besides official protests from the Kingdom of Saudi Arabia (KSA), the U.S. condemned Iranian aggression. Although U.S. President Donald Trump finally refused to take retaliatory measures against Iran, this attack led to a remarkable deployment of U.S. troops to Saudi Arabia. Why does the U.S., the self-proclaimed lighthouse of liberty and democracy, feels so affiliated with a Kingdom that is repeatedly condemned for human rights violations?

A nation’s purpose is to ensure a society’s existence. In this regard, nations develop strategies, consisting of ends, ways, and means, facilitating a desired end state. In the National Security Strategy (NSS), the U.S. defines the desired end state “America First,” facilitated by the four goals[1]. Although the NSS clearly outlines the U.S.’ unique national capacities, it emphasizes the importance of partnerships and alliances[2]. One of the U.S.’s critical partners is the KSA. The fact that the KSA’s Wahabi monarchy is a country restricting religious freedom, denying gender equality, and promoting the Sharia founding religious schools in that spirit around worldwide makes the partnership appear at least strange[3]. At first glance, the characteristic is not congruent with the idea of “the American Way of Life.” Might it be “Bismarck-ian strategic thinking[4],” the idea of maintaining an ally instead of destroying or even gaining an enemy[5], ties the U.S. to KSA?

The most problematic sphere of the U.S. – Saudi relationship is linked to the goal (1) “Protect the American People, the Homeland, and the American Way of Life.” The majority of the terrorists responsible for 9/11 came from KSA. Rumors about financial support to terror organizations never silenced. Osama Bin-Laden even lived in the Wahabi Kingdom[6]. All of that is contradictory to the idea of the NSS. What are the U.S.’ benefits from this partnership?

U.S. National Security Strategy Goals

(1) Protect the American People, the Homeland, and the American Way of Life:

The benefit of the U.S. – Saudi Arabian relationship is at least questionable. The possible infliction of the Wahabi Kingdom in terror attacks even had a severe impact on this relationship[7]. In consequence, Saudi Arabia promotes its efforts on counter-terrorism operations since 9/11[8].

Additionally, promoting the Sharia, political assassination[9], and beheadings as death-penalty hardly correlates with the American Way of Life. However, economic prosperity, facilitated by ties to the Middle East, is a precondition for protecting the American way of life.

(2) Promote American Prosperity:

The U.S. and KSA have close economic ties, based on oil, reciprocal investments, and weapon sales. Most of the Saudi Arabian economic key leaders studied in the U.S. and are, therefore, eager to maintain close connections[10]. Saudi Arabia possesses the second-largest oil reserves (the U.S. is the 10th largest[11]) worldwide after Venezuela. When it comes to dealing arms, the Wahabi leadership negotiated a 110 billion dollars treaty with follow-on investments within the next ten years, worth 350 billion dollars[12].

Saudi Arabia is mentioned once in the NSS. Although just in a regional context, it is mentioned – like Egypt – as an area of interest to modernize its economy. U.S. military presence is very often an expression of national interest. Within KSA, there are five U.S. Air Force bases[13], hosting military capability packages to survey the essential sea lines of communication from the Arab Gulf along the Yemeni coast, the Bab El Mandeb through the Suez channel, the lifeline for U.S. oil imports from the Arab world[14]. The U.S. military’s force posture is in line with the national interests, according to the NSS.

(3) Preserve Peace through Strength:

It is an inherent part of the U.S.’ strategic understanding to ensure its national security by a deterrent military force such as the one based in the KSA. Strategic partnerships and the U.S. Navy keep conflicts out of the continental U.S. Consequently, the U.S. military is focused on out-of-area and expeditionary warfare. During the Second World War, the U.S. has proven its unique capabilities to conduct amphibious operations, accomplishing the landings in Italy, the Pacific, and on the Normandy’s shores. Nevertheless, the price-tag in soldiers’ lives was extraordinarily high[15]. It is unlikely that a nation would be willing to suffer such losses again in the 21st century, a period of reluctance to bear heavy losses[16].

It appears logical to establish and maintain strategic partnerships – regardless of ideological distances/differences – to avoid the necessity to conduct amphibious operations again. In consequence, worldwide partnerships are a reasonable approach for permanent pre-positioning of forces and, in a follow-on phase, to be used as assembly as well as staging areas for large scale combat operations. It is an interesting detail that in the KSA the U.S.’ military areas of interest overlap with its economic ones. Partnerships and deterrent armed forces require, like the American way of life, economic prosperity to finance national interests.

(4) Advance American Influence:

Partnerships and alliances are crucial for the U.S.[17] They are the tools for advancing American influence. Besides the fact that these partnerships and alliances enable a strong force posture towards upcoming or recent adversaries, they immensely support end (2) American prosperity. The inclusion of eastern European states in the North Atlantic Treaty Organization (NATO) (reducing Russian influence, primarily economically[18]) is a remarkable example of forcefully advancing the U.S.’ influence, followed by pushing for a more significant military commitment of European NATO members (overtaking the [financial] burden of deterring Russia to free forces[19]), pre-deploying forces to South Korea, and maintaining the partnership with Japan (containing China’s expansionism[20]). In the vein, the KSA is an economical source of strength for the U.S. and a potential staging area to maintain an appropriate force flow for military operations in the Middle East.

Economic prosperity, goal (2), is the critical requirement within the U.S. NSS. Consequently, it dictates necessities for the political level, regardless of the ideological differences and ethical considerations. Niccolò Machiavelli described an eternal rule: “The end is the outcome or the effect, and if a prince wins and maintains a state, the means will always be judged honorable[21].”


Endnotes:

[1] National Security Strategy of the United States of America: NSS (2017), II-VI.

[2] Ibid., 1.

[3] Fatimah Alyas, “US-Saudi Arabia Relations: Relations Between the Two Countries, Long Bound by Common Interests in Oil and Security, Have Strained over What Some Analysts See as a More Assertive Saudi Foreign Policy”, https://www.cfr.org/backgrounder/us-saudi-arabia-relations (accessed October 1, 2019).

[4] Geoffrey Parker, The Cambridge Illustrated History of Warfare: The Triumph of the West/ Edited by Geoffrey Parker, Rev. and updated ed., Cambridge illustrated Histories (Cambridge: Cambridge University Press, 2008), 236.

[5] Peter Paret, Gordon A. Craig and Felix Gilbert, Makers of Modern Strategy: From Machiavelli to the Nuclear Age/ Edited by Peter Paret with Gordon A. Craig and Felix Gilbert (Princeton, N.J.: Princeton University Press, 1986), 293-295.

[6] Fatimah Alyas, “US-Saudi Arabia Relations”.

[7] Saudi Arabia: Background and U.S. Relations (2018), 18-19.

[8] Saudi Arabia and Counterterrorism (2019), passim.

[9] Ian Black, “Jamal Khashoggi Obituary: Saudi Arabian Journalist Who Fell Foul of His Country’s Ruling Dynasty After Moving Abroad so He Could Criticise It More Freely,” The Guardian, October 19, 2018, Saudi Arabian journalist who fell foul of his country’s ruling dynasty after moving abroad so he could criticize it more freely.

[10] Fatimah Alyas, “US-Saudi Arabia Relations”.

[11] Howard J. Shatz, US International Economic Strategy in a Turbulent World (2016), 35.

[12] Saudi Arabia: Background and U.S. Relations, 21-22.

[13] MilitaryBases.com, “U.S. Military Bases in Saudi Arabia,”, https://militarybases.com/overseas/saudi-arabia/ (accessed October 1, 2019).

[14] Jean-Paul Rodrigue, “International Oil Transportation: Petroleum Remains a Strategic Resource in the Global Economy Underlining the Challenges of Producing and Transporting Oil,”, https://transportgeography.org/?page_id=6757 (accessed October 1, 2019).

[15] Klaus Roch, Viribus Unitis – Analyse Von Operationen: Ausgewählte Seminararbeiten Des 20. Generalstabslehrganges, Militärwissenschaftliches Journal der Landesverteidigingsakademie 2015, Band 16 (Wien: Republik Österreich, Bundesministerium für Landesverteidigung und Sport, 2015), 108-110.

[16] Martin van Creveld, Pussycats: Why the Rest Keeps Beating the West and What Can Be Done About It, First edition (Mevasseret Zion, Israel: DLVC Enterprises, 2016), 224-229.

[17] National Security Strategy of the United States of America, 26.

[18] Ibid., 38.

[19] Posture Statement US EUCOM (2019), 3-5.

[20] National Security Strategy of the United States of America, 47.

[21] Niccolò Machiavelli, The Prince, 2nd ed. (Chicago, Ill., London: University of Chicago Press, 1998), XVIII.

 

Allies & Partners Assessment Papers Diplomacy Matthias Wasinger Saudi Arabia (Kingdom of Saudi Arabia) United States

Alternative History: An Assessment of the Long-Term Impact of U.S. Strikes on Syria in 2013 on the Viability of the Free Syrian Army

Michael D. Purzycki is a researcher, analyst, writer and editor based in Arlington, Virginia. He is a former communications and media analyst for the United States Marine Corps. He writes regularly for Charged Affairs (the journal of Young Professionals in Foreign Policy) and Braver Angels, and has also been published in Merion West, Washington Monthly, the Truman National Security Project, and France 24. He can be found on Twitter at @MDPurzycki and on Medium at https://medium.com/@mdpurzycki. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Alternative History: An Assessment of the Long-Term Impact of U.S. Strikes on Syria in 2013 on the Viability of the Free Syrian Army

Date Originally Written:  June 9, 2020.

Date Originally Published:  July 29, 2020.

Author and / or Article Point of View:  This article presumes that the United States launched air and missile strikes on Syria in August 2013, in response to the use of chemical weapons against civilians by the regime of Syrian President Bashar al Assad. It is written from the perspective of the U.S. Intelligence Community (IC) for an audience of U.S. national security policymakers.

Summary:  One year after U.S. air and missile strikes in Syria, a stalemate exists  between the Assad regime and rebel groups. While Assad is far from defeated, the Free Syrian Army (FSA) held its own, thanks to U.S. assistance, and positions itself as a viable political alternative to both Assad and the Islamic State (IS). This stance is tenuous, however, and is threatened by both continued bombardment by regime forces and the international community’s focus on defeating IS.

Text:  On August 21, 2013, the Syrian military fired rockets containing sarin gas at civilian areas in Eastern Ghouta, a suburb of Damascus, as well as conventionally armed rockets at Western Ghouta. Estimates of the resulting death toll range from 281 (estimated by French intelligence[1]) to 1,729 (alleged by the FSA[2]). A preliminary U.S. Intelligence Community estimate, released nine days after the attacks, “determined that 1,429 people were killed in the chemical weapons attack, including at least 426 children[3].”

After receiving the IC’s estimate, U.S. President Barack Obama ordered air and missile strikes against Assad regime command and control centers, and bases from which helicopters are deployed[4]. While the combined strikes did not curtail the Assad regime’s ability to use chemical weapons, they impeded communication between units armed with chemical weapons and their commanders, and reduced the use of barrel bombs dropped from regime helicopters. Assad concluded that the benefits of further use of chemical weapons did not outweigh the costs of possible further U.S. or French strikes.

Instead of using chemical weapons, Assad continued his use of conventional weapons against his opponents, including civilians. For example, in November and December 2013, as government forces attempted to break a stalemate with rebels in Aleppo, government air strikes killed up to 425 civilians, of whom 204 were killed in a four-day period[6]. While the FSA has fought capably on the ground against the Syrian Arab Army (SAA), its fighters and the civilians they protect remain vulnerable to air strikes.

In January 2014, President Obama expanded Timber Sycamore, the supply of weapons and training to Syrian rebels by the Central Intelligence Agency (CIA)[7]. In addition to providing greater numbers of rifles, machine guns, mortars, rocket-propelled grenades, and anti-tank missiles, the CIA provided rebels with a limited number of man-portable air defense systems. While the rebels have repeatedly asked for more of these antiaircraft systems, the U.S. has declined to provide them, due to fears of them ending up in the hands of Jabhat al-Nusra (al-Qaeda’s affiliate in Syria) or other extremists[8]. Thus, while the FSA has shot down several regime warplanes, fighter aircraft have largely continued to operate unimpeded over rebel-held territory.

The U.S. and France have launched strikes against SAA command and control locations on three additional occasions in the last year. While these strikes have not significantly curbed the regime’s use of conventional weapons, they have slowed the pace at which regime forces can plan and carry out their attacks. This slowing pace has enabled the FSA to better prepare for upcoming attacks, and thus reduce the number of deaths both among their ranks and among nearby civilians.

While fighting between the regime and the FSA has continued, IS has emerged over the past year as the primary extremist organization opposing Assad. In addition to its capture of large swaths of Iraq, including the city of Mosul in June 2014[9], it controls portions of northern, central and eastern Syria[10]. While IS’ former partner Jabhat al-Nusra remains focused on fighting the Assad regime, IS’ goal is the perpetuation of an Islamist proto-state, where it can govern in accordance with its extremely strict, puritanical interpretation of Islam.

The strength of IS has benefited Assad; he has cited IS’s extreme brutality as evidence that he must remain in power and crush his opponents, making no distinction between IS, the FSA, or any other force opposing the regime. The international community’s focus on defeating IS in Iraq gives Assad more opportunities to target his non-IS opponents. While it is in the U.S. interest to play a leading role in dislodging IS from its strongholds in Iraq, it risks losing influence over the Syrian opposition if it does not continue its actions in Syria. The FSA may look to other actors, such as Saudi Arabia, to help it fight Assad if it feels it is being ignored by the U.S.[11]

U.S. support, including air and missile strikes, has helped the FSA endure in the face of regime attacks. However, Syria’s non-extremist opposition faces considerable challenges. While IS’ extreme governance model of what a post-Assad Syria might look like is imposing, and is attracting thousands of foreign fighters[12], the FSA’s potential democratic and pluralist model has not inspired to the same extent. The vulnerability of the FSA and the areas it holds to regime air strikes is a significant weakness. If the U.S. insists that Assad must not be allowed to remain in power[13], he is likely to focus his attacks on the FSA, potentially overwhelming it, while leaving the U.S.-led coalition to fight IS.


Endnotes:

[1] “Syria/Syrian chemical programme – National executive summary of declassified intelligence.” Ministre de l’Europe et des Affaires étrangères, September 3, 2013. https://www.diplomatie.gouv.fr/IMG/pdf/Syrian_Chemical_Programme.pdf

[2] “Bodies still being found after alleged Syria chemical attack: opposition.” Daily Star, August 22, 2013 http://www.dailystar.com.lb/News/Middle-East/2013/Aug-22/228268-bodies-still-being-found-after-alleged-syria-chemical-attack-opposition.ashx

[3] “Government Assessment of the Syrian Government’s Use of Chemical Weapons on August 21, 2013.” White House, August 30, 2013 https://obamawhitehouse.archives.gov/the-press-office/2013/08/30/government-assessment-syrian-government-s-use-chemical-weapons-august-21

[4] Shanker, Thom, C. J. Chivers and Michael R. Gordon. “Obama Weighs ‘Limited’ Strikes Against Syrian Forces.” New York Times, August 27, 2013. https://www.nytimes.com/2013/08/28/world/middleeast/obama-syria-strike.html

[5] Walt, Vivienne. “France’s Case for Military Action in Syria.” TIME, August 31, 2013. https://world.time.com/2013/08/31/frances-case-for-military-action-in-syria

[6] “Syria: Dozens of Government Attacks in Aleppo.” Human Rights Watch, December 21, 2013. https://www.hrw.org/news/2013/12/21/syria-dozens-government-attacks-aleppo

[7] Mazzetti, Mark, Adam Goldman and Michael S. Schmidt. “Behind the Sudden Death of a $1 Billion Secret C.I.A. War in Syria.” New York Times, August 2, 2017. https://www.nytimes.com/2017/08/02/world/middleeast/cia-syria-rebel-arm-train-trump.html

[8] Seldin, Jeff and Jamie Dettmer. “Advanced Weapons May Reach Syrian Rebels Despite US Concerns.” Voice of America, October 26, 2015. https://www.voanews.com/middle-east/advanced-weapons-may-reach-syrian-rebels-despite-us-concerns

[9] Sly, Liz and Ahmed Ramadan. “Insurgents seize Iraqi city of Mosul as security forces flee.” Washington Post, June 10, 2014. https://www.washingtonpost.com/world/insurgents-seize-iraqi-city-of-mosul-as-troops-flee/2014/06/10/21061e87-8fcd-4ed3-bc94-0e309af0a674_story.html

[10] Gilsinan, Kathy. “The Many Ways to Map the Islamic ‘State.’” Atlantic, August 27, 2014. https://www.theatlantic.com/international/archive/2014/08/the-many-ways-to-map-the-islamic-state/379196

[11] Chivers, C.J. and Eric Schmitt. “Saudis Step Up Help for Rebels in Syria With Croatian Arms.” New York Times, February 25, 2013.
https://www.nytimes.com/2013/02/26/world/middleeast/in-shift-saudis-are-said-to-arm-rebels-in-syria.html

[12] Karadsheh, Jomana, Jim Sciutto and Laura Smith-Spark. “How foreign fighters are swelling ISIS ranks in startling numbers.” CNN, September 14, 2014. https://www.cnn.com/2014/09/12/world/meast/isis-numbers/index.html

[13] Wroughton, Lesley and Missy Ryan. “U.S. insists Assad must go, but expects he will stay.” Reuters, June 1, 2014. https://www.reuters.com/article/us-usa-syria/u-s-insists-assad-must-go-but-expects-he-will-stay-idINKBN0EC1FE20140601

Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers Michael D. Purzycki Syria United States

Assessing the Paradox of North Atlantic Treaty Organization Expansion

Stuart E. Gallagher is a graduate of National Defense University and a recognized expert in Russia / Ukraine affairs. He has served as a Military Advisor to the United States Department of State during the outset of the Ukraine crisis and has delivered briefings on Russian New Generation Warfare throughout the interagency and the Department of Defense. Divergent Options content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Paradox of North Atlantic Treaty Organization Expansion

Date Originally Written:  May 25, 2020.

Date Originally Published:  July 22, 2020.

Author and / or Article Point of View:  The author maintains a keen interest in Russia  /Ukraine affairs. The author contends that North Atlantic Treaty Organization (NATO) expansion and encroachment on Russian borders exacerbates Kremlin paranoia of the West creating a paradox for Western policymakers.

Summary:  The 1991 Soviet Union collapse irreversibly changed the security environment. The world moved from a bi-polar world to that of a uni-polar world overnight leaving the United States as the sole superpower. NATO found itself in uncharted waters and pursued new purpose including the expansion of the alliance. NATO’s expansion since the fall of the Soviet Union and its encroachment on Russian borders creates a paradox for Western policymakers.

Text:  NATO was founded in 1949 soon after the conclusion of World War II. The overall intent of the organization was to maintain peace and stability in Europe. As the Cold War escalated, the Soviet Union responded to the West by founding a security organization of their own – the Warsaw Pact. This organization included all of the Soviet republics and Eastern Bloc countries that fell within the Soviet Union’s orbit and provided a level of parity with the West. By all accounts, NATO was successful in executing its charge during the Cold War. Peace and stability were maintained in Europe. However, in 1991, the collapse of the Soviet Union ushered in a tectonic change to the security environment. The geopolitical landscape shifted from a bi-polar world to that of a uni-polar overnight. This immediately left the U.S. as the sole superpower. As the Cold War warriors of the era celebrated this monumental achievement, the Soviet Union quickly descended into chaos.

The government in shambles, the economy devastated, and the military essentially emasculated, it would take decades before Russia would effectively return to the world stage as a great power. The U.S. in essence had become the proverbial dog that caught the car inheriting global primacy and all the responsibility associated therewith. It was a phenomenon that can very aptly be summed up in the famous words of George Bernard Shaw, “There are two tragedies in life – one is to lose your heart’s desire. The other is to gain it[1].”

After the Soviet Union’s collapse, the Warsaw Pact was disbanded while NATO endured and grew. It was this moment in time where politicians and journalists alike would call into question the requirement for NATO. Was NATO truly still needed to maintain peace and stability in Europe with the Soviet Union and the Warsaw Pact now defunct? What would be its mission moving forward with no real threat to speak of? The answer was NATO 2.0.

At the height of the Cold War, 16 countries were members of the NATO alliance. During the post-Cold War period, NATO expansion pressed forth despite recommendations from experts such as George Kennan, a well-known American diplomat and historian. In 1997, Kennan predicted that pushing ahead with the expansion “would inflame the nationalistic, anti-Western, and militaristic tendencies in Russian opinion,…have an adverse effect on the development of Russian democracy,” and “restore the atmosphere of Cold War to East-West relations[2].”

Between 1991 and 2020, NATO would add 14 more countries to its roster, increasing the grand total to 30. NATO 2.0 included countries such as the Czech Republic, Hungary, and Poland (former Soviet Union satellite republics); and Estonia, Latvia, and Lithuania (former Soviet republics). For these countries, this inclusion into NATO was a logical step as “new member states found joining an existing, successful alliance preferable to forming an entirely new alliance[3].” Moreover, many of these countries were intent on protecting themselves from revisiting the oppressive relationship that they had with Russia in years past.

At the outset of NATO expansion, something was left out of the calculus, or perhaps more appropriately ignored altogether – Russia’s response to NATO expansion and encroachment on its borders. Looking to history, Russia has consistently survived existential threats through defense in depth. That is to say, Russia maintained a geographical buffer zone between itself and that of its adversaries, which provided a level of stand-off and protection critical to its survival.

In the words of Henry Kissenger, “Here is a country that has never had a friendly neighbor, that has always had shifting borders, that has never had a clearly defined security arrangement – a country, quite frankly that has been either too weak or too strong for the peace of Europe, a country that at one and the same time has been a central element of the balance of power and a threat to it[4].”

This buffer zone strategy has served Russia well throughout the years from the likes of Napoleon, the Nazis, and most recently from the West during the Cold War. Quite simply, in the Russian mind, geography is equated to security.

So is Russia paranoid? “Champions of NATO expansion aver that it maintains peace in Europe and promotes democracy in East-Central Europe. They add that Russia has nothing to fear[5].” However, the view from Moscow is quite the contrary. To Russia, NATO encroachment is not a perception – it is a reality. Considering Russia’s intimate experience with existential threat, their response may be well justified. The inclination to protect itself from NATO expansion was noted from the beginning when “Russia registered its objections [to NATO expansion] early, frequently, and emphatically[6].” This was not long after the fall of the Soviet Union and at a time when Russia was in no position to dictate terms or push back against the West with any sort of positive outcome.

Unlike the end of the Cold War, in 2014 when the Russian-backed President of Ukraine Viktor Yanukovych, was ousted from office, Russia was in a different position, and could dictate terms. At this point, Russia had bolstered its instruments of national power (Diplomatic, Information, Military, and Economic) that led to the annexation of Crimea and the invasion of Eastern Ukraine with limited resistance from the West. The following year, Russia recast NATO as an adversary. George Kennan’s prediction from 1997 was now a reality.

At present, the Western policymaker is now left with a paradox – the NATO 2.0 paradox. If NATO expansion continues, will Europe truly be safer and more stable as the advocates of NATO expansion contend? From a Western lens, “the United States [and the West] would like Russia to see that a great state can live in security and prosperity in a world which big buffer areas do not have the strategic value they once did[7].” However, this is as idealistic as it is unfair as the West continues to encroach on Russia’s borders. And, if Ukraine is any measure of Russia’s response and resolve to protect the integrity of its borders and regional hegemony, it may be prudent to rethink future NATO expansion altogether, for not doing so could very well lead to increased destabilization in the region, more bloodshed and degraded East-West relations with the West gaining little in return.


Endnotes:

[1] Kissenger, Henry. “Russian and American Interests after the Cold War.” Rethinking Russia’s National Interest. (1994): 1.

[2] Menon, Rajan and William Ruger. “NATO Enlargement and U.S. Grand Strategy: A Net Assessment.” Springer Link. (May 2020): 374, https://doi.org/10.1057/s41311-020-00235-7

[3] Menon, Rajan and William Ruger. “NATO Enlargement and U.S. Grand Strategy: A Net Assessment.” Real Clear Public Affairs. May 14, 2020, https://www.realclearpublicaffairs.com/public_affairs/2020/05/14/nato_enlargement_and_us_grand_strategy_a_net_assessment_491628.html

[4] Kissenger, Henry. Russian and American Interests after the Cold War. Rethinking Russia’s National Interest. (1994): 3.

[5] Menon, Rajan and William Ruger. “NATO Enlargement and U.S. Grand Strategy: A Net Assessment.” Real Clear Public Affairs. May 14, 2020, https://www.realclearpublicaffairs.com/public_affairs/2020/05/14/nato_enlargement_and_us_grand_strategy_a_net_assessment_491628.html

[6] Kissenger, Henry. “Russian and American Interests after the Cold War.” Rethinking Russia’s National Interest. (1994): 7.

[7] Menon, Rajan and William Ruger. “NATO Enlargement and U.S. Grand Strategy: A Net Assessment.” Real Clear Public Affairs. May 14, 2020, https://www.realclearpublicaffairs.com/public_affairs/2020/05/14/nato_enlargement_and_us_grand_strategy_a_net_assessment_491628.html

Assessment Papers North Atlantic Treaty Organization Russia Stuart E. Gallagher

Alternative Future: An Assessment of U.S. Re-Engagement with Hungary in 2035

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


Rocco P. Santurri III is an independent Financial Representative and Security Consultant.  He also serves as a Civil Affairs Officer in the U.S. Army Reserves. He recently completed an assignment with the Office of Defense Cooperation at the U.S. Embassy in Budapest, Hungary.  While there, he conducted polling throughout the country to capture populace sentiment on a host of national and international issues. He also conducted strategic communications initiatives through the U.S. Embassy Public Affairs Section. He can be found on LinkedIn.com at www.linkedin.com/in/RoccoPSanturri3Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of U.S. Re-Engagement with Hungary in 2035

Date Originally Written:  May 2, 2020.

Date Originally Published:  July 20, 2020.

Author and / or Article Point of View:  The author is a current U.S. Army Reservist. He believes in a pragmatic U.S. approach to relations with Hungary that takes into consideration the cultural, psychological, and behavioral attributes of the Hungarian human domain and their corresponding political viewpoints.

Summary:  In 2020, Hungarian Prime Minister Viktor Orban refused to relinquish his COVID-19 emergency powers[1]. Following this, relations with the West soured and Hungary was expelled from the North Atlantic Treaty Organization (NATO). Since Orban’s death, key figures in the Hungarian government have signaled their interest in resuming relations with NATO. This situation represents an opportunity for the U.S. to re-establish relations with Hungary.

Text:  As the U.S. prepares for strategic level talks with the Government of Hungary, Washington’s strategy of re-engagement is under intense scrutiny. Most political pundits assumed the U.S. would adopt a fresh approach in the chaotic post-Orban era, as the memories of well-documented policy failures are still fresh. However, a review of the U.S. platform reveals a strong similarity to previous policies, perhaps owing to institutional inertia within the Department of State. While the U.S. approach can rightfully retain some familiar core elements from the past, it can also consider the Hungarian human domain in its policy calculation. A critical error of U.S. policy toward Hungary in the 2010s was a failure to understand the cultural, psychological, and behavioral attributes of the populace.  The projection of American attributes on Hungary set the conditions for misguided U.S. strategy and messaging that ignored populace sentiment.  This projection was compounded on a regional scale in Romania and Bulgaria, which also resulted in disappointing returns on the American diplomatic and financial investment. Examining what led to the current situation is critical, as it reveals how these failures led to a break in relations for over 15 years. Perhaps more importantly, an objective examination of the past also leads to a path forward.

Engagement between Hungary and the U.S. began in earnest following the breakup of the Union of Soviet Socialist Republics (USSR) and culminated in Hungary joining NATO in 1997[2].  NATO was eager to capitalize on their Cold War victory by bringing former Warsaw Pact countries into the fold. It is difficult to fault the aggressiveness of NATO in seeking to exploit a cataclysmic paradigm shift in East-West relations.  But without a solid understanding of the psyche of these new-to-NATO countries, it was inevitable that relations would be problematic in the long-run. Hungary’s history spawned belief systems within the human domain that run counter to core NATO principles.

The “Golden Age” for Hungary began in the mid-1800s and represented the height of Hungarian power and prestige. Though imperfect, this era saw the upward mobility of a large segment of the population[3]. This Golden Age came to a crashing halt with defeat in World War I. Hungary lost 70% of her territory and 13 million citizens as part of the Treaty of Trianon[4]. Graffiti demonizing this treaty exists throughout the country today and serves as a painful reminder of what most Hungarians see as a crime committed against their country.  The monarchy, a symbol of national pride for Hungarians, abruptly ended. World War II brought more pain and suffering to the Hungarian psyche.  Again, a poor choice in allies by Hungary, and another bitter Hungarian defeat. The post-war years of 1956-1988 consisted of a strong political figure (albeit a Kremlin puppet) dominating the political scene[5].  Free and fair elections, an independent judiciary, and freedom of the press were brutally co-opted or suppressed by the state security apparatus.

Fast forward to the rapid fire events of the fall of the USSR.  Suddenly the order of the USSR-inspired political environment was replaced by the disorder and chaos of a forced democratic transformation. Societal adjustment preceded at a glacial pace.  The uncertainty of the new order made many Hungarians long for days past.  As the years passed, the oppression of life under the USSR grew dimmer in memory, while the recollection of the order and stability of those days grew more enticing. Against this backdrop Hungarian engagement with the West began in which neither side completely understood the other.  Western consideration of Hungarian cultural, psychological, and behavioral attributes was lost amid grandiose goals of democracy, free markets and open borders, concepts it assumed were wholeheartedly accepted by the Hungarian populace.  The West perceived Hungary’s desire to join NATO as a clear repudiation of all things Soviet. This fostered a zero sum game mentality, a competition that the West felt was won by being the diametrical opposite of the USSR. Overlooked were the more practical reasons for Hungarians to seek inclusion, as well as populace sentiment.

As the years progressed, the cracks in the inherently shaky foundation of the relationship grew larger.  Enter PM Orban, chisel in hand and a finger on the pulse of the Hungarian population, to deepen the fissures.  While NATO and Brussels reprimanded PM Orban over several issues, Hungarians perceived life as better under him as the economy grew, quality of life increased, and pride was restored, while negative views on immigration remained prevalent throughout society.   With a super majority in Parliament, PM Orban was perfectly positioned to take advantage of COVID-19 to give himself dictatorial powers. Few in Hungary protested.  Strong authoritarian leadership was comfortable and familiar to Hungarians throughout their history.  While the death of PM Orban opens the door to reintegration with the West, the sentiment of the populace remains.

With this knowledge, the U.S. efforts can employ a realistic platform of engagement. Hungary will not be a model example of thriving liberalism and Jeffersonian democracy — the edges will still be rough.  Hungarian cultural, psychological, and behavioral attributes remain rooted in their history. Hungarian taste for capitalism greatly exceeds their tolerance of open borders.  “Hungary for Hungarians” remains a common refrain throughout the country. A strong leader who bends the rules by centralizing power and limiting some freedoms, but maintains order and promotes economic growth, is tolerable so long as the pendulum does not swing too far, as it did towards the end with PM Orban.

As Russia lurks nearby, a now much younger nation[6] has limited memory of the USSR. The U.S. has the opportunity to decide if an ally in the region with illiberal tendencies is better than no ally at all, for as Hungary goes, so might its like-minded neighbors Romania and Bulgaria. While this presents the U.S. with a difficult decision, the past again offers a path forward. Throughout its history the U.S. has overlooked questionable policies by an ally because they supported U.S. interests, especially during the Cold War[7]. Realpolitik amid great power competition demands it. So does the populace of a proud country of 10 million.


Endnotes:

[1] Tharoor, I. (2020, March 30). Coronavirus Kills Its First Democracy. Retrieved May 4, 2020 from https://www.washingtonpost.com/world/2020/03/31/coronavirus-kills-its-first-democracy

[2] Associated Press (1997, November 17). Hungarians Vote to Join NATO. Retrieved May 5, 2020 from https://www.latimes.com/archives/la-xpm-1997-nov-17-mn-54753-story.html

[3] Gero, A. (2016, May 1). The Lost Golden Age of Hungary. Retrieved May 5, 2020, from http://geroandras.hu/en/blog/2016/05/01/the-lost-golden-age-of-hungary

[4] KafkaDesk (2018, December 5). Why Is The Treaty of Trainon So Controversial? Retrieved May 5, 2020 from https://kafkadesk.org/2018/12/05/hungary-why-is-the-trianon-treaty-so-controversial

[5] Balazs, S. (2013, February 21). Knock in the Night. Refugee Press, Hillsborough, North Carolina.

[6] Velkoff, V.A. (1992, October). Aging trends: Hungary. Journal of Cross-Cultural Gerontology 7, 429–437. Retrieved May 5, 2020 from https://doi.org/10.1007/BF01848702

[7] Boot, M. (2018, October 19). Yes, The US Sometimes Supports Warlords and Dictators So When Should We Stop? Retrieved May 5, 2020 from https://www.washingtonpost.com/blogs/post-partisan/wp/2018/10/19/yes-the-u-s-sometimes-supports-warlords-and-dictators-so-when-should-we-stop

2020 - Contest: Civil Affairs Association Writing Contest Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers Civil Affairs Association Diplomacy Hungary Rocco P. Santurri III United States

Assessment of a Tutoring Model as a Replacement for Conventional Teaching and Learning

Thomas Williams is a Part-Time member of the faculty at Quinnipiac University.  He is a retired Colonel in the U.S. Army Reserve, a member of the Military Writer’s Guild, and tweets at @twilliams01301.  Divergent Options content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.

Title:  Assessment of a Tutoring Model as a Replacement for Conventional Teaching and Learning

Date Originally Written:  May 16, 2020.

Date Originally Published:  July 15, 2020.

Author and / or Article Point of View:  The author is a retired military reservist who teaches (adjunct status) in higher education. The author believes that education is lagging in its role as a bulwark of national security. The article is written from the point of view of an educational outsider who has been privileged to teach part time at the undergraduate level since 2008, but is not that of an administrator who must work out the logistics.

Summary:  Today’s college graduates are not adequately prepared for the world they will inherit, especially with its complex national security challenges. The current system teaches students to regurgitate the answers they are instructed to value, thus creating “excellent sheep.” A tutoring regimen combining student-educator interaction, team discussions, and individual efforts, will better prepare current students for the challenges of tomorrow.

Text:  Too many undergraduates seek credentials rather than pursue knowledge. The degree is their goal. Learning is ancillary. This observation is not an indictment of the current generation of students but of the system. These students behave as rational actors in a system designed to be efficient and risk averse.

The education system values compliant behavior, submitting carefully crafted papers on time, scoring well on tests, and participating in class, usually earns an A grade. Yet the sad truth is that students can write papers and score well on tests without actually learning the material. Former Yale professor turned full-time author William Deresiewicz derides this circumstance as the “game of school” and these A students as “excellent sheep[1].”

Furthermore, the game of school leaves many graduates incapable of using habits of mind that constitute critical thinking. Students do not learn and practice critical thinking as a discrete skill. Students learn the strategies of critical thinking by tangibly associating its many abstract concepts with domain specific problems. In other words, real-world practice. For instance, a student cannot consider multiple points of view if they do not possess basic knowledge of an event’s participants. Absent domain knowledge critical thinking becomes a meaningless phrase.

The strategies of critical thinking are more than just using evidence in support of an argument, or minding the dozens of common heuristics. The critical thinker is capable of forming novel conclusions from the information at hand. If students merely parrot back the same truths they have been told to esteem, they are, no matter how clever, only answering questions[2]. They are not practicing critical thinking. It is a troubling prospect to consider that educators are training presumed most educated citizens to be excellent sheep.

Students who obtain credentials yet avoid an education will eventually harm our the United States’ ability to compete in the global market and compromise its ability to protect and advance its interests around the world[3]. What is worse, because educated citizens are more likely to hold their governments accountable, compromising said citizens ability to think on their own jeopardizes the foundations of the republic[4].

Some Colleges and Universities offer innovative degrees and programs, but they are the exception. There are also pedagogies that try to adopt student-centered approaches, everything from problem-based learning and case-method learning to flipped classrooms and inquiry. When combined with evidenced-based learning practices, they are all strong steps in the right direction. However, none are sufficient to desist the majority of students from seeking the efficient path toward a credential.

An alternative to the conventional 50-minute Monday, Wednesday, Friday regimen is a tutoring model such as what one might find in graduate school, or in the United Kingdom at Oxford. Making allowances for student developmental levels, a class of 20 students can be divided into four teams of five. These teams meet with their Professor for 50 minutes only, one day of the week. They met as a team without a Professor on another day of their own choosing to work on various projects. On the remaining 50-minute period of the week, they wrote a short paper, usually a reflection on learning. Despite the lack of constant supervision, it is common for students to accept the imperative that they come to each session well-prepared to engage in an in-depth conversation[5].

Evolving information technology systems also enable this alternative approach to work online, as the COVID-19 pandemic has forced many educators and students to connect virtually.

Using this alternative, students shift from performance goals and an emphasis on products to mastery and the desire to understand in multiple contexts, take risks, and question. Initially this change in behavior is less about attitude and more the physical reality of having no back row in which to hide, but in the end the shift was genuine.

The Professor’s role is varied, but includes facilitating the discussions, recommending content readings (covering multiple perspectives), and monitoring student learning. A significant task is to watch for instances when students rely on misconceptions or use factually incorrect information in their arguments.

In many ways, teaching with a tutoring model resembles the military’s philosophy of mission command. There is an expectation of disciplined initiative from the student. The professor emphasizes purpose in any prompt, with permission given to deviate from the task to fit the purpose, and develops in students a tolerance for risk, which turns to acceptance as they develop competence. Trust replaces rules and policies.

There are always hiccups in a course that challenges convention, and some students struggle more than others. A few students even demand a return to a military-style command and control climate, as they worry about not giving the Professor what he or she wants. Paradoxically, giving students what they demand eliminates any chance of developing their critical thinking strategies. Sometimes the conversations that result from student failure offer more lessons than the topic at hand.

Only through risk taking on the part of Professors will the current system improve. When students test boundaries, this is not a reason to abandon the trust-based system. Instead, this testing is an opportunity to recognize and channel maverick behavior into something productive. Professors responding in a traditional way, with punitive action, ends the trust-based relationship. Students will quickly surmise that a Professors actions matter more than words and they will revert to doing only as they are told. Reducing fear is vital to fostering initiative.

In this alternative, while some students struggle early on, the end-of-course evaluations will likely be good. The students will embrace having ownership of the work and the freedom to explore. Student comments regularly contrast their experience in the tutoring model with their conventional classes and they express a desire to see more of the former. These comments are a clear signal that the typical undergraduate student truly does love learning and under the right circumstances can also love school[6].


Endnotes:

[1] Deresiewicz, W. (2008). The disadvantages of an elite education. American Scholar, 77(3), 20.

[2] Willingham, D. T. (2008). Critical thinking: Why is it so hard to teach? Arts Education Policy Review, 109(4), 21-32. doi:10.3200/AEPR.109.4.21-32

[3] Skaggs, D. (2014). Higher education as a matter of national security: Can a democracy plan ahead? Liberal Education, 100(1), 32.

[4] Botero, J., Ponce, A., & Shleifer, A. (2013). Education, complaints, and accountability. The Journal of Law & Economics, 56(4), 959-996. doi:10.1086/674133

[5] Horn, J. (2013). Signature pedagogy/powerful pedagogy: The oxford tutorial system in the humanities. Arts and Humanities in Higher Education, 12(4), 350-366. doi:10.1177/1474022213483487

[6] Blum, S. D. (2016). “I love learning; I hate school”: An anthropology of college (1st ed.). Ithaca: Cornell University Press. doi:10.7591/j.ctt20d8b00

Assessment Papers Education Thomas Williams

Assessing African Strategic Needs to Counter Undue Chinese Influence

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He can be found on Twitter @DAOlawuyi. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing African Strategic Needs to Counter Undue Chinese Influence

Date Originally Written:  May 2, 2020.

Date Originally Published:  July 13, 2020.

Author and / or Article Point of View:  The author believes that China’s current posture in Africa, if left unchecked, will turn the continent into a battleground for Great Power Competition below the threshold of armed conflict.

Summary:  China, despite its claims of peaceful rise, has steadily exercised its military, economic and diplomatic might. With strong leadership that is not afraid of compromise, African countries can enforce their independence as they ensure peace and prosperity on the continent.

Text:  When Deng Xiaoping liberalized the Chinese economy in 1978[1], his goals were to lift 860 million Chinese from poverty and power the Chinese economy to overtake its neighbors[2]. From an agrarian, state-controlled economy, China is now an industrial, largely private sector-led economic superpower[3]. However, as China’s economic power has grown, concerns about China’s global agenda have emerged[4]. China, along with Russia, is determined to reorder the world in its image[5], making conflict with the West more likely[6]. Yet, despite professing a policy of “Peaceful Rise[7]”, Chinese actions in the South China Sea[8] and its isolation campaign against Taiwan[9] show that Beijing isn’t afraid to flex its diplomatic, economic and military muscles.

Africa has attracted the interest of Great Powers through the ages. Often this interest has been to the detriment of Africans. From the destruction of Carthage[10] to slave trade[11][12] and colonization[13], Africa has faced privations from empires looking to exploit its resources. Even after independence, warring powers continued to interfere in the internal conflicts of African countries[14] throughout the Cold War. With a large and growing African population, sophisticated middle class, and increased connectivity to the rest of the world, Africa will continue to be both a source of materials and destination for goods and services.

As China expands its international footprint, it has deliberately increased its African ties. It supplies weapons to African countries without regard to the human rights practices of their leaders[15]. China is now Africa’s biggest trading partner[16] while providing financing for infrastructural projects through its Belt and Road Initiative. These projects have often been sponsored without regard to their sustainability or economic viability. The inability of countries to repay such loans have forced them to surrender critical infrastructure, with potential military implications[17][18].

As Great Power competition returns and China’s stance becomes more confrontational, and African leaders fail to act, the continent will again become just another front for global rivalries without regard for the well being of Africans. Global powers have fought their wars on African soil since the 18th Century. Regardless of the winners of these conflicts, Africans lose more than they gain. Africans, more than ever, can shape their destinies and work for the 21st Century to become Africa’s Century.

Africa nations can work to secure peace on the continent. By leveraging multilateral organizations operating on the continent, African leaders can make the painful compromises required to settle their inter-state disputes and move to cooperative models that engender peace based on common interests. African leaders can expand intra-African trade through the African Continental Free Trade Area and exploit regional organizations to tackle transnational crimes including human trafficking, illegal extraction of resources, religious extremism, and corruption under joint platforms.

Leaders can resolve the various internal stresses that keep their countries in political crises. Many African countries have been unable to foster a national identity, leaving their people clinging to tribal and religious identities without regard for the state’s interest. By decentralizing power, increasing citizen participation, respecting the rule of law, and reforming governance models for efficient service delivery, populations can begin to develop their sense of nationhood. Food security, public sanitation, healthcare, power, justice, and education programs can be implemented smartly and with consideration to the direct needs of their citizens, to prevent the resentment that bad actors can exploit.

African countries can take deliberate steps to diversify their technical, industrial, and financial sources. Governments can implement open standards, secure sensitive infrastructure from interference, and break up monopolies. As COVID-19 exposes the weakness of China’s role as the world’s manufacturing hub, countries can invest in manufacturing abilities and build capabilities to scale up production of critical items to safeguard their supply chains.

Most importantly, African leaders can declare that China will not be allowed to use its assets on the continent for military purposes in its competition with the West. Individual countries can also demonstrate the will to prevent the militarization of Chinese financed projects in their jurisdictions. Regional blocs can come together and draw up contingencies to retake control, by force if necessary, any dual-use facilities in member states. The status of Chinese bases on the continent can be spelled out, and appropriate contingencies planned should open conflict break out.

Ultimately, Africans can make deliberate decisions about the future of the continent. They have more agency than at any other time in history to shape the direction of the continent. While many may balk at the redirections needed to make themselves independent of Chinese machinations as well as the costs involved, such actions are crucial to ensure that African countries have the freedom to pursue policies most favorable to them.


Endnotes:

[1] Le, Y., Rabinovitch, S. (2008, December 8). TIMELINE: China milestones since 1978. Retrieved April 19, 2020, from
https://www.reuters.com/article/us-china-reforms-chronology-sb-idUKTRE4B711V20081208

[2] Kopf, D., Lahiri, T. (2018, December 18). The charts that show how Deng Xiaoping unleashed China’s pent-up capitalist energy in 1978. Retrieved April 19, 2020, from
https://qz.com/1498654/the-astonishing-impact-of-chinas-1978-reforms-in-charts

[3] Brandt, L., Rawski, G. (2008, April 14). China’s Great Economic Transformation.

[4] Arace, A. (2018, August 8). China Doesn’t Want to Play by the World’s Rules. Retrieved April 19, 2020, from
https://foreignpolicy.com/2018/08/08/china-doesnt-want-to-play-by-the-worlds-rules

[5] Stent, A. (2020, February). Russia and China: Axis of Revisionist? Retrieved April 19, 2020, from
https://www.brookings.edu/wp-content/uploads/2020/02/FP_202002_russia_china_stent.pdf

[6] Kaplan, R. (2019, January 7). A New Cold War Has Begun. Retrieved April 19, 2020, from
https://foreignpolicy.com/2019/01/07/a-new-cold-war-has-begun

[7] Bijian, Z. Speeches of Zheng Bijian 1997-2004. Retrieved April 24, 2020, from
https://www.brookings.edu/wp-content/uploads/2012/04/20050616bijianlunch.pdf

[8] Axe, D. (2020, March 23). How China is Militarizing the South China Sea with a Ton of Missiles. Retrieved April 24, 2020, from
https://nationalinterest.org/blog/buzz/how-china-militarizing-south-china-sea-ton-missiles-136297

[9] Myers, S. and Horton, C. (2018, May 25). China Tries to Erase Taiwan, One Ally (and Website) at a Time. Retrieved April 23, 2020, from
https://www.nytimes.com/2018/05/25/world/asia/china-taiwan-identity-xi-jinping.html

[10] Kierana, B. (2004, August 1). The First Genocide: Carthage, 146 BC. Retrieved April 23, 2020, from
https://gsp.yale.edu/sites/default/files/first_genocide.pdf

[11] M’Bokolo, E. (1998, April). The impact of the slave trade on Africa. Retrieved April 23, 2020, from
https://mondediplo.com/1998/04/02africa

[12] Nunn, N. (2017, February 27). Understanding the long-run effects of Africa’s slave trades. Retrieved April 23, 2020, from
https://www.bbc.co.uk/bitesize/guides/zxt3gk7/revision/1

[13] Settles, J. (1996). The Impact of Colonialism on African Economic Development. Retrieved April 28, 2020, from
https://trace.tennessee.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=1182&context=utk_chanhonoproj

[14] Schmidt, E. (2016, July 26). Conflict in Africa: The Historical Roots of Current Problems. Retrieved April 23, 2020, from
https://www.historians.org/publications-and-directories/perspectives-on-history/summer-2016/conflict-in-africa-the-historical-roots-of-current-problems

[15] Hull, A. Markov, D. (2012, February 20). Chinese Arms Sales to Africa. Retrieved April 24, 2020, from
https://www.ida.org/-/media/feature/publications/2/20/2012-chinese-arms-sales-to-africa/2012-chinese-arms-sales-to-africa.ashx

[16] Smith, E. (2019, October 9). The US-China Trade Rivalry is Underway in Africa, and Washington is playing catch-up. Retrieved April 24, 2020, from
https://www.cnbc.com/2019/10/09/the-us-china-trade-rivalry-is-underway-in-africa.html

[17] Abi-Habib, Maria. (2018, June 25). How China Got Sri Lanka to Cough Up a Port. Retrieved April 24, 2020, from
https://www.nytimes.com/2018/06/25/world/asia/china-sri-lanka-port.html

[18] Paris, C. (2019, February 21). China Tightens Grip on East African Port. Retrieved April 24, 2020, from
https://www.wsj.com/articles/china-tightens-grip-on-east-african-port-11550746800

2020 - Contest: PRC Below Threshold Writing Contest Africa Assessment Papers Below Established Threshold Activities (BETA) China (People's Republic of China) Competition Damimola Olawuyi Great Powers & Super Powers

Assessing China as a Complex Competitor and its Continued Evolution of Tactics Below the Threshold of Armed Conflict

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Matthias Wasinger is an Austrian Army officer. He can be found on LinkedIn. The views contained in this article are the author’s alone and do not represent the views of the Austrian Armed Forces, the Austrian Ministry of Defense, or the Austrian Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing China as a Complex Competitor and its Continued Evolution of Tactics Below the Threshold of Armed Conflict

Date Originally Written:  April 1, 2020.

Date Originally Published:  June 17, 2020.

Author and / or Article Point of View:  The author is an active General Staff Officer. He believes in the importance of employing all national instruments of power in warfare in a comprehensive approach, including non-state actors as well as allies, coalition forces, and partners. This assessment is written from the author’s point of view on how China plans to achieve its objectives.

Summary:  The Thucydides trap – it is a phenomenon destining a hegemon and an emerging power to war. The People’s Republic of China and the United States of America are currently following this schema. China aims at reaching a status above all others. To achieve that, it employs all instruments of national power in a concerted smart power approach, led by the constant political leadership. China fills emerging gaps in all domains and exploits U.S. isolationism.

Text:  The People’s Republic of China and the U.S. are competing actors. As an emerging power, China challenges the current hegemon[1]. Whereas the U.S. sees itself “first” amongst others[2], China aims at being “above” all[3]. To achieve this goal, China adheres to a whole of nation approach[4]. In the current stage of national resurrection, China will not challenge the U.S. in a direct approach with its military[5]. However, it balances hard and soft power, consequently employing smart power[6]. Within this concept, China follows examples of the U.S., further develops concepts, or introduces new ones. Foremost, China is willing to fill all emerging gaps the U.S. leaves in any domain. Its exclusive political system provides a decisive advantage towards other competitors. China’s political leadership has no pressure to succeed in democratic elections. Its 100-year plan for the great rejuvenation until 2049 is founded on this constancy[7].

China’s diplomacy is framed by several dogmata, executed by the Chinese People’s Party that stands for entire China, its well-being, and development. China’s view of the world is not pyramidic but concentric. That given, it might be easier to understand why China is ignoring concerns about internal human rights violations, adheres to a One-China policy regarding Taiwan, and assumes Tibet as Chinese soil. Maintaining North Korea as a buffer-zone to a U.S. vassal and developing the “string of pearls” in the South China Sea are more examples for the concentric world perception. These examples are the inner circle. They are indisputable[8].

Additionally, China’s diplomacy overcame the pattern of clustering the world by ideology. Necessity and opportunity are the criteria for China’s efforts[9]. Western nations’ disinterest in Africa led – like the European Union’s incapability in stabilizing states like Greece after the 2008 economic crisis – to close diplomatic, economic, and military ties with China. Whereever the so-called west leaves a gap, China will bridge it[10]. The growing diplomatic self-esteem goes, thereby, hand in hand with increasing China’s economic and military strength. China exploits the recent U.S. isolationism and the lacking European assertiveness. It aims at weak points.

In the fight for and with information, China showed an impressive evolution in information technology[11]. This field is of utmost importance since gathering data is not the issue anymore, but processing and disseminating. The infinite amount of information in the 21st century requires computer-assisted processes. Since China gained “Quantum Supremacy”, it made a step ahead of the United States of America[12]. Under this supremacy, China’s increasing capabilities in both Space and Cyberspace gain relevance. Information is collected almost equally fast by competitors, but more quickly fed into the political decision-making process in China[13]. The outcome is superiority in this field[14].

In the information domain, China follows a soft power approach, turning its reputation into a benevolent one. Lately, even the COVID-19 crisis was facilitated to make China appear as a supporter, delivering medical capacities worldwide. China makes use of the western community’s vast and open media landscape while restricting information for the domestic population. China will continue to show a domestically deterrent but supportive expeditionary appearance.

A strong economy and an assertive military are the Chinese political leadership’s source of strength[15]. Concerning the economy, China achieved remarkable improvements. From being a high-production rate, but low-quality mass-producer, it switches increasingly towards quality industries — their chosen path led via industrial espionage and plagiarism towards further developing imported goods[16]. Automobile and military industries are two illustrative examples. The former led to Chinese cars being banned, for example, from the U.S. market, not due to lacking quality but to protect U.S. automobile industries. The latter is based on Russian imports that were analyzed and improved. In doing so, China was able to raise its domestic weapons industry, literally rushing through development stages that took other nations decades.

China requires economic development. Only a strong economy ensures social improvements for its population, a precondition for internal stability. As long as this social enhancement is perceived, China’s domestic population bears restrictions. China will, therefore, maintain its economic growth with all given means. Modern technologies will be pursued in China, and resources will be either imported or, as seen in Africa, entire land strips or regions will be acquired. An essential capstone in this regard will be the “Belt and Road Project”, connecting the Chinese economy with other relevant markets such as Europe[17]. Concentrically, China will extend its influence along this trade route and grow its influence by creating dependence[18].

Establishing and maintaining contested economic routes requires capable security forces. China’s military keeps the pace. Founded as a revolutionary force, the military achieved the goal of combat readiness. Until 2049, China’s ambition is to build armed forces, able to fight and win wars. In a regional context, deterrence is the requirement. However, China seeks more. Superseding the U.S. means exceeding U.S. maritime capabilities. China’s strategic goal is to build the most capable blue-water navy[19]. The “string of pearls” is just an intermediate step until its naval fleet as assets of power-projecting will be established. China will maintain its land forces and increase its capabilities in all other domains. Regional conflicts will be facilitated to test doctrine, technology, and combat readiness.

China is aware of its geopolitical situation. It has to deter Russia militarily while marginalizing it economically. It will avoid a direct military confrontation that might hamper economic growth[20]. China has to shape the surrounding Asian nations’ attitude so they would not provide U.S. forces further staging areas. It will exploit U.S. isolationism, influence Europe economically, and diminish transatlantic influence using the information domain.

The U.S., being a maritime power, is eager to maintain its status as a hegemon by controlling opposite coast-lines such as Europe via Great Britain or Asia via Japan and South Korea. Reluctance to directly compete with China will enable the concentric power growth to reach the U.S. territory, finally overwhelming it. Interventionism will be exploited in the information domain, and isolationism is even a precondition for China’s success.


Endnotes:

[1] Allison, G. (2018, 24). Destined for War.

[2] The President of the United States. (2017, 1). National Security Strategy of the United States of America.

[3] Ward, J. (2019, 5). China’s Vision of Victory.

[4] Ward (2019, 92). Ibid.

[5] Ward (2019, 31-36). Ibid.

[6] Allison, G. (2018, 22). Destined for War.

[7] Raik et al. (2018, 33). The Security Strategy of the United States of America, China, Russia, and the EU.

[8] Ward (2019, 54-61). China’s Vision of Victory.

[9] Raik et al. (2018, 22-26). The Security Strategy of the United States of America, China, Russia, and the EU.

[10] Allison (2018, 20-24). Destined for War.

[11] Ward (2019, 85-87). China’s Vision of Victory.

[12] Ward (2019, 86). Ibid.

[13] Preskill (2018, 7). Quantum Computing in the NISQ.

[14] Poisel (2013, 49-50). Information Warfare and Electronic Warfare.

[15] Raik et al. (2018, 36). The Security Strategy of the United States of America, China, Russia, and the EU.

[16] Ward (2019, 92-95). China’s Vision of Victory.

[17] Raik et al. (2018, 33). The Security Strategy of the United States of America, China, Russia, and the EU.

[18] Ward (2019, 116-118). China’s Vision of Victory.

[19] Ward (2019, 61). Ibid.

[20] Raik et al. (2018, 34). The Security Strategy of the United States of America, China, Russia, and the EU.

2020 - Contest: PRC Below Threshold Writing Contest Assessment Papers Below Established Threshold Activities (BETA) China (People's Republic of China) Matthias Wasinger United States

An Assessment of the U.S. Army’s Civil Affairs’ Capability to Provide Commanders with Improved Situational Awareness in Population-Centric Operations

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


Lieutenant Colonel Alexander L. Carter is a U.S. Army Civil Affairs officer who deployed twice to Iraq as a Civil Affairs Team Leader. He presently works at the Office of the Chief of the Army Reserve as an Army Senior Strategist. He can be found on LinkedIn at www.linkedin.com/in/alexcarter2016. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the U.S. Army’s Civil Affairs’ Capability to Provide Commanders with Improved Situational Awareness in Population-Centric Operations

Date Originally Written:  April 21, 2020.

Date Originally Published:  June 15, 2020.

Author and / or Article Point of View:  The author is an active-duty Army officer currently serving at Headquarters, Department of the Army as a Senior Strategist. The author believes that the U.S. Army Civil Affairs community lacks sufficient stakeholder engagement skills needed to prepare commanders for population-centric operations in 2035 and suggests new approaches to identifying, prioritizing, and engaging with stakeholders.

Summary:  Successful population-centric operations will be achieved only when military forces understand underlying human behavior, attitudes, and predispositions of local populations. This knowledge can be taught by introducing new techniques in stakeholder engagement. Army Civil Affairs operators are the natural choice for this new training to support commanders conducting population-centric operations.

Text:  A recently published review of the U.S. Army’s involvement in the Iraq war revealed an unflinching account of significant failures in the planning and execution of population-centric operations[1]. One explanation for these failures is that the Army underestimated the physical, cultural, psychological, and behavioral attributes of individuals and groups that influenced local Iraqi perceptions, understanding, and interactions. As the Army focuses on modernization, readiness, and reform initiatives to prepare for the future fight, Army Civil Affairs (CA) are the logical choice to leverage lessons learned from recent experiences in Iraq and elsewhere and develop a much-needed capability to identify, prioritize, and engage with individuals and groups to favorably influence conditions on the ground. Specifically, CA adopting and implementing new stakeholder engagement techniques to better understand and leverage human attitudes, behaviors, and sentiments will impact the Supported Commander’s ability to accomplish the mission and achieve the desired end-state.

While certain communication or key leader engagement skills are taught at the CA branch qualification course and regularly practiced during exercises and other training events, more deliberate, comprehensive stakeholder management practices are not. In fact, such practices are absent from Army and Joint publications. To launch this new initiative in stakeholder outreach or engagement, one must start with a definition.

A stakeholder is “any group or individual who can affect or is affected by the achievement of the organization’s objectives[2].” To support the commander’s mission, CA operators must first identify stakeholders who can positively impact the mission. There are at least two methods for identifying stakeholders – Center of Gravity (COG) analysis and Strengths-Weaknesses-Opportunities-Threats or (SWOT) analysis. COG analysis begins with desired end state and identifies supporting critical capabilities needed to achieve the end state[3]. COG analysis identifies those critical capabilities that are also most vulnerable to ‘enemy’ or critical vulnerabilities[4]. Stakeholders are then identified that can either strengthen existing capabilities or mitigate the vulnerabilities of other capabilities.

Similarly, SWOT analysis can be used to generate a list of stakeholders. SWOT analysis identifies strengths, weaknesses, opportunities, and threats bearing upon a command or unit contemplating a proposed operation. Strengths and weaknesses are internally focused while opportunities and threats are external to the organization[5]. A re-purposing of traditional SWOT analysis focuses on opportunities and threats to identify stakeholders that help the organization capitalize on opportunities and mitigate threats. Once identified, these stakeholders are then prioritized to determine whether deliberate outreach to them is necessary.

There are different ways to prioritize stakeholders. One technique is the power/interest grid[6]. Stakeholders are plotted on any one of four quadrants, along the axes, based on a collective assessment of their relative power and interest. The degree of power for each stakeholder is assessed subjectively considering various types of power sources, such as legitimate, informal, referent, expert, coercive, connective, etc., that may be associated with an individual stakeholder[7]. The degree of interest is assessed based on the perceived level of interest that the stakeholder has on the outcome of the strategy or plan. Because stakeholders need to be managed differently based on their relative authority (power) and level of concern (interest), those stakeholders assessed as having a high degree of power and interest will be classified as “Manage Closely,” and actively managed.

Once stakeholders are identified and categorized into one of four quadrants on the grid, leaders allocate resources (team members) to engage with stakeholders deemed critical for solicitation. Stakeholders assessed as having high interest and high power (“Manage Closely”) are further assessed to determine their current and desired dispositions toward such plans[8]. Stakeholder engagements are calendared and reported through leader-led meetings. Engagements are planned with supporting goals and objectives for each stakeholder, ideally moving the stakeholder’s current disposition towards a desired disposition relative to the commander’s goals. In this process, CA operators could gauge stakeholders’ sentiments, thoughts, and feelings toward a command’s developing or proposed operations. Why choose the CA community to be the proponent for such expertise?

Civil Affairs operators are doctrinally and operationally aligned to be highly successful enablers to Supporting Commanders conducting population-centric operations because of CA’s laser focus on working exclusively in the human domain. The recently published joint concept for operating in such a contested, information environment states that commanders are tasked to gain “shared situational awareness…and establishment of relationships that reduce or eliminate barriers to the integration of physical power and informational power[9]. Through more deliberate, calculated, and, ultimately, effective stakeholder engagement, commanders will receive the information they need from CA operators to make better informed decisions that could make the difference between success or failure in population-centric warfare in the years to come.

Figure 1: Power/Interest Grid[10]

Screen Shot 2020-04-25 at 7.30.17 AM


Endnotes:

[1] U.S. Army, (2016). The U.S. Army in the Iraq War Volume 2: Surge and Withdrawal 2007–2011, U.S. Army War College Press, 625.[2] Freeman, E. R. (1984). Strategic Management: A Stakeholder Approach. Pitman, 31.

[3] Kornatz, S. D. (2016). The primacy of COG in planning: Getting back to basics. Joint Force Quarterly, (82), 93.

[4] Ibid.

[5] Helms, M. M., & Nixon, J. (2010). Exploring SWOT analysis – where are we now?: A review of academic research from the last decade. Journal of Strategy and Management, 3(3), 216. https://www.researchgate.net/publication/247630801_Exploring_SWOT_analysis_-_where_are_we_now_A_review_of_academic_research_from_the_last_decade.

[6] Smith, P. A. (2017). Stakeholder Engagement Framework. Information & Security: An International Journal, 38, 35–45. http://dx.doi.org/10.11610/isij.3802.

[7] Turcotte, W. E., Calhoun W.M., and Knox, C. (2018). Power and Influence, research paper, U.S. Naval War College. 2–3.

[8] A Guide to the Project Management Body of Knowledge, 5th ed (2013). Project Management Institute. 13.2.2.3.

[9] Joint Chiefs of Staff. (2018). Joint Concept for Operating in the Information Environment. https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdf.

[10] Eden, C. (1999). Making strategy: The journey of strategic management. Management Research News, 22(5). 37.

2020 - Contest: Civil Affairs Association Writing Contest Alexander L. Carter Assessment Papers Civil Affairs Association Civilian Concerns

Assessing the Role of Career Diplomats in National Security

Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He can be found on Twitter @DAOlawuyi. Confidence MacHarry is a Security Analyst at the same firm and can be found on Twitter @MacHarryCI. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing the Role of Career Diplomats in National Security.

Date Originally Written:  April 30, 2020.

Date Originally Published:  June 10, 2020.

Author and / or Article Point of View:  The authors believe that the relegation of career diplomats in shaping national security policy has robbed governments of vital perspectives sorely needed in great power competition.

Summary:  Career diplomats are an essential component of any national security apparatus. Their ability to understand allies and adversaries at the most basic levels means that governments are less likely to stumble down the path of armed conflict while securing the most favorable positions for themselves on the international stage. When diplomatic efforts take a back seat to those of military and security forces, the likelihood of conflict increases.

Text:  Diplomacy is one of the few professions which has remained true to its earliest history, albeit with a few marked adaptations to suit changing times. Harold Nicholson described diplomacy as “guiding international relations through negotiations, and how it manages ambassadors and envoys of these relations, and diplomatic working man or his art[1].”

The Greek style of diplomacy was founded on the abhorrence of secret pacts between leaders arising out of the distrust Greeks have for their leaders. The Greek diplomats pursued this narrative of intergovernmental relations, beginning with relations between the city-states, eventually extending to governments of non-Greek origin, most notably Persia.

The rise of international organizations has transformed the conduct of diplomacy between two entities into a multifaceted discipline. In its original form as relations between states, the conduct of diplomacy involved the exchange of officials in various capacities. Usually, the ambassador is the most important officer of one state’s relations to another. But, as international relations has grown over the last two centuries, diplomacy’s substance has transcended politics to include economic and socio-cultural relations, hence the entrance of consular officers and other subject matter experts amongst others. The exchange of ambassadors is not done without ceremony, and before a country accepts an ambassador, the sending country has to inform the recipient country about who is being sent. When the ambassador arrives, he or she is required to present a letter of credence to the head of state of the host country.

For relations between states to happen without friction, the Vienna Convention on Diplomatic Relations of 1961 spelled out the rules of engagement. Article 27.3 states that the diplomatic bag shall not be opened or detained, while Article 27.4 states that the packages constituting the diplomatic bag must bear visible external marks of their character and may contain only diplomatic documents or articles intended for official use[2]. Given the vulnerability of communications sent by wireless, by telephone, or by correspondence through public facilities—described in the commentary on Article 27.1 and 27.2 and increasing as technology advances and leaking meets with public sympathy—States attach prime importance to the security of the diplomatic bag for reliable transmission of confidential material.

No nation survives on autarky. Diplomacy, along with economic and cultural resources, makes up the soft power of a nation[3]. The importance of diplomats in ensuring state existence cannot be overemphasized and can be seen in the role they play in both peace and war. The ability to achieve foreign policy objectives via attracting and co-opting rather than hard power or coercion means that the country is spared the costs of waging wars[4].

Career diplomats (along with intelligence officers and analysts), through long service and academic study, serve as cultural experts and assist their political leaders in understanding developments from foreign countries. Diplomats understand the ideological leanings, beliefs, and fears of allies and adversaries. Such understanding is useful in crafting appropriate responses to developments. Diplomats are best positioned to seek out countries who share the same ideals with them, making alliances for national security easy. By building relationships with their counterparts from other nations, more channels for conflict resolution between countries become apparent.

These diplomatic understandings and relationships also facilitate both sides taking advantage of opportunities for military, political, and economic cooperation. Cultural attachés can facilitate educational exchanges, military attachés can prepare for joint exercises, and trade attachés can help businesses navigate the business environment in a foreign nation. All of these efforts deepen the bonds that bind countries together and make the peaceful resolution of disagreements more beneficial for all parties.

More importantly, career diplomats help their nations understand shared security threats and ensure a more effective joint response. The work that was done by American diplomats[5] to persuade China and Russia that a nuclear-armed Iran was not in their best interest comes to mind[6]. The sanctions regime that was created forced Iran to negotiate the status of its nuclear program under the Joint Comprehensive Plan of Action. The alternative, military action against Iranian nuclear sites, had no guarantee of success and risked a wider, Middle East conflict.

Ultimately, diplomats are required in the entire spectrum of relationships between nations. In peace, they facilitate understanding and rapport between countries. In a crisis, they defuse tensions and calm fraying nerves. In war, they can negotiate terms to bring all sides to lay down their arms and win the peace. All these tasks can only be done if the political masters can be convinced that the price for peace is cheaper than the blood of brave men and women. If peace is valued, then competent civil servants positioned to represent their countries to the world and provide the platform to realize this goal.


Endnotes:

[1] Nicholson, H. (1939). Diplomacy.

[2] Denza, E. (2016, January 14). Diplomatic Law: Commentary on the Vienna Convention on Diplomatic Relations. Retrieved April 16, 2020 from
https://opil.ouplaw.com/view/10.1093/law/9780198703969.001.0001/law-9780198703969-chapter-27

[3] Smith, A. (2007, October). Turning on the Dime: Diplomacy’s Role in National Security. Retrieved April 17, 2020 from
https://www.jstor.org/stable/resrep11348

[4] Nye, J. (2004). Soft Power: The Means to Success in World Politics.

[5] DePetris, D. (2016, August 9). Diplomacy, Not Force, Was the Best Choice With Iran. Retrieved April 22, 2020 from
https://nationalinterest.org/blog/the-skeptics/diplomacy-not-force-was-the-best-choice-iran-17292

[6] Almond, R. (2016, March 8). China and the Iran Nuclear Deal. Retrieved April 22, 2020 from
https://thediplomat.com/2016/03/china-and-the-iran-nuclear-deal

Assessment Papers Confidence MacHarry Damimola Olawuyi Diplomacy

Assessing China’s Civil and Military Crisis Response Capabilities

Hugh Harsono is currently serving as an Officer in the United States Army. He writes regularly for multiple publications about cyberspace, economics, foreign affairs, and technology. He can be found on LinkedIn @HughHarsono. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group. 


Title:  Assessing China’s Civil and Military Crisis Response Capabilities

Date Originally Written:  March 17, 2020.

Date Originally Published:  June 8, 2020.

Author and / or Article Point of View:  The author believes that observing China’s response to the COVID-19 pandemic can inform national security researchers and practitioners as to how China may respond to other crises.

Summary:  COVID-19 has highlighted China’s strengths in terms of rapid quarantine implementation and mobilizing national-level resources quickly. It has also highlighted failures in China’s bureaucratic nature and failing public health systems and breakdowns on the military front.  COVID-19 has enabled outsiders a rare look to both analyze and assess the China’s current capabilities for crisis response.

Text:  COVID-19 has engulfed not only the entirety of People’s Republic of China (PRC) but also the world. From quarantining entire regions in China to mobilizing national-level assets, the PRC has been forced to demonstrate its crisis response abilities in addressing the COVID-19 epidemic. Crisis response is a particularly vital capability for the PRC to possess in order to truly legitimize its standing on the global stage, with these abilities allowing China to project power internally and externally. The reactionary nature of the PRC’s response to COVID-19 can be analyzed to showcase its current capabilities when applied to a variety of other scenarios, from insurgent threats to bioweapon attacks.

The PRC has responded to COVID-19 in two distinct ways that can be applauded, with these specific crisis response initiatives being drastic quarantine measures and the mobilization of national-level assets. The large-scale quarantine ordered in the Hubei province by Beijing in January 2020 demonstrated a specific capability to employ scalable options in terms of reducing the number of COVID-19 cases from this region[1], with other areas in China also following suit. The Hubei quarantine was no small feat, given Wuhan’s status as the capital of the Hubei province with some estimates placing the number of affected individuals to approximately 35 million people[2]. Furthermore, the PRC’s mobilization of national-level assets demonstrates a consolidated ability to action resources, potentially in an expeditionary capability. Aside from the cancellation of major Lunar New Year events throughout the country[3] and the mass recall of manufacturing workers to produce face masks[4], PRC authorities also deployed resources to build multiple hospitals in a time of less than several weeks, to include the 1,000 bed Huoshenshan hospital and the 1,600 bed Leishenshan hospital with 1,600 beds[5]. These actions demonstrated the PRC’s crisis response strengths in attempting to contain COVID-19. China’s stringent mass-quarantine measures and mobilization of national-level resources showcased the PRCs ability to exercise its authority in an attempt to reduce the spread of the coronavirus outbreak.

While the PRC has proven itself effective on some levels, COVID-19 has also exposed weaknesses in the PRC’s crisis response apparatus in both civilian and military infrastructure systems. From a civil perspective, the PRC’s multi-tiered bureaucratic nature has showcased itself as a point of failure during the PRC’s initial response to COVID-19. With a top-down approach emphasizing strict obedience to superiors and centralized PRC leadership, local-level officials hesitated in relaying the dire nature of COVID-19 to their superiors, going so far as to continue local Lunar New Year Events, shut out experts, and even silence whistleblowers[6]. The PRC’s already over-burdened health system did not fare much better[7], with Chinese hospitals quickly exhausting available supplies, personnel, and hospital beds in the initial weeks of the declared coronavirus outbreak[8].

Chinese military response efforts also experienced similar breakdowns in purported capabilities. The PRC’s Joint Logistic Support Force (JLSF), a Wuhan-headquartered force purported to comprise of “multiple units, ammunition depots, warehouses, fuel depots, hospitals, and underground facilities spread over a wide geographic area,” has seen relatively little activation in support of the PRC’s crisis response efforts thus far[9]. The JLSF has mobilized less than 2,000 personnel in support of COVID-19 response efforts as of the writing of this article, playing a role more in-line with situation monitoring and self-protection[10]. Additionally, military logistics were further highlighted by a significant shortage in the amount of available nucleic acid testing kits[11], highlighting issues between both JLSF and People’s Liberation Army enterprise-at-large. Therefore, it is only possible for one to conclude that the PRC’s military crisis response capabilities may not be as developed as otherwise advertised.

There is no doubt that COVID-19 will be a defining medical pandemic with global impact. Testing the PRC at a real-time level, COVID-19 has highlighted Beijing’s strengths in terms of rapid quarantine implementation and the ability to mobilize national-level resources quickly. On the other hand, China’s ineffectiveness in terms of crisis response has also been showcased, with failures emerging from the PRC’s bureaucratic nature and failing public health systems combined with breakdowns on the PRC’s military front. As devastating as its effects continue to be, the coronavirus provides immense value into understanding the PRC’s capabilities for crisis response.


Endnotes:

[1] Woodward, A. (2020, January 28). Wuhan, China, and at least 15 other cities have been quarantined as China attempts to halt the spread of the coronavirus. That’s about 50 million people on lockdown. Retrieved April 18, 2020, from https://www.businessinsider.com/wuhan-coronavirus-officials-quarantine-entire-city-2020-1

[2] Bernstein, L. & Craig S. (2020, January 25). Unprecedented Chinese quarantine could backfire, experts say. Retrieved April 17, 2020, from https://www.washingtonpost.com/health/unprecedented-chinese-quarantine-could-backfire-experts-say/2020/01/24/db073f3c-3ea4-11ea-8872-5df698785a4e_story.html

[3] Reuters (2020, January 23). Beijing cancels New Year events to curb virus spread. Retrieved April 16, 2020, from https://www.reuters.com/article/china-health-newyear/beijing-cancels-new-year-events-to-curb-virus-spread-beijing-news-idUSB9N29F025

[4] Zhang L. & Goh, B. (2020, January 23). China’s mask makers cancel holidays, jack up wages as new virus spurs frenzied demand. Retrieved April 15, 2020, from https://www.reuters.com/article/us-china-health-masks-idUSKBN1ZM18E

[5] Wang, J. & Zhu, E. (2020, February 6). How China Built Two Coronavirus Hospitals in Just Over a Week. Retrieved April 17, 2020, from https://www.wsj.com/articles/how-china-can-build-a-coronavirus-hospital-in-10-days-11580397751

[6] Wang, D. (2020, March 10). Wuhan officials tried to cover up covid-19 — and sent it careening outward. Retrieved April 18, 2020, from https://www.washingtonpost.com/politics/2020/03/10/wuhan-officials-tried-cover-up-covid-19-sent-it-careening-outward

[7] Shim, E. (2020, February 6). China’s ‘grand gestures,’ propaganda aim to calm fears about coronavirus. Retrieved April 14, 2020, from https://www.upi.com/Top_News/World-News/2020/02/06/Chinas-grand-gestures-propaganda-aim-to-calm-fears-about-coronavirus/8971580989891

[8] Buckley, C. & Qin, A. (2020, January 30). Coronavirus Anger Boils Over in China and Doctors Plead for Supplies. Retrieved April 12, 2020, from https://www.nytimes.com/2020/01/30/world/asia/china-coronavirus-epidemic.html

[9] China’s Military Reforms and Modernization: Implications for the United State: Testimony before the U.S.-China Economic and Security Review Commission. 115th Cong. (2018) (testimony of Kevin McCauley).

[10] ANI. (2020, February 5). PLA rushes to the rescue in Wuhan. Retrieved April 10, 2020, from https://timesofindia.indiatimes.com/world/china/pla-rushes-to-the-rescue-in-wuhan/articleshow/73951301.cms

[11] Wee, S.L. (2020, February 9). As Deaths Mount, China Tries to Speed Up Coronavirus Testing. Retrieved April 10, 2020, from https://www.nytimes.com/2020/02/09/world/asia/china-coronavirus-tests.html

 

Aid / Development / Humanitarian Assistance / Disaster Relief Assessment Papers Capacity / Capability Enhancement China (People's Republic of China) COVID-19 Hugh Harsono

Assessing Iran in 2020 Regarding the United Nations Arms Embargo and the U.S. Elections

Khaled Al Khalifa is a Bahraini International Fellow at the U.S. Army War College (Academic Year 2020).  He has deployment and service experience in the Arabian Peninsula and Gulf.  He has an interest in Middle Eastern security and defense studies.  He can be found on twitter @KhalidBinAli.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Iran in 2020 Regarding the United Nations Arms Embargo and the U.S. Elections

Date Originally Written:  May 18,2020.

Date Originally Published:  June 5, 2020.

Author and / or Article Point of View:  The author believes in the importance of efforts that lead to stability in the Arabian Gulf and the wider Middle East. However, these efforts must start with a true understanding of the environment.

Summary:  The United Nations (U.N.) arms embargo will end in October 2020[1]. U.S. President Donald Trump sees this as a failure of the Iran deal, which allows Iran to acquire sophisticated weapon systems[2]. Iran altered its behavior in response to recent actions undertaken by the Trump administration, but Iran also sees opportunity. Stemming from this position, Iran will attempt to undermine the Trump administration through grey zone actions in the near future.

Text:  The Islamic Republic of Iran is entrenched in a fierce and continuous grey zone competition, where it pushes an incremental grand strategy designed to achieve net gains to protect it from adversaries and assert itself on the world stage as a dominant regional power. Iran established itself in the regional and international arenas as an aggressive competitor by using an array of tools to further its position. This competitive nature can be traced to much older times when Iran’s policies were hegemonic and aspirational[3]. The current status of Iran’s outlook is not much different; in fact, it became more deliberate and ambitious after it developed the capable means to achieve slow but cumulative gains. Soon after the 1979 revolution in Iran, the institutionalization of the Iranian Revolutionary Guard Corps(IRGC) provided the Islamic Republic with a hybrid tool to control the economy and pursue an eager foreign policy[4]. On the international stage, the Iranian nuclear program enabled Iran to increase its diplomatic signaling and allowed it to engage in negotiations with the West. Regionally, the IRGC oversaw the expansion of the Iranian geopolitical project by asserting itself directly and indirectly through links with state officials used as proxies or the sponsorship of militias and terrorist organizations. The sanctions imposed through the United Nations Security Council in 2006 were taking their toll; nonetheless, Iran remained defiant, signaling a high tolerance[5]. The nuclear deal relieved Tehran, bought its leadership some time, and freed up financial resources to continue funding their geopolitical project[6]. Iran’s support for Hezbollah in Lebanon and Iraq, the Houthi militia in Yemen and the tremendous lethal and financial support for the Assad regime in Syria, coincided with the 18 months of diplomatic talks that resulted in the Joint Comprehensive Plan of Action (JCPOA)[7]. The P5+1 partitioned the deal by separating it from addressing Iran’s malign behavior and focusing on the nuclear program exclusively. The exclusion of Iran’s support to terrorist organizations and nonstate actors through IRGC handlers in the deal resulted in a signal of acquiescence where Iran’s geopolitical project continued in Iraq, Syria, Yemen and beyond.

The JCPOA was a political and economic win for Iran; it received $1.7 billion from its frozen assets and had economic trade deals with Europe, while it maintained its malign geopolitical activities[8]. In 2015, some U.S. allies in the region voiced their concern privately and while others did so publicly by saying “Iran will get a jackpot, a cash bonanza of hundreds of billions of dollars, which will enable it to continue to pursue its aggression and terror in the region and the world”[9]. Iran was winning in the grey zone to the point it began to boast to the world and taunt its rivals[10]. Nonetheless, this euphoria didn’t last long. In May 2018, the United States government led by the Trump administration decided to withdraw from the JCPOA and reimpose the sanctions that were lifted under the deal. This move was explained in a White House briefing by the president citing a compelling list of reasons that the deal fails to protect America’s national security interests[11]. Iran’s response was more of the same, it used its nuclear program to signal defiance and maintained its hostilities to the region.

Recently, Iran probed its regional and international competitors in a series of actions which were designed to identify a threshold of tolerance below armed conflict and continue operating right below it. In June 2019, Iran shot down a U.S. military drone and attacked two oil tankers near the Straight of Hurmuz, disrupting one of the world’s most important oil and gas passageways. In September of the same year, Iran launched a drone attack on one of Saudi Arabia’s most important oil processing facilities, which significantly impacted the oil market and crude prices. In December, a rocket attack killed an American contractor and injured several others in Iraq. Although no official claim of responsibility was made, the U.S. held Kata’ib Hezbollah, an Iranian backed militia, responsible. As a result, the U.S. retaliated by targeting Hezbollah in Iraq and, not long after, Qassim Soleimani, the commander of the IRGC. These actions caused a short escalation from Iran, which resulted in more U.S. targeting of Iranian proxies in Iraq. Since then, Iran has halted its hostile activities and reverted to using its nuclear program diplomatically as a bargaining tool.

Iran is observing two events that are important for it to calculate its next moves—the arms embargo expiration date and the U.S. elections in November. The U.S. is leading an effort to extend the embargo in coordination with the U.N. Security Council and urge the other E3 countries of China and Russia to support this action. This effort is a continuation of the “maximum pressure” campaign, which started after the U.S. withdrew from the JCPOA to coerce Iran into a new deal[12]. Iran’s President threatened a “crushing response” if the arms embargo was prolonged as reaching that date is a significant political goal. The rapprochement established under the Obama administration created diplomatic channels, which resulted in understanding and agreement between the leadership of both countries. Iran is keen on reestablishing those channels to work towards lifting the sanctions and sticking to the terms of the JCPOA. The political investment, past gains, and official Iranian statements all indicate their high interest in reverting to the JCPOA days. Therefore, the U.S. elections is an important date on Iran’s calendar. Concessions before those dates are not foreseeable as the Trump administration continues to signal an open door to negotiate a new deal that guarantees the curtailment of Iran’s nuclear path and addresses Iran’s behavior in the region and around the world. Any move that Iran makes before those dates will be designed to incur audience costs against the Trump administration. An election year amid a pandemic crisis offers enough obscurity for Iran to remain in the grey zone and continue its destabilizing activities and policies.


Endnotes:

[1] Iran nuclear deal: Key details. (2019, June 11). Retrieved from https://www.bbc.com/news/world-middle-east-33521655

[2] Pamuk, H. (2020, April 29). U.S. will not let Iran buy arms when U.N. embargo ends: Pompeo. Retrieved from https://www.reuters.com/article/us-usa-iran-sanctions-idUSKBN22B29T

[3] McGlinchey, S. (2013, August 2). How the Shah entangled America. Retrieved from https://nationalinterest.org/commentary/how-the-shah-entangled-america-8821
[4] Iran’s revolutionary guards.(n.d.). Retrieved from https://www.cfr.org/backgrounder/irans-revolutionary-guards

[5] Resolution 1737 (2006) adopted by the security council at its 5612th meeting, on 23 December 2006. (n.d.). Retrieved from https://www.iaea.org/sites/default/files/unsc_res1737-2006.pdf

[6] Silinsky, M. D. (Ed.). (n.d.). Iran’s Islamic revolutionary guard corps: Its foreign policy and foreign legion. Retrieved from https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/Expeditions-with-MCUP-digital-journal/Irans-Islamic-Revolutionary-Guard-Corps

[7] Shannon, M. (2015, September 29). The United States and Iran: A great rapprochement? Retrieved from https://lobelog.com/the-united-states-and-iran-a-great-rapprochement

[8] Katzman, K. (2020, April). Iran’s sanctions. Retrieved from https://fas.org/sgp/crs/mideast/RS20871.pdf

[9] Hafezi, P. (2015, July 14). Iran deal reached, Obama hails step towards ‘more hopeful world’. Retrieved from https://www.reuters.com/article/us-iran-nuclear/iran-deal-reached-obama-hails-step-towards-more-hopeful-world-idUSKCN0PM0CE20150714

[10]Heard, L. S. (2014, November 3). Another Iranian proxy in the making? Retrieved from https://www.arabnews.com/columns/news/654531

[11] President Donald J. Trump is ending United States participation in an unacceptable Iran deal. (n.d.). Retrieved from https://www.whitehouse.gov/briefings-statements/president-donald-j-trump-ending-united-states-participation-unacceptable-iran-deal

[12] Advancing the U.S. maximum pressure campaign on Iran: United States department of state. (2020, March 13). Retrieved from https://www.state.gov/advancing-the-u-s-maximum-pressure-campaign-on-iran

Arms Control Assessment Papers Iran Khaled Al Khalifa United Nations United States

Assessment of the Virtual Societal Warfare Environment of 2035

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


James Kratovil is a Civil Affairs Officer in the United States Army, currently working in the Asia-Pacifc region.

Hugh Harsono is currently serving as an Officer in the United States Army. He writes regularly for multiple publications about cyberspace, economics, foreign affairs, and technology. He can be found on LinkedIn @HughHarsono.

Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group


Title:  Assessment of the Virtual Societal Warfare Environment of 2035

Date Originally Written:  April 30, 2020.

Date Originally Published:  June 3, 2020.

Author and / or Article Point of View:  Both authors believe that emerging societal warfare is a risk to U.S. interests worldwide.

Summary:  The world of 2035 will see the continued fracturing of the online community into distinctive tribes, exacerbated by sophisticated disinformation campaigns designed to manipulate these siloed groups. Anonymity on the internet will erode, thus exposing individuals personally to the masses driven by this new form of Virtual Societal Warfare, and creating an entirely new set of rules for interaction in the digital human domain.

Text:  The maturation of several emerging technologies will intersect with the massive expansion of online communities and social media platforms in 2035 to create historic conditions for the conduct of Virtual Societal Warfare. Virtual Societal Warfare is defined by the RAND Corporation as a “broad range of techniques” with the aim of changing “people’s fundamental social reality[1].” This form of warfare will see governments and other organizations influencing public opinion in increasingly precise manners. Where once narratives were shaped by professional journalists, unaltered videos, and fact-checked sources, the world of 2035 will be able to convincingly alter history itself in real time. Citizens will be left to the increasingly difficult task of discerning reality from fantasy, increasing the rate at which people will pursue whatever source of news best fits their ideology.

By 2035, the maturation of artificial intelligence (AI) will transform the information landscape. With lessons learned from experiences such as Russia’s interference with the 2016 elections in the U.S.[2], AI will continue to proliferate the issue of deep fakes to the point where it will be substantially more challenging to identify disinformation on the internet, thus increasing the effectiveness of disinformation campaigns. These AI systems will be able to churn out news stories and video clips showing fabricated footage in a remarkably convincing fashion.

With the population of the global community currently continuing to trend upwards, there is no doubt that an increasing number of individuals will seek information from popular social media platforms. The current figures for social media growth support this notion, with Facebook alone logging almost 2.5 billion monthly active users[3] and Tencent’s WeChat possessing an ever-growing user base that currently totals over 1.16 billion individuals[4]. An explosion in the online population will solidify the complete fracturing of traditional news sites into ones that cater to specific ideologies and preferences to maintain profits. This siloed collection of tailored realities will better allow disinformation campaigns of the future to target key demographics with surgical precision, making such efforts increasingly effective.

Where social media, the information environment, and online disinformation were once in their infancy of understanding, in 2035 they will constitute a significant portion of future organizational warfare. States and individuals will war in the information environment over every potentially significant piece of news, establishing multiple realities of ever starker contrast, with a body politic unable to discern the difference. The environment will encompass digital participation from governments and organizations alike. Every action taken by any organizational representative, be it a public affairs officer, a Department of Defense spokesperson, or key leader will have to take into account their engagement with online communities, with every movement being carefully planned in order to account for synchronized messaging across all web-based platforms. Organizations will need to invest considerable resources into methods of understanding how these different communities interact and react to certain news.

A digital human domain will arise, one as tangible in its culture and nuances as the physical, and organizations will have to prepare their personnel to act appropriately in it. Ostracization from an online community could have rippling effects in the physical world. One could imagine a situation where running afoul of an influential group or individual could impact the social credit score of the offender more than currently realized. Witness the power of WeChat, which not only serves as a messaging app but continually evolves to encompass a multitude of normal transactions. Everything from buying movie tickets to financial services exist on a super application home to its own ecosystem of sub-applications[5]. In 2035 this application constitutes your identity and has been blurred and merged across the digital space into one unified identity for social interactions. The result will be the death of online anonymity. Offend a large enough group of people, and you could see your social rating plummet, impacting everything from who will do business with you to interactions with government security forces.

Enter the new age disinformation campaign. While the internet has become less anonymous, it has not become any less wild, even within the intranets of certain countries. Communities set up in their own bubbles of reality are more readily excited by certain touchpoints, flocking to news organizations and individuals that cater to their specific dopamine rush of familiar news. A sophisticated group wanting to harass a rival organization could unleash massive botnets pushing AI-generated deep fakes to generate perceived mass negative reaction, crashing the social score of an individual and cutting them off from society.

Though grim, several trends are emerging to give digital practitioners and the average person a fighting chance. Much of the digital realm can be looked at as a never-ending arms race between adversarial actors and those looking to protect information and the privacy of individuals. Recognizing the growing problem of deepfakes, AI is already in development to detect different types, with a consortium of companies recently coming together to announce the “Deepfake Detection Challenge[6].” Meanwhile, the privacy industry has continued development of increasingly sophisticated forms of anonymity, with much of it freely available to a tech savvy public. The proliferation of virtual machines, Virtual Private Networks, Onion Routers, blockchain[7], and encryption have prolonged a cat and mouse game with governments that will continue into the future.

Where social media, the information environment, and online disinformation were once in their infancy of understanding, in 2035 they will be key elements used by governments and organizations in the conduct of Virtual Societal Warfare. The merging and unmasking of social media will leave individuals critically exposed to these online wars, with casualties on both sides weighed not in lives lost, but rather everyday lives suppressed by the masses. Ultimately, it will be up to individuals, corporations, and governments working together to even the odds, even as they advance the technology they seek to counter.


Endnotes:

[1] Mazarr, M., Bauer, R., Casey, A., Heintz, S. & Matthews, L. (2019). The emerging risk of virtual societal warfare : social manipulation in a changing information environment. Santa Monica, CA: RAND.

[2] Mayer, J. (2018, September 24). How Russia Helped to Swing the Election for Trump. Retrieved April 16, 2020, from https://www.newyorker.com/magazine/2018/10/01/how-russia-helped-to-swing-the-election-for-trump

[2] Petrov, C. (2019, March 25). Gmail Statistics 2020. Retrieved April 17, 2020, from https://techjury.net/stats-about/gmail-statistics/#gref

[3] Clement, J. (2020, January 30). Number of Facebook users worldwide 2008-2019. Retrieved April 18, 2020, from https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-

[4] Thomala, L. L. (2020, March 30). Number of active WeChat messenger accounts Q2 2011-Q4 2019. Retrieved April 18, 2020, from https://www.statista.com/statistics/255778/number-of-active-wechat-messenger-accounts

[5] Feng, Jianyun. (2019, September 26). What is WeChat? The super-app you can’t live without in China. Retrieved April 25, 2020 from https://signal.supchina.com/what-is-wechat-the-super-app-you-cant-live-without-in-china

[6] Thomas, Elise. (2019, November 25). In the Battle Against Deepfakes, AI is being Pitted Against AI. Retrieved April 30, 2020 from https://www.wired.co.uk/article/deepfakes-ai

[7] Shaan, Ray. (2018, May 4). How Blockchains Will Enable Privacy. Retrived April 30, 2020 from https://towardsdatascience.com/how-blockchains-will-enable-privacy-1522a846bf65

2020 - Contest: Civil Affairs Association Writing Contest Assessment Papers Civil Affairs Association Cyberspace James Kratovil Non-Government Entities

Assessing How India’s ‘Fourth Arm of Defence’ Decreased the United States’ Munitions

Michael Lima, D.B.A., is an Ammunition Warrant Officer and has served 21 years in the United States military.  He can be found on Twitter @Mike_k_Lima and provides pro bono consulting in munitions and explosives safety on MikeLimaConsulting.org.  Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing How India’s ‘Fourth Arm of Defence’ Decreased the United States’ Munitions

Date Originally Written:  April 16, 2020.

Date Originally Published:  June 1, 2020.

Author and / or Article Point of View:  The author believes in India’s growing military-industrial complex. The article’s point of view is from India towards the United States’ defense security cooperation programs.

Summary:  India has a growing military-industrial complex that includes state-owned enterprises, and has been less reliant on the United States and Russia for munitions production. This complex simultaneously builds political ties with other nations and builds partners and allies in the world. Surround by hostile nations and increasing its industrial base, India increased its internal strength and therefore its influence.

Text:  Mohandas Gandhi said that “Democracy necessarily means a conflict of will and ideas, involving sometimes a war of the knife between different ideas.” He is one of India’s most famous leaders who believed in non-violence, and successfully lead independence from the British without using a gun.

When the discussion of a nation’s industrial base for arms production comes around, three countries come to mind, the United States, China, and Russia. One country that is not associated with arms production in the world stage is the Republic of India. But in 2017, Indian companies ranked in the Top 100 categorized by Stockholm International Peace Research Institute as an emerging producer nation[1]. The achievement in production was due to a combination of defense production facilities and state-owned enterprises. The ‘Make in India’ nation-building initiative has transformed India into a global manufacturing hub[2]. India has shown the ability to produce and export at an international level, but its efforts are concentrated towards internal ordnance production known as its ‘Fourth Arm of Defence.’

At the heart of the Indian ordnance production is the Ordnance Factory Board, under the direction of the Department of Defence Production. This government organization is responsible for vertical integration of munitions with 41 factories, nine training institutes, three regional marketing centers, and four regional Controllers of Safety[3]. The board is one of the oldest and dates to the 1775 colonial period, with the East India Company of England and British authorities’ establishment of Board of Ordnance[4]. Along with the defense facilitates, additional facilities are run by state-owned enterprises such as Hindusthan Aeronautics Limited, Bharat Electronics Limited, and Bharat Dynamics Limited. These enterprises make up most of India’s arms production. With this amount of production, it is difficult to understand why India needs the United States’ armament.

The United States is the second-largest arms supplier to India, and Russia being the first[5]. Through the Defense Security Cooperation Agency, the United States supports India with major aircraft programs such as AH-64E Apaches and C-17 Globemaster III[6], and sales of armament as the AGM-84L Harpoon Block II air-launched missiles[7]. The Federal Service for Military and Technical Cooperation of Russia assists India with larger weapon systems such as the T-90S tanks[8] and Russian S-400 surface to air missile systems[9]. The Indian government, with an impressive military-industrial complex, does not yet have the same capabilities as its two leading importers. The Republic of India does a balancing act of building relationships with both the United States and the Russian government while having contested borders with China. Also, of note politically is India’s near war with its main rival Pakistan over the Jammu and Kashmir region[10]. These circumstances have driven India to be independent and less reliant on external support.

The United States arms exports to India decreased by 51%, and Russian arms exports to India were reduced by 47% between the periods of 2010–14 and 2015–19. [11] The ability for India to have major ownership of the supply chain of the military-industrial complex, allows India to produce munitions systems comparable to the United States and Russia. This, in turn, brings about the success required to decrease import sales from both countries. Between 2010–14 and 2015–19, India’s overall arms imports decreased by 32%, which aligns with their stated objective to produce their own major arms, but still have plans for the imports of major systems[12].

Even with an overall decrease in imports, India continues to increase arms imports from other major powers like Israel and France by 175 and 71%, respectively, in the same time frame. Simultaneously reducing dependency on world superpowers and building political ties with other strategic and critical partners throughout the geopolitical spectrum. Additionally, India managed to have an increase of 426% of arms to smaller countries such as Myanmar, Sri Lanka, and Mauritius[13]. Showing the capability of their industrial complex to produce and export.

The United States and India have a partnership based on shared values, including democratic principles, and the U.S. supports India’s emergence as a leading global power to ensure regional peace in the Indo-Pacific[14]. With the acknowledgment of India’s advancement as a superpower, the United States will eventually concede that its partner has a military-industrial complex that can rival its own. State-owned enterprises increased the capacity of India’s defense production and technical expertise. While the United States is a leading arms exporter to India, working with India to use both U.S. and Indian arms exporting as an instrument of influence within the Indo-Pacific, will likely be required to offset China’s rise.


Endnotes:

[1] The SIPRI Top 100 Arms-producing and Military Services Companies, 2017. (2018). Retrieved April 15, 2020, from https://www.sipri.org/publications/2018/sipri-fact-sheets/sipri-top-100-arms-producing-and-military-services-companies-2017

[2] Ordnance Factory Board. About Us. (n.d.). Retrieved April 15, 2020, from https://www.makeinindia.com/about

[3] Ordnance Factory Board. OFB in Brief. (n.d.). Retrieved April 15, 2020, from https://ofbindia.gov.in/pages/ofb-in-brief

[4] Ordnance Factory Board. https://ofbindia.gov.in/pages/history

[5] Pubby, M. (2020, March 10). In a first, India figures on arms exporters list. Retrieved April 15, 2020, from https://economictimes.indiatimes.com/news/defence/in-a-first-india-figures-on-arms-exporters-list/articleshow/74557571.cms

[6] The Official Home of the Defense Security Cooperation Agency. India. (n.d.). Retrieved April 15, 2020, from https://www.dsca.mil/tags/india

[7] Ibid.

[8] The Moscow Times. (2019, April 09). India to Buy Over 450 Russian Tanks Worth $2Bln – Reports. Retrieved April 15, 2020, from https://www.themoscowtimes.com/2019/04/09/india-to-buy-over-450-russian-tanks-worth-2bln-reports-a65146

[9] The Moscow Times. (2019, September 05). India’s Russian Arms Purchases Hit’ Breakthrough’ $14.5Bln, Official Says. Retrieved April 15, 2020, from https://www.themoscowtimes.com/2019/09/05/indias-russian-arms-purchases-hit-breakthrough-145bln-official-says-a67153

[10] Kugelman, M. (2019, December 31). India and Pakistan Are Edging Closer to War in 2020. Retrieved April 16, 2020, from https://foreignpolicy.com/2019/12/31/afghanistan-taliban-nuclear-india-pakistan-edging-closer-war-2020

[11] Wezeman, P. D., Fleurant, A., Kuimova, A., Lopes da Silva, D., Tian, N., & Wezeman, S. T. (2020, March). Trends in International Arms Transfers, 2019. Retrieved April 16, 2020, from https://www.sipri.org/publications/2020/sipri-fact-sheets/trends-international-arms-transfers-2019

[12] Wezeman, P. D., Fleurant, A., Kuimova, A., Lopes da Silva, D., Tian, N., & Wezeman, S. T. (2020, March). Trends in International Arms Transfers, 2019. Retrieved April 16, 2020, from https://www.sipri.org/publications/2020/sipri-fact-sheets/trends-international-arms-transfers-2019

[13] Wezeman, P. D., Fleurant, A., Kuimova, A., Lopes da Silva, D., Tian, N., & Wezeman, S. T. (2020, March). Trends in International Arms Transfers, 2019. Retrieved April 16, 2020, from https://www.sipri.org/publications/2020/sipri-fact-sheets/trends-international-arms-transfers-2019

[14] U.S. Relations With India – United States Department of State. (2019, June 21). Retrieved April 16, 2020, from https://www.state.gov/u-s-relations-with-india

Assessment Papers Capacity / Capability Enhancement India Michael Lima United States

Assessing Russia’s Pursuit of Great Power

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


Stuart E. Gallagher has served as a Military Advisor to the United States Department of State during the outset of the Ukraine crisis and is a recognized subject matter expert on Russian / Ukrainian affairs. He can be contacted at: s_gallagher@msn.com. Divergent Options content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing Russia’s Pursuit of Great Power

Date Originally Written:  April 20, 2020.

Date Originally Published:  May 20, 2020.

Author and / or Article Point of View:  The author serves as a subject matter expert on Russian / Ukrainian affairs. The author contends that Russia has and will continue to pursue great power status seeking legitimacy from the international community.

Summary:  The Soviet Union’s collapse in 1991 forced Russia to cede its Superpower status. This event embarrassed Russian leadership who then retooled Russia’s instruments of national power and redefined how Russia engaged globally. This ceding of power also motivated Vladimir Putin and his retinue to pursue Great Power status. Russia will use crises to their advantage, including COVID-19, viewing global power as a zero sum game thereby strengthening itself at the expense of the west.

Text:  As the world embarks on a new decade looking to the horizon and 2035, it is important to take pause and consider the United States future relationship with Russia. Looking back, the United States’ relationship with Russia changed dramatically in the summer of 1991 with the fall of the Soviet Union leaving the United States as the sole Superpower in the world. Russia struggled throughout the 1990’s politically, economically, and militarily. In the early 2000’s Russia began to get back on its feet showing early aspirations of returning to great power status as evidenced by systematically retooling and bolstering its instruments of national power (diplomacy, information, military, economic or DIME). In 2014, Russia annexed Crimea, a sovereign territory of Ukraine, and destabilized southeastern Ukraine employing what is now commonly referred to as New Generation Warfare. These actions redefined the contemporary security environment in a way not seen since the Cold War. Yet, 2020 ushered in a new and unexpected challenge to the contemporary security environment – the virus called COVID-19. Russia used COVID-19 to its advantage by exploiting the unpreparedness of other countries. Considering Russia’s past actions, it is safe to assume that it will use future events of this nature in the same manner to “legitimately,” in its view, return to Great Power status thereby re-establishing a new level of parity with the United States and other great power nations throughout the world.

A Great Power is “a sovereign state that is recognized as having the ability and expertise to exert its influence on a global scale. Great powers characteristically possess military and economic strength, as well as diplomatic and soft power influence, which may cause middle or small powers to consider the Great Powers’ opinions before taking actions of their own[1].” Russia was thoroughly embarrassed with the collapse of the Soviet Union as demonstrated in an address to the nation by President Putin where he stated that the collapse of the Soviet empire “was the greatest geopolitical catastrophe of the century[2].” At the turn of the century, when Vladimir Putin was about to enter the office of President of Russia, he delivered his manifesto. This manifesto focused on Russia’s past, present, and future struggles, providing a form of road map for what was required to return to great power status[3].

Since the turn of the century, Russia has taken many actions leveraging its vertically aligned instruments of national power to increase its standing in the world. Russia’s most profound action was the annexation of Crimea and the occupation of southeastern Ukraine by Russian backed separatist forces in 2014. However, today, with COVID-19 threatening the world, Russia has adopted a new mantle – that of savior. During a time when the world scrambles to contain COVID-19 and muster resources, Russia has swooped in to the rescue providing expertise and medical supplies to hard-hit Italy, affectionately referred to as “from Russia with love[4].” This assistance was viewed by “senior European Union and North Atlantic Treaty Organization diplomats less as generosity and more as a geopolitical move asserting Russian power and extending influence[5].” These diplomatic views are understandable considering the dubious, unsolicited “humanitarian assistance” Russia provided in eastern Ukraine in 2014[6]. In another recent instance, Russia provided an Antonov cargo plane full of medical supplies to help ease the burden as the United States struggled with the escalation of COVID-19 on its populace. These acts demonstrated that Russia could do what Great Powers should do in times of world crisis – help. Consequently, a United States concern about Russia’s actions providing legitimacy to their Great Power status quest is justified. Not only will the Kremlin use global-reaching events to highlight their humanity and power, but they will also manipulate these situations in a way that displays the weakness of the west.

One of the banner events the United States had to address in 2014 that redefined the contemporary security environment was the illegal annexation of Crimea by Russia. This annexation caught the United States senior leadership off guard resulting in significantly delayed reaction time(s). However, now that Russia has reasserted itself on the world stage as a Great Power, it is time to define Great Power Competition. At present, the United States government does not have a policy or a single working definition for great power competition. Simply put, “without a single definition – they [stakeholders to include: US military, the defense industry, elements of diplomacy and US policymakers] will inevitably develop different, and possibly competing, interpretations of great-power competition, with consequent effects for US national security and foreign policy[7].”

So, as the United States sits in the year 2020 and looks to the future, will Russia’s Great Power status be granted, and what are the second and third order effects of doing so? To complicate these questions further, “there are no set or defined characteristics of a great power. These characteristics have often been treated as empirical, self-evident to the assessor[8].” In other words, granting legitimacy to a state is completely subjective in nature. Considering this fact, Russia could effectively grant itself legitimacy as a Great Power. Whether or not the international community would recognize this legitimacy is another issue altogether. On the other hand, by virtue of its position in the world, if the United States were to grant legitimacy to Russia, the international community would be inclined, if not compelled, to recognize this status as well. This granting of status would also reveal a paradox. The United States granting legitimacy to Russia as a Great Power would arguably re-establish parity more quickly, which would be especially helpful during times of world crisis, such as COVID-19 pandemic. However, this granting could also come at a high price, possibly resulting in another arms race, a series of proxy wars or worse. Regardless, at some point, the United States will be required to address this issue and the outcomes, for said decision(s) will have far-reaching impacts on both United States/Russia relations and the security environment well beyond 2035.


Endnotes:

[1] Neumann, Iver B. “Russia as a Great Power, 1815–2007.” Journal of International Relations and Development 11.2 (2008): 128-151.

[2] “Putin: Soviet Collapse a ‘Genuine Tragedy.’” World New on NBC News.com (2005). Retrieved April 20, 2020 from: http://www.nbcnews.com/id/7632057/ns/world_news/t/putin-soviet-collapse-genuine-tragedy.

[3] Putin, Vladimir. “Russia at the Turn of the Millennium.” Nezavisimaia Gazeta 4, Rossiia Na Rubezhe Tysiacheletii (1999): pp. 209-229. Retrieved April 18, 2020 from: https://pages.uoregon.edu/kimball/Putin.htm.

[4] Emmott, Robin and Andrew Osborn. “Russian Aid to Italy Leaves EU Exposed.” Reuters, World News (2020): Retrieved April 21, 2020 from: https://www.reuters.com/article/us-health-coronavirus-russia-eu/russian-aid-to-italy-leaves-eu-exposed-idUSKBN21D28K.

[5] Ibid.

[6] “Ukraine Crisis: Russian Convoy ‘Invades Ukraine.’” BBC News. (2014): Retrieved April 21, 2020 from: https://www.bbc.com/news/world-europe-28892525.

[7] Boroff, Alexander. “What is Great-Power Competition Anyway?” Modern War Institute. (17 April 2020). Retrieved from: https://mwi.usma.edu/great-power-competition-anyway.

[8] Waltz, Kenneth N (1979). Theory of International Politics. McGraw-Hill. p. 131.

2020 - Contest: Civil Affairs Association Writing Contest Assessment Papers Civil Affairs Association Competition Great Powers & Super Powers Russia Stuart E. Gallagher

Assessing the Threat posed by Artificial Intelligence and Computational Propaganda

Marijn Pronk is a Master Student at the University of Glasgow, focusing on identity politics, propaganda, and technology. Currently Marijn is finishing her dissertation on the use of populist propagandic tactics of the Far-Right online. She can be found on Twitter @marijnpronk9. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Threat posed by Artificial Intelligence and Computational Propaganda

Date Originally Written:  April 1, 2020.

Date Originally Published:  May 18, 2020.

Author and / or Article Point of View:  The Author is a Master Student in Security, Intelligence, and Strategic Studies at the University of Glasgow. The Author believes that a nuanced perspective towards the influence of Artificial Intelligence (AI) on technical communication services is paramount to understanding its threat.

Summary: 
 AI has greatly impacted communication technology worldwide. Computational propaganda is an example of the unregulated use of AI weaponized for malign political purposes. Changing online realities through botnets which creates a distortion of online environments could affect voter’s health, and democracies’ ability to function. However, this type of AI is currently limited to Big Tech companies and governmental powers.

Text:  
A cornerstone of the democratic political structure is media; an unbiased, uncensored, and unaltered flow of information is paramount to continue the health of the democratic process. In a fluctuating political environment, digital spaces and technologies offer great platforms for political action and civic engagement[1]. Currently, more people use Facebook as their main source of news than via any news organization[2]. Therefore, manipulating the flow of information in the digital sphere could not only pose as a great threat to the democratic values that the internet was founded upon, but also the health of democracies worldwide. Imagine a world where those pillars of democracy can be artificially altered, where people can manipulate the digital information sphere; from the content to the exposure range of information. In this scenario, one would be unable to distinguish real from fake, making critical perspectives obsolete. One practical embodiment of this phenomenon is computational propaganda, which describes the process of digital misinformation and manipulation of public opinion via the internet[3]. Generally, these practices range from the fabrication of messages, the artificial amplification of certain information, to the highly influential use of botnets (a network of software applications programmed to do certain tasks). With the emergence of AI, computational propaganda could be enhanced, and the outcomes can become qualitatively better and more difficult to spot.

Computational propaganda is defined as ‘’the assemblage of social media platforms, autonomous agents, algorithms, and big data tasked with manipulating public opinion[3].‘’ AI has the power to enhance computational propaganda in various ways, such as increased amplification and reach of political disinformation through bots. However, qualitatively AI can also increase the sophistication and the automation quality of bots. AI already plays an intrinsic role in the gathering process, being used in datamining of individuals’ online activity and monitoring and processing of large volumes of online data. Datamining combines tools from AI and statistics to recognize useful patterns and handle large datasets[4]. These technologies and databases are often grounded in in the digital advertising industry. With the help of AI, data collection can be done more targeted and thus more efficiently.

Concerning the malicious use of these techniques in the realm of computational propaganda, these improvements of AI can enhance ‘’[..] the processes that enable the creation of more persuasive manipulations of visual imagery, and enabling disinformation campaigns that can be targeted and personalized much more efficiently[4].’’ Botnets are still relatively reliant on human input for the political messages, but AI can also improve the capabilities of the bots interacting with humans online, making them seem more credible. Though the self-learning capabilities of some chat bots are relatively rudimentary, improved automation through computational propaganda tools aided by AI could be a powerful tool to influence public opinion. The self-learning aspect of AI-powered bots and the increasing volume of data that can be used for training, gives rise for concern. ‘’[..] advances in deep and machine learning, natural language understanding, big data processing, reinforcement learning, and computer vision algorithms are paving the way for the rise in AI-powered bots, that are faster, getting better at understanding human interaction and can even mimic human behaviour[5].’’ With this improved automation and data gathering power, computational propaganda tools aided by AI could act more precise by affecting the data gathering process quantitatively and qualitatively. Consequently, this hyper-specialized data and the increasing credibility of bots online due to increasing contextual understanding can greatly enhance the capabilities and effects of computational propaganda.

However, relativizing AI capabilities should be considered in three areas: data, the power of the AI, and the quality of the output. Starting with AI and data, technical knowledge is necessary in order to work with those massive databases used for audience targeting[6]. This quality of AI is within the capabilities of a nation-state or big corporations, but still stays out of reach for the masses[7]. Secondly, the level of entrenchment and strength of AI will determine its final capabilities. One must differ between ‘narrow’ and ‘strong’ AI to consider the possible threat to society. Narrow AI is simply rule based, meaning that you have the data running through multiple levels coded with algorithmic rules, for the AI to come to a decision. Strong AI means that the rules-model can learn from the data, and can adapt this set of pre-programmed of rules itself, without interference of humans (this is called ‘Artificial General Intelligence’). Currently, such strong AI is still a concept of the future. Human labour still creates the content for the bots to distribute, simply because the AI power is not strong enough to think outside the pre-programmed box of rules, and therefore cannot (yet) create their own content solely based on the data fed to the model[7]. So, computational propaganda is dependent on narrow AI, which requires a relatively large amount of high-quality data to yield accurate results. Deviating from this programmed path or task severely affects its effectiveness[8]. Thirdly, the output or the produced propaganda by the computational propaganda tools vary greatly in quality. The real danger lies in the quantity of information that botnets can spread. Regarding the chatbots, which are supposed to be high quality and indistinguishable from humans, these models often fail tests when tried outside their training data environments.

To address this emerging threat, policy changes across the media ecosystem are happening to mitigate the effects of disinformation[9]. Secondly, recently researchers have investigated the possibility of AI assisting in combating falsehoods and bots online[10]. One proposal is to build automated and semi-automated systems on the web, purposed for fact-checking and content analysis. Eventually, these bottom-top solutions will considerably help counter the effects of computational propaganda. Thirdly, the influence that Big Tech companies have on these issues cannot be negated, and their accountability towards creation and possible power of mitigation of these problems will be considered. Top-to-bottom co-operation between states and the public will be paramount. ‘’The technologies of precision propaganda do not distinguish between commerce and politics. But democracies do[11].’


Endnotes:

[1] Vaccari, C. (2017). Online Mobilization in Comparative Perspective: Digital Appeals and Political Engagement in Germany, Italy, and the United Kingdom. Political Communication, 34(1), pp. 69-88. doi:10.1080/10584609.2016.1201558

[2] Majo-Vazquez, S., & González-Bailón, S. (2018). Digital News and the Consumption of Political Information. In G. M. Forthcoming, & W. H. Dutton, Society and the Internet. How Networks of Information and Communication are Changing Our Lives (pp. 1-12). Oxford: Oxford University Press. doi:10.2139/ssrn.3351334

[3] Woolley, S. C., & Howard, P. N. (2018). Introduction: Computational Propaganda Worldwide. In S. C. Woolley, & P. N. Howard, Computational Propaganda: Political Parties, Politicians, and Political Manipulation on Social Media (pp. 1-18). Oxford: Oxford University Press. doi:10.1093/oso/9780190931407.003.0001

[4] Wardle, C. (2018, July 6). Information Disorder: The Essential Glossary. Retrieved December 4, 2019, from First Draft News: https://firstdraftnews.org/latest/infodisorder-definitional-toolbox

[5] Dutt, D. (2018, April 2). Reducing the impact of AI-powered bot attacks. CSO. Retrieved December 5, 2019, from https://www.csoonline.com/article/3267828/reducing-the-impact-of-ai-powered-bot-attacks.html

[6] Bolsover, G., & Howard, P. (2017). Computational Propaganda and Political Big Data: Moving Toward a More Critical Research Agenda. Big Data, 5(4), pp. 273–276. doi:10.1089/big.2017.29024.cpr

[7] Chessen, M. (2017). The MADCOM Future: how artificial intelligence will enhance computational propaganda, reprogram human culture, and threaten democracy… and what can be done about it. Washington DC: The Atlantic Council of the United States. Retrieved December 4, 2019

[8] Davidson, L. (2019, August 12). Narrow vs. General AI: What’s Next for Artificial Intelligence? Retrieved December 11, 2019, from Springboard: https://www.springboard.com/blog/narrow-vs-general-ai

[9] Hassan, N., Li, C., Yang, J., & Yu, C. (2019, July). Introduction to the Special Issue on Combating Digital Misinformation and Disinformation. ACM Journal of Data and Information Quality, 11(3), 1-3. Retrieved December 11, 2019

[10] Woolley, S., & Guilbeault, D. (2017). Computational Propaganda in the United States of America: Manufactoring Consensus Online. Oxford, UK: Project on Computational Propaganda. Retrieved December 5, 2019

[11] Ghosh, D., & Scott, B. (2018, January). #DigitalDeceit: The Technologies Behind Precision Propaganda on the Internet. Retrieved December 11, 2019, from New America: https://www.newamerica.org/public-interest-technology/policy-papers/digitaldeceit

Artificial Intelligence / Machine Learning / Human-Machine Teaming Assessment Papers Cyberspace Emerging Technology Influence Operations Marijn Pronk

Assessing 9/11 Lessons and the Way Ahead for Homeland Defense Against Small Unmanned Aerial Systems

Peter L. Hickman, Major, United States Air Force, holds a PhD from Arizona State University in International Relations and a Master of Military Operational Art and Science in Joint Warfare. He is currently a Defense Legislative Fellow for a member of the House Armed Services Committee. Prior to this position, he worked as a Requirements Manager on Air Combat Command HQ staff and the Chief of Weapons and Tactics at the 225th Air Defense SquadronThe views expressed in this paper represent the personal views of the author and are not necessarily the views of the Department of Defense or of the Department of the Air Force.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing 9/11 Lessons and the Way Ahead for Homeland Defense Against Small Unmanned Aerial Systems

Date Originally Written:  March 18, 2020.

Date Originally Published:  May 13, 2020.

Author and / or Article Point of View:  The author is a field-grade, U.S. Air Force Weapons Officer who has worked in homeland air defense for the past 8 years at tactical and headquarters levels. He is currently a Defense Fellow assigned to the office of a member of the House Armed Services Committee. The article is written from the point of view of an American strategic analyst viewing the emerging threat of small unmanned systems in the context of the current state of North American air defense.

Summary:   For small unmanned aerial systems (sUAS), the current state of North American air defense is analogous to its state prior to the 9/11 attacks, and therefore the risk posed by an sUAS attack is currently high. However, the lessons of 9/11 for adapting air defense to a new class of threat provides a model to prepare for the threat of sUAS before an attack occurs.

Text:  The beginning of the twenty first century has seen rapid development of small unmanned aerial systems (sUAS). Violent extremist organizations and others with malign intent have already demonstrated the threat posed by sUAS in attacks overseas. Though a successful attack has not yet occurred in North America, current limitations of the North American air defense system suggest that chances of defeating one when it does occur are very low. However, the hard lessons of the 9/11 attacks provide a model for proactive measures that will enable effective defense if an sUAS attack occurs in North America.

The first documented non-state use of an sUAS as an improvised explosive device (IED) in an attack was by Hezbollah in 2006[1]. More recently, Houthi fighters in Yemen have used sUAS to damage radar systems[2], and the Islamic State and other groups have used sUAS to drop small explosives on forces on the ground, at one point even resulting in the halt of a U.S. ground force advance on Mosul[3]. Rebels in Ukraine used an sUAS to destroy an arms depot resulting in damage that has been estimated as high as a billion dollars[4]. The first documented fatalities from sUAS attacks occurred in 2016 when two Kurdish fighters were killed, and two members of French special operations forces were wounded by an sUAS-based IED[5]. There are also reports from as far back as 2014 of fatal non-state sUAS attacks[6].

The proven lethal potential of sUAS attacks is not limited to far off battlefields. sUAS attacks on North America have already been foiled by intelligence and law enforcement organizations in 2011 and 2015, and gaps in security were demonstrated when an sUAS was inadvertently flow over the White House in January of 2015[7]. Even more alarming incidents have taken place in Europe and Japan, including a 2013 demonstration against German Chancellor Angela Merkel where an sUAS was flown onto the stage where she was speaking[8]. Another bizarre incident found an sUAS on the roof of the Prime Minister of Japan’s house that was “marked with radioactive symbols, carried a plastic bottle with unidentifiable contents, and registered trace levels of radiation[9].

Systems are currently available that can provide point defense against sUAS for a small area for a limited time. These systems are effective for some military applications overseas as well as providing limited point defense for specific events and facilities in North America. However, a point defense approach is not effective for extending the existing air defense system of North America to include wide area defense against sUAS. This lack of effectiveness is because the current North American air defense system was originally designed to defend against state actors and was updated in the aftermath of 9/11 to defend against manned aircraft attacks that originate from within the U.S.. Though the current system is not postured to provide effective wide area defense against sUAS, the changes that were made just after 9/11 provide a model for urgently needed changes.

Immediately following the 9/11 attacks, North American air defense was adapted in three main ways: increased domain awareness, interagency coordination, and additional defeat measures. Immediately post-9/11, NORAD & NORTHCOM gained access to interior Federal Aviation Administration (FAA) radars and radios which enabled the domain awareness capabilities that were lacking on 9/11. Interagency coordination tactics, techniques, and procedures were developed so that the FAA could notify air defense tactical units within seconds of detection of concerning flight behavior. Finally, a widespread constellation of alert aircraft and other defeat measures was established that would enable persistent timely response to any event in the national airspace. The net result of the post-9/11 changes to air defense was not to eliminate the risk entirely of a successful air attack, but to mitigate that risk to an acceptable level.

These post-9/11 measures are effective for mitigating the risk of the last attack, but they will not be for the next. The legacy radar systems providing surveillance for air defense were designed to detect manned aircraft at typical transit altitudes and are not well suited to targets that are small, slow, and low in altitude. The federal air traffic management procedures that form the basis of effective interagency coordination aren’t yet in place for sUAS. Though simple restrictions on operating areas exist, the lack of a comprehensive sUAS traffic management plan means that the FAA does not have the tools that would enable timely notification of suspicious sUAS activity. Finally, existing alert bases and response options assume that targets will be moving on manned aircraft scales, measured in hundreds of miles, which means that the existing constellation of alert bases and response postures are well situated to defend major population centers and critical assets from manned aircraft. sUAS operate on scales that render this existing approach ineffective, both in terms of the times and distances required to make an intercept, but also in terms of the size of the aircraft, which are very difficult for manned pilots to acquire with onboard systems, and almost impossible to visually acquire while traveling as much as ten times faster than the target.

Without effective domain awareness, interagency coordination, or defeat measures, relative to sUAS, North American air defense is in a state analogous to pre-9/11. Fortunately, the lessons learned on 9/11 provide a model of what is now required to anticipate the next attack, though the details will be different. The unique characteristics of sUAS suggest that sensor coverage volumes may not need to be as comprehensive as they are above 18,000 feet, and existing and emerging sensors can be augmented with sophisticated data analysis to better report sUAS detections that today are dismissed as radar noise. The framework for broad interagency coordination exists today, but lacks specific tactics, techniques, and procedures tailored to communicating an unfolding sUAS threat. The decreased ranges of sUAS potentially enable much better target envelope predictions which translates to much more tightly focused interagency coordination and rapid, targeted risk mitigation for any threat. Modest hardening and warning-based shelter-in-place or evacuation can provide a much larger measure of risk mitigation than they can against a hijacked airliner or cruise missile, which likely reduces the need for exquisite defeat mechanisms.

Though the existing North American air defense system is not well position to defeat an sUAS attack, the lessons of 9/11 suggest that adaptation of our current system to mitigate risk of sUAS attack may be closer we think. There are near term opportunities to weave a tailored blend of increased domain awareness, interagency coordination, and defeat measures to enable risk mitigation specific to the threat of a small sUAS. The only question now is whether this adaptation takes place before, or after, the first sUAS attack in the homeland.


Endnotes:

[1] Ash Rossiter, Drone Usage by Militant Groups: Exploring Variation in Adoption, Defense & Security Analysis 34, no. 2 (April 3, 2018): 116, https://doi.org/10.1080/14751798.2018.1478183.

[2] Ibid, 116.

[3] Ibid, 117.

[4] Ibid, 117.

[5] Ibid, 116.

[6] Ibid, 117.

[7] Ryan Wallace and Jon Loffi, Eamining Unmanned Aerial System Threats & Defenses: A Conceptual Analysis, International Journal of Aviation, Aeronautics, and Aerospace, 2015, 1, https://doi.org/10.15394/ijaaa.2015.1084.

[8] Ibid, 1.

[9]Ibid, 2.

Assessment Papers Homeland Defense Peter L. Hickman United States Unmanned Systems

An Assessment of U.S. Leadership Potential in Asia via the Trans-Pacific Partnership

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Dr. Heather Marie Stur is professor of history at the University of Southern Mississippi and fellow in the Dale Center for the Study of War & Society. She is the author of several books, including Saigon at War: South Vietnam and the Global Sixties (Cambridge 2020 forthcoming), The U.S. Military and Civil Rights Since World War II (Praeger/ABC-CLIO 2019), and Beyond Combat: Women and Gender in the Vietnam War Era (Cambridge 2011). Her articles have appeared in various publications including the New York Times, Washington Post, National Interest, War on the Rocks, Diplomatic History, and War & Society. Stur was a 2013-14 Fulbright Scholar in Vietnam, where she was a professor in the Faculty of International Relations at the University of Social Sciences and Humanities in Ho Chi Minh City. She can be found on Twitter @HeatherMStur. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of U.S. Leadership Potential in Asia via the Trans-Pacific Partnership

Date Originally Written:  April 15, 2020.

Date Originally Published:  May 11, 2020.

Author and / or Article Point of View:  The author is a diplomatic and military historian who is interested in U.S. history in a global context. The author is interested in the strengths and limitations of international alliances to address issues of global security.

Summary:  The Trans-Pacific Partnership (TPP) enables the U.S. to assert leadership in the Asia-Pacific region. Although U.S. President Donald Trump withdrew the U.S. from the TPP, he indicated in 2018 that he would consider returning to the alliance. Regional tensions make this a favorable time for the U.S. to enter the TPP as a way to challenge China’s dominance.

Text:  As 2019 drew to a close, leaders from China, Japan, and South Korea met to discuss strengthening trade and security ties. But the COVID-19 pandemic has slowed the development of closer regional relations and has created a chance for the U.S. to assert economic leadership in Asia. The U.S. vehicle for doing this is the Trans-Pacific Partnership. The TPP’s origins go back to 2008, when talks between several Asia-Pacific countries eventually brought the U.S., Mexico, Canada, Peru, Chile, Australia, New Zealand, Japan, Vietnam, Brunei, Malaysia, and Singapore together in a proposed sweeping trade agreement aimed at strengthening relations among the member countries and limiting China’s economic influence. Former U.S. President Barack Obama saw the TPP as the centerpiece of his foreign policy “pivot” to Asia[1]. Yet President Donald Trump rejected the agreement, asserting that the U.S. could make better trade deals working on its own[2].

Trump was not the TPP’s only opponent. Critics of the agreement have decried the secret negotiations that shaped it and have argued that the TPP favors corporations over labor[3]. After Trump withdrew the U.S. from the deal, the remaining 11 members forged ahead, renaming the agreement the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP). In March 2018, Trump attempted to put his “go-it-alone” strategy into practice, announcing that the U.S. would levy new tariffs on Chinese imports, but in December 2019, he back-pedaled, declaring that not only would the U.S. not impose new tariffs on Chinese goods, it would also lower existing ones[4]. With U.S.-China trade relations in flux and COVID-19 threatening the global economy the U.S. could reconsider its exit from the TPP.

The TPP offers a framework in which the U.S. can assert itself as a leader in the Asia-Pacific region, a primary reason for Obama’s support of the deal. The agreement isn’t just about trade; it’s about international rules of engagement in areas including intellectual property, labor relations, the environment, and human rights. U.S. leaders have been particularly concerned about Chinese theft of American intellectual property (IP), which was one of the motivations behind Trump’s 2018 tariffs. Protecting US IP was also a priority for the Obama administration, and American negotiators pushed for strong IP protections in the original TPP contract[5]. With the U.S. at the helm of an alliance that would cover about 800 million people and 40 percent of the global economic output, the Trump administration could shape and even make the rules. Returning to the TPP now wouldn’t be a radical move for Trump. In April 2018, he suggested that he would consider returning the U.S. to the alliance.

Joining the TPP would also allow the U.S. to capitalize on regional discord. Despite a December 2019 meeting in Chengdu that brought together Japanese Prime Minister Shinzo Abe, Chinese Premier Li Keqiang, and South Korean President Moon Jae-in to discuss regional stability and shared concerns, Japan is using the COVID-19 pandemic as an opportunity to reduce its economic dependence on China. The Japanese government’s pandemic stimulus package includes more than $2 million USD for companies that move production out of China[6]. Vietnam and China have a contentious relationship that dates back nearly two millennia. One of Vietnam’s most famous legends is that of the Trung sisters, who led a successful rebellion against Chinese control of Vietnam in the year 40 and subsequently ruled their country for three years. Earlier this year, Vietnamese defense officials published a white paper that indicated Vietnam’s desire to build closer ties with the U.S. while drifting away from the Chinese orbit[7]. Japan, Vietnam, and the U.S. are among China’s largest trading partners, and all three were members of the talks that produced the original TPP. A restored alliance that includes the U.S. could modify its terms of agreement to respond to current regional and global phenomena.

Among those phenomena are wild game farming and pandemic preparedness. The wild game industry in China involves the farming of animals such as bats, pangolins, and peacocks, which are then sold for human consumption in wet markets throughout the country. The practice has been at the center of two global health crises, the SARS outbreak that began in 2002 and the current COVID-19 pandemic. A U.S.-led TPP could put economic pressure on the Chinese government to shut down the wild game industry and regulate wet markets more rigorously to uphold internationally-accepted hygiene and food safety standards.

If and when another pandemic occurs, the U.S. will need to be more prepared than it was for COVID-19. Some economists have indicated that Trump’s tariffs on Chinese products caused shortages in the U.S. of ventilators, masks, and other medical equipment that are made in China[8]. A renewed TPP contract could include provisions for the manufacture and sale of medical supplies by member nations.


Endnotes:

[1] McBride, James and Chatzky, Andrew. (2019, January 4). “What is the Trans-Pacific Partnership (TPP)?” Council on Foreign Relations. Retrieved April 14, 2020, from https://www.cfr.org/backgrounder/what-trans-pacific-partnership-tpp

[2] Dwyer, Colin. (2018, March 8). “The TPP is Dead. Long Live the Trans-Pacific Trade Deal,” National Public Radio. Retrieved April 14, 2020, from https://www.npr.org/sections/thetwo-way/2018/03/08/591549744/the-tpp-is-dead-long-live-the-trans-pacific-trade-deal

[3] BBC News. (2017, January 23). “TPP: What is it and why does it matter?” Retrieved April 14, 2020, from https://www.bbc.com/news/business-32498715

[4] Franck, Thomas. (2019, December 13). “Trump halts new China tariffs and rolls back some of the prior duties on $120 billion of imports,” CNBC. Retrieved April 14, 2020, from https://www.cnbc.com/2019/12/13/trump-says-25percent-tariffs-will-remain-but-new-china-duties-will-not-take-effect-sunday.html

[5] Baker McKenzie. (2018, April 22). “Reconsidering the Trans-Pacific Partnership and Impact on Intellectual Property.” Retrieved April 14, 2020, from https://www.bakermckenzie.com/en/insight/publications/2018/04/reconsidering-the-tpp-and-impact-on-ip

[6] Reynolds, Isabel and Urabe, Emi. (2020, April 8). “Japan to Fund Firms to Shift Production Out of China.” Retrieved April 14, 2020, from https://www.bloomberg.com/news/articles/2020-04-08/japan-to-fund-firms-to-shift-production-out-of-china

[7] Kurlantzick, Joshua. (2020, January 30). “Vietnam, Under Increasing Pressure From China, Mulls a Shift Into America’s Orbit.” Retrieved on April 14, 2020, from https://www.worldpoliticsreview.com/articles/28502/as-china-vietnam-relations-deteriorate-hanoi-mulls-closer-ties-with-the-u-s

[8] The World. (2020, March 23). “Trump’s China tariffs hampered U.S. coronavirus preparedness, expert says.” Retrieved on April 14, 2020, from https://www.pri.org/stories/2020-03-23/trumps-china-tariffs-hampered-us-coronavirus-preparedness-expert-says

2020 - Contest: PRC Below Threshold Writing Contest Assessment Papers China (People's Republic of China) Dr. Heather Marie Stur Economic Factors United States

Assessing COVID-19’s Impact on the Philippines in the Context of Great Power Competition

Hugh Harsono is currently serving as an Officer in the United States Army. He writes regularly for multiple publications about cyberspace, economics, foreign affairs, and technology. He can be found on LinkedIn @HughHarsono. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group. 


Title:  Assessing COVID-19’s Impact on the Philippines in the Context of Great Power Competition

Date Originally Written:  April 20, 2020.

Date Originally Published:  May 6, 2020.

Author and / or Article Point of View:  The author believes that the Philippines are important to U.S. national security efforts and is concerned that China will use the COVID-19 pandemic as a way to further exacerbate U.S.-Philippine relations.

Summary:  The Philippines is currently at a pivotal crossroads, with the coronavirus hastening the Philippines’ decision to choose a strategic partner in light of actions by Philippine President Duterte. Choosing between a historic relationship with the United States or a newer one with either China or Russia, the Philippines’ actions in the immediate future will set the stage for world history.

Text:  The spread of the coronavirus (COVID-19) has placed the Philippines at a critical point in history in terms of Great Power Competition. Through a variety of extraneous factors, the COVID-19 pandemic has hastened the Philippines’ decision to choose between its close historic relationships with America and a potentially prosperous economic future with its more regionally-aligned Chinese and Russian neighbors. Through careful analysis, readers will be able to understand how and why this sole event has forced the Philippines to this point in history, with this pivotal time potentially shaping the future of Asia for the next millennia.

The Philippines and the United States share a myriad of close ties, many of them deeply rooted in both nation’s histories. For example, the Philippines and America enjoy very close military bonds. In fact, the Armed Forces of the Philippines’s force structure closely mirrors that of America’s, to include similar civilian control mechanisms providing oversight over military actions, in addition to existing close relationships between the Philippine and United States’ Military Academies[1]. These relationships are further strengthened through events such as annual bilaterally-led Balikatan exercises, combined with a myriad of episodic engagements to include military Joint Combined Exchange Training, Balance Pistons[2], law-enforcement oriented Badge Pistons[3], counter-narcotics Baker Pistons[4], and regular civil-military events[5]. The Philippines and the United States’ close relationships have even extended into the cultural realm, with a mutual shared love of fast food, basketball, and American pop culture[6]. These factors, combined with the Filipino diaspora in the West and high rates of positive perceptions of America in the Philippines[7], showcase the close bonds between the Philippines and America.

However, since his election in May 2016, Filipino President Duterte has made it a point to form increasingly close relationships with China. Just several months after his election in October 2016, President Duterte announced a “separation” from the United States, with his trade secretary simultaneously announcing over $13 billion dollars of trade deals[8]. President Duterte has also regularly supported China’s Belt and Road Initiative (BRI) development project, going so far as to court Chinese tourists to the point where mainland Chinese tourists account for the Philippines’ second-largest source of tourist arrivals, with a 41% increase from 2018 to 2019 and a projected 30% average growth by 2022[9]. Additionally, China’s seizure of the Scarborough Shoal in 2012 has so far gone uncontested during President Duterte’s reign, to the point where China is developing military facilities on Scarborough Shoal, among other areas in the South China Sea[10]. This pursuance of Chinese military favor through inaction has also paid off for President Duterte, with China supplying the Philippines with aid ranging from rifles in October 2017 to boats and rocket launchers in July 2018[11][12], and even a state-of-the-art surveillance system in November 2019[13], culminating recently in the first-ever Philippines/Chinese joint maritime exercise in January 2020[14].

On a similar note, President Duterte has also sought closer ties between the Philippines and Russia. In October 2019, the Philippines and Russia signed several business agreements focused on infrastructure development, agriculture, and even nuclear power plant growth[15]. On the military front, Russia has so far made a landmark donation of weapons and equipment to the Philippines through two military deals in October 2017[16], with an additional promise of further equipment procurement in September 2019[17]. These landmark military procurement efforts have also been seen in military cooperation through the posting of respective defense attachés to both nations’ capitals, marking a new era of defense cooperation[18].

Despite being able to effectively balance between supporting historic partnerships with the United States and its new ones with China and Russia, the Philippines has now been forced to choose between the three due to implications stemming from the coronavirus. While President Duterte announced his decision to pursue “separation” from the United States in October 2016, the announcement of the revocation of the Visiting Forces Agreement (VFA) between America and the Philippines was not made until February 2020, with an effective termination date of August 2020[19]. Under normal conditions, this revocation would allow the United States a total of six months to plan for full retrograde of personnel and equipment from the Philippines. However, the coronavirus has hastened this process, with an emphasis on force protection measures and a tightening of international and local travel restrictions throughout the Philippines[20]. As a result, this revocation opens immense opportunities for both China and Russia, particularly as these developing bi-lateral security pacts become an increasing reality.

The preceding is where the Philippines become a primary pivotal point in terms of Great Power Competition. The Philippines has enjoyed a long-standing and stable relationship with the West with America being a stabilizing regional guarantor, a fact highlighted in the chaotic aftermath of the American withdrawal from the Philippines in the 1990s[21]. At the same time, many other nations are looking at the Philippines as a test ground of China’s BRI, particularly amidst allegations of predatory lending and “debt-trap diplomacy[22] [23].” On the same note, others see the Philippines as being the key to forging a free trade agreement between the Russian-centric Eurasian Economic Union and the Association of South East Asian Nations community, further showcasing the critical importance of the Philippines at this pivotal time in history[24].

There is no question that multi-domain partnerships will a play important role for the Philippines to select a future strategic partner. America’s historic relationships and nuanced expertise in security programming create a strong choice for the United States as a strategic partner. However, economic and matériel promise by both China and Russia also make these two countries enticing strategic partners, particularly as Filipino financial markets struggle amidst the coronavirus[25]. The world will watch this evolving situation closely, particularly as the Philippines precariously approaches a crossroads in terms of selecting a strategic partner.


Endnotes:

[1] Steffen J. (2015). The Role of the U.S. Military in the Professionalization of the Armed Forces of Liberia (Master’s thesis, U.S. Army Command and General Staff College, Fort Leavenworth, Kansas, United States of America). Retrieved from https://apps.dtic.mil/dtic/tr/fulltext/u2/a623974.pdf

[2] Leuthner, S. & Cabahug, S. (2015). Joint Combined Exchange Training Evaluation Framework: A Crucial Tool in Security Cooperation Assessment (Master’s thesis, Naval Postgraduate School, Monterrey, California, United States of America). Retrieved from https://www.hsdl.org/?view&did=790460

[3] U.S. and Philippine Forces Conduct Joint Training in Negros Occidental. Retrieved April 20, 2020, from https://ph.usembassy.gov/us-and-philippine-forces-conduct-joint-training-in-negros-occidental

[4] Taboada, J. (2019, August 30). Baker Piston 19-2 holds counter-narcotics simulated exercise. Retrieved March 19, 2020, from https://palawan-news.com/baker-piston-19-2-holds-counter-narcotics-simulated-exercise

[5] U.S. and Philippine Service Members Jointly Volunteer at Day Care. Retrieved April 19, 2020, from https://ph.usembassy.gov/us-and-philippine-service-members-jointly-volunteer-at-day-care

[6] Meyers, J. (2019, October 29). Ties between the U.S. and Philippines run deep. It won’t be easy for Rodrigo Duterte to unravel them. Retrieved April 15, 2020, from https://www.latimes.com/world/asia/la-fg-us-philippines-explainer-20161031-story.html

[7] Poushter, J. & Bishop, C. (2017, September 21). People in the Philippines Still Favor U.S. Over China, but Gap Is Narrowing. Retrieved April 19, 2020, from https://www.pewresearch.org/global/2017/09/21/people-in-the-philippines-still-favor-u-s-over-china-but-gap-is-narrowing

[8] Reuters (2016). Duterte: Philippines is separating from US and realigning with China. Retrieved April 15, 2020, from https://www.theguardian.com/world/2016/oct/20/china-philippines-resume-dialogue-south-china-sea-dispute

[9] Xinhua. Philippines expects to attract 4 mln Chinese tourists annually by end of 2022. Retrieved April 20, 2020, from http://www.xinhuanet.com/english/2019-12/20/c_138646442.htm

[10] CIMSEC (2020). China’s Military Modernization Is Becoming A Real Problem For America. Retrieved April 19, 2020, from https://nationalinterest.org/blog/buzz/chinas-military-modernization-becoming-real-problem-america-138537

[11] Zheng, S. (2017, October 5). China arms Philippine police for counterterrorism mission. Retrieved April 19, 2020, from https://www.scmp.com/news/china/diplomacy-defence/article/2114152/china-arms-philippine-police-counterterrorism-mission

[12] Reuters. (2018, July 30). China donates small boats and RPG launders to Philippines. Retrieved April 19, 2020, from https://www.scmp.com/news/asia/diplomacy/article/2157406/china-donates-small-boats-and-rpg-launchers-philippines

[13] CNN. (2019, November 22). DILG launches Chinese CCTV surveillance system in Metro Manila. Retrieved April 19, 2020, from https://cnnphilippines.com/news/2019/11/22/DILG-Chinese-CCTV-Manila-Safe-Philippines.html

[14] Maitem J. (2020, January 15). Philippine, Chinese Coast Guards Stage Joint Drill in South China Sea. Retrieved April 19, 2020, from https://www.benarnews.org/english/news/philippine/coast-guards-joint-drill-01152020135718.html

[15] ABS-CBN News. 2019, October 04). Philippines, Russia ink 10 business agreements. Retrieved April 19, 2020, from https://news.abs-cbn.com/business/10/04/19/philippines-russia-ink-10-business-agreements

[16] Mogato, M. (2017, October 25). Philippines, Russia sign two military deals. Retrieved April 19, 2020, from https://www.reuters.com/article/us-philippines-russia-defence/philippines-russia-sign-two-military-deals-idUSKBN1CU1K6

[17] Simes, D. (2019, November 4). Why Russia is arming a longtime US ally in Asia. Retrieved April 19, 2020, from https://www.ozy.com/around-the-world/why-is-russia-arming-a-long-time-u-s-ally-in-asia/220634

[18] Russia posts first defense attaché to Philippines. Retrieved April 20, 2020, from http://www.xinhuanet.com/english/2019-09/04/c_138365216.htm

[19] Esguerra, D. (2020, February 11). Philippines officially terminates VFA with US. Retrieved April 20, 2020, from https://globalnation.inquirer.net/185186/fwd-breaking-philippines-officially-terminates-vfa-with-us

[20] Santos, A. (2020, March 09). Crossing the Pacific to beat the Philippines’ coronavirus lockdown. Retrieved April 20, 2020, from https://www.aljazeera.com/blogs/asia/2020/03/crossing-pacific-beat-philippines-coronavirus-lockdown-200319022504907.html

[21] Winger, G. (2020, February 06). For want of a visa? Values and Institutions in U.S.-Philippine Relations. Retrieved April 19, 2020, from https://warontherocks.com/2020/02/for-want-of-a-visa-values-and-institutions-in-u-s-philippine-relations

[22] Green, M. (2019, April 25). China’s Debt Diplomacy. Retrieved April 20, 2020, from https://foreignpolicy.com/2019/04/25/chinas-debt-diplomacy

[23] Pandey, A. (2019, September 05). China: A loan shark or the good Samaritan? Retrieved April 19, 2020, from https://www.dw.com/en/china-a-loan-shark-or-the-good-samaritan/a-48671742

[24] Ramani, S. (2017, January 07). The Growing Russia-Philippines Partnership. Retrieved April 19, 2020, from https://thediplomat.com/2017/01/the-growing-russia-philippines-partnership

[25] Tu, L. & Sayson, I. (2020, March 17). Philippines becomes first country to shut financial markets thanks to virus. Retrieved April 20, 2020, from https://www.bloomberg.com/news/articles/2020-03-16/philippines-shuts-financial-markets-after-virus-spurs-stock-rout

Assessment Papers China (People's Republic of China) Competition COVID-19 Great Powers & Super Powers Hugh Harsono Philippines United States

Assessing the Kettlebell One Arm Long Cycle for the U.S. Army Physical Fitness Test

J David Thompson is a U.S. Army Civil Affairs Major. He has a Juris Doctorate from Washington Lee University School of Law. He also holds a BS in Economics and MBA-Leadership from Liberty University. Outside the military, he’s worked at the UN Refugee Agency, Department of Defense, and Physicians for Human Rights – Israel. He holds a basic kettlebell certification and two national ranks in kettlebell sport. Look him up at www.jdavidthompson.com or follow him on Twitter @jdthompson910. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Kettlebell One Arm Long Cycle for the U.S. Army Physical Fitness Test

Date Originally Written:  November 1, 2019.

Date Originally Published:  April 27, 2020.

Summary:  The U.S. Army Physical Fitness Test (APFT) inaccurately measures fitness. The Army Combat Fitness Test (ACFT) is better, but transition to the ACFT has been slowed due to units not receiving equipment and the COVID-19 virus pandemic delaying soldiers’ ability to properly train. The kettlebell one arm long cycle (OALC) is a much better of measure of fitness than the APFT and less resource intensive than the ACFT.

Text:  The Army correctly determined that the APFT was an inaccurate measure of fitness. The APFT—consisting of two minutes of push-ups, sit-ups, and a 2-mile run—failed to test a soldier’s ability to perform the job in a combat environment. The ACFT does a good job at measuring a soldier’s fitness levels. The ACFT includes: three repetition maximum deadlift, standing power throw, hand release push-ups with arm extension, sprint drag carry, leg tucks, and a 2-mile run. Compared to the APFT, the ACFT is a much better measure of fitness.

The benefit of the APFT, though, was that it required no equipment. A soldier in an austere environment could work on push-ups and sit-ups. The ACFT requires a lot of equipment—hex bars, bumper plates, kettlebells, cones, sleds, and medicine balls. Many units still do not have the equipment to test, and soldiers cannot adequately train without access to a gym. The ACFT requires a lot of time to set-up, test, and tear down.

Somewhere between the validity and equipment extremes of the APFT and ACFT the Army could find a balance. The one arm long cycle (OALC) is simple, effective, and only requires a kettlebell. The OALC measures strength, endurance, and stamina. An OALC physical fitness test could easily take less than thirty minutes for an entire unit to administer.

The proposed test is ten minutes of OALC. To start the test, the participant stands behind the kettlebell. At the command “GO,” the participant cleans the kettlebell from the ground to the chest (the rack position). The participant then launches the kettlebell overhead as part of the “jerk” phase of the lift. The grader counts the repetition once the kettlebell is motionless, fixated overhead, and the participant has knees, hips, and elbow generally straight[1].

After the jerk, the participant returns the kettlebell to the rack position. Participants must re-clean the kettlebell between each jerk. Participants may change hands as many times as desired using a one-handed swing, but participants may not set the kettlebell down for the duration of the test. If the participant sets the kettlebell down, the grader must terminate the test.

The scoring system uses a power-to-weight ratio, enabling soldiers to accurately measure fitness despite bodyweight and size. A power-to-weight ratio incentivizes strength, endurance, and a healthy bodyweight. To calculate score, multiply the kettlebell weight in kilograms by the number of repetitions performed, then divide the product by the individual’s bodyweight in kilograms.

Score = (weight of kettlebell in kilograms x repetitions performed) / bodyweight in kilograms. Males use a 24 kilogram kettlebell. Women use a 16 kilogram kettlebell.

For example, a male Soldier that weighs 90 kilograms performs 100 repetitions in ten minutes scores 26.67. A male Soldier weighing 100 kilogram would have to perform 112 repetitions to match the score. A female Soldier weighing 65 kilograms would have to perform 109 repetitions to equal the 90 kilogram male Soldier’s score.

The minimum score for the test would be 20. The maximum score would be between 30 and 35. Final scoring standards come after a period of testing. The Army could even have different standards based on job requirements.

Not all kettlebells are created equal. To institutionalize this test the Army would need a standardized kettlebell to ensure a standardized test. Kettlebells generally come in two styles: cast iron or steel. Cast iron kettlebells are what most people probably know. They come in various sizes depending on weight and manufacturer. The grips of them vary depending on manufacturer. Steel kettlebells are used for kettlebell sport. These competition style kettlebells are the same size regardless of weight, and the handles are either 33mm or 35mm. One way to ensure the Army has a standardized test is to use a sole manufacturer. The other way is to purchase competition kettlebells.

To field the equipment to units and Soldiers, the Army would provide one kettlebell to soldiers as part of a basic issue. For those currently in the Army, the Army has several options to ensure units receive kettlebells. The quickest and most cost-efficient process may be to have units purchase kettlebells by providing a link (or links) of approved manufacturers (for example: Kettlebell Kings, Kettlebells USA, Rogue Fitness, etc.). Giving each soldier a kettlebell as part of his/her standard issue ensures the soldier has the resources to train for the fitness test. It also gives the soldiers a portable gym because the kettlebell can be used for a variety of exercises.

The Army correctly identified that the APFT did not adequately test a soldier’s physical fitness to meet current and future demands. The ACFT is a much better measure of fitness than the APFT, but it is very resource intensive. The proposed OALC fitness test gives the Army a measure of fitness that far surpasses the APFT and requires less equipment (and time) than the ACFT. The proposed scoring standard uses a power-to-weight ratio, incentivizing a well-rounded approach to health and fitness. As a personal observation, the author is currently deployed in a remote area. The author would not be able to take the ACFT in this deployed environment. The author did administer the proposed fitness test to other soldiers present. All participants found the test challenging and fun while recommending it as a standardized test with appropriate training.

Should the Army accept this proposed test, initial testing could take a period of a couple months. Using commercially available kettlebells enables the Army to implement the test Army-wide quickly and efficiently. Kettlebells provide a fun, dynamic way to exercise. They could also create a fitter military.


Endnotes:

[1] One Arm Long Cycle, Mike Stefano, July 5, 2020, retrieved from https://www.youtube.com/watch?v=a5VdP0F-dtQ

 

Assessment Papers Capacity / Capability Enhancement J David Thompson United States

Assessing the Effect of Military Aid on Both Donor and Receiver

Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He can be found on Twitter @DAOlawuyi.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing the Effect of Military Aid on Both Donor and Receiver

Date Originally Written:  April 4, 2020.

Date Originally Published:  April 13, 2020.

Author and / or Article Point of View:  The author maintains a keen interest in the geopolitical implications of conflicts and alliances. The author believes that any assistance towards parties in conflict must be bound in an overarching strategic framework that allows both donor and receiver achieve their aims.

Summary:  Military aid is a significant part of any foreign diplomatic effort. While aid, properly constructed, can provide significant advantages for all parties involved, the failure of such a policy will result in serious political repercussions for both sides beyond the ceasing of such transfers.

Text:  Ever since nations have been established, they have supported allies in prosecuting armed conflict, including fighting interstate conflict, terrorism, and counter-insurgencies[1]. The Egyptian-Hittite treaty is the first treaty of which both sides’ independent copies have survived. The treaty spoke to providing aid in case of attacks on either party[2]. While the treaty was between adversaries, it aligned the interests of both parties in putting down external military threats and stabilizing their internal jurisdictions.

Military aid takes various forms, often tailored to meet the perceived needs of the receiver as well as strategic considerations guiding the relationships. One form of military aid is the provision of men and firepower for direct combat like the Russian intervention in Syria[3]. Donor countries may provide instructors and advisers like the Military Assistance Advisory Groups that operated around the world during the Cold War[4]. Donors will also sell weapons and the instruct allies in their employment, managed in the United States by the Defense Security Cooperation Agency under its Foreign Military Sales program[5].

The deployment of military aid allows donors to show support to allies and deter aggressive behavior from adversaries. As part of its diplomatic strategy, aid will allow the sponsor to deepen personal and institutional bonds with the recipient. Industries can develop overseas markets via follow-on contracts and opening of the recipient’s markets to trade. The donor can fine tune doctrines, test equipment, and prepare personnel for future military campaigns[6][7]. By exhibiting the lethality and reliability of its weapons, the donor can attract sales from other countries looking to expand their military capacities and capabilities. The threat of withholding aid may be used to shape the behavior of receiver countries[8]. Finally, the donor may leverage the platform of the recipient to project power and influence in the recipient’s region.

The recipient gains access to military capabilities often beyond the ability of local industries to manufacture. By leveraging relationships with allies, those capabilities can be obtained at favorable conditions not available to others. This access to top level technology may also enable the recipient jumpstart local industries to meet civil and military needs. Exposure to military training and expertise from first rate armies will allow the beneficiary military to professionalize faster than organic capacity will permit. The presence of a patron will result in more freedom of action for operations while curtailing the ability of their adversaries to act without risking escalation.

However, the provision of military aid may result in adverse consequences. The Athenian support for the Ionian Revolt precipitated the 50-year Greco-Persian War[9]. Aid may encourage unproductive behavior in the recipient, especially by prolonging the conflict. Once aid is passed to the beneficiary, there is limited donor control over its use, resulting in potential exposure of the benefactor to accusations of enabling war crimes[10]. There is no certainty that the aid will result in a favorable outcome for the recipient[11] and the fall of the ally may result in sensitive technology passing into hands of adversaries[12].

Ultimately, foreign military aid type, size, and duration, requires constant critiquing. Military aid, for both the donor and receiver, is a crucial extension of defense and diplomatic policies. The consequences of a failed aid policy will exert political costs far beyond currency figures. It is crucial that political leaders are made aware of the multiple options available to them in deciding what is sent, who it is sent to and how it is sent.


Endnotes:

[1] Shah, A. (2010, May 3). Military Aid. Retrieved April 2, 2020 from
https://www.globalissues.org/article/785/military-aid

[2] Bryce, T. (2006). The Eternal Treaty from the Hittite perspective. Retrieved April 2, 2020 from https://espace.library.uq.edu.au/data/UQ_263207/UQ263207_OA.pdf

[3] O’Connor, T. (2018, August 23). How many Russian Troops in Syria? Military reveals full count as U.S. told to leave. Retrieved April 3, 2020 from
https://www.newsweek.com/how-many-russia-troops-syria-military-reveals-full-count-us-told-leave-1088409

[4] Liebman, O., Midkiff, J. and Minor, M. (1963). Preliminary Inventory of the Records of Interservice Agencies. Retrieved April 3, 2020 from
https://www.archives.gov/research/guide-fed-records/groups/334.html

[5] Defense Security Cooperation Agency. Foreign Military Sales. Retrieved April 3, 2020 from
https://www.dsca.mil/programs/foreign-military-sales-fms

[6] Musciano, W. (2004, September). Spanish Civil War: German Condor Legion’s Tactical Air Power. Retrieved April 3, 2020 from
https://www.historynet.com/spanish-civil-war-german-condor-legions-tactical-air-power.htm

[7] Oppenheimer, P. (1986). From the Spanish Civil War to the Fall of France: Luftwaffe Lessons Learned and Applied. Retrieved April 3, 2020 from
http://www.ihr.org/jhr/v07/v07p133_Oppenheimer.html

[8] Shah, S., Entous, A., Lubold, G. (2015, August 21). U.S. Threatens to Withhold Pakistan Aid. Retrieved April 4, 2020 from
https://www.wsj.com/articles/u-s-threatens-to-withhold-pakistan-aid-1440163925

[9] White, M. (2011, November). The Great Big Book of Horrible Things: The Definite Chronicles of History’s 100 Worst Atrocities.

[10] Hathaway, O., Haviland, A. Kethireddy, S., Francis, A., Yamamoto, A. (2018, March 7). The Legality of U.S. Arms Sales to Saudi Arabia for Use in Yemen. Retrieved April 4, 2020 from https://www.justsecurity.org/53449/u-s-arms-sales-saudi-arabia-yemen

[11] Cohen, R. (1988, April 22). The Soviet’s Vietnam. Retrieved April 4, 2020 from
https://www.washingtonpost.com/archive/opinions/1988/04/22/the-soviets-vietnam/5e7fde43-6a0c-46fb-b678-dbb89bcb720b

[12] Demerly, T. (2019, May 31). The Secret is Out: How Russia Somehow Captured U.S. Fighters (And Tested Them Out. Retrieved April 4, 2020 from
https://nationalinterest.org/blog/buzz/secret-out-how-russia-somehow-captured-us-fighters-and-tested-them-out-60487

Assessment Papers Capacity / Capability Enhancement Damimola Olawuyi

Assessing U.S. Relative Decline

Adam A. Azim is a writer and entrepreneur based in Northern Virginia. His areas of interest include U.S. foreign policy and strategy, as well as political philosophy and theory. He can be found on Twitter @adamazim1988.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing U.S. Relative Decline

Date Originally Written:  March 7, 2020.

Date Originally Published:  March 23, 2020.

Author and / or Article Point of View:  This article is written from an American point of view, in regards to U.S. relative decline vis-à-vis Russia and China.

Summary:  American policy since World War II imposed “world order,” which is fraught with the inability to enforce as well as aspirations exceeding capabilities. As a result, America is entangled in futile Middle Eastern conflicts, plagued with populism and President Trump, faced with the rise of Russia and China, debt, polarization, and public health issues. This situation prompts a paradigm shift from excess militarization to the elevation of national spirit.

Text:  In the early 20th century, a British historian named E.H. Carr made an odd proclamation: “Only the West is in decline.” The author sought to explore this idea by writing a book titled “Is The West in Decline? A Study of World Order and U.S. Relative Decline” published January 2018. This article seeks to summarize the findings of this book by making a few key points.

The United States, as the linchpin of Western civilization after Europe’s collapse in the 20th century, is not going through absolute decline. Rather, the United States is experiencing what Joseph Nye of Harvard University calls “relative decline,” which means other countries are rising as a result of America’s slowdown which can turn around. But the slowdown is yet to be a cause for severe concern. In a short book titled “Is the American Century Over?” Nye conducts an assessment and concludes that the United States is at least fifty years ahead of its nearest competitors in terms of military and economic capabilities.

But there are clear symptoms of American relative decline vis-à-vis other countries. In a number of public lectures, Professor John Mearsheimer of the University of Chicago argues that there are three evident symptoms of American decline: entanglement in Middle Eastern conflicts, the rise of Russia and China, and the emergence of President Donald Trump. In addition to this are three internal symptoms that result from Mearsheimer’s list of external symptoms: the growing national debt, polarization, and a downturn in public health. One can argue that the national debt is the biggest threat to national security. As a result of debt, the United States barely has the capacity to stem the rise of polarization as evinced by problems such as domestic terrorism and health problems such as the recent opioid crisis and the mental health epidemic. When combining these six symptoms, the resulting decline in American power is evident. For example, one of America’s key tasks during the post-World War II period was to keep Europe united within political institutions such as the North Atlantic Treaty Organization and the European Union. These institutions are presently fraying as a result of the United Kingdom leaving the European Union and Britain’s faltering relationship with Germany.

From a big picture perspective, American foreign policy boils down to the fulfillment of one task after it emerged as the world’s foremost power subsequent to World War II, which was the maintenance of what is known as “world order.” During Sir Winston Churchill’s 1946 “Iron Curtain” Speech in Fulton, Missouri, Britain passed the responsibility of managing world affairs to the United States after its empire had severely contracted during the 1940’s. Now, the United States no longer seeks to shoulder the entire burden of maintaining world order. President Donald Trump has made “America First” the main priority of his political agenda. World Order has always been fraught with two permanent conditions. For one, aspirations always exceed capabilities, as noted by Pankaj Mishra in a book titled “The Age of Anger.” Second is the issue of enforcement, as noted by Henry Kissinger in his last book titled “World Order.” It is simply impossible for one nation, despite their capabilities, to enforce law and order on the entire world.

These conditions have led to the failure of liberal democracy as a system that can be imposed on the world.  The result is the United States incurring ongoing costs by defaulting to a realpolitik approach towards Russia and China, and in turn the costs have led to polarization and populism domestically. America is now faced with the option of experimenting with a constructivist foreign policy and a paradigm shift from a militaristic and costly realpolitik approach to a diplomatic approach that brings multiple parties together in the way of a burden-sharing approach to world order. Combined, Europe and East Asia have a higher GDP than America; it would be remiss to not ask these two regions to increase their share of defense spending. America will eventually be forced to advance its security and economic interests to contribute its fair share to world order, while considering a shift from an offensive approach to a defensive approach to national security. Overreach and America’s unnecessary entanglement in Afghanistan, which is considered “The Graveyard of Empires”, has led to the neglect of America’s first ever foreign policy proclamation, namely, “The Monroe Doctrine.” Because of Afghanistan, which Andrew Bacevich has called “a flight of fancy,” Russia and China have found apparent holes in American defense and have penetrated Africa and Latin America to the detriment of America’s hemispheric security.

For a long time, America has traded off a truly free market system, education, and health care for militarization and the imposition of world order. International relations theorists call this “the security dilemma.” John Herz, an international relations theorist, has called it “the absolute predicament and irreducible dilemma,” which is the inability to allocate resources to social welfare due to security concerns. As a result, radical leaders like President Donald Trump and Senator Bernie Sanders who appeal to American pathos are gaining momentum. Europe, Arab Gulf Countries, and East Asia have long prospered from the U.S. security umbrella by enjoying U.S. defense subsidies that enable these regions to invest in human development instead of defense, to the detriment of American citizens. To resolve this “security dilemma,” one must evaluate the main threat, which is not a physical one; rather, the threat is a moral and spiritual one. Baudelaire wrote of the “baseness of men’s hearts” that will lead to what Kierkegaard called “the common plight of man.” From a realist perspective, this threat is relevant. Hans Morgenthau, in “The Politics of Nations,” identified six dimensions of power: military, economic, population, territory, natural resources, and spirit. As long as there is a disproportionate amount of focus on militarization at the expense of national spirit, the United States will not be able to reverse what is known as “relative decline” vis-à-vis Russia and China.


Endnotes:

[1] Azim, A. A. (2018). Is The West In Decline? A Study of World Order and U.S. Relative Decline. Brandylane Publishing. / https://www.amazon.com/Decline-Study-World-Order-Relative/dp/0692967168

Adam A. Azim Assessment Papers Budgets and Resources Competition United States

An Assessment of the Concept of Competition as a Foundation to Military Planning

Jeffrey Alston is a member of the United States Army National Guard and a graduate of the United States Army War College.  He can be found on Twitter @jeffreymalston.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Concept of Competition as a Foundation to Military Planning

Date Originally Written:  February 23, 2020.

Date Originally Published:  March 26, 2020.

Author and / Article Point of View:  The author is a field-grade, maneuver officer with nearly 30 years of commissioned service. The article is written from the point of view of an American strategic analyst viewing the developments in the national security space since the release of the 2017 National Security Strategy.

Summary:  The U.S. Military is overextending its intellectual resources regarding great power competition and is losing its focus on core warfighting concepts. Recent national security documents have codified the great power security environment. The absence of any coherent foreign policy and subsequent strategy, coupled with over reliance on the military as the single foreign policy tool, puts U.S. military planning at a critical juncture.

Text:  Dutifully, the U.S. Armed Services (Services) seized upon the competition task following publication of the 2017 National Security Strategy (NSS) and 2018 National Defense Strategy (NDS) and has-especially at the Joint Staff level-expended considerable effort framing[1] the military aspects of competition. At the same time, the Services are attempting to realize fundamental concepts which embrace the new challenges of a multi-domain environment with the vocabulary of competition seeping into its foundational documents. Without question, a nation’s military makes up part of its power and in the case of the U.S., holds the charge that they fight and persecute the nation’s wars securing victory through its unique capabilities. Logically, it follows then, the expansive idea of competition-at heart an international relations framework- should not be the sole conceptual focus of its military planning.

Seizing upon competition as a framework for structure and employment of the Services is understandable given recent history. The genesis of today’s U.S.’s strategic atrophy coincides with the end of the Cold War. The fall of the Berlin Wall and the collapse of the Soviet Union left America with a sense of winning-if not hubris. The spectacular victory in Desert Shield/Desert Storm clinched this idea of a unipolar moment for the U.S. The promise of the “fog-lifting” Revolution in Military Affairs, the lack of an ideological or near peer competitor and selective military engagements (Bosnia, Somalia, Desert Fox in Iraq / Kuwait, et al) did not place demands for any type of comprehensive national strategy thinking let alone theory development. Operationally, the military was unsurpassed in its capability.

Then the 9/11 attacks occurred and the nation entered the Global War on Terror (GWOT). The opening phases of the campaigns in Iraq and Afghanistan, initially about regime change, were successful. However, lack of a meaningful goals for the successive phases of the GWOT, a lack of sustained, whole of nation effort to conduct the GWOT saw counterinsurgency and counter terrorism tactics elevate to take the place of actual strategy[2]. Simultaneously, debates about the utility of military force in such environments became more frequent in political and scholarship spheres. Frustration with quantifiable or sustainable goals in either campaign began to center on simple timelines and troop levels. Two decades of GWOT was exacerbating this period of strategic atrophy.

The military was not going to give up the initiative as it sought to make lasting impacts in the Afghanistan and Iraq campaigns. The military design movement began to find leverage in the Services as formations struggled to achieve sustainable outcomes in their areas of operations. Design “how-to’s” began to fill the pages of military journals, institutional curricula and be integrated into exercises. Tactical formations were left to seek the best way to leverage their capabilities in the campaigns in Iraq and Afghanistan[3].  Attempting to leverage design was further evidence of an absence of strategy. Design was an awkward and uncomfortable translation into formations which normally are assigned an objective set of mission essential tasks to master and execute.

Enter the 2017 National Security Strategy and 2018 National Defense Strategy and the corresponding concept of great power competition (GPC). Correctly identifying today’s national security realities, strategic competition is-in the context of the current environment-a concept requiring more thought and analysis for it to be a useful national security construct[4]. “Competition,” as a government wide framework, is not encouraging. The U.S. Department of State strategic plan for 2018-2022 mentions the term “competition” three times; the Treasury Department’s equivalent, once. While not an exhaustive review of interdepartmental policy coordination, it stands witness to the lack of whole of nation integration, if not linkage of competition at the national level. In the absence of a definitive “competition” strategy at the national level, the Joint Staff and Services must resist the temptation to unnecessarily militarize GPC.

The NSS and NDS provide the Services a framework to begin their realignment within an environment of GPC. However, as documents such as the Joint Staff’s Competition Continuum[1] frame the role of the Services as a function of competition. This is a mistake. Strategic competition is an environment for the military and is best if it informs broad decisions in the Services’ role of man, train and equip, but not its warfighting approaches. The Continuum document reflects a tremendous amount of intellectual capacity devoted to and carefully considering the aspects of competition: it is thought provoking, but misplaced. The American military would do well to resist, once again, elevating its capabilities to fulfill a strategic gap at the national levels and instead focus on core warfighting abilities and tasks.

The Services are at a crucial stage in the planning and programming for the out years; all with fresh eyes towards their obligations in an era of GPC. The U.S. Army has initiated a well-intentioned intellectual renaissance on large scale combat operations. The U.S. Army and Air Force (and the others) are collaborating and struggling with realizing Multidomain Operations[5]. In reviving and focusing on these ideas, the Services can appropriately complement national power as an element of GPC vice being its foundation. Until workable GPC foreign policy goals are established, acceptable political risks are identified and corresponding national strategies are in place, best would be for the Services to carefully navigate the contours of GPC.

The Joint Doctrine notes mentioned earlier and related documents (ie. Joint Concept for Integrated Campaigning) are not helping in this cognitive framework. Their prominent use of a continuum of conflict[6] as a foundational model conflates national strategy formulation with military campaigning. While these sample documents speak to the role of interagency contributions to competition, recent campaigns make such whole of government intentions suspect. Most notably, the continuum of completion-conflict-competition is fertile ground for obscuring definitive political objectives. A lack of political objectives upends strategy formulation. Combined, this is not the space to expand military planning efforts. Competition is without a doubt, part of the global security environment, but it is a condition of that environment, not a principle of warfighting planning.


Endnotes:

[1] U.S. Department of Defense. (2019). Joint Doctrine Note 1-19, Competition Continuum. Washington, DC. From https://www.jcs.mil/Portals/36/Documents/Doctrine/jdn_jg/jdn1_19.pdf?ver=2019-06-10-113311-233

[2] Stachan, H. (2013). The Direction of War: Contemporary Strategy in Historical Perspective. Cambridge University Press.

[3] Keller, J. (2018, January 22). The 1st SFAB’s Afghan Deployment Is A Moment Of Truth For The Global War On Terror. Retrieved December 12, 2019, from https://taskandpurpose.com/analysis/sfab-train-advise-assist-afghanistan

[4] Wyne, A. (2019, February 11). America’s Blind Ambition Could Make It a Victim of Global Competition. Retrieved February 13, 2020, from https://nationalinterest.org/feature/americas-blind-ambition-could-make-it-victim-global-competition-44227

[5] Air Force, Army Developing Multidomain Doctrine. (2018, January 25). Retrieved January 7, 2020, from https://www.jcs.mil/Media/News/News-Display/Article/1425475/air-force-army-developing-multidomain-doctrine/

[6] U.S. Department of Defense. (2018). Joint Concept for Integrated Campaigning. Washington, DC. p. 8 From https://www.jcs.mil/Portals/36/Documents/Doctrine/concepts/joint_concept_integrated_campaign.pdf?ver=2018-03-28-102833-257

Assessment Papers Competition Defense and Military Reform Great Powers & Super Powers United States

Assessing U.S. Use of Coercive Diplomacy

Assad Raza is an Active Component U.S. Army Civil Affairs Officer with deployment experience throughout the Middle East.  He holds a M.A. in Diplomacy with a concentration in International Conflict Management from Norwich University, and is a graduate of The Western Hemisphere Institute for Security Cooperation Command and General Staff Officer Course at Fort Benning, Georgia.  He can be found on Twitter @assadraza12.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing U.S. Use of Coercive Diplomacy

Date Originally Written:  February 23, 2020.

Date Originally Published:  March 9, 2020.

Author and / or Article Point of View:  The author believes the U.S. should only use coercive diplomacy if the situation is vital to U.S. interests, and the U.S. is prepared to go to war if necessary.

Summary:  U.S. use of coercive diplomacy has conflicting results. The 2018 missile strikes to compel the Syrian regime to stop using chemical weapons on civilians succeeded. The 2020 killing of an Iranian general to compel Iran to stop its aggression in the Middle East failed. To date, North Korea has not abandoned its nuclear program despite U.S. military threats, sanctions, and diplomatic talks.  Coercive diplomacy’s success isn’t guaranteed and it risks escalation.

Text:  Throughout history, the United States has used coercive diplomacy as a diplomatic strategy to influence adversaries’ behaviors. However, the U.S. success rate on the use of this strategy has mixed results. One example is the failed U.S. attempts to persuade the government of Iraq to cease their weapons of mass destruction (WMD) program before the 2003 invasion[3]. A more recent example is the January 2020 U.S. drone strike that killed Iranian General Qassim Soleimani that failed to compel Iran to stop its aggression in the Middle East and provoked their retaliation, which could have quickly escalated to conflict[2]. These two examples highlight the importance of understanding the motives and perceptions of the adversary that can limit the effectiveness of coercive diplomacy.

Coercive diplomacy is the use of military and non-military threats to primarily persuade an adversary to cease a specific action. Former Stanford University political professor, Alexander L. George, defined coercive diplomacy as a “defensive strategy that is employed to deal with the efforts of an adversary to change a status quo situation in his own favor, by persuading the adversary to stop what it is doing or to undo what it had done[3].” A successful example of coercive diplomacy is the 2018 U.S. missile strikes against the Syrian regime to compel them to stop chemical attacks on civilians[4].

When employing coercive diplomacy, the coercing power must have a credible threat for non-compliance. According to Alexander George, “…the military weaker side may be strongly motivated by what is at stake and refuse to back down, in effect calling the bluff of the coercing power[5].” An excellent example of this “calling of bluff” is U.S. President Barack Obama’s threats to use military action on the Syrian regime if they crossed the “red line” by using chemical weapons on civilians. Once Syria crossed this red line, in August 2013, President Obama did not follow through on his threat, thus hurting U.S. credibility[6]. Failing to respond to non-compliance can cause the coercing power to lose credibility and negatively impact how it is perceived internationally as it did not follow through on its military promises.

Additionally, coercive diplomacy can include a mixture of military and non-military threats to influence an adversary’s behavior[7]. Yet, depending on what is at stake, not every actor will respond to these combinations of threats the same. For example, to date, North Korea has not abandoned its nuclear program and ballistic missile testing from the combination of U.S. military threats, sanctions, and diplomatic talks[8]. However, North Korea’s non-compliance may be due to their perceptions of the U.S. views on their nuclear program and the low risk of U.S. military actions based on U.S history towards them over the past 25 years.

One major risk of coercive diplomacy is the difficulty in calculating the adversary’s response. As Robert Art and Patrick Cronin wrote, “… mistakes are easy to make in situations where resolve is hard to estimate. …the coercer often underestimates the targets will to resist. Consequently, the coercer has to apply larger amounts of force, but then it entered the realm of war[9].” Two examples of this type of escalation are the 1999 North Atlantic Treaty Organization’s air campaign due to Serbian non-compliance to stop their persecution of Kosovo Albanians and the 2003 U.S. invasion of Iraq to halt their WMD program. Hence, there are no guarantees that the use of coercive diplomacy will persuade the adversary to stop an action or, worse, the adversary’s miscalculations could escalate the situation.

As mentioned earlier, before employing coercive diplomacy, it is crucial to understand the adversary’s motivations and what is at stake for them. The January 2020 drone strike that killed the Iranian general is an example of the need for understanding motivational factors to calculate an adversary’s response. Iran’s potential loss of credibility within their own country and the region may have driven their retaliatory missile attacks at the two bases in Iraq[10]. Although there were no U.S. fatalities, with the right miscalculations, this retaliation could have escalated past coercive diplomacy to full-on war. This example reveals the risk of employing coercive diplomacy and the difficulties with calculating adversaries’ countermeasures.

In summary, the recent use of U.S. coercive diplomacy has conflicting results. For example, the 2018 missile strikes to compel the Syrian regime to stop using chemical weapons civilians achieved its objectives, but the 2020 drone strike of the Iranian general to compel Iran to stop its aggression in the Middle East did not. Iran’s retaliation demonstrates that weaker states will respond back if they believe their credibility is at stake. Also, the use of coercive diplomacy against North Korea shows the difficulty of changing an adversary’s behavior when their most vital program for survival is at stake. Moreover, coercive diplomacy is only of value if the threat is credible, and the nation is prepared to go to war if necessary. Lastly, coercive diplomacy is a risky strategy as it depends on the adversary’s motivations, and any wrong calculation can escalate the situation to full-on war, as seen with the 2003 invasion of Iraq.


Endnotes:

[1] Jervis, R. (2013). Getting to Yes with Iran: The Challenges of Coercive Diplomacy. Foreign Affairs, 92(1), 105-115. Retrieved February 17, 2020, from www.jstor.org/stable/41721008

[2] Missy Ryan, J. D. (2020, January 4). How Trump decided to kill a top Iranian general. Retrieved February 23, 2020, from https://www.washingtonpost.com/national-security/how-trump-decided-to-kill-a-top-iranian-general/2020/01/03/77ce3cc4-2e62-11ea-bcd4-24597950008f_story.html

[3] Levy, J. (2008). Deterrence and Coercive Diplomacy: The Contributions of Alexander George. Political Psychology, 29(4), 537-552. Retrieved February 17, 2020, from www.jstor.org/stable/20447143

[4] Anne Gearan, M. R. (2018, April 14). U.S. and allies warn Syria of more missile strikes if chemical attacks used again. Retrieved February 2020, from https://www.washingtonpost.com/world/national-security/us-launches-missile-strikes-in-syria/2018/04/13/c68e89d0-3f4a-11e8-974f-aacd97698cef_story.html

[5] George, A. L. (1991). Forceful Persuasion: Coercive Diplomacy as an Alternative to War. Washington, D.C.: United States Institute of Peace Press.

[6] Chollet, D., Glover, J., Greenfield, J., & Glorioso, A. (2016, July 19). Obama’s Red Line, Revisited. Retrieved February 23, 2020, from https://www.politico.com/magazine/story/2016/07/obama-syria-foreign-policy-red-line-revisited-214059

[7] George, A. L. (1991). Forceful persuasion: Coercive Diplomacy as an Alternative to War. Washington, D.C.: United States Institute of Peace Press.

[8] North Korea. (2019, August). Retrieved February 23, 2020, from https://www.nti.org/learn/countries/north-korea

[9] Cronin, P. M., & Art, R. J. (2003). United States and Coercive Diplomacy. Washington, D.C.: United States Inst. of Peace Press.

[10] Bender, B., Zanona, M., Ferris, S., O’Brien, C., Starks, T., & Forgery, Q. (2020, January 7). Iran retaliates with missile attacks on U.S. troop locations in Iraq. Retrieved February 2020, from https://www.politico.com/news/2020/01/07/iran-retaliation-iraq-base-095869

 

Assad Raza Assessment Papers Coercive Diplomacy Diplomacy

An Assessment of Nationalism’s Impact on Security and Stability in Switzerland

Editor’s Note:  This article is the result of a partnership between Divergent Options and a course on nationalism at the George Washington University.


Gracie Jamison is a sophomore at The George Washington University and studies political science and history.  She can be found on Twitter at @grjamison13 and writes for the GW Hatchet, an independent student-run newspaper.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Nationalism’s Impact on Security and Stability in Switzerland

Date Originally Written:  August 6, 2019.

Date Originally Published:  March 2, 2020.

Author and / or Article Point of View:  The author was an exchange student in Switzerland in 2015. The author supports multicultural policies, but believes nationalism is useful in promoting Swiss national unity. The article is written from the point of view of an American observing trends in Switzerland.

Summary:  Swiss citizens feel safer and more secure due to Switzerland’s nationalist policies of mandatory military service and stringent naturalization requirements[1]. The Swiss overcome ethnolinguistic tensions that threaten to divide them through a sense of security allowed by mass military military mobilization and local participation in the naturalization process which supports a key part of Switzerland’s national identity.

Text:  Given Switzerland’s cultural heterogeneity, as exemplified by its four national languages and the diversity of ethnic groups, it would be well to ask how a strong Swiss identity is possible. And yet, not only does a strong Swiss identity exist, with “a common national identity as Swiss over and above their separate linguistic, religious, and cantonal identities,” but evidence shows that Swiss nationalist policies help exert a stabilizing force on the country as a whole and provide an opportunity to realize national strength and unity amidst the variety of ethnicities and cultures[2].

Swiss nationalism consists of several different factors, a particularly dominant one being a strong political culture, as Switzerland is rooted in shared political spirit and belief in common ideals rather than cultural similarities. While a country based upon political will and a desire to achieve a common civic vision may seem fragile, it has united a remarkable number of diverse language, cultural, and ethnic groups throughout Swiss history and provides a helpful model of civic nationalism for other diverse nations.

Nationalist policies in Switzerland have pursued this common vision and balanced the conflicting identities through several mechanisms, but mandatory military service, starting around age 20 for men as well as women who choose to join, is perhaps the most successful. While the forced requirement to join an institution could very easily lead to resentment and protest, a staggeringly high percentage of Swiss citizens support the continuation of mandatory service[3]. Perhaps even more revealing is the amount of young people, the very demographic required to join the institution itself, who support the military–nearly eight in ten respondents reported positive feelings toward the military, and the number is climbing[4]. According to scholar Stephen Van Evera, perceived security of borders and faith in institutions are two of the most important factors for predicting nationalist violence. Swiss support for the military, nationalism in a civic sense, buries ethnolinguistic divisions and prevents the nationalist violence that could arise when such groups may otherwise feel ignored or threatened by such institutions instead of relying on them for external security[5]. Fundamentally, where borders are secure and there is intrinsic faith in institutions, nationalist violence is much less likely to occur.

This burying of ethnolinguistic divisions is particularly evident in a statistic that shows a majority of citizens feel that Switzerland’s famous neutrality is linked to their national identity[6]. Switzerland’s role as mediator in major wars throughout history has given Swiss citizens a sense of pride and security in their global standing- critically, without the potential for violence that has accompanied other countries involved in conflicts. The concept of neutrality has become so tied to the image of the nation itself that to desire one’s security often requires one to support the nation and its institutions[7]. It is this sense of security then, as well as the faith in institutions like the military, that showcases the link between nationalism and the stabilizing force it exerts in Swiss life.

Although the ways in which nationalism helps promote external security are important, internal stability is another vital aspect of the Swiss national identity and is supported by stringent naturalization policies. The restrictions surrounding who can live in the country and become a citizen involves an incredible amount of local participation compared to most countries, as applications for citizenship are not considered on a federal level “but rather by the country’s cantons and municipalities—and the applicants’ peers have a say in whether naturalization gets granted.”[8] Residents in local villages vote on whether they feel their neighbor should receive citizenship or not, and communal assemblies allow citizens to voice their concerns, procedures that would seem strange to many Americans but one that would perhaps give them more faith in their institutions and a sense of value that may be lacking. Being able to decide who comes in and why within the populace leads to a deep sense of security about borders, and also upholds the common Swiss belief in political participation and pride in their direct democracy, with 65 percent of Swiss citizens saying they are satisfied with their government[9]. This naturalization practice also helps to explain Switzerland’s success at what many Swiss consider to be at the heart of their national identity: “the idea that several linguistic communities [coexisting] within a single nation based on a degree of shared political culture while preserving and developing their cultural distinctiveness in other spheres.”[10] Switzerland’s economy is also relevant to this particular point, as, given the dependence on sectors like banking that require massive amounts of coordination and precise understanding, it is not only reassuring to Swiss citizens that immigrants assimilate but necessary for the strength of the economy[11].

Switzerland is rooted in civic nationalism that goes back to the writing of the Swiss constitution, a document “whose explicit goal was to consolidate the Swiss national unity and national sentiment through policy centralisation,” and has contributed to a national identity that is based upon shared political culture and the concept of neutrality[12]. Furthermore, nationalistic policies and programs in Switzerland ensure that tensions or divisions that might otherwise threaten a sense of a united Swiss nation are superseded by faith in institutions and the desire for the security that they provide, as well as a strong belief and participation in the political culture. While all of the preceding works well for Switzerland, it remains to be seen if Swiss-like civic nationalism can be successfully adopted by other countries who also have multi-ethnic populations.


Endnotes:

[1] Swissinfo.ch. (2018, May 25). Swiss feel safe and trust security forces, says report. Retrieved August 8, 2019, from
https://www.swissinfo.ch/eng/swiss-security-study_swiss-feel-safe-and-trust-security-forces–says-report/4414477

[2] Miller, D. 1995. On Nationality. Oxford: Oxford University Press.

[3] Davis, M. (2019, March 23). What makes Switzerland different. Retrieved August 8, 2019, from https://bigthink.com/politics-current-affairs/switzerland-high-gun-ownership

[4] Swissinfo.ch. (2018, May 25). Swiss feel safe and trust security forces, says report. Retrieved August 8, 2019, from
https://www.swissinfo.ch/eng/swiss-security-study_swiss-feel-safe-and-trust-security-forces–says-report/4414477

[5] Evera, S. V. (1994). Hypotheses on Nationalism and War. International Security, 18(4), 5-39. doi:10.2307/2539176

[6] Kużelewska, Elżbieta. (2016). Language Policy in Switzerland. Studies in Logic, Grammar and Rhetoric. 45. 10.1515/slgr-2016-0020.

[7] Swissinfo.ch. (2018, May 25). Swiss feel safe and trust security forces, says report. Retrieved August 8, 2019, from https://www.swissinfo.ch/eng/swiss-security-study_swiss-feel-safe-and-trust-security-forces–says-report/44144770

[8] Garber, M. (2017, January 14). In Switzerland, You Can Be Denied Citizenship for Being Too Annoying. Retrieved August 8, 2019, from https://www.theatlantic.com/international/archive/2017/01/switzerland-citizenship-nancy-holten/513212

[9] Lucchi, M., Swiss Public Affairs, & World Economic Forum. (2017, July 31). This is how Switzerland’s direct democracy works. Retrieved August 8, 2019, from https://www.weforum.org/agenda/2017/07/switzerland-direct-democracy-explained

[10] Helbling, M., & Stojanović, N. (2011). Switzerland: Challenging the big theories of nationalism1. Nations and Nationalism, 17(4), 712-717. doi:10.1111/j.1469-8129.2011.00516.x

[11] Morris, D. (2018, October 25). Swiss Model of Positive Nationalism. Retrieved August 8, 2019, from https://www.baltimoresun.com/news/bs-xpm-1991-09-01-1991244083-story.html

[12] Helbling, M., & Stojanović, N. (2011). Switzerland: Challenging the big theories of nationalism1. Nations and Nationalism, 17(4), 712-717. doi:10.1111/j.1469-8129.2011.00516.x

Assessment Papers Gracie Jamison Nationalism Switzerland

Assessing a U.S. Policy of Détente with China

Assad Raza is an Active Component U.S. Army Civil Affairs Officer with deployment experience throughout the Middle East.  He holds a M.A. in Diplomacy with a concentration in International Conflict Management from Norwich University, and is a graduate of The Western Hemisphere Institute for Security Cooperation Command and General Staff Officer Course at Fort Benning, Georgia.  He can be found on Twitter @assadraza12.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing a U.S. Policy of Détente with China

Date Originally Written:  December 23, 2019.

Date Originally Published:  January 27, 2020.

Author and / or Article Point of View:  The author believes a policy of Détente, easing tension, with China would benefit the U.S. to avoid a military confrontation and increase economic opportunities between major powers.

Summary:  Any U.S. confrontation with China, which is the world’s second-largest economy and an emerging major power, would impact the global economy. The U.S. and its allies and partners cannot sever ties with China due to economic interdependencies. For these reasons, a policy of Détente with China that balances cooperation and deterrence to avoid a military confrontation would not only benefit the U.S. but the entire world.

Text:  In 1971 the United States set the conditions to integrate China into the international community. That year U.S. Secretary of State Henry Kissinger visited Beijing twice, and the United States voted for China’s permanent seat on the United Nations Security Council[1]. Now, 48 years later, U.S. Secretary of State, Mike Pompeo is saying that “China is the greatest threat the U.S. faces[2].” As an emerging major power, China’s foreign policy and competitive economy can threaten U.S. interests in the long-term.

To secure U.S. interests, a U.S. policy of Détente would ease U.S. tensions with China thus avoiding a military confrontation that could expand on a global scale. According to author Fareed Zakaria, “The U.S. risks squandering the hard-won gains from four decades of engagement with China, encouraging Beijing to adopt confrontational policies of its own, and leading the world’s two largest economies into a treacherous conflict of unknown scale and scope that will inevitably cause decades of instability and insecurity[3].” In a globalized world, the U.S. and several allies are economically interdependent, and any confrontation with China would have a drastic effect on the global economy. For this reason, improved U.S. relations with China would increase economic opportunities and reduce the risk of confrontation.

China is the second-largest economy and the largest trading partner in the world. As a result of this, any confrontation, either economically or militarily, will drastically impact the entire world. China’s recent economic decline and current U.S. trade disputes demonstrate China’s impact on the global economy. For example, Japan, China’s second-largest trading partner, blames China’s economic downturn for its first global trade deficit (1.2 trillion yen) since 2015[4]. Understanding China’s economic ties will likely drive U.S. policy development towards China. A China policy taking into account economic cooperation in areas of mutual interest will reduce the risk of a global market crash.

Beyond economic concerns, a U.S. policy towards China could include an arms agreement to limit a potential arms race and identify areas of cooperative research between the two countries. A good example is the Strategic Arms Limitation Treaty (SALT) that was part of the 1972 Nixon-Kissinger strategy of Détente with the Soviet Union[5]. Although negotiations over various strategic delivery systems (nuclear) continued through several administrations, this treaty did establish the necessary groundwork to prevent an accidental escalation of a nuclear war. A similar model to SALT with China would avoid the risk of confrontation and promote peace between major powers. A treaty between both countries does not imply that deterrence is not an option to manage any military ambitions China may have, for example, with Taiwan and the South China Sea.

In addition to economic and arms concerns, a policy of cooperation in technology and space with China would benefit the U.S. diplomatically and economically. During the Cold War, the U.S. pursued cooperative space research with the former Soviet Union. Although tensions at the time limited the extent of the cooperation, Russia’s technological contributions, pre- and post-Cold War, did benefit with establishing the International Space Station[6]. Additionally, cooperation in space also promoted U.S. foreign policy objectives in areas such as nonproliferation and arms control with Russia. Involving China in selected areas of cooperation in technology and space can ease tensions and increase diplomatic engagements in areas of mutual interests for both countries. Moreover, this space involvement can provide opportunities for the U.S. to engage with China on their nuclear program as they continue to build out their military capabilities.

The U.S. cannot sever ties with China due to the economic interdependence between China, the U.S., and its allies and partners. Additionally, several U.S. based companies want access to the growing market in China. According to the Scholl Chair in International Business at the Center for Strategic and International Studies (CSIS), William Reinsch, “With 1.2 billion people, you can’t be a multinational company or a global company without some kind of presence there one way or the other[7].” Hence, U.S. companies would benefit from a U.S. policy that eases tension and increases economic ties with China. However, the topic of human rights abuses, censorship, and mass surveillance in China will continue to be debated between U.S. businesses, the U.S. government, and China.

China’s domestic behavior and foreign policy do threaten the liberal international order, for example, with human rights. However, severing ties with China would empower them to continue those repressive behaviors and influence other developing countries to follow suit. A U.S. policy that increases relations with China can provide the necessary leverage in the future to reinforce their commitment to human rights and promote peace within their borders.

For the U.S., a multi-faceted policy of Détente, compared to severing ties with from China, would better benefit the nation in the long-term. According to the chief economist at Enodo Economics, Diana Choyleva, severing ties with from China “…would mean cost-push inflation, it would mean the slowing down of innovation and technological progress, it would mean that each economy trying to solve the issues of increased inequality will find it that much harder to do so[8].” For this reason, a policy of Détente with China that balances cooperation and deterrence to avoid a military confrontation would not only benefit the U.S. but the entire world.


Endnotes:

[1] United States Department of State, Office of the Historian, Foreign Service Institute (n.d.). Rapprochement with China, 1972. Retrieved December 23, 2019, from https://history.state.gov/milestones/1969-1976/rapprochement-china

[2] Schwartz, I. (2018). Pompeo: China Is The Greatest Threat U.S. Faces. Retrieved December 23, 2019, from https://www.realclearpolitics.com/video/2018/12/10/pompeo_china_is_the_greatest_threat_us_faces.html

[3] Zakaria, F. (2019). The New China Scare. Foreign Affairs, 99(1), 52–69. DOI: https://www.foreignaffairs.com/articles/china/2019-12-06/new-china-scare

[4] Johnston, M. (2019). China’s Top Trading Partners. Retrieved December 23, 2019, from https://www.investopedia.com/articles/investing/092815/chinas-top-trading-partners.asp 

[5] United States Department of State, Office of the Historian, Foreign Service Institute (n.d.). Strategic Arms Limitations Talks/Treaty (SALT) I and II. Retrieved December 23, 2019, from https://history.state.gov/milestones/1969-1976/salt 

[6] U.S. Congress, Office of Technology Assessment (1995). U.S.-Russian Cooperation in Space, OTA-ISS-618. Retrieved December 23, 2019, from https://www.princeton.edu/~ota/disk1/1995/9546/9546.PDF 

[7] Disis, J. (2019). American companies are taking enormous risks to do business in China. Retrieved December 23, 2019, from https://www.cnn.com/2019/10/11/business/us-china-trade-war-business/index.html 

[8] Mistreanu, S. (2019). Beyond ‘Decoupling’: How China Will Reshape Global Trade In 2020 . Retrieved from https://www.forbes.com/sites/siminamistreanu/2019/12/03/beyond-decoupling-how-china-will-reshape-global-trade-in-2020/#44bda74065b7 

 

Assad Raza Assessment Papers China (People's Republic of China) Détente / Detente

An Assessment of the Global War on Terror via Deterrence Theory

James P. Micciche is an Active Component U.S. Army Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific. He is currently a Master’s candidate at the Fletcher School of Law and Diplomacy at Tufts University.  He can be found on Twitter @james_miccicheDivergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Global War on Terror via Deterrence Theory

Date Originally Written:  December 27, 2019.

Date Originally Published:  January 20, 2020.

Author and / or Article Point of View:  The author believes that the 2017 National Security Strategy marked an end to the Global War on Terrorism.  Based upon this belief, it is important to start assessing U.S. policy during the Global War on Terrorism era through multiple theoretical lenses and practical frameworks to understand its successes and failures.

Summary:  The Global War on Terrorism’s goal was deterrence based — preventing terror attacks against the U.S. and extending that deterrence to other nations through a policy of denial and punishment. While the U.S. element of this goal was successful, the extension part was not as both terrorism deaths and the number of attacks from 2015-2019 still exceed pre-Global War on Terrorism levels, raising questions about the validity of deterring terror.

Text:  On September 11, 2001, al-Qaeda conducted a series of coordinated attacks on the United States marking an emergence of a new era of American foreign policy. Nine days later before a joint session of Congress, President George W. Bush declared, “Our war on terror begins with al Qaeda, but it does not end there. It will not end until every terrorist group of global reach has been found, stopped, and defeated[1].” Bush’s speech ushered in the Global War on Terrorism (GWOT), a construct that would define the lens and transactional medium through which U.S. policy makers would shape foreign policy for the next 16 years.

The 2002 National Security Strategy (NSS) codified Bush’s charge by clearly defining that to achieve its strategic interests the United States will: “strengthen alliances to defeat global terrorism and work to prevent attacks against us and our friends[2].” In addition to the overarching principles within the NSS, two additional policy documents guided the initial operationalizing of the GWOT, the National Strategy for Homeland Security and the National Strategy for Combating Terrorism. The former focused on preventing terrorist attacks within and against the United States while the ladder established a strategy to “Identify and defuse threats before they reach our borders[3].” These two documents outlined the GWOT’s foundational objectives that endured throughout the Bush and Obama administrations, a narrow goal of protecting the America and Americans and a comprehensive objective of averting international terrorist attacks by both defeating named terrorist organizations and preventing new ones to form.

Despite the 2006 NSS’s declaration that “terrorists cannot be deterred[4],” the foundational documents above clearly establish objectives based on deterrence. At its core, the GWOT sought to prevent a specific behavior, terrorism, against the United States and partners by means of both core tenets of deterrence, denial and punishment. Deterrence, simply put, is an agent preventing another agent from undertaking unwanted action or behaviors. The vast majority of deterrence theories identify two primary methods through which nations can deter others from taking undesirable actions — denial and punishment. The former increases the cost of conducting unwanted behaviors and decreases the chance of their success while the ladder threatens punitive action against agents who engage in such behaviors. Furthermore, it is important to analyze the scope of a nation’s deterrence efforts by defining if they are direct and concentrated only on preventing action against the nation itself or extended beyond national borders to other agents[5].

The GWOT utilized a bifurcated approach of denial by first directly hardening the United States homeland from terrorist attack by establishing new government agencies and implementing laws and structures that denied terrorists the opportunity to attack the United States. Secondly, the United States extended the GWOT to third parties by proactively attempting to deny terrorists the economic, social, and cultural conditions needed to thrive and form through development and democracy building efforts. Concurrently, the United States waged an aggressive punitive based deterrent policy against those that engaged and supported terror, including state actors, attempting to extend deterrence globally. If one is to examine the amount of Overseas Contingency Operations (OCO) funding that Congress authorized as part of the aforementioned efforts, it becomes clear that DoD-led punitive deterrence was the emphasized and preferred method throughout the GWOT. Of the nearly $2 Trillion spent on the GWOT-related OCO funding from 2001 to 2019 the U.S. Government allocated 92% towards DoD efforts, 8% for the U.S. Agency for International Development and Department of State development programs, and less than 1% on Department of Homeland Security and Coast Guard operations[6]. Punitive deterrence presents unique challenges against non-state actors who have no territorial sovereignty and often coexist with neutral civilian populations making preemptive and disciplinary action a calculated risk as it has the potential to support recruitment and propaganda narratives and counter ongoing denial efforts. Furthermore, punitive and preemptive actions against state actors also present the prospective of creating instability and under governed spaces conditions in which terrorist organizations form and thrive.

If one is to assess at the goal of extended global deterrence then the GWOT failed to achieve its objective as global terrorism related deaths were almost three and half times higher in 2017 (26,445) than in 2001 (7729) with numbers of attacks following similar growth rates[7]. Additionally, the GWOT period saw the rise of new violent extremist organizations such as Boko Haram and the Islamic State, despite ongoing extended denial efforts and punitive strikes and raids. Furthermore, two nations at the center of U.S. GWOT efforts, Afghanistan and Iraq, have remained the most impacted by terror despite nearly two decades of U.S. efforts[8]. Even longstanding U.S. treaty allies such as North Atlantic Treaty Organization countries have had their terror rates increase during the GWOT period. Despite the overall increase in global terror rates throughout the GWOT period, the past four years (2015-2019) have witnessed a decline in both deaths and number of attacks but still exceeds pre-GWOT levels.

The GWOT goal of direct deterrence has been far more successful than its extended counterpart as there have been no attacks on U.S soil that are comparable to the scale of 9/11. Moreover, from 2002 to 2018, North America experienced 431 terrorist attacks and 317 related deaths, only Central America and the Caribbean saw lower rates with 212 and 164 respectively; for comparison, Europe experienced 4290 attacks and 2496 deaths during the same period[9]. Despite the relative success of preventing terrorism compared to other regions, the United States still experienced deadly terrorist attacks from across the spectrum of ideologies such as the Boston Marathon bombing of 2013 and El Paso shooting of 2017.

In closing, assessing the GWOT through the lens of deterrence presents mixed results based on the scope of efforts; direct deterrence achieved far greater outcomes than extended efforts with less allocated funding. Furthermore, the GWOT raises questions about the validity of deterring non-state actors through punitive measures, the prospects of waging war against a tactic, and if a given level of terrorism is a constant risk within the modern world. U.S. Africa Command’s 2019 strategic priority of reducing terror threats to a “level manageable by internal security forces[10]” highlights a strategic shift in thinking and the acceptance of inherent levels of global terrorist activity.


Endnotes:

[1] Gregg, Gary L. “George W. Bush: Foreign Affairs.” The Miller Center. https://millercenter.org/president/gwbush/foreign-affairs. (retrieved 29Nov19)

[2] Bush, George W. , National Security Strategy of the United States of America. Executive Officer of the President, Washington DC, Washington United States 2002

[3] Bush, George W., National Strategy for Combating Terrorism. Executive Officer of the President, Washington DC, Washington United States 2006

[4] Bush, George W., National Security Strategy of the United States of America. Executive Officer of the President, Washington DC, Washington United States 2006

[5] Mazarr, Michael J. Understanding Deterrence. RAND 2018

[6] Mazarr, Michael J. Understanding Deterrence. RAND 2018 McGarry, Brendan W. and Morgenstern, Emily M. “Overseas Contingency Operations Funding: Background and Status.” Library of Congress. Washington D 2019

[7] McGarry, Brendan W. and Morgenstern, Emily M. “Overseas Contingency Operations Funding: Background and Status.” Library of Congress. Washington D 2019 Global Terrorism Database https://www.start.umd.edu/gtd/search/Results.aspx?search=&sa.x=54&sa.y=3

[8] Institute for Economics & Peace. Global Terrorism Index 2019: Measuring the Impact of Terrorism, Sydney, November 2019. Available from: http://visionofhumanity.org/reports (accessed 20 Dec 2019).

[9] Ibid

[10] Waldhauser, Thomas. United States Africa Command Posture Statement. Washington DC: DoD, 2019.

Assessment Papers Deterrence James P. Micciche Violent Extremism

An Assessment of the Forest Brothers’ Response to Invasion of the Baltics

Adam Paul Hunt is a freelance writer with a background in political science.  Adam wide-ranging writing has been featured in Library Journal, Premier Guitar, and Dirt Rag.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

Title:  An Assessment of the Forest Brothers’ Response to Invasion of the Baltics

Date Originally Written:  November 22, 2019.

Date Originally Published:  January 13, 2020.

Author and / or Article Point of View:  The author believes that in today’s security environment many lessons can be learned from how the Baltic nations historically defended themselves against a militarily superior foe.

Summary:  According to the Rand Corporation, Russia could invade the Baltic nations and reach the capitols of Estonia, Latvia, and Lithuania within 60 hours[1].  The Baltic nations are not strangers to defending themselves against invasion.  History shows that Baltic-based resistance groups, though their actions may be complicated or undesired, can penalize a militarily superior foe.

Text:  Since the collapse of the Soviet Union and the election of Vladimir Putin as President of Russia in 1999, the Baltic States of Latvia, Lithuania, and Estonia have felt uneasy concerning their larger and more powerful Russian neighbor. The Baltic States have a long history of resisting Russian aggression, but as with most histories, the relationship between the Baltic States and Russia is complex and sometimes the line between hero and villain is indistinct.

During the Russian Revolution of 1905, small groups of Baltic peasants and teachers sought refuge from Tsarist forces and hid in the forests. These groups become known as The Forest Brothers[2]. After the chaos of World War I and the 1918 Bolshevik revolution, the Baltic States were able to break away from Russia. In 1940 that independence would come to a halt, with the Soviets seizing control of the Baltic States. As in 1905, small groups fled into the forests and attempted to resist the Soviets and the German Nazis. Some of The Forest Brother groups were hopeful that they could depend on the 1941 Atlantic Charter signatories, the United Kingdom and the United States, to come to their aid. The lack of action of the Atlantic Charter nations, among other factors, would eventually doom the resistance group efforts to failure[3].

In 1941, the first resistance group in Lithuania called the Lithuanian Activist Front, was formed to fight the Soviets[4]. A year later, The Supreme Committee for Liberation of Lithuania was set up to resist Nazi occupation. Curiously, partisan resistance did not start in earnest until 1944, even though the resistance would last until 1953 and the last Lithuanian partisan, Benediktas Mikulis, would be arrested in 1971[5]. While the exact numbers of those that took up arms against the Soviets are unknown, it’s estimated that between 30,000 – 50,000 did and another 50,000 people were active helpers; which means 1-20 Lithuanians were active in the struggle for independence[6]. The pinnacle of partisan efforts in 1945 clearly represents a culminating point that forced the Lithuanian resistance movement to shift their operations drastically. Ultimately, based on the totality of evidence, this 1945 culminating point split the resistance into two stages: 1) 1944-1945 – conventional war operations, a period of traditional offensive warfare by an organized partisan movement; and 2) 1946-1953 – irregular warfare operations, a period of unremitting decline by a significantly diminished resistance, relegated to a more defensive posture and small scale offensive operations.

Two men, Povilas Plechavičius[7][8] and Adolfas Ramanauskas[9][10] (“Vanagas”)would emerge as during World War II as symbols of Lithuanian independence. Plechavičius had been involved in the 1918 war of independence and the 1926 Lithuanian coup d’état that overthrew Lithuanian President Kazys Grinius. Ramanauskas was an American of Lithuanian dissent who became a platoon commander to the chairman of the Union of Lithuanian Freedom Fighters.

By 1944, the tide had started to turn against Germany. Nazi occupation forces had begun conscripting members of the German minority in Estonia and Latvia into the Waffen-SS. In keeping with blurring the line between hero and villain, Povilas Plechavičius cooperated with SS Obergruppenführer, and police general Friedrich Jackeln and Chief-of-Staff of the Northern Front Field Marshal Walther Model[11]. However, Plechavičius refused Jackeln’s demand for a Lithuanian SS division[12] and formed a local group called the Lithuanian Territorial Defense Force instead[13][14].

One of the most famous of the Lithuanian anti-Soviet partisans was Adolfas Ramanauskas[15]. Ramanauskas was born 1918 in Connecticut, United States of America, but in 1921 he and his family moved to Lithuania. While in Lithuania he would eventually study at the Kanus War School, join the reserve forces, rise to the rank of second lieutenant, and participate in the anti-Soviet uprising in 1941.

Ramanauskas organized a sizable resistance group called the Lithuanian Freedom Fighters Union (LLKS) and directly engaged the Soviet Ministry of Interior’s forces, the NKVD. The group’s most daring assault was an effort to free prisoners located in Merkinė and destroy Soviet records. The attack was only partly successful, ending in the destruction of the records[16]. Merkinė was also the site of the extinction of 854 Jews by fellow Lithuanians. Their bodies were deposited in a mass grave near the Jewish cemetery[17].

One of the controversies surrounding Ramanauskas is the event of July 19, 1941. Along with German forces, the LLKS partisans held partial control of the Lithuanian town of Druskininkai and participated in the roundup of communists and Jews, and the disarming of Poles. Those detained were then transported to the Treblinka death camp[18].

At the end of World War II, The Forest Brothers would continue to defy Soviet occupation and hope that the United States and Great Britain would support their resistance[19]. Plechavičius ordered his men to disband and organize resistance groups to fight Soviet occupation. Plechavičius would eventually be arrested by the Soviets and deported to Latvia. In 1949, Plechavičius moved to the United States and would die in 1973[20].

Ramanauskas would continue to resist Soviet occupation, but due to a series of defeats and lack of outside support, he would eventually suspend armed resistance in favor of passive resistance and publish newspapers in Russian and Lithuanian. He would continue to evade Soviet authorities until his arrest in 1956. Ramanauskas would be tortured by the Soviet Committee for State Security, the KGB, and was eventually executed in 1957[21].

The occupation of Lithuania by the Third Reich and the Soviet Union was brutal. Between extermination campaigns by the Wehrmacht and Einsatzgruppen, mass deportations (notably operations Vesna, Priboli, and Osen), and “Sovietization” campaign, it’s estimated that between 60-70,000 Lithuanians were forced into exile[22]. Between 1940 and 1944, 460,000 civilians and military personnel were killed (out of a population of 2,442,000). Also, in 1953 nearly 120,000 people, (about 5% of the population) would be deported. Lastly, the Germans exterminated between 143,000-195,000 Litvaks (Lithuanian Jews).

The lessons that can be learned from Lithuania are many, and range from: history is messy, the distinction between hero and villain isn’t always clear, commitments like Atlantic Charter are not always honored, and changing tactics as circumstances change is necessary, especially against superior forces.


Endnotes:

[1] Kyle, J. (2019, January 16), “Contextualizing Russia and the Baltic States,” Retrieved December 15, 2013, from https://www.fpri.org/article/2019/01/contextualizing-russia-and-the-baltic-states/.

[2] Woods, Alan. “Bolshevism: The Road to Revolution Archived 2012-12-10,” Wellred Publications, London, 1999.

[3] Leskys, Major Vylius M. United States Army. “‘Forest Brothers,’ 1945: The culmination of the Lithuanian Partisan movement” Submitted in partial fulfillment of requirements for the degree of Master of Military Studies. United States Marine Corps Command and Staff College, Marine Corps University, 2009.

[4] Piotrowski,Tadeusz, “Poland’s Holocaust”, McFarland & Company, 1997

[5] Buttar, Prit, “Between Giants: The Battle for the Baltics in World War II” Osprey Publishing, 2015.

[6] Ruin, Pahl, “The forest brothers – heroes & villains of the partisan war in Lithuania” Baltic Worlds http://balticworlds.com/the-forest-brothers-heroes-villains/, 2016.

[7] Povilas Plechavičius, http://partizanai.org/gen-povilas-plechavicius

[8] Roszkowski,Wojciech and Kofman, Jan, “Biographical Dictionary of Central and Eastern Europe in the Twentieth Century” Routledge, 2008.

[9] Adolfas Ramanauskas, http://www.draugas.org/news/adolfas-ramanauskas-the-hawk-vs-the-ussr/

[10] “Ceremony of Adolfas Ramanauskas-Vanagas state funeral,” Ministry of National Defence Republic of Lithuania, https://kam.lt/en/ceremony_of_adolfas_ramanauskas-vanagas_state_funeral.html 

[11] Povilas Plechavičius, http://partizanai.org/gen-povilas-plechavicius

[12] Villani, Gerry and Georg, Jennifer, “Soldiers of Germania – The European volunteers of the Waffen SS”. CreateSpace Independent Publishing Platform, 2016.

[13] “Karys Nr. 2 (2018) 2014 m.” (PDF). Karys: 46–52. 2014, https://kam.lt/download/39937/maketas%20visas.pdf, Retrieved 2 October 2019.

[14] Eidintas, Alfonsas et al., “The History of Lithuania. 2nd rev. ed”. Vilnius: Eugrimas, 2015.

[15] Adolfas Ramanauskas, https://www.baltictimes.com/lithuania_pays_tribute_to_partisan_commander_ramanauskas-vanagas_in_state_funeral/

[16] Adolfas Ramanauskas, https://peoplepill.com/people/adolfas-ramanauskas/

[17] Balčiūnas, Evaldas, “Footprints of Adolfas Ramanauskas-Vanagas in the Mass Murder of the Jews of Druskininkai” http://defendinghistory.com/footprints-adolfas-ramanauskas-vanagas-mass-murder-jews-druskininkai/65177, 2014.

[18] Balčiūnas, Evaldas, “Footprints of Adolfas Ramanauskas-Vanagas in the Mass Murder of the Jews of Druskininkai” http://defendinghistory.com/footprints-adolfas-ramanauskas-vanagas-mass-murder-jews-druskininkai/65177, 2014.

[19] Leskys, Major Vylius M. United States Army. “‘Forest Brothers,’ 1945: The culmination of the Lithuanian Partisan movement” Submitted in partial fulfillment of requirements for the degree of Master of Military Studies. United States Marine Corps Command and Staff College, Marine Corps University, 2009.

[20] Povilas Plechavičius, http://partizanai.org/gen-povilas-plechavicius

[21] Adolfas Ramanauskas, http://www.draugas.org/news/adolfas-ramanauskas-the-hawk-vs-the-ussr/

[22] “The Genocidal Temptation: Auschwitz, Hiroshima, Rwanda, and Beyond,” edited by Robert S. Frey, 2004, https://books.google.com/books?id=NkE1LGCxiR0C&lpg=PA79&dq=Soviet%20deportations%20from%20Lithuania&lr&pg=PA79#v=onepage&q=Soviet%20deportations%20from%20Lithuania&f=false

Assessment Papers Baltics Estonia Germany Irregular Forces / Irregular Warfare Latvia Lithuania Russia

An Assessment of the National Security Impact of Digital Sovereignty

Kathleen Cassedy is an independent contractor and open source specialist. She spent the last three years identifying, cataloging, and analyzing modern Russian and Chinese political and economic warfare efforts; the role of foreign influence operations in gray zone problem sets; global influence of multi-national entities, non-state actors, and super-empowered individuals; and virtual sovereignty, digital agency, and decentralized finance/cryptocurrency. She tweets @Katnip95352013.

Ian Conway manages Helios Global, Inc., a risk analysis consultancy that specializes in applied research and analysis of asymmetric threats. Prior to conducting a multi-year study of political warfare operations and economic subversion, he supported DoD and homeland security programs focused on counterterrorism, counterproliferation, hard and deeply buried targets, and critical infrastructure protection.

Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the National Security Impact of Digital Sovereignty

Date Originally Written:  December 6, 2019.

Date Originally Published:  January 6, 2020.

Author and / or Article Point of View:  The authors believe that traditional notions of citizenship and sovereignty are rapidly changing and that the U.S. could gain competitive advantage by embracing a tiered citizenship model, including e-residency.

Summary:  Money, people, and companies drove globalization’s disruption of centuries of power domination by nation-states, while increasing the agency and autonomy of corporations and individuals. The balance of power has shifted, and if governments do not learn how to adapt, they will be relegated to the back seat in influence and decision making for this century. One opportunity for adaptation lies in embracing, not rejecting, digital sovereignty.

Text:  In the past 25 years, the globalization of the world’s economic systems and the introduction of Internet ubiquity have had profound effects on humankind and centuries-old governance structures. Electronic commerce has transformed international supply chain dynamics and business finance. Physical borders have become less meaningful in the face of digital connectedness and supranational economic zones. The largest multinational corporations have market caps which challenge or exceed the gross domestic product of most of the countries in the world. These changes have made international transactions – and investments – executable with the click of a button, transactions that once required weeks or months of travel to finalize.

Facilitating and empowering the citizens of the world to engage in the global marketplace has created a new dynamic. This dynamic involves the provision of safety and security of the people being increasingly transferred to the private sector thus forcing governments to outsource their most basic sovereign responsibility and reserving the most complete and effective solutions for those who can afford them. This outsourcing includes fiscal security (or social welfare), especially in free market economies where the responsibility for savings and investment is on the individual, not the government. As safety and security – personal and fiscal – becomes further privatized, individuals are taking steps to wrest control of themselves – their identities, their businesses, and their freedom of movement – from the state. Individuals want to exercise self-determination and attain individual sovereignty in the globalized world. This desire leaves the nation state, particularly in western democracies, in a challenging position. How does a government encourage self-sufficiency (often because states can no longer afford the associated costs) and democracy when globalized citizens are redefining what it means to be a citizen?

The first war of the 21st century, the Global War on Terrorism, was one of individuals disenfranchised from the state developing subnational, virtual organizations to employ terror and insurgent tactics to fight the nation states’ monopoly on power. The second war – already well underway but one that governments have been slow to recognize and engage – is great power competition short of kinetic action, to remake the geopolitical balance of power into multi-polar spheres of influence. The third war this century may likely be over amassing talent and capital, which in turn drives economic power. America’s near-peer adversaries, particularly China[1], are already moving aggressively to increase their global hegemony for this century, using all means of state power available. How can America counter its near-peers? The U.S. could position itself to exert superiority in the expanding competition for wealth by proactively embracing self-determination and individual autonomy as expressed by the digital sovereignty movement.

Digital sovereignty is the ultimate expression of free market capitalism. If global citizens have freedom of movement – and of capital, access to markets, encouragement to start businesses – they will choose the market and the society with the fewest barriers to entry. Digital sovereignty gives the advantage to countries who operate on free market capitalism and self-determination. Digital sovereignty is also an unexpected counter to China’s and Russia’s authoritarian models, thus disrupting the momentum that both those competitors have gained during the great power competition. In addition to acting as a disrupter in global geopolitics, proactive acceptance and adoption of digital sovereignty opens new potential tax and economic boosts to the U.S. Further, digital sovereignty could serve as an opportunity to break down barriers between Silicon Valley (particularly its techno-libertarians) and the U.S. government, by leveraging one of the tech elite’s most progressive socio-cultural concepts.

What might digital sovereignty look like in the U.S.? One approach is Estonia’s forward-looking experiments with e-residency[2] for business purposes but with the U.S. extending these ideas further to a tiered citizenship structure that includes U.S.-issued identity and travel benefits. One can be a citizen and contribute to the U.S. economy with or without living there. People can incorporate their business and conduct banking in the U.S., all using secure digital transactions. Stateless (by choice or by circumstance) entrepreneurs can receive travel documents in exchange for tax revenue. This is virtual citizenship.

The U.S. government could opt to act now to throw its weight behind digital sovereignty. This is a democratic ideal for the 21st century, and the U.S. has an opportunity to shape and influence the concept. This policy approach would pay homage to the Reagan-Bush model of free movement of labor. In this model, people don’t get full citizenship straight away, but they can legally work and pay taxes in the U.S. economy, while living where they like.

The U.S. government could create two tiers of citizenship. Full conventional citizenship – with voting privileges and other constitutionally guaranteed rights – could remain the domain of natural born and naturalized citizens. A second level of citizenship for the e-citizen could avoid the provision of entitlements but allow full access to the economy: free movement across borders, the ability to work, to start a business, to open a bank account. E-citizenship could be a path to earning full citizenship if that’s what the individual wants. If not, they can remain a virtual citizen, with some but not all privileges of full citizenship. Those who do wish to pursue full legal citizenship might begin contributing to the American economy and gain some benefits of association with the U.S., but they could do so from wherever they are currently located. This approach might also encourage entrepreneurship, innovation, and hard work – the foundations of the American dream.

Both historically and at present – irrespective of what party is in office – the U.S. has always desired to attract immigrants that want the opportunity to pursue a better life for themselves and their children through hard work. Life, liberty, and the pursuit of happiness: the foundational concept of the United States. Accordingly, if the U.S. is the first great power to embrace and encourage digital sovereignty, acting in accordance with core American values, then the U.S. also shapes the future battlespace for the war for talent and capital by exerting first-mover advantage.


Endnotes:

[1] Shi, T. (2017, October 17). “Xi Plans to Turn China Into a Leading Global Power by 2050”. Retrieved December 2, 2019, from https://www.bloomberg.com/news/articles/2017-10-17/xi-to-put-his-stamp-on-chinese-history-at-congress-party-opening.

[2] Republic of Estonia. “The new digital nation: What is E-Residency?” Retrieved December 2, 2019, from https://e-resident.gov.ee/.

Assessment Papers Cyberspace Economic Factors Estonia United States

Assessment of the U.S. Presence in Afghanistan

Adam A. Azim is a writer and entrepreneur based in Northern Virginia.  He holds a Master’s Degree in U.S. Foreign Policy at American University’s School of International Service in Washington, DC.  His areas of interest include U.S. foreign policy and strategy, as well as political philosophy.  He can be found on Twitter @adamazim1988.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the U.S. Presence in Afghanistan

Date Originally Written:  December 5, 2019.

Date Originally Published:  December 30, 2019.

Author and / or Article Point of View:  This article is written from an American point of view, in regards to the U.S. presence in Afghanistan.

Summary:  Afghanistan is part of an American effort to create a world system based on liberal-democratic principles. This effort began in post-World War II reconstruction projects, the success of which rested on abstention from extending the project into countries like Russia and China and accommodating their security and military interests.

Text:  The rationale for the U.S. presence in Afghanistan can vary depending on whether one views the presence through a realist or liberal lens. On one hand, there is sufficient cause to suggest that the U.S. presence in Afghanistan is based on realpolitik, where the U.S. is pursuing security and economic interests by thwarting the possibility of Afghanistan again becoming a transnational terrorist safe haven all while tapping into natural resources such as uranium, lithium, rare earth materials, and opium that are vital for the sustenance of modern high-tech industries and the pharmaceutical industry. On the other hand, an idealist would justify the U.S. presence in Afghanistan as part of an overall pursuit of what John Mearsheimer calls “liberal hegemony” where the U.S. is seeking to establish a world system based on the principles of liberal democracy, such as global peace and security, free-market economics, as well as rule of law and the adjudication of conflicts.

In reality, U.S. foreign policy is a balance of both approaches, where the pursuit of military and economic power is combined with principle to shape the nature of foreign policy. Unlike China, whose foreign policy is based purely on the concept of realpolitik and the pursuit of its own security and economic interests, the U.S. is one of the few superpowers in world history to have combined the realpolitik approach of foreign policy with one that is based on the promotion of liberal-democratic principles. Much of America’s efforts on the global stage since World War II have been focused on institution building on a global level in various areas of concern to all nations, such as security with the creation of the North Atlantic Treaty Organization, and economics through the creation of the World Bank and the International Monetary Fund and international law through the creation of the United Nations. The United States has applied both realpolitik and liberal hegemony as approaches to its involvement in Afghanistan. There is both a moral justification to America’s presence in Afghanistan and a military and economic justification.

The question remains whether the U.S. presence in Afghanistan will persist and possess the lifespan of the U.S. presence in other places such as Germany and the Korean Peninsula. The American public has put immense pressure on its politicians to withdraw American forces and personnel from the Middle East and Afghanistan. From a legal standpoint, the U.S. government has the legal justification for its involvement in the Middle East and Afghanistan through laws that were passed in the post-9/11 era such as the Patriot Act as well as an “Authorization to Use Military Force.” The United Nations and the European Union have also pledged support for the U.S. mission in Afghanistan. The U.S. government may decide to announce a withdrawal of a significant number of troops and personnel from Afghanistan to placate its public, but it is highly unlikely that the United States will initiate a full withdrawal from Afghanistan after all the investments that it has made there over the past eighteen years.

As mentioned before, the mission in Afghanistan is part of an overall effort to organize the world and create a world system based on liberal-democratic principles while maintaining the pursuit of American military and economic power to sustain the liberal hegemonic effort. This liberal hegemonic effort has its roots in America’s post-World War II reconstruction of Europe and Asia, and this effort has now extended in scope by covering areas that are novel to the United States such as the Middle East and Afghanistan. However, it is a fact that the focus of the United States has been lopsided towards countries where America has vested security and economic interests. Furthermore, there has not been a significant push on the part of the United States to implement international law in places like Saudi Arabia, Turkey, and Pakistan who are allied to the United States but are in violation of liberal-democratic principles. Nevertheless, the global strategy for the United States is in place with clear objectives, and the implementation of such a strategy will inevitably face challenges and roadblocks imposed by authoritarian powers such as Russia and China who like the United States have regional and possibly global ambitions.

One component of America’s global strategy will also include a “live and let die” component by using all the levers of power at its disposal to place pressure as well as sanctions on countries that will resist America’s liberal hegemonic project such as Iran and Russia. However, it is unlikely that Russia and China will seek to thwart America’s global strategy simply because the capabilities are not there to mount such an effort. Instead, the Russians and the Chinese will seek to find opportunities to negotiate and engage in dialogue with the United States to preserve their respective security and economic interests. As far as Afghanistan is concerned, the Russians and the Chinese initially had no objections to America’s involvement in Afghanistan, and the Russians even encouraged Uzbekistan to allow the United States to stage its Afghan-related operations there in 2001.

While America’s liberal hegemonic effort has staying power in Afghanistan and possibly the Middle East, it may run into a dead end if America seeks to extend the effort inside of Russia and China. It is highly unlikely that Russia and China will seek to dislodge the United States from Afghanistan via proxy as long as America engages in sustainable diplomacy with Russia and China and find ways to accommodate Russian and Chinese security and economic interests. Short of Russia joining the European Union and America engaging with the Shanghai Cooperation Organization for the purpose of economic and infrastructural development in Asia, American efforts in Afghanistan regarding Russia and China will continue to be one-offs and not be underpinned by a formal structure.


Endnotes:

None.

Adam A. Azim Afghanistan Assessment Papers Taliban (Islamic Emirate of Afghanistan) United States

Assessing the Deterrence Value of the F-35 in Syria

Humayun Hassan is an undergraduate student at National University of Sciences and Technology, Pakistan. His areas of research interests include 5th and 6th generation warfare and geopolitics of the Levant. He can be found on Twitter @Humayun_17. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Deterrence Value of the F-35 in Syria

Date Originally Written:  October 30, 2019.

Date Originally Published:  December 16, 2019.

Author and / or Article Point of View:  This article is written from the U.S perspective, with regards to the significance of the F-35 aircraft, in terms of protecting U.S assets in Syria and the Levant amidst various local and foreign hostile forces.

Summary:  In 2019 the F-35 Joint Strike Fighter was used for the first time in the Middle East. As major world players further their national interests in Syria, the United States is forced to be more active in the region. The Turkish offensive against the Kurds, the Islamic State, and Russian influence are the major concerns for the U.S. The F-35 could be used effectively to not only protect the U.S ground forces but also to deter its enemies from attacking the American assets.

Text:  Amidst the fickle and intricate geopolitics of Syria, perhaps the only constant in this melting pot, is the United States’ lack of strategic clarity. After over eight years of the ongoing Syrian civil war, the average American might not pay much heed to this seemingly incessant conflict, other than when this issue involves their fellow countrymen and tax money. Regardless, the geo-strategic significance of Syria, coupled with the kind of major players involved in this conflict, calls for proactivity and sometimes, grudging, yet necessary entailment on the part of the United States.

The emergence and the consequential establishment of the Islamic State’s (IS) caliphate, amongst the ashes of burning Levant, is perhaps the most pertinent issue of concern, not only for United States but for most of the Western powers. Since the civil war broke out in 2011, the scale of the conflict has only exacerbated[1], to the point where almost all global powers are somehow involved in the Syrian crisis. Whether this involvement is due to a lack of U.S. long-term vision for Syria and the greater Levant, or the reluctance to be proactive and protect its national interests in the region, the fact remains that rival powers, Iran and Russia, have more strategic depth and the leverage to protect their interests in the region than any time in recent years[2].

Since 2011, there have been many turns and changes with regards to the U.S objectives in Syria. However, containment and impairment of the IS caliphate, opposition of Syrian President Bashar al-Assad’s regime, and halting increasing Iranian influence in the region have continued to be the among the main priorities of the United States in Syria. With a limited number of boots on ground the U.S also relies on its allies to such as Syrian Democratic Force (SDF), to protect its interests in the region. The SDF, which are commonly regarded as “rebel forces,” are primarily comprised of Kurdish fighters, who have actively fighting against the Syrian army and IS simultaneously[3]. With three main local factions fighting each other for the control of territory and resources of the country, each foreign power is supporting their side. For the United States, the prevailing objective is to not only undermine the threat of IS, but also to deny the unholy trinity of Assad, Iran, and Russia sole dominion over the geopolitical landscape.

With limited amount of manpower, unfamiliar terrain, presence of multiple hostile fronts, and a threat of inadvertent clash with the Iranian or Russian forces, how does the United States protect its assets, while keeping the hostile forces at bay? Regardless of where the U.S ground forces might be, their competitive advantage, in many instances, is the fact that they are supported by arguably the best, in terms of operational capacity and technological prowess. To this end, the recently developed F-35 fighter jet[4] is likely to play a vital role in maintaining a buffer between the American/coalition forces and the local hostile factions.

As the only other credible air force present in the region, the Russian air force, has maintained a safe distance with the American forces. Disregarding an unlikely scenario, at least in the near future, of a direct confrontation between the American and the Russian forces, the only remaining airpower against the F-35 is the Syrian Arab Air force[5]. With its fighter fleet mainly comprised of MiG-23s, Su-17 and the Fencer (Su-24), theoretically there is no threat to the F-35’s air superiority in the region.

In April 2019, the first U.S combat use of the F-35 was observed in the Middle East, when an IS munitions cache was targeted, to thwart the group’s possible resurgence[6]. To compensate for its numerical disadvantage and to protect strategically vital oilfields, the F-35’s role against the hostile local groups is likely to increase overtime. With its initiation into combat, it seems as if the Unites States envisions a key role for the F-35 in the region’s future. The only criticism is on the jet’s lack of energy maneuverability, due to its lower thrust to weight ratio compared to its rivals, which makes the jet less nimble in a dogfight[7]. However, the recent footage released by the U.S. Air Force depicts the F-35 making significant strides in this aspect, which has halted many of the objections on its close combat capabilities[8]. Despite its dogfight nimbleness, the competitive advantage of the F-35 is its computational capacity. The F-35, as a 5th-generation fighter, is unmatched at intelligence gathering, reconnaissance, and targeting aircraft from a distance beyond visual range, significantly far away from the range of any of its possible competitors. Furthermore, the F-35’s stealth capability makes it difficult to detect, early and accurately[9].

As the United States sends its largest contingent of troops in Syria thus far, there is new threat looming over which might challenge the U.S interests in the area. As the Turkish forces target the Kurdish fighters, the threat of IS reprisal looms over, and Russia justifies its military presence in the area, as a “balancing act” between the Turkish and Syrian forces, the coming days for the United States will be precarious. As evident by the combat testing against IS earlier this year, the F-35 will play an ever-increasing role in Syria and greater Levant, where its stealth may be used to venture inside hostile territory to preemptively target terror networks. The F-35’s superior recon may be used to provide a bird’s eye to the American forces in Northeast Syria, and perhaps, most importantly, to deter the Russian forces and their proxies as they attempt to use their numerical advantage against the American land forces to control the lucrative energy fields of Northeastern Syria.


Endnotes:

[1] Bernard A and Saad H. (2018, February 8). It’s Hard to Believe but Syria’s Wat is Getting Even Worse. Retrieved October 31, 2019, from https://www.nytimes.com/2018/02/08/world/middleeast/syria-war-idlib.html

[2] Neely B, Smith S. (2019, October 15). As the U.S. withdraws, Assad and Putin are emerging as the winners in Syria. Retrieved October 31, 2019, from https://www.nbcnews.com/news/world/u-s-withdraws-assad-putin-are-emerging-winners-syria-n1066231

[3] Shapiro A. (2019, October 10). A Look At The History Of The U.S. Alliance With The Kurds. Retrieved October 31, 2019, from https://www.npr.org/2019/10/10/769044811/a-look-at-the-history-of-the-u-s-alliance-with-the-kurds

[4] Staff. (2019, October 29). Lockheed Martin F-35 Lightning II. Retrieved October 31, 2019, from https://www.militaryfactory.com/aircraft/detail.asp?aircraft_id=23

[5] Majumdar D. (2017, April 17). The Syrian Air Force: What Is Left? Retrieved October 31, 2019, from https://nationalinterest.org/blog/the-buzz/the-syrian-air-force-what-left-20135

[6] Insinna V. (2019, April 30). US Air Force conducts airstrikes with F-35 for first time ever. Retrieved October 31, 2019, from https://www.defensenews.com/air/2019/04/30/us-air-force-conducts-airstrikes-with-f-35-for-first-time-ever/

[7] Robinson T. (2015, July 10). Does the F-35 really suck in air combat? Retrieved October 31, 2019, from https://www.aerosociety.com/news/does-the-f-35-really-suck-in-air-combat/

[8] Lockie A. (2017, April 19). Here’s why the F-35 once lost to F-16s, and how it made a stunning comeback. Retrieved October 31, 2019, from https://www.businessinsider.com/f-35-vs-f-16-15-18-lost-beaten-flatley-comeback-2017-4

[9] Thompson L. (2019, May 13). The F-35 Isn’t Just ‘Stealthy’: Here’s How Its Electronic Warfare System Gives It An Edge. Retrieved October 31, 2019, from https://www.forbes.com/sites/lorenthompson/2019/05/13/how-a-super-agile-electronic-warfare-system-makes-f-35-the-most-invincible-combat-aircraft-ever

 

Assessment Papers Deterrence F-35 Lightning II (Joint Strike Fighter) Humayun Hassan Syria United States

Assessing the Relationship of Sikh-Canadians with Canada and India

Editor’s Note:  This article is the result of a partnership between Divergent Options and a course on nationalism at the George Washington University.


Nikita Khurana is an undergraduate student at the George Washington University in Washington, D.C. She is pursuing a Bachelor of Arts in Economics and minoring in International Affairs.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Relationship of Sikh-Canadians with Canada and India

Date Originally Written:  October 19, 2019.

Date Originally Published:  December 9, 2019.

Author and / or Article Point of View:  The author of this piece identifies as a first-generation Indian-American. This article is written in the point of view of Sikhs living in Canada that have a strong religious identity.

Summary:  Canada is home to nearly half a million Sikhs, thus becoming one of the largest Sikh diaspora populations in the world. While most diaspora populations have difficulty settling into their new home countries, political tensions with the Indian state was a driving force in Sikh-Canadian integration. Even though Sikh-Canadians faced discrimination from white Canadians, the Khalistan movement (a Sikh separatist movement) helped create a strong Sikh community within Canada.

Text:  Canada is home to one of the largest Sikh diaspora communities in the world. As of 2011, Sikhs accounted for 1.4% of the Canadian population with over 400,000 residents[1]. Legal immigration from the Indian province of Punjab is the root cause for the prominence of the Sikh religion in Canada. Sikh immigration into Canada can be separated into two waves: the early twentieth century and the 1960s. Due to political differences in their homeland, Sikhs in Canada have been able to integrate into Canadian society and even gain political power, despite the initial unwelcoming actions of white Canadians.

South Asia has been home to numerous religious movements including the creation of Buddhism, Jainism and Hinduism. In the late fifteenth century, Guru Nanak established the Sikh religion. Sikhism is a prominent ideology with over 27 million followers, thus making it the fifth largest religion in the world. Followers of Skihism believe that there is a total of ten gurus, including Guru Nanak, and upon the death of the final spiritual leader, the essence of the eternal Guru transferred itself into the sacred Sikh scripture[2].

From their initial migration to Canada, Sikhs were met with profound racial discrimination[3]. This discrimination took the international stage in April of 1914 when the Komagata Maru, a Japanese steamship ship carrying Sikh passengers, was refused entry into Canada[4]. Nonetheless, Sikhs established strong religious institutions through gurudwaras or Sikh temples. South Asian immigration was completely halted until 1920, when wives and children of Sikh-Canadians were finally allowed to enter the country.

In contrast to the American society depicted as a ‘melting pot,’ Canada is seen as a ‘mixed salad’ of cultural differences today, where all faiths, ethnicities, and traditions are accommodated instead of assimilated. However, throughout the twentieth century, white Canadians were resistant to non-white immigrants. From the 1920s to the 1960s, Sikhs in Canada experienced a religious revision. Instead of maintaining traditional practices, children of immigrants adopted Sahajdhari practices. Being a Sahajdhari meant that men were able to break from practices that prevented them from cutting their hair and adopting Canadian dress codes[5].

The second wave of immigration coincided with the birth of the Sikh separatist movement in India. Even though Sikhs and Hindus lived peacefully amongst each other for centuries, tensions arose in the late 1960s when the Sikh population in Punjab gained economic prosperity following the Green Revolution in India. With growing wealth and a flourishing agricultural industry, Punjabi society slowly became increasingly more detached from mainstream Indian culture. In an effort to relieve political stress, Indian Prime Minister Indra Gandhi attempted to transfer the city of Chandigarh to the Punjab province. However, with no success, this olive branch was never fully executed, further strengthening distrust of the Prime Minister amongst the Sikh population. By the 1980s, the Sikh Khalistan movement was in full force.

The Khalistan movement is a separatist movement that calls for an autonomous Sikh nation-state. As scholar Stephen Van Evera suggests that nationalist movements are inherently violent, the Khalistan movement quickly turned violent against the Indian state[6]. In 1984, the Indian army staged a siege of the Golden Temple, a sacred Sikh shrine, in an effort to take down Sikh extremists. After the altercation, more than 1,000 people died, and the temple was nearly destroyed. This results of the siege ignited support from the Sikh diaspora in Canada, both financially and socially. Sikhs in Canada began to fund the separatist movement in India, which resulted in the deterioration of the relationship between Canadian Sikhs and their Indian homeland[7]. Additionally, the sudden violence of the Khalistan movement caused a mass migration of Sikhs to western countries, most prominently in Canada.

The growing Sikh population in Canada has recently become a concern to India. Within the last year, Indian Prime Minister Narendra Modi has become wary of Canada and their foreign policies. Indian officials worry that western governments have become sympathetic to the Sikh separatists and will act in their interests when considering foreign policy[8]. In 2017, the Canadian Parliament declared the siege on the Golden Temple in Punjab a genocide committed by the Indian state against the Sikh religious minority. This genocide declaration has further strained the relationship between Sikh-Canadians and the Indian State. Being a stateless nation, the Sikh population in Canada has essentially become a political organization where they have gained the agency to influence politics in Canada[9]. Thus, the Canadian government has been an active participant in accommodating Sikh-Canadians and Sikh immigrants. On March 2, 2006, the Canadian Supreme court notably struck down a ban on allowing Sikh students to carry a kirpan, ceremonial dagger, in school[10].

Pop culture is another important indicator of the relationship between white Canadians and Sikhs. Within the past century, major pop culture figures of Sikh roots have gained popularity among all Canadians. Most famously, Lilly Singh, also known as iiSuperwomanii, was the highest paid female on the video hosting website YouTube in 2016. She is a vocal Sikh who was born and brought up in the Ontario province of Canada[11].

Sikh immigrants were not initially welcomed with open arms into Canada. Due to racial discrimination by white Canadians, South Asians had a slow assimilation into Canadian society. However, political tensions with the Indian state weakened the connection Sikh immigrants had with their homeland. Hence, integration and assimilation into a new national identity was possible. Sikhs in Canada have risen to political power with nearly twenty Sikh Members of Parliament. While Sikh-Canadians’ connection to India may have been weakened, Sikh identity in Canada was strengthened due to support for the Khalistan movement and Sikh nation, instead of the actual Indian state.


Endnotes:

[1] “History.” Canadian Sikh Heritage. Accessed August 11, 2019. http://canadiansikhheritage.ca/history/.

[2] McLeod, William Hewat. “Sikhism.” Encyclopædia Britannica. Encyclopædia Britannica, inc., June 21, 2019. https://www.britannica.com/topic/Sikhism

[3] “Sikhism in Canada.” Sikhism in Canada | The Canadian Encyclopedia. Accessed August 9, 2019. https://www.thecanadianencyclopedia.ca/en/article/sikhism.

[4] “History.” Canadian Sikh Heritage. Accessed August 11, 2019. http://canadiansikhheritage.ca/history/.

[5] “Who Is a ‘Sehajdhari’?: India News – Times of India.” The Times of India. Accessed August 11, 2019. https://timesofindia.indiatimes.com/india/Who-is-a-sehajdhari/articleshow/9830416.cms.

[6] Evera, Stephen Van. “Hypotheses on Nationalism and War.” International Security18, no. 4 (1994): 5. https://doi.org/10.2307/2539176.

[7] “Sinews of the Nation: Constructing Irish and Zionist Bonds in the United States” 51, no. 03 (2013). https://doi.org/10.5860/choice.51-1737.

[8] Sunny Hundal @sunny_hundal. “India’s Indifference to the Sikh Diaspora Is Damaging Western Foreign Policy towards the Country.” The Independent. Independent Digital News and Media, February 25, 2018. https://www.independent.co.uk/voices/india-sikh-justin-trudeau-separatism-canada-foreign-policy-a8223641.html.

[9] Harris Mylonas & Nadav G. Shelef (2014) Which Land Is Our Land? Domestic Politics and Change in the Territorial Claims of Stateless Nationalist Movements,Security Studies, 23:4, 754-786, DOI: 10.1080/09636412.2014.964996

[10] CBC News, “Ban on Sikh kirpan overturned by Supreme Court,” March 2, 2006. https://www.cbc.ca/news/canada/ban-on-sikh-kirpan-overturned-by-supreme-court-1.618238.

[11] Maya Oppenheim @mayaoppenheim. “The Highest-Paid Female YouTuber, and the Astonishing Amount She Earns.” The Independent. Independent Digital News and Media, March 6, 2017. https://www.independent.co.uk/news/people/lilly-singh-youtube-highest-paid-richest-forbes-list-2016-a7458441.html.

 

Assessment Papers Canada India Nikita Khurana

Assessment of Increased Chinese Strategic Presence in Afghanistan

Humayun Hassan is an undergraduate student at National University of Sciences and technology, Pakistan.  His areas of research interests include 5th and 6th generation warfare and geopolitics of the Levant.  He can be found on Twitter @Humayun_17. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Increased Chinese Strategic Presence in Afghanistan

Date Originally Written:  September 15, 2019.

Date Originally Published:  December 2, 2019.

Author and / or Article Point of View:  This article is written from the Chinese standpoint, with regards to U.S and North Atlantic Treaty Organization member country (NATO) presence in Afghanistan and the pursuit of the Belt and Road Initiative.

Summary:  Afghanistan is important to Chinese strategic interests. To ensure stability in its autonomous region of Xinjiang, expansion of the China-Pakistan Economic Corridor as part of the Belt and Road Initiative, and counter a perceived “encirclement of China” strategy, Afghanistan holds the key for China. Therefore, China is consolidating its interests in Afghanistan through “economic diplomacy”, facilitation of peace talks, and working with other regional players.

Text:  As a part of the Belt and Road Initiative (BRI), China is establishing multiple economic passages, across Eurasia, Africa, and Southeast Asia. A total of six economic[1] corridors are designed to connect China with most of the major markets of the world. To consolidate her direct access to these markets, it is pivotal for China to maintain regional and political stability, especially in areas that directly pertain to these economic corridors. Two of these six corridors, namely CPEC (China-Pakistan Economic Corridor) and China-Central Asia and West Asia economic corridors pass through the Chinese autonomous region of Xinjiang. This network of railroads, energy projects, and infrastructure is meant to connect Beijing with Central and Western Asia, along with the Middle East. Xinjiang is not only one of the most impoverished and underdeveloped regions of China, but is also home to almost 10-12 million Uighurs Muslims. In the past few years, Muslims in Xinjiang have caught significant media spotlight[2], due to growing sense of discontent among the local population with the Chinese administration. While the official Chinese narrative depicts a few Uighurs groups to be supportive of terrorist activities, the opposing viewpoint highlights internment camps[3] and over-representation of police force in the region. Nevertheless, the geo-economic importance of Xinjiang is paramount, which is why China is willing to use aggressive measures to restore stability in the area.

The militant factions of the Uighur community are supported by various group operating from Afghanistan. The Turkestan Islamic Movement, which was formerly known as East Turkestan Islamic Movement, is considered to be the primary organization undermining the Chinese sovereignty in Western China. In the past, this group has primarily operated from Afghanistan, with alliances with the Afghan Taliban (Taliban) and Al-Qaeda. However, since 2015, China has another reason to be cautious of protecting its economic[4] interests in the region. The Islamic State-Khorasan (IS-K) chapter of the violent extremist organization the Islamic State was established that year, with an aim to create its terror network in Afghanistan and Pakistan. Apart from tacitly supporting the Uighurs militant factions, IS-K has openly threatened to attack the ongoing CPEC projects, not only inside Pakistan but also in Western China[5].

The encirclement of China strategy advocates for constant U.S military and political presence in Chinese proximity[6]. With forces in Afghanistan the United States and NATO have opened up a new pressure point for China, a country that is already coping with the U.S forces in South China Sea and Japan, on the eastern front. After almost 18-years of non-conclusive war in Afghanistan, the U.S and Afghan forces have failed subdue the Taliban[7]. As the Kabul administration is facing financial and political turmoil, the U.S is considering reducing military presence in the country, and leaving a friendly government in Afghanistan. China seems to be aware of the political vacuum that awaits Afghanistan, which is why it presents an opportunity for it to find new allies in the country and work with other stakeholders to bring in a friendly government. This government vacuum-filling may not only allow China to neutralize U.S encirclement from Afghanistan, but will also help suppress terrorist organizations operating from Afghanistan. The latest developments in lieu of U.S-Taliban talks in Doha, Qatar indicate that China is enhancing ties with the Taliban. A Taliban government in Afghanistan may be suitable for China, at least in consideration of the available options. Not only have the Taliban declared war against IS-K[8], an entity that has openly threatened to disparage Chinese interests in the region and support militants in Western China, but also remained silent on the alleged persecution of the Uighurs in Xinjiang. This war declaration may be regarded as a major milestone in the China-Taliban relations, since the late 1990s when the Taliban government in the country allowed militant groups, such as Islamic Movement of Uzbekistan.

For the first few years of the Afghan war, China passively supported it. However, as the United States, under the Obama administration started to hint a military withdrawal from Afghanistan, China assumed a more active role in the country. Since the initiation of BRI, Chinese exports to Afghanistan have increased significantly[9]. For the first time in modern China-Afghanistan relations, China has offered military aid to the Afghanistan. The Chinese foreign minister also expressed a desire to expand the ongoing CPEC into Afghanistan as well[10]. Another aspect that is often discredited is the natural resource potential in the country. Afghanistan incorporates some of the largest Lithium reserves, which are particularly essential for the manufacturing of most electronic products. As per the American Geological Survey, Afghanistan holds approximately $3 trillion worth of natural resources[11]. This alone makes Afghanistan an area of interest for major world powers.

In conclusion, China’s approach towards Afghanistan may be best deciphered by a paradigm shift. From a strategic limited involvement to active leadership, China has now become one of the key stakeholders in the Afghan peace process. With an apparent failure of the Afghan peace talks between the Taliban and U.S, the situation is deteriorating quickly. The Taliban, since then, have vowed to double down on militancy. From a Chinese standpoint, continuation of U.S presence in Afghanistan and the anticipated increase in violence would be the least desired outcome. China, over the years, has strategically played a balancing act between all the internal stakeholders of Afghanistan, from offering aid to the national government to hosting a Taliban delegation in Beijing. Therefore, any political settlement in the country, whether it is the creation of a new “national government” with the Taliban or a truce between the fighting forces within the country may suit the Chinese in the long-run. As the BRI initiative enters the next stage, and threats of terror activities in the Xinjiang loom, and the race to tap into Afghanistan’s natural resources intensifies, China is now in unchartered waters, where any significant development in Afghanistan will directly effects its regional political and economic interests. It seems that, in coming times, China may assume the central role in organizing new peace initiatives, ensuring that whoever comes to power in Afghanistan may not thwart China’s ambitions in the country.


Endnotes:

[1]1 Hillman, J. (2019, September 4). China’s Belt and Road Is Full Of Holes. Retrieved October 10, 2019, from https://www.csis.org/analysis/chinas-belt-and-road-full-holes

[2] Sudworth, J. (2019, July 4). China Muslims: Xinjiang schools used to separate children from families. Retrieved October 10, 2019, from https://www.bbc.com/news/world-asia-china-48825090

[3] Shams, S. (2015, July 24). Why China’s Uighurs are joining jihadists in Afghanistan. Retrieved October 10, 2019, from https://www.dw.com/en/why-chinas-uighurs-are-joining-jihadists-in-afghanistan/a-18605630

[4] Pandey, S. (2018, September 22). China’s Surreptitious Advance in Afghanistan. Retrieved October 10, 2019, from https://thediplomat.com/2018/09/chinas-surreptitious-advance-in-afghanistan/

[5] Aamir, A. (2018, August 17). ISIS Threatens China-Pakistan Economic Corridor. Retrieved October 10, 2019, from https://www.chinausfocus.com/peace-security/isis-threatens-china-pakistan-economic-corridor

[6] Gunner, U. (2018, January 18). Continuity of Agenda: US Encirclement of China Continues Under Trump. Retrieved October 10, 2019, from https://www.globalresearch.ca/continuity-of-agenda-us-encirclement-of-china-continues-under-trump/5626694

[7] Wolfgang, B. Taliban now stronger than when Afghanistan war started in 2001, military experts say. Retrieved October 10, 2019, from, https://www.washingtontimes.com/news/2019/sep/9/taliban-strongest-afghanistan-war-started-2001/

[8] Burke, J. (2019, August 19). With Kabul wedding attack, Isis aims to erode Taliban supremacy. Retrieved October 10, 2019, from, https://www.theguardian.com/world/2019/aug/19/with-kabul-wedding-attack-isis-aims-to-erode-taliban-supremacy

[9] Zia, H. (2019, February 14). A surge in China-Afghan trade. Retrieved October 10, 2019, from, http://www.chinadaily.com.cn/a/201902/14/WS5c65346ba3106c65c34e9606.html

[10] Gul, A. (2018, November 1). China, Pakistan Seeking CPEC Extension to Afghanistan. Retrieved October 10, 2019, from, https://www.voanews.com/south-central-asia/china-pakistan-seeking-cpec-extension-afghanistan

[11] Farmer, B. (2010, June 17). Afghanistan claims mineral wealth is worth $3trillion. Retrieved October 10, 2019, from, https://www.telegraph.co.uk/news/worldnews/asia/afghanistan/7835657/Afghanistan-claims-mineral-wealth-is-worth-3trillion.html

 

Afghanistan Assessment Papers China (People's Republic of China) Great Powers & Super Powers Humayun Hassan

Assessing North Korea’s Cyber Evolution

Ali Crawford has an M.A. from the Patterson School of Diplomacy and International Commerce where she focused on diplomacy, intelligence, cyber policy, and cyber warfare.  She tweets at @ali_craw.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing North Korea’s Cyber Evolution

Date Originally Written:  September 17, 2019.

Date Originally Published:  November 25, 2019.

Author and / or Article Point of View:  The author believes that the international community’s focus on addressing North Korea’s nuclear capability sets the conditions whereby their cyber capabilities can evolve unchecked.

Summary:  Despite displaying a growing and capable cadre of cyber warriors, North Korean cyber prowess has been overshadowed by threats of nuclear proliferation. While North Korea remains extremely isolated from the global community, it has conducted increasingly sophisticated cyber attacks over a short span of time. In a relatively short period of time, North Korea has cultivated a cyber acumen worth recognizing as threatening as its nuclear program.

Text:  As the internet quickly expanded across the globe and changed the nature of business and communication, Western nations capitalized on its capabilities. Authoritarian regimes felt threatened by the internet’s potential for damaging the regime’s power structure. In the 1990s, Kim Jong-il, father of current North Korean leader Kim Jong-un, restricted internet access, usage, and technology in his country[1]. Eventually, Kim Jong-il’s attitude shifted after recognizing the potential benefits of the internet. The North likely received assistance from China and the Soviet Union to begin training a rudimentary cyber corps during the 80s and 90s[2]. Cyber was and still is reserved explicitly for military or state leadership use.

The expansion of North Korea’s cyber program continued under Kim Jong-un, who today seeks to project military might by displays of a capable nuclear program. But Kim Jong-un, who possesses a degree in computer science, also understood the potential for cultivating cyber power. For North Korea, cyber is not just an asymmetrical medium of warfare, but also a method of surveillance, intelligence-gathering, and circumventing sanctions[3]. Within the last decade, North Korea has demonstrated an impressive understanding and application of offensive cyber competence. Several experts and reports estimate North Korean cyber forces range from 1,800 to upwards of 6,000 professionals[4]. Internet access is reportedly routed through China, which lends added difficulty to attribution but provides a measure of defense[5]. North Korea is largely disconnected from the rest of the world and maintains a rudimentary internet infrastructure[6]. The disconnect between the state and the internet leaves a significantly small and less vulnerable attack surface for other nations to exploit. 

Little information is available regarding the internal structure of North Korea’s cyber forces. What is thought to be known suggests an organizational hierarchy that operates with some autonomy to achieve designated mission priorities. Bureau 121, No. 91 Office, and Lab 110 report to North Korea’s Reconnaissance General Bureau (RGB)[7]. Each reportedly operate internally and externally from Pyongyang. Bureau 121’s main activities include intelligence gathering and coordinating offensive cyber operations. Lab 110 engages in technical reconnaissance, such as network infiltration and malware implantation. No. 91 Office is believed to orchestrate hacking operations. Other offices situated under Bureau 121 or the RGB likely exist and are devoted entirely to information warfare and propaganda campaigns[8]. 

In the spring of 2013, a wave of cyber attacks struck South Korea. A new group called Dark Seoul emerged from North Korea armed with sophisticated code and procedures. South Korean banks and broadcasting companies were among the first institutions to endure the attacks beginning in March. In May, the South Korean financial sector was paralyzed by sophisticated malware. Later in June, marking the 63rd anniversary of the beginning of the Korean War, various South Korean government websites were taken offline by Distributed Denial of Service (DDoS) attacks. Although Dark Seoul had been working discreetly since 2009, its successful attacks against major South Korean institutions prompted security researchers to more seriously consider the North Koreans as perpetrators[9]. The various attacks against financial institutions would be a prequel to the massive cyber financial heists the North would eventually manage, possibly making South Korea a testing ground for North Korea’s code and malware vehicles.

North Korea’s breach of Sony Pictures in 2014 catapulted the reclusive regime to international cyber infamy. Members of an organization calling themselves the Guardians of Peace stole nearly 40 gigabytes of sensitive data from Sony Pictures, uploaded damaging information online, and left behind a bizarre image of a red skeleton on employees’ desktop computers[10]. This was the first major occurrence of a nation-state attacking a United States corporation in retribution for something seemingly innocuous. While the Sony hack was an example of how vague rules for conducting cyber war and crime differ between nations, the attack  was more importantly North Korea’s first true display of cyber power. Sony executives felt compelled to respond and sought counsel from the U.S. government. The government was hesitant to let a private company respond to an attack led by the military apparatus of a foreign adversary. Instead, President Barack Obama publicly named North Korea as the perpetrator and vaguely hinted at a potential U.S. response, becoming the first U.S. president to do so.

Cyber crime also provides alternative financing for the regime’s agenda. In February 2016, employees at the Bank of Bangladesh were struggling to recover a large sum of money that had been transferred to accounts in the Philippines and Sri Lanka. The fraudulent transactions totaled $81 million USD[11]. Using Bangladesh Bank employee credentials, the attackers targeted the bank’s SWIFT account. SWIFT is an international money transfer system used by financial institutions to transfer large sums of money. After-action analysis revealed the malware had been implanted a month prior and shared similarities with the malware used to infiltrate and exploit Sony in 2014[12]. The Bangladesh Bank heist was intensively planned and researched, which lent credence to the North’s growing cyber acumen. As of 2019, North Korea has accumulated an estimated $2 billion USD exclusively from cyber crime[13]. Security assessments indicate the Sony attack, the Bangladesh Bank hack, and the WannaCry attacks are related which lends some understanding to how North Korean cyber groups operate. In 2018, the United States filed criminal charges against a North Korean man for all three cyber crimes as part of a grander strategy for deterrence[14].

Finally, it is important to consider how North Korea’s cyber warfare tactics and strategies will evolve. North Korea has already proven to be a capable financial cyber crime actor, but how would its agencies perform in full-scale warfare? In terms of numbers, the North Korean military is one of the largest conventional forces in the world despite operating with rudimentary technology[15]. Studies suggest that while the North may confidently rely on its nuclear program to win a conventional war, it is unlikely that North Korea would be able to sustain its forces in long-term war[16]. North Korea would need to promptly engage in asymmetric warfare to disorient enemy forces to gain a technological advantage while continuously attempting to attack enemy systems to disrupt crucial communications. The regime could conduct several cyber operations against its adversaries, deny responsibility, then use the wrongful attribution as grounds for a kinetic response. North Korea has threatened military action in the past after being hit with additional sanctions[17]. 

Despite North Korea’s display of a growing and expansive cyber warfare infrastructure coupled with a sophisticated history of cyber attacks, the international community remains largely concerned with the regime’s often unpredictable approach to nuclear and missile testing. With the international community focused elsewhere, North Korea’s cyber program continues to grow unchecked. It remains to be seen if someday the international community will diplomatically engage North Korea regarding their cyber program with the same intensity as their nuclear program.


Endnotes:

[1] David E. Sanger, The Perfect Weapon, Crown Publishing, 2018, p. 127

[2] The Perfect Weapon, p.127-128; and Eleanor Albert, Council on Foreign Relations: North Korea’s Military Capabilities, 25 July 2019, retrieved from https://www.cfr.org/backgrounder/north-koreas-military-capabilities

[3] David Sanger, David Kirkpatrick, Nicole Perloth, New York Times: The World Once Laughed at North Korean Cyberpower. No more, 15 October 2017, retrieved from https://www.nytimes.com/2017/10/15/world/asia/north-korea-hacking-cyber-sony.html

[4] Ibid; and 1st Lt. Scott J. Tosi, Military Review: North Korean Cyber Support to Combat Operations, July/August 2017, retrieved from https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/MilitaryReview_20170831_TOSI_North_Korean_Cyber.pdf

[5] 1st Lt. Scott J. Tosi

[6] David Sanger, David Kirkpatrick, Nicole Perloth

[7] 1st Lt. Scott J. Tosi; and Kong Ji Young, Lim Jong In, and Kim Kyoung Gon, NATO CCDCOE:The All-Purpose Sword: North Korea’s Cyber Operations and Strategies, 2019, retrieved from https://ccdcoe.org/uploads/2019/06/Art_08_The-All-Purpose-Sword.pdf

[8] Ibid.

[9] Symantec Security Response, Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War, 26 June 2013, retrieved from https://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war; and Kong Ji Young, Lim Jong In, and Kim Kyoung Gon, NATO CCDCOE Publications, The All-Purpose Sword: North Korea’s Cyber Operations and Strategy, 2019, retrieved from https://ccdcoe.org/uploads/2019/06/Art_08_The-All-Purpose-Sword.pdf

[10] Kim Zetter, Wired: Sony Got Hacked Hard: What We Know and Don’t Know So Far, 3 December 2014, retrieved from https://www.wired.com/2014/12/sony-hack-what-we-know/

[11] Kim Zetter, Wired: That Insane, $81M Bangladesh Bank Heist? Here’s What We Know, 17 May 2016, retrieved from https://www.wired.com/2016/05/insane-81m-bangladesh-bank-heist-heres-know/

[12] Ibid.

[13] Michelle Nichols, Reuters: North Korea took $2 billion in cyberattacks to fund weapons program: U.N. report, 5 August 2019, retrieved from https://www.reuters.com/article/us-northkorea-cyber-un/north-korea-took-2-billion-in-cyberattacks-to-fund-weapons-program-u-n-report-idUSKCN1UV1ZX

[14] Christopher Bing and Sarah Lynch, Reuters: U.S. charges North Korean hacker in Sony, WannaCry cyberattacks, 6 September 2018, retrieved from https://www.reuters.com/article/us-cyber-northkorea-sony/u-s-charges-north-korean-hacker-in-sony-wannacry-cyberattacks-idUSKCN1LM20W

[15] Eleanor Albert, Council on Foreign Relations, What Are North Korea’s Military Capabilities?, 25 July 2019, retrieved from https://www.cfr.org/backgrounder/north-koreas-military-capabilities

[16] 1st Lt. Scott J. Tosi, Military Review: North Korean Cyber Support to Combat Operations, July/August 2017, retrieved from https://www.armyupress.army.mil/Portals/7/military-review/Archives/English/MilitaryReview_20170831_TOSI_North_Korean_Cyber.pdf

[17] Jack Kim and Ju-min Park, Reuters:Cyber-attack on South Korea may not have come from China after all, 22 March 2013, retrieved from  https://www.reuters.com/article/us-cyber-korea/cyber-attack-on-south-korea-may-not-have-come-from-china-after-all-regulator-idUSBRE92L07120130322

 

 

Assessment Papers Cyberspace North Korea (Democratic People’s Republic of Korea)

Assessment of Militia Forces as a Model for Recruitment and Retention in Cyber Security Forces

Franklin Holcomb is a graduate student from the U.S. at the University of Tartu, Estonia and a former research analyst on Eastern European security issues in Washington, D.C. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Militia Forces as a Model for Recruitment and Retention in Cyber Security Forces

Date Originally Written:  September 25, 2019.

Date Originally Published:  November 18, 2019.

Author and / or Article Point of View:  The author is a graduate student from the U.S. at the University of Tartu, Estonia and a former research analyst on Eastern European security issues in Washington, D.C. He is a strong believer in the Euro-American relationship and the increasing relevance of innovation in security and governance.

Summary:  U.S. and Western Armed Forces are struggling with recruitment and retention in their cyber units, which leaves their countries vulnerable to hostile cyber actors. As society becomes increasingly digitalized in coming years, the severity of these vulnerabilities will increase. The militia model adopted by the Baltic states provides a format to attract civilian experts and decrease vulnerabilities.

Text:  The U.S. Armed Forces are facing difficulties recruiting and retaining cyber-security talent. To meet this challenge the U.S. Marine Corps announced in April 2019 that it would establish a volunteer cyber-auxiliary force (Cyber Aux) consisting of a “small cadre of highly-talented cyber experts who train, educate, advise, and mentor Marines to keep pace with constantly-evolving cyber challenges[1].” The Cyber Aux will face many of the issues that other branches, and countries, have in attracting and retaining cyber-security professionals. Cyber Aux takes notably important steps towards increasing the appeal of participation in the U.S. armed forces for cyber-security experts, such as relaxing grooming and fitness standards. But Cyber Aux will struggle to attract enough professionals due to factors such as its role as a mentorship organization, rather than one that conducts operations, and the wide military-civilian pay gap in the cyber-security field[2]. These factors will ensure U.S. and North Atlantic Treaty Organization (NATO) military forces will have suboptimal and likely understaffed cyber components; increasing their vulnerabilities on and off the battlefield.

Estonia, Latvia, and Lithuania have been on the geographic and virtual frontlines of many challenges faced by NATO. The severity of threats facing them has made security innovation a necessity rather than a goal. While not all innovations have succeeded, these countries have created a dynamic multi-layered defense ecosystem which combines the skillsets of civil society and their armed forces to multiply their defense capabilities and increase national resilience. There are numerous organizations that play a role in these innovations including civilian groups as well as the militias of each state[3]. The militias, non-professional military forces who gain legitimacy and legality from state authorization, play a key role in increasing the effective strength of forces in the region. The Estonian Defense League, the Latvian National Guard, and the Lithuanian Riflemen’s Association all draw on civilian talent to form militias. These organizations are integrated, to different extents, with military structures and play supporting roles in a time of crisis that would free regular forces to conduct operations or support their operations directly.

These militias have established cyber units which are models for integrating civilian cyber-security professionals into military structures. The Baltic cyber-militias engage directly in practical cyber-security concerns, rather than being restricted to academic pursuit or mentoring like Cyber Aux. In peacetime, these organizations conduct training for servicemen and civilians with the goal of raising awareness of the risks posed by hostile cyber actors, increasing civilian-military collaboration in cyber-security, and improving cyber-security practices for critical systems and infrastructure[4]. In crisis, these units mobilize to supplement state capabilities. The Estonian Defense League and Latvian National Guard have both established cyber-defense units, and Lithuania intends to complete a framework through which its militia could play a role in supporting cyber-defense capabilities by January 2020[5]. 

The idea of a cyber-militia is not new, yet the role these organizations play in the Baltic states as a talent bridge between the armed forces and civil society provides a very useful policy framework for many Western states. Currently cyber-auxiliaries are used by many states such as Russia and China who rely on them to supplement offensive cyber capacities[6]. This situational, and often unofficial use of auxiliaries in cyber operations has advantages, prominently including deniability, but these should not overshadow the value of having official structures that are integrated into both civil society and national cyber-defense. By creating a reserve of motivated civilian professionals that can be called on to supplement military cyber units during a time of crisis, the Baltic states are also effectively increasing not only their resilience to a major cyber incident while it is underway, but raising the up-front cost of conducting such an attack in the first place.

As NATO and European policymakers consider the best courses available to improve their Armed Forces’ cyber capacities, the models being adopted in Estonia, Latvia, and Lithuania are likely of value. Estonia pioneered the concept in the region[7], but as the model spreads to other states Western states could learn from the effectiveness of the model. Cyber-militias, which play a supportive role in cyber operations, will strengthen the cyber forces of militaries in other NATO states which are undermined by low recruitment and retention.


Endnotes:

[1] (2019, May 13). Marine Corps Establishes Volunteer Cyber Auxiliary to Increase Cyberspace Readiness. Marines.mil. Retrieved September 25, 2019. https://www.marines.mil/News/Press-Releases/Press-Release-Display/Article/1845538/marine-corps-establishes-volunteer-cyber-auxiliary-to-increase-cyberspace-readi

[2] Moore E., Kollars N. (2019, August 21). Every Marine a Blue-Haired Quasi-Rifleperson? War on the Rocks. Retrieved on September 25, 2019. https://warontherocks.com/2019/08/every-marine-a-blue-haired-quasi-rifleperson/; Cancian M., (2019, September 05) Marine Cyber Auxiliaries Aren’t Marines, and Cyber “Warriors” aren’t Warriors. War on the Rocks. Retrieved September 25, 2019. https://warontherocks.com/2019/09/marine-cyber-auxiliaries-arent-marines-and-cyber-warriors-arent-warriors/

[3] Thompson T. (2019, January 9) Countering Russian Disinformation the Baltic nations’ way. The Conversation. Retrieved September 25, 2019. http://theconversation.com/countering-russian-disinformation-the-baltic-nations-way-109366

[4] (2019, September 24). Estonian Defense League’s Cyber Unit. Estonian Defense League. Retrieved on September 25, 2019. http://www.kaitseliit.ee/en/cyber-unit; (2013). National Armed Forces Cyber Defense Unit (CDU) Concept. Latvian Ministry of Defense. Retrieved September 25, 2019. https://www.mod.gov.lv/sites/mod/files/document/cyberzs_April_2013_EN_final.pdf; (2015, January 15). National Guard opens cyber-defense center. Public Broadcasting of Latvia. Retrieved September 25, 2019. https://eng.lsm.lv/article/society/society/national-guard-opens-cyber-defense-center.a113832/; Kaska K, Osula A., Stinnissen J. (2013) The Cyber Defence Unit of the Estonian Defense League NATO Cooperative Cyber Defense Centre of Excellence. Tallinn, Estonia. Retrieved September 25, 2019. https://ccdcoe.org/uploads/2018/10/CDU_Analysis.pdf; Pernik P. (2018, December). Preparing for Cyber Conflict: Case Studies of Cyber Command. International Centre for Defense and Security. Retrieved on September 25, 2019. https://icds.ee/wp-content/uploads/2018/12/ICDS_Report_Preparing_for_Cyber_Conflict_Piret_Pernik_December_2018-1.pdf

[5] (2019, July 03) The Government of the Republic of Lithuania: Ruling on the Approval of the Interinstitutional Action Plan for the Implementation of National Cybernet Security Strategy. Lithuanian Parliament. Retrieved September 25, 2019. https://e-seimas.lrs.lt/portal/legalAct/lt/TAD/faeb5eb4a6c811e9aab6d8dd69c6da66?jfwid=dg8d31595

[6] Applegate S. (2011, September/October) Cybermilitias and Political Hackers- Use of Irregular Forces in Cyberwarfare. IEEE Security and Privacy. Retrieved on September 25, 2019. https://www.researchgate.net/publication/220497000_Cybermilitias_and_Political_Hackers_Use_of_Irregular_Forces_in_Cyberwarfare

[7] Ruiz M. (2018.January 9) Is Estonia’s Approach to Cyber Defense Feasible in the United States? War on the Rocks. Accessed: September 25, 2019. https://warontherocks.com/2018/01/estonias-approach-cyber-defense-feasible-united-states/; Drozdiak N. (2019, February 11) One of Russia’s Neighbors Has Security Lessons for the Rest of Us. Bloomberg. Retrieved on September 25, 2019. https://www.bloomberg.com/news/articles/2019-02-11/a-russian-neighbor-has-cybersecurity-lessons-for-the-rest-of-us

Assessment Papers Baltics Cyberspace Estonia Franklin Holcomb Latvia Lithuania Non-Full-Time Military Forces (Guard, Reserve, Territorial Forces, Militias, etc)

An Assessment of the Current State of U.S. Cyber Civil Defense

Lee Clark is a cyber intelligence analyst currently working on cyber defense strategy in the Middle East.  He holds an MA in intelligence and international security from the University of Kentucky’s Patterson School. He can be found on Twitter at @InktNerd.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Current State of U.S. Cyber Civil Defense

Date Originally Written:  September 11, 2019.

Date Originally Published:  November 22, 2019.

Author and / or Article Point of View:  The author is an early-career cybersecurity analyst with experience advising private and public sector organizations on cyber threats and building cyber threat intelligence programs.

Summary:  Local civic organizations in the U.S. are experiencing a wave of costly and disruptive low-sophistication cyberattacks on a large scale, indicating widespread vulnerabilities in networks. In light of past and ongoing threats to U.S. cyber systems, especially election systems, this weak cybersecurity posture represents a serious national security concern.

Text:  The state of cyber defenses among public sector entities in the United States is less than ideal. This is especially true among smaller civic entities such as city utility companies, local government offices (including local election authorities), and court systems. There is currently an ongoing wave of cyberattacks against government systems in cities across the U.S. In 2019, more than 40 local government organizations experienced successful ransomware attacks[1]. These widespread attacks indicate an attractive attack surface and vulnerable profile to potential cyber aggressors, which has broad implications for the security of U.S. cyber systems, including election systems.

Ransomware is a vector of cyberattack in which malicious actors compromise a victim’s computer and encrypt all available files, while offering the victim an encryption key to decrypt files in exchange for a ransom payment, typically in the form of a cryptocurrency such as Bitcoin. If victims refuse to pay or cannot pay, the files are left encrypted and the infected computer(s) are rendered useless. In some cases, files can be decrypted by specialists without paying the ransom. In other cases, even if victims pay, there is in reality no decryption key and files are permanently locked. 

Ransomware is among the most common and least sophisticated forms of cyberattack in the field today. Attacks of this type have grown exponentially in recent years, and one study found that in 2019, 18% of all cyber-related insurance claims internationally were linked to ransomware incidents, second only to business email compromises[2]. In some cases, insurance companies were found encouraging clients to pay ransoms because it saved money and promoted the criminal practice, enhancing the market for cyber insurance services[3]. 

Ransomware attacks are relatively easy to execute on the part of attackers, and often target computers can be infected by tricking a victim into clicking on a malicious link through a phishing email disguised as a legitimate business communication. For example, in 2018, city computer networks in Allentown, Pennsylvania were offline for weeks after ransomware infected the system through an employee’s email after the employee failed to install security updates and clicked on a phishing email. The attack cost the city around USD 1 million to resolve and ongoing security improvements are costing approximately USD 420,000 per year[4].

Local city systems make for attractive targets for cyber attackers for several reasons: 

1) Such organizations often carry cyber insurance, indicating an ability to pay and a higher likelihood of attackers being paid quickly without difficulty.

2) Local government offices have a reputation for being soft targets, often with lax and/or outdated security software and practices.

3) Infecting systems requires very little investment of resources on the attacker’s part, such as time, technical skill, focus, and labor, since phishing emails are often sufficient to gain access to targeted networks.

4) Executing successful attacks against such organizations often results in widespread media attention and tangible damages, including monetary cost to the organization, disruption to services, and public backlash, all of which enhance the attacker’s reputation in criminal communities.

Because of the ongoing prevalence of ransomware attacks, U.S. officials recently voiced public concern about the plausibility of ransomware attacks against election systems during the 2020 elections[5]. A chief concern is that if attackers have enough systems access to lock the files, the attackers very likely also have the ability to alter and/or steal files from an infected system. This concern is compounded by recent revelations by the Senate Select Committee on Intelligence that Russian-linked threat actors targeted election systems in all 50 states in 2016, most successfully in Illinois and Arizona[6]. 

It should be noted that U.S. federal agencies and private consulting firms have engaged in a large-scale effort to increase security measures of election systems since 2016 in preparation for the 2020 election, including hiring specialists and acquiring new voting machines[7]. The specifics, technical details, and effectiveness of these efforts are difficult to properly measure from open source materials, but have drawn criticism for their limited scope[8].

In the U.S., election security is among the most complex and difficult challenges facing the cybersecurity field. Elections involve countless competing and interacting stakeholders, intricate federal and local regulations, numerous technologies of varying complexity, as well as legal and ethical norms and expectations. These nuances combine to present a unique challenge to U.S. national security concerns, especially from a cyber-viewpoint. It is a matter of public record that U.S. election systems are subject to ongoing cyber threats from various actors. Some known threats operate with advanced tactics, techniques, procedures, and resources supported by technologically-sophisticated nation states. 

The recent wave of ransomware attacks on local governments compounds election security concerns because the U.S. election system relies heavily on local government organizations like county clerk and poll offices. Currently, local systems are demonstrably vulnerable to common and low-effort attacks, and will remain so without significant national-level efforts. If local defenses are not developed enough to resist a ransomware attack delivered in a phishing email, it is difficult to imagine a county clerk’s office in Ohio or Kentucky having sufficient cyber defenses to repel a sophisticated attack by a Russian or Chinese-backed advanced persistent threat group. 

After the beginning of the nuclear arms race in the second half of the 20th century, the U.S. government developed a national civil defense program by which to prepare local jurisdictions for nuclear attacks. This effort was prominent in the public mind and expensive to execute. Lessons from this national civil defense program may be of value to adequately prepare U.S. civic cyber systems to effectively resist both low and high-sophistication cyber intrusions.

Unlike nuclear civil defense, which has been criticized for achieving questionable results in terms of effective defense, cyber civil defense effectiveness could be benchmarked and measured in tangible ways. While no computer system can be entirely secure, strong indicators of an effective cybersecurity posture include up-to-date software, regular automatic security updates, periodic security audits and vulnerability scans, established standard operating procedures and best practices (including employee cyber awareness training), and a well-trained and adequately-staffed cybersecurity team in-house.


Endnotes:

[1] Fernandez, M., Sanger, D. E., & Martinez, M. T. (2019, August 22). Ransomware Attacks Are Testing Resolve of Cities Across America. Retrieved from https://www.nytimes.com/2019/08/22/us/ransomware-attacks-hacking.html

[2] Cimpanu, C. (2019, September 2). BEC overtakes ransomware and data breaches in cyber-insurance claims. Retrieved from https://www.zdnet.com/article/bec-overtakes-ransomware-and-data-breaches-in-cyber-insurance-claims/

[3] Dudley, R. (2019, August 27). The Extortion Economy: How Insurance Companies Are Fueling a Rise in Ransomware Attacks. Retrieved from https://www.propublica.org/article/the-extortion-economy-how-insurance-companies-are-fueling-a-rise-in-ransomware-attacks

[4] Fernandez, M., Sanger, D. E., & Martinez, M. T. (2019, August 22). Ransomware Attacks Are Testing Resolve of Cities Across America. Retrieved from https://www.nytimes.com/2019/08/22/us/ransomware-attacks-hacking.html

[5] Bing, C. (2019, August 27). Exclusive: U.S. officials fear ransomware attack against 2020 election. Retrieved from https://www.reuters.com/article/us-usa-cyber-election-exclusive/exclusive-us-officials-fear-ransomware-attack-against-2020-election-idUSKCN1VG222

[6] Sanger, D. E., & Edmondson, C. (2019, July 25). Russia Targeted Election Systems in All 50 States, Report Finds. Retrieved from https://www.nytimes.com/2019/07/25/us/politics/russian-hacking-elections.html

[7] Pearson, R. (2019, August 5). 3 years after Russian hackers tapped Illinois voter database, officials spending millions to safeguard 2020 election. Retrieved from https://www.chicagotribune.com/politics/ct-illinois-election-security-russian-hackers-20190805-qtoku33szjdrhknwc7pxbu6pvq-story.html 

[8] Anderson, S. R., Lostri, E., Jurecic, Q., & Taylor, M. (2019, July 28). Bipartisan Agreement on Election Security-And a Partisan Fight Anyway. Retrieved from https://www.lawfareblog.com/bipartisan-agreement-election-security-and-partisan-fight-anyway

Assessment Papers Civil Defense Cyberspace Lee Clark United States

Assessing Black Swans and their Pre-Incident Indicators

Charles Cameron, is a poet first and foremost, managing editor of the Zenpundit blog, and one-time Senior Analyst with The Arlington Institute and Principal Researcher with The Center for Millennial Studies at Boston University. He holds an MA Oxon, having studied theology at Christ Church, Oxford, under AE Harvey. He is the designer of the HipBone family of creative and analytic games, based on Hermann Hesse’s Nobel-winning novel, The Glass Bead Game. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Black Swans and their Pre-Incident Indicators

Date Originally Written:  August 21, 2019.

Date Originally Published:  November 4, 2019.

Author and / or Article Point of View:  The author, who earned a living as a professional futurist during the 1999/2000 rollover, believes Black Swan Events will disrupt our best efforts to predict future threats.  However, with cognitive humility firmly in place national security analysts can observe the cross-disciplinary impacts of trends and can at least begin to think better about where these trends may lead.

Summary:  Black Swan Events come as a surprise, have a major effect, and are often inappropriately rationalized after the fact with the benefit of hindsight.  Rather than watching the Black Swan take off from the lake, identifying its initial wing flaps, as warning of the impending event, and where other events intersect, is valuable.  

Text:  Watching a black swan take off is instructive.  It starts, invisibly, on the lake of time, skeeting with wing-flaps to gain speed, achieves lift-off, after quite a while, and whang, whang, whang, ups itself to optimal speed and altitude – at which point we, in our hide in the marshes, recognize “Hey, there’s a black swan here,” and note where on the lake of time the occurrence occurred.  National security analysts often opine on Black Swan Events, which are events that comes as a surprise, has a major effect, and are often inappropriately rationalized after the fact with the benefit of hindsight.  Equally if not more important than the Black Swan Event are the pre-incident indicators of the event, the flaps of the swan’s wings if you will, that enabled the Black Swan to take flight. 

A first flap might have been Ramon Llull’s devices for calculating all possible knowledge by means of wheels and tables.  As History-Computer.com suggests, “One can ask ‘What exactly is Ramon Llull’s place in the history of computers and computing?’ The answer is Llull is one of the first people who tried to make logical deductions in a mechanical, rather than a mental way.”  On the lake of time, that preliminary wing-flap occurs around 1275 CE.  Llull, a Franciscan, was called Doctor Illuminatus, and beatified by the Church in 1514 CE.

Skipping a few possible Renaissance wing-flaps from the general type of magus on which Shakespeare based his Prospero, and oh, Pascal and Leibniz, we can reach Charles Babbage.  Babbage attained lift-off but not optimal speed or flight altitude with his Difference and Analytical mechanical computing engines.  While Llull’s were wing-flaps with the swan’s orange webbed feet still tracing ripples in the waters of time, Babbage’s definitively cleared the lake, it’s reflection, however, still allowing us to date it to the reign of Queen Victoria and Lewis Carroll’s river-boating tales with Alice – circa 1833 to 1871.  Insufficient funding prevented the construction of Babbage’s engine – an indication that general awareness of a black swan in flight was still lacking.  Even the powerful flap of Vannevar Bush’s memex machine, described in his 1945 Atlantic piece “As We May Think” wasn’t enough.

Next are the wing-flaps of Johnny von Neumann, or International Business Machines aka IBM mainframes at a time when Thomas Watson said no more than six computers would suffice for world-wide supply.  Even the first personal computers (PC), or the portable Osbornes and KayPros made a few flaps, but it’s Steve Jobs’ Macintosh that hits speed and altitude, popularity and elegance.  In 1984 the Macintosh dragged the reluctant PC world into Windows behind it.  Black Swan, we cry, as ARPANET, an internet precursor, becomes the World Wide Web which sets the conditions for Facebook and QAnon.  “We didn’t see it coming” analyst cry, turning to Nicholas Nassim Taleb’s book, “Black Swan,” for an excuse.  Taleb, meanwhile, has moved on, writing more books and a stream of articles – and thinking as yet unwritten thoughts.

The lake of time by now has become, for all practical purposes, the timeline of computing, but the flight plan of the Black Swan has still not been announced.  Black Swans in general don’t issue flight plans and – here’s the catch – are generally recognized only in retrospect.  So the future can be intuited to some degree by assessing the black swans already in flight such as social media and climate change, and tracking them to their national security implications such as weakening of the nation state, the rise of nationalist movements, protest movements, and massive migrations / movements.  But beyond that, and in terms of Black Swans just now achieving lift-off – the future is black, blank, invisible, unseen, and unguessable.  This un-guessability is you will is partly because the future lies where the paths of Black Swans such as mass migration and climate change intersect and cross-pollinate.

Pollination is from a different discourse than swan lift-off, of course – it’s mixing metaphors.  But then by now, interdisciplinarity and perhaps intersectionality intersect, too.  “Only connect” wrote English novelist EM Forster, flapping his dark wings back before the First World War in 1910: “Only connect!” that was the whole of her sermon.  “Only connect the prose and the passion, and both will be exalted, and human love will be seen at its height.  Live in fragments no longer.”

Cognitive humility is valuable to not only surviving Black Swans but identifying the early flap of their wings.  While best assessments of future threats can be made, exploring the cross-over impacts of these assessments can be of value.  So too can considering outside influences and whether possible events will unfold in a sequence or lack thereof.  As national security threats are driven by the needs of people and their actions, returning frequently to climate change and cross-border mass migration threats can be of value.  Finally, one’s depth of historical knowledge will greatly one’s reach of futuristic thinking.  And, despite all this, the future Black Swan Event may still come at us from behind.  

Endnotes:

None.

Assessment Papers Charles Cameron Major Events / Unforeseen Events / Black Swans

Alternative History: An Assessment of the Islamic Revolutionary Guard Corps Navy Azhdar Unmanned Undersea Vehicle

David R. Strachan is a naval analyst and founder of Strikepod Systems (strikepod.com), a provider of current and strategic fiction intelligence (FICINT) on global naval affairs, with an emphasis on unmanned maritime systems.  He can be found on Twitter @Strikepod.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Alternative History: An Assessment of the Islamic Revolutionary Guard Corps Navy Azhdar Unmanned Undersea Vehicle

Author and / or Article Point of View:  This article presumes that the anonymous tanker attacks of May 12, 2019, were carried out by the Islamic Revolutionary Guard Corps Navy (IRGCN) using an indigenously-developed unmanned undersea vehicle (UUV), and that the United States subsequently uncovered evidence of an Iranian offensive UUV, the Azhdar. It is written from the perspective of the U.S. Intelligence Community for an audience of national security policymakers.

Date Originally Written:  August 10, 2019.

Date Originally Published:  October 28, 2019.

Summary:  U.S. intelligence has uncovered evidence that Iran has repurposed its e-Ghavasi swimmer delivery vehicle (SDV) as an offensive UUV.  This repurposing is a potentially game-changing capability for Iranian naval forces with grave implications for regional stability.

Text:  On the morning of May 12, 2019, four oil tankers anchored off the coast of the Port of Fujairah, United Arab Emirates (UAE), sustained damage from what was alleged to be limpet mines placed by Iranian divers or fast boat operatives. However, scientific intelligence obtained from a clandestine source working alongside UAE investigators suggests that the blast damage was in fact inconsistent with the use of limpet mines. The source also reports that UAE investigators reached conclusions similar to those of an unnamed Norwegian insurance company (as reported by Reuters on May 17, 2019), namely that the IRGCN was behind the attacks, that these attacks were likely carried out using “underwater drones carrying 30-50 kg (65-110 lb.) of high-grade explosives,” and that the release of such information would cause significant alarm and exacerbate regional instability[1]. Additional supporting evidence was not provided, but if confirmed, this type of attack would represent a deeply concerning development for the United States, its  allies, and a potentially game-changing breakthrough for the IRGCN. 

Despite years of crippling economic sanctions, Iran has managed to acquire a potent undersea warfare capability, including three Russian-made Kilo-class submarines, nearly two dozen Ghadir-class midget submarines, two domestically produced classes of attack submarine (Fateh and Besat), and an assortment of special operations vehicles and mines[2]. Given the IRGCN’s experience with undersea operations, including offensive mining, and the fact that the Iranian Revolutionary Guard Corps and IRGCN have historically been skilled early adopters of unmanned technologies, we anticipated that Iran would seek to acquire an unmanned undersea capability, either through illicit acquisition or indigenous manufacture. Even a crude UUV would provide a considerable asymmetric advantage to Iran and its nonstate proxies operating in the Strait of Hormuz and Bab al-Mandeb Strait. As such, U.S. collection efforts expanded in 2010 to include monitoring for indications of Iranian procurement of UUV-related technologies. 

In 2012, a report surfaced that Iran had managed to domestically produce a UUV, dubbed the Phoenix, that was capable of 18 knots while submerged[3]. Given Tehran’s history of exaggerating or outright fabricating military capabilities, the veracity of this report was questionable. We were aware, however, that Iran had been attempting to acquire commercially available UUVs by tapping into the global defense marketplace via a complex web of front companies and smuggling operations. Iran was also attempting to acquire commercial off-the-shelf components, such as accelerometers and gyroscopes (used in inertial guidance systems), marine magnetometers, electro-hydraulic pressure sensors, and undersea modems. In the months leading up to May 12, 2019, we were well aware of Iranian materiel gains, but believed that the technical and operational challenges involved in deploying an offensive UUV were too great for Iran to overcome. However, given the UAE investigation, and intelligence recently provided by a highly placed source within the Iranian naval establishment, we no longer believe this to be the case.

We are now certain that Iran has repurposed its e-Ghavasi SDV as a weaponized UUV, and that four of these vehicles were in fact used to carry out the May 12, 2019 attacks. With its ready-made hullform and operational propulsion system, Iranian engineers successfully retrofitted a crude but effective onboard inertial guidance system. Coupled with its capacity to accommodate a large multi-influence mine, the weaponized, unmanned e-Ghavasi, dubbed the Azhdar, is now a highly mobile, stealthy, and lethal mine platform.

The weaponized UUV Azhdar is 533mm in diameter, which makes it compatible with standard heavyweight torpedo tubes. In order to fit, the vehicle’s forward diving planes and rear stabilizer have been recessed into the hull and are spring loaded to deploy upon launch. The vehicle’s cargo bay is large enough to carry a 480kg seabed mine, and it is likely, given the scale of the damage, that only a fraction of its ordnance capacity was utilized in the May 12, 2019 attacks[4]. Approximately twelve units are currently in the IRGCN inventory.  Assuming current Iranian defense industrial capacity and an uninterrupted connection to illicit supply lines, we believe Iran is capable of producing two to three weaponized UUVs per month.

The Azhdar is essentially a mobile mine that can be programmed to detonate at a particular time or place, or when influenced by specific sensory inputs. It can be deployed from surface or subsurface platforms, and is extremely hard to detect and neutralize. Although relatively slow and lumbering when compared to a torpedo or encapsulated torpedo mine, it is extremely quiet and stealthy, and, given its mobility, is largely immune to mine countermeasures. Azhdar undersea deployments would be far more covert than indiscriminate mining, which would take several days of highly visible surface activity. Also, the psychological effect of targeted Azhdar attacks could enable the Iranians to effectively close the Strait of Hormuz while enjoying deniability and maintaining a vital economic lifeline for oil exports.

The Azhdar poses a unique and significant tactical challenge for the U.S. Navy, as it would likely render traditional mine countermeasures and anti-submarine warfare (ASW) tactics ineffective. In a manner consistent with Iranian torpedo tactics, we believe that Azhdars would be deployed from Ghadir-class midget submarines operating on the seabed in shallow, cluttered coastal areas where they would be effectively masked from sonar detection. But unlike a torpedo launch, which would expose the Ghadir to near-immediate counter-detection and counterattack by U.S. ASW assets, an Azhdar deployment would be extremely difficult if not impossible to detect. Once deployed, the Azhdars would proceed slowly and quietly, approaching their targets without warning and detonating on contact or from magnetic influence. The Ghadir could then rearm while surfaced or submerged using divers from an IRGCN surface vessel to facilitate the reloading process[5]. 

The Azhdar UUV is a force multiplier for the IRGCN, combining the sea denial capability of conventional offensive mine warfare with the stealth, mobility, and plausible deniability of unmanned undersea operations. It is a game-changer for Iranian seapower, with far-reaching implications for the United States and its regional interests.


Endnotes:

[1] Reuters, (2019, May 17) Exclusive: Insurer says Iran’s Guards likely to have organized tanker attacks https://www.reuters.com/article/us-usa-iran-oil-tankers-exclusive/exclusive-insurer-says-irans-guards-likely-to-have-organized-tanker-attacks-idUSKCN1SN1P7

[2] See Covert Shores, (2017, December 29) Iranian e-Ghavasi Human Torpedo http://www.hisutton.com/Iran_Chariot.html; Covert Shores, (2015, October 10) Demystified – new low profile Iranian SDV http://www.hisutton.com/Demystified%20-%20new%20low-profile%20Iranian%20SDV.html; Covert Shores, (2016, August 28) Nahang Class http://www.hisutton.com/Nahang%20Class.html; Office of Naval Intelligence, (2017, February) Iranian Naval Forces: A Tale of Two Navies https://www.oni.navy.mil/Portals/12/Intel%20agencies/iran/Iran%20022217SP.pdf

[3] Navy Recognition, (2012, January 24) Iran reportedly designed an unmanned undersea vehicle (UUV) https://www.navyrecognition.com/index.php/news/year-2012-news/january-2012-navy-world-naval-forces-maritime-industry-technology-news/294-iran-reportedly-designed-an-unmanned-underwater-vehicle-uuv.html

[4] Covert Shores, (2017, December 29) Iranian e-Ghavasi Human Torpedo http://www.hisutton.com/Iran_Chariot.html

[5] Tasnim News Agency, (2016, January 30) Iranian Navy Forces Practice Off-Dock Torpedo Loading in Drills https://www.tasnimnews.com/en/news/2016/01/30/985644/iranian-navy-forces-practice-off-dock-torpedo-loading-in-drills

Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers David R. Strachan Iran Underwater Capabilities

Alternative Future: Assessment of the Effects of the Loss of the American Lease on Camp Lemonnier, Djibouti

Travis Prendergast has served in the United States Army for eight years as a Rifle Platoon Leader, Staff Officer, and Rifle Company Commander.  He currently serves as a Company Commander in U.S. Army Recruiting Command.  He has just started tweeting as @strategy_boi, where he shares fiction and non-fiction content.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Alternative Future:  Assessment of the Effects of the Loss of the American Lease on Camp Lemonnier, Djibouti

Date Originally Written:  August 10th, 2019.

Date Originally Published:  October 17, 2019.

Author and / or Article Point of View:  The author is a current military member who served at Camp Lemonnier, Djibouti in 2018. The article is written from the point of view of a historian in the mid-2030s, examining shifts in great power competition in East Africa.

Summary:  After the United States lost its lease on Camp Lemonnier, Djibouti in 2024, a series of operational and strategic challenges arose in East Africa. The departure of certain operational assets degraded America’s capability to conduct crisis response. At a strategic level, the ability of the United States to stem Chinese foreign direct investment and influence in Africa also suffered.

Text:  Looking back, it is easy to pinpoint the shift in America’s strategic position in East Africa to the 2024 decision by Djiboutian President Ismail Omar Guelleh to not allow the United States to extend its lease on Camp Lemonnier, Djibouti (CLDJ). As a former commander of United States Africa Command (USAFRICOM) had once said of the then $1.2 billion worth of Djiboutian debt to China, there did indeed come a time when that money would be collected[1]. The collection came at a steep price for Djibouti, as the country was forced to hand over control of the Doraleh Container Terminal to Beijing, an outcome many had feared would be the eventual result of the Chinese debt trap[2]. However, the United States paid the steepest price of all by losing its strategic position at CLDJ, which was at the time the United States’ longest enduring military base in Africa and headquarters of the Combined Joint Task Force – Horn of Africa (CJTF-HOA). Whether the loss came as a result of the Chinese Belt and Road Initiative (BRI) influx of money and influence into the Djiboutian government, or as a result of American foreign policy changes, is still in debate even ten years later. It is clear though that the loss of CLDJ triggered strategic and operational effects that are still being felt today.

With the loss of CLDJ, the United States’ already tenuous grasp on Africa, best illustrated by the failure of USAFRICOM to establish its headquarters on the continent itself, slipped further. First used by America in 2001 and expanded in 2007, the camp had been a hub for a variety of United States operations not just in East Africa, but in Yemen as well[3]. As the base expanded, so did its mission set, resulting in the United States basing not just special operations forces and Marines there, but also conventional Army units[4]. This expansion of the base and the operational support that Camp Lemonnier provided to the operations in Yemen and East Africa only intensified the impact of the loss of the American lease on CLDJ.

The immediate scramble to plan for and then re-locate the 4,000 personnel on Camp Lemonnier and their attendant functions to other locations left little time to plan for contingency operations in the Horn of Africa. Just as the United States military was completing its phased transition out of Camp Lemonnier, riots in the South Sudanese capital of Juba in 2026 threated American embassy personnel and tested USAFRICOM’s ability to respond to crises on the continent from outside the continent. With the departure of the East Africa Response Force from Camp Lemonnier, the United States could no longer provide a rapid response force as outlined in the New Normal procedures that had been in put in place in reaction to the Benghazi consulate attacks in 2012[5][6]. Instead, USAFRICOM and the Department of State had to rely on another child of the Benghazi attacks: the Special Purpose Marine Air Ground Task Force (SP-MAGTF) located in Moron, Spain and Sigonella, Italy[7]. In the vast distances of the African continent, the time spent getting from Sigonella to Juba proved costly, and by the time the SP-MAGTF element secured the embassy, two American diplomats were dead. In the investigations in the months that followed, it was not lost on American legislators that a failure to maintain a foothold in East Africa had contributed to the loss of American lives and property in Juba.

Beyond the immediate operational costs of losing CLDJ, America faced a greater strategic loss in East Africa. As part of the BRI that China had been pursuing for over a decade prior to 2024, the Export-Import Bank of China had loaned Djibouti nearly $957 million as of 2018 in order to finance development projects[8]. Also under the BRI, China constructed the Djibouti International Free Trade Zone, a 3.5 billion dollar project[9]. After losing its foothold in Djibouti, the United States had little diplomatic clout to resist the continued investment of Chinese capital into East African states, furthering the debt trap situation beyond the borders of Djibouti. Furthermore, with the departure of the United States military from Djibouti, long-term American humanitarian projects in Djibouti, such as the 2019 opening of a medical clinic in the town of Ali Oune, no longer had a logistical base from which to draw support[10]. With America out of the way, any non-Chinese foreign direct investment (FDI) was left in the hands of the French, Japanese, and other foreign powers present in Djibouti. America could no longer use its military to try to match, in some small way, the FDI provided by China.

Despite the American military departure from the region beginning in 2024, several of America’s allies remain to this day. Although the French Senate had previously expressed concern over Chinese influence overshadowing French influence in Djibouti, France’s defense clause remains in place and ensures that the French will remain in Djibouti even as China grows in power[11]. With piracy in the waters off the Horn of Africa no less prevalent than in the late 2010s, the Japanese anti-piracy base just outside the old Camp Lemonnier gate continues its operations. However, no amount of anti-piracy operations or promises of defense can match the sheer influx of money that China promised, and delivered, under their BRI. As the world moves toward the 2040s and the completion of the multi-decade BRI, the world is left wondering if the 21st century will be a Chinese century. With the departure of the American military from Djibouti, the answer seems to be that in Africa, it already is.


Endnotes:

[1] Browne, R. (2018, April 08). US military resumes air operations in Djibouti. Retrieved August 7, 2019, from https://www.cnn.com/2018/04/08/politics/us-air-operations-djibouti/index.html

[2] Belt and Road Initiative strikes again… Djibouti risks Chinese takeover with massive loans – US warns. (2018, September 02). Retrieved August 07, 2019, from https://www.kaieteurnewsonline.com/2018/09/02/belt-and-road-initiative-strikes-again-djibouti-risks-chinese-takeover-with-massive-loans-us-warns/

[3] Schmitt, E. (2014, May 06). U.S. Signs New Lease to Keep Strategic Military Installation in the Horn of Africa. Retrieved August 7, 2019, from https://www.nytimes.com/2014/05/06/world/africa/us-signs-new-lease-to-keep-strategic-military-installation-in-the-horn-of-africa.html

[4] Ibid.

[5] Martin, P. (2019, March 20). East Africa Response Force deployed to Gabon. Retrieved August 07, 2019, from https://www.army.mil/article/218891/east_africa_response_force_deployed_to_gabon

[6] Schmitt, E. (2014, May 06). U.S. Signs New Lease to Keep Strategic Military Installation in the Horn of Africa. Retrieved August 07, 2019, from https://www.nytimes.com/2014/05/06/world/africa/us-signs-new-lease-to-keep-strategic-military-installation-in-the-horn-of-africa.html

[7] Egnash, M. (2019, January 14). Legacy of Benghazi: Marine force stays ready for quick Africa deployment. Retrieved August 07, 2019, from https://www.stripes.com/news/legacy-of-benghazi-marine-force-stays-ready-for-quick-africa-deployment-1.564342

[8] Daly, J. C. (2018, April 11). Geostrategic position draws foreign powers to Djibouti. Retrieved August 07, 2019, from https://thearabweekly.com/geostrategic-position-draws-foreign-powers-djibouti

[9] Belt and Road Initiative strikes again… Djibouti risks Chinese takeover with massive loans – US warns. (2018, September 02). Retrieved August 07, 2019, from https://www.kaieteurnewsonline.com/2018/09/02/belt-and-road-initiative-strikes-again-djibouti-risks-chinese-takeover-with-massive-loans-us-warns/

[10] Nickel, S. (2019, January 31). U.S. Navy Seabees turn over Ali Oune Medical Clinic to Djiboutian officials. Retrieved August 07, 2019, from https://www.hoa.africom.mil/story/22489/u-s-navy-seabees-turn-over-ali-oune-medical-clinic-to-djiboutian-officials

[11] Griffin, C. (2018, October 28). Strategic Competition for Bases in Djibouti: TRENDS. Retrieved August 07, 2019, from http://trendsinstitution.org/strategic-competition-for-bases-in-djibouti/

Africa Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers China (People's Republic of China) Djibouti Horn of Africa Travis Prendergast United States

Alternative Futures: An Assessment of the 2040 Security Environment absent Great Power Competition

Mike Sweeney is a former think tanker who lives and writes in New Jersey.  He is the author of the essays, “Could America Lose a War Well?” and “Could America Leave the Middle East by 2031?” He’s still not sure about the answer to either question.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Alternative Futures: An Assessment of the 2040 Security Environment absent Great Power Competition

Date Originally Written:  July 22, 2019.

Date Originally Published:  October 14, 2019.

Author and / or Article Point of View:  This article presupposes that the challenges the United States will face as it approaches the mid-century mark could be quite different from the great-power conflicts with China and Russia that are now being anticipated and planned for. This article attempts to jar thinking to promote consideration of an entirely different set of threats. 

Summary:  America is likely to be ill-prepared for the security threats circa 2040. The tasks the U.S. military may be asked to perform in the face of global political instability, mass migration, and environmental degradation are likely to be both unconventional and unwanted. 

Text:  By 2040, Russia and, to a lesser extent, China are twilight powers whose strategic influence and military strength are waning. The former is mainly pre-occupied with internal stability and reform in the post-Putin era[1]. The latter has solidified its influence over the South China Sea, but the extreme costs of maintaining internal control over its domestic population and territories inhibit China from translating its resources into true global power[2]. The great-power conflict many postulated in the early twenty-first century never comes to pass. Instead, the U.S. military is forced to confront diverse but persistent low-level threats spurred on by forced migration, environmental degradation, and growing global inequality.

Several regions begin to undergo major political and social change, notably the Middle East. The region’s traditional rentier system breaks down in the face of falling oil revenue as the world belatedly transforms to a post-hydrocarbon economy. The Arab monarchies and secular authoritarian regimes begin to crumble in a second, more wide-ranging “Arab Spring[3].” While increasing the personal freedom of the region’s citizens, this second Arab Spring also enhances instability and creates a loose security environment where weapons and terrorist safe-havens are plentiful. 

Globally, there is a growing antipathy towards the world’s “have’s” among its many “have not’s.” Part of this antipathy is due to the economic insecurity in regions affected by major social and political transformation. But just as significant is the impact of environmental degradation on the livability of areas home to millions of people. By mid-century, ecological decline provokes massive refugee movements, dwarfing those seen earlier in the century[4]. As the stateless population increases substantially, the ability of Western governments to cope is severely stressed, necessitating assignation of military forces to administer refugee settlements and to interdict migrant flows. 

The increased stateless population, coupled with the turmoil brought about by political change in the Middle East and other regions, provides ample recruits for revolutionary organizations. Conservative, religious extremist groups like Al Qaeda and the Islamic State have been discredited due to their social backwardness and exploitative hierarchies. However, the cycle of violence swings back to new incarnations of the violent Marxism that dominated terrorism at various points during the twentieth century. In contrast to religious extremists, the Marxist revivalists embrace many nominally noble ideas like gender and racial equality, the existence of universal human rights, and place an emphasis on securing dignity for the oppressed individual. They also draw an explicit link between the existing health of the world’s stable, prosperous nations and past exploitation of both poorer regions and the world’s environment as a whole. 

These Marxist beliefs form the basis for their targeting of the United States and other mature industrial states like Japan and most European nations. Despite their ostensibly laudable goals, the new wave of Marxists are willing to employ extreme violence to achieve them. The lethality of these groups is enhanced by major advances in biotechology which create new opportunities for relatively small groups to initiate catastrophic terrorist strikes. Proliferation of directed energy weapons renders civilian aircraft of all types increasingly vulnerable from terrorist attack from the ground. 

After decades of largely ignoring the value of international organizations, U.S. efforts to resuscitate such bodies to deal with many of the transnational problems undergirding new terrorist threats are ineffective. The result is an ad hoc approach where the United States works bilaterally where it can with whomever it can to address regional migration and poverty. 

For the U.S. military, the consequences are severe. Most of the equipment purchased or developed for great-power conflict with Russia and China is ill-suited for the challenges it faces in 2040. The U.S. military’s heavy investment in robotics still yields some benefits in the realms of logistics and reconnaissance. However, the complexities of dealing with challenges like migration flows, globally distributed low-intensity conflicts, and Marxist terrorism places limits on the applicability of robotic systems to combat. 

Above all else, well-trained manpower remains at a premium. The nature of many tasks the military is asked to carry out – directly guarding American borders, providing security and humanitarian aid to refugee camps, “humanely” interdicting migration flows, conducting counter-insurgency against impoverished, sometimes displaced populations – makes securing qualified personnel difficult. Some consideration is given to establishing a standing force of paid professionals drawn from outside the United States for particularly distasteful jobs, essentially “an American Foreign Legion.” 

The specific extent to which America should go abroad to address transnational threats is a source of intense domestic debate, with a wide disparity among political groups on the issue. One school of thought argues for developing and implementing truly imposing physical and technological barriers to seal the United States off completely from the outside world. These barriers are referred to as “the Fortress America” model. Another approach favors a robust and invasive effort to interdict the sources of Marxist terrorism through a range of humanitarian and nation-building initiatives. In this model, the U.S. military becomes something of a global gendarme mated with a strong civil engineering component. A third line of thinking argues for modestly increasing the physical barriers to entry into America while conducting specific interdiction missions against groups, leaders, and weapons facilities. These raids are initially referred to as “Abbottabad on steroids,” where small units deploy from the U.S. for short periods – up to a week – to secure and clear “zones of concern” around the world. 

The intense domestic debate over the military’s role in addressing transnational threats makes long-term procurement planning difficult. Many military members grow increasingly despondent with the thankless security tasks the challenges of 2040 require. The ubiquitous coverage of most U.S. military actions through everyday technology like cell phones increases civilian debate and military dissatisfaction. Force retention reaches a crisis, as does the mental health of military personnel. Most Americans agree that administering large migrant camps or attempting to address environmental degradation abroad aren’t what they want their military to do; most also concede that given the scope of these problems by mid-century, there are few other qualified options. 


Endnotes:

[1] For an excellent discussion of four scenarios for Russia’s future, see Lynch, A. (2018, October 25). What Will Russia Be. Retrieved July 21, 2019, from https://www.the-american-interest.com/2018/10/25/what-russia-will-be/

[2] See the discussion of China’s future prospects in Beckley, M. (2018). Unrivaled: Why America Will Remain the World’s Sole Superpower. Ithaca and London: Cornel University Press.

[3] For a discussion of the rentier system and its role in maintaining authoritarian governments in the Middle East, see Muasher, M. (2018, November/December). The Next Arab Uprising. Retrieved July 21, 2019, from https://www.foreignaffairs.com/articles/middle-east/2018-10-15/next-arab-uprising 

[4] For another possible extrapolation of the security impacts of the climate-refugee link, see Ader, M. (2019, July 2). Climate Refugees: Our Problem from Hell. Retrieved July 21, 2019, from https://wavellroom.com/2019/07/02/climate-refugees-our-problem-from-hell/

Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers Great Powers & Super Powers Mike Sweeney

Assessment of Right-Wing Militia Extremism in the United States

T.S. Whitman is a writer from St. Louis, Missouri.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Right-Wing Militia Extremism in the United States

Date Originally Written:  July 5, 2019.

Date Originally Published:  October 7, 2019.

Summary:  Due to increased levels of militia activity and right-wing extremism, individuals radicalized on the far right-end of the political spectrum remain an awkward elephant in the room for policymakers. Despite a clear threat from right-wing extremists, an effective response is often limited by political posturing and pressure.

Text:  The rise of alt-right ideology, availability of firearms, and increased militia membership over the past decade creates a unique problem for policymakers. Setting aside the unlikely, worst-case scenario of whole-scale rebellion, even a single militia can pose a threat that exceeds the operational capacity of law enforcement personnel. There is no easy way to address this issue, as even openly discussing it probes sensitivities and fuels political resentment.

The ascent of militias has not occurred in a vacuum. It can be attributed to a sharp increase in political polarization over the past two decades, particularly after the election of President Barack Obama in 2008. This widening gap in ideology and values has led to rising animosity between Americans. Nearly 1-in-5 Americans believe that many members of the opposite party “lack the traits to be considered fully human”; and 13% of Republicans and 18% of Democrats believe that violence would be justified in response to an electoral loss in 2020[1]. Despite high-levels of animus from both sides of the political spectrum, right-wing violence represents an increasing share of terrorist activity. The slice of terrorist violence by right-wing extremists increased from 6% of attacks in 2010 to 35% by 2016, while left-wing terrorist violence during the same period dropped from 64% of attacks to just 12%[2]. Furthermore, right-wing violence quadrupled between 2016 and 2017[3]. As the Center for Strategic and International Studies notes, “Although violent left-wing groups and individuals also present a threat, far-right-networks appear to be better armed and larger[4].” Many acts or plots of right-wing violence have involved militia members[5].

Some militia groups are conducting so-called “operations.” One frequent spot for militia activity is the U.S.-Mexican border, where one militia recently detained several hundred immigrants illegally crossing the border[6]. Meanwhile, over the past decade, there have been a number of prominent incidents involving right-wing militia members. In 2014, following what had been two decades of legal disputes between the Bureau of Land Management (BLM) and Cliven Bundy over grazing fees, the BLM moved to confiscate Bundy’s cattle. What followed was a tense standoff between Bundy’s armed supporters, many of whom had militia ties, and BLM agents. Out of fear of armed violence, the BLM caved and returned Bundy’s livestock[7]. In 2016, Ammon Bundy, son of Cliven Bundy, led a group of armed protestors affiliated with militias and the sovereign citizen movement to occupy the Malheur National Wildlife Refuge outside of Burns, Oregon, in response to federal charges against two farmers, Stephen and Dwight Hammond. By the time the standoff ended, one armed occupier was dead and 27 more were arrested and charged. In June, 2019, after eleven Oregon Republican state Senators refused to attend a legislative session for a cap-and-trade bill, Governor Kate Brown ordered state police to apprehend and bring them to the state capitol for a vote on the bill. All eleven Senators went on the run. During a television interview, Senator Brian Boquist (R) said, “Send bachelors and come heavily armed. I’m not going to be a political prisoner in the state of Oregon.” They received support from militia groups in Oregon and Idaho, the former of which was involved in the aforementioned Bundy Ranch and Malheur National Wildlife Reserve standoffs. According to Real Three Percenters Idaho militia leader Eric Parker, “We’re doing what we can to make sure that they’re safe and comfortable.” He added that his group was communicating with the Oregon Three Percenters militia about the Senators. One militiaman with the Oregon Three Percenters wrote on Facebook that his militia “vowed to provide security, transportation and refuge for those Senators in need[8].” The crisis ended after an agreement between Republican and Democratic leadership was reached to kill the cap-and-trade bill.

Attempted or fulfilled acts of political violence and terrorism by domestic extremists, though often bloody, have overwhelmingly been perpetrated by an individual or small cells. In almost every case, law enforcement officers have been able to preempt, apprehend, or kill the responsible parties. However, the size, organization, and armament of many right-wing militias gives the government cause for concern. Based upon the result of the 2014 Bundy standoff and the disastrous outcome of the 1993 Waco siege, it stands to reason that even a small militia of 100 armed personnel would require U.S. military capabilities to suppress[9]. However, the contemporary history of domestic military operations is fraught with confusion. For instance, during the L.A. Riots in 1992, Joint Task Force-Los Angeles lacked legal experts in Chapter 15, Title 10, Sections 331-334, and military lawyers were initially confused by the Posse Comitatus Act[10].

Discussing right-wing extremism requires delicacy and nuance, but will remain an inflammatory topic regardless of how it is addressed. In attempt to position itself to respond to right-wing domestic terrorism and political violence, the government has faced allegations of political bias. The earliest assessment of right-wing extremism under the Obama administration’s Department of Homeland Security (DHS) came under severe scrutiny for anti-conservatism and was subsequently retracted. According to Daryl Johnson, a career intelligence analyst and author of the report, the political fallout led to the end of “work related to violent right-wing extremism[11].” It was reported by The Daily Beast in April 2019 that the DHS had disbanded its domestic terrorism intelligence unit. Some officials have anonymously alleged that there has been a sharp reduction in the number of domestic terrorism assessments as a result[12].

Despite the challenge of addressing right-wing militia extremism, the average American is unlikely to ever be killed or injured by one. The chances of being killed in a terrorist attack, committed by a right-wing extremist or otherwise, are 1 in 3,269,897[13]. More concerning is the threat posed by insurrection, even if it is isolated and not widespread. Keith Mines, a veteran Special Forces officer and diplomat, estimated a 60% chance that America would experience “violence that requires the National Guard to deal with[14].” Ignoring this possibility will only place America at a disadvantage if an extreme militia group collectively turns to violence.


Endnotes:

[1] Kalmoe, N. P., & Mason, L. (2019, January). pp. 17-24. Lethal Mass Partisanship: Prevalence, Correlates, and Electoral Contingencies (pp. 1-41). Retrieved April 09, 2019, from https://www.dannyhayes.org/uploads/6/9/8/5/69858539/kalmoe___mason_ncapsa_2019_-_lethal_partisanship_-_final_lmedit.pdf

[2] Ideological Motivations of Terrorism in the United States, 1970-2016 (Rep.). (2017, November). Retrieved April 10, 2019, from University of Maryland website: https://www.start.umd.edu/pubs/START_IdeologicalMotivationsOfTerrorismInUS_Nov2017.pdf

[3] Clark, S. (2019, March 07). Confronting the Domestic Right-Wing Terror Threat. Center for American Progress. Retrieved April 10, 2019, from https://www.americanprogress.org/issues/security/reports/2019/03/07/467022/confronting-domestic-right-wing-terrorist-threat/

[4] Jones, S. G. (2018, November 07). The Rise of Far-Right Extremism in the United States. Retrieved July 08, 2019, from https://www.csis.org/analysis/rise-far-right-extremism-united-states

[5] Goldman, A. (2019, June 04). F.B.I., Pushing to Stop Domestic Terrorists, Grapples With Limits on Its Power. Retrieved July 08, 2019, from https://www.nytimes.com/2019/06/04/us/politics/fbi-domestic-terrorism.html

[6] Hernandez, S. (2019, April 19). A Militia Group Detained Hundreds Of Migrants At Gunpoint At The Border. Retrieved July 05, 2019, from https://www.buzzfeednews.com/article/salvadorhernandez/militia-group-border-migrants-detain-united-constitutional

[7] Prokop, A. (2015, May 14). The 2014 controversy over Nevada rancher Cliven Bundy, explained. Retrieved April 11, 2019, from https://www.vox.com/2014/8/14/18080508/nevada-rancher-cliven-bundy-explained

[8] Sommer, W. (2019, June 21). Armed Militias Pledge to Fight for Fugitive Oregon GOP Lawmakers ‘At Any Cost’. Retrieved from https://www.thedailybeast.com/armed-militias-pledge-to-fight-for-fugitive-oregon-gop-lawmakers-at-any-cost

[9] Matthews, M. (2012, February 07). Chapter 4: The 1992 Los Angeles Riots and the Posse Comitatus Act. In The Posse Comitatus Act and the United States Army: A Historical Perspective. Retrieved April 10, 2019, from https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/matthews.pdf

[10] Matthews, M. (2012, February 07). Chapter 6: Conclusions. In The Posse Comitatus Act and the United States Army: A Historical Perspective. Retrieved April 10, 2019, from https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/matthews.pdf

[11] Johnson, D. (2017, August 21). I Warned of Right-Wing Violence in 2009. Republicans Objected. I Was Right. Washington Post. Retrieved April 09, 2019, from https://www.washingtonpost.com/news/posteverything/wp/2017/08/21/i-warned-of-right-wing-violence-in-2009-it-caused-an-uproar-i-was-right/

[12] Woodruff, B. (2019, April 02). Exclusive: Homeland Security Disbands Domestic Terror Intelligence Unit. The Daily Beast. Retrieved April 11, 2019, from https://www.thedailybeast.com/homeland-security-disbands-domestic-terror-intelligence-unit

[13] Nowrasteh, A. (2018, March 08). More Americans Die in Animal Attacks than in Terrorist Attacks. Retrieved April 10, 2019, from https://www.cato.org/blog/more-americans-die-animal-attacks-terrorist-attacks

[14] Ricks, T. E. (2017, March 10). Will we have a civil war? A SF officer turned diplomat estimates chances at 60 percent. Foreign Policy. Retrieved April 9, 2019, from https://foreignpolicy.com/2017/03/10/will-we-have-a-civil-war-a-sf-officer-turned-diplomat-estimates-chances-at-60-percent/

Assessment Papers T.S. Whitman United States Violent Extremism

Alternative Futures: Assessment of the 2027 Afghan Opium Trade

Chris Wozniak is an independent analyst. He holds a BA in Political Economy from the University of Washington. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Alternative Futures: Assessment of the 2027 Afghan Opium Trade

Date Originally Written:  July 3, 2019.

Date Originally Published:  October 3, 2019.

Author and / or Article Point of View:  This article is written from the point of view of a United Nations report outlining the rise Afghan heroin production and the consequences both within and beyond Afghan borders.

Summary:  A sudden exit of western troops from Afghanistan has fostered dramatic expansion of the already robust opium trade. Peace, profitability, and cynical policy calculations have led Afghan and regional players to embrace cultivation and trafficking at a cost to their licit economies, public health, and security. International players seem to think that Afghan peace on these terms is worth the corrosive influence that opium exports are carrying abroad.

Text:  In this 2027 30th anniversary edition of the World Drug Report, we have added an auxiliary booklet with an unprecedented singular focus on Afghanistan’s global impact on the drug supply chain and the threat it poses to security and development across multiple continents. This booklet covers the political landscape that allowed Afghanistan to become the world’s heroin epicenter and key players in the heroin trade. It also addresses the international response to the crisis and the global implications of the Afghan drug economy.

Five years after China’s 2022 acquisition of the port of Karachi through predatory One Belt One Road loans and a cooling in relations with Russia following the annexation of Belarus, major sea and air resupply routes to International Security Assistance Force (ISAF) were closed or compromised, making sustained operations in Afghanistan logistically untenable. The subsequent departure of all ISAF troops removed a principal roadblock in peace talks with the Afghan Taliban (Taliban): withdrawal of foreign forces from Afghanistan. The resulting hastily negotiated peace deal formalized a power sharing agreement between the existing Afghan government and Taliban shadow government in exchange for renunciation of support and safe haven for transnational terrorists. In practice, a crude federalization has taken effect that leaves the Taliban politically represented in Kabul and in control of the majority of arable countryside used for poppy growth. The Western-supported government of Afghanistan largely retains control of urban centers and major highways needed for processing and export. This delicate equilibrium is largely sustained due to recognition that uninterrupted Afghan opium production is in the interest of both Afghans and international stakeholders and any violence would negatively impact profitability.

Within Afghanistan, an influential lobby shaping the political environment that has had a hand in the opium trade for decades is the transport mafia. Afghanistan has historically been a crossroads of trade and transport interests have long exploited opportunities for profit. The modern transport mafia became robust beginning in 1965 following the Afghan Transit Trade Agreement (ATTA). The agreement allowed the duty free trade of goods from Pakistan into Afghanistan, leading to smuggling of the same goods back across the border for illicit profit. Soviet-Afghan war transport mafia activities included cross-border smuggling of arms to the mujahideen and smuggling of opium on the return journey. Post 9/11, theft of American supplies shipped via Karachi and destined for Afghanistan was another common scheme[1]. The influence of transport mafia interests in Afghanistan is profound in the political and developmental arenas as well. Popular support of the Taliban in the 1990s was largely attributable to the Taliban elimination of highway bandits, making transport much more predictable. Following the improvement in conditions, the profitability of opium smuggling by transport interests proved too popular for even the Taliban’s ban on poppy cultivation and opium. Following the 2001 arrival of American and ISAF personnel, transportation interests continued to grow alongside poppy cultivation, and in 2017 cultivation reached an all-time high of approximately 420,000 hectares – seventy-five percent of the global total[2]. Yields have continued to improve in the years since as Afghans have repaired irrigation infrastructure all over the south and east of the country. Reconstruction of qanats destroyed in the Soviet-Afghan war when they were utilized as tunnels for covert mujahideen movement has been especially important to year-over-year poppy yield increases. Many of the improvements were enabled by international donations until media coverage revealed poppy farmers to be the chief beneficiaries. Subsequent donor fatigue has depressed additional rounds of Afghan development funding, making improvements in health care and education unlikely. With few alternatives, most Afghans are now completely dependent on either poppy cultivation or the transport enterprise for their livelihoods.

Regional players surrounding Afghanistan all reap unique rewards by allowing opium trade to continue. Pakistan has doubled down on the idea of “strategic depth” in any conflict with India that is afforded to them by a friendly Afghan power structure. Allowing the proliferation of poppy farming in Taliban-controlled districts and refining labs throughout the Hindu Kush has benefited Pakistan by restoring a major proxy force that is now self-sustaining. Moreover, extraction of rents from producers and traffickers by Pakistani military and intelligence factions supports asymmetric operations against India in the disputed Kashmir region. Iran has been exploiting the European heroin epidemic by extracting concessions from European stakeholders in nuclear talks in exchange for closure of their border with Afghanistan, thereby closing a major trafficking highway to Europe. Iran’s border closure has had the unforeseen consequence of driving the flow of narcotics north into the Central Asian states and the Russian Federation. Subsequently, Russia has made heroin trafficking into Europe their latest asymmetric effort to disrupt European cohesion, with reports that tacit support of the Russian Mafia by the state has expanded the volume of the Moscow trafficking hub from one third of all heroin being trafficked to Europe to two thirds today[3]. As for the United States, the domestic political atmosphere continues to reward an exit from Afghan affairs despite the diplomatic and security costs incurred abroad. For all of these actors, inaction or an embrace of Afghan heroin is a devil’s bargain. In Pakistan, the drug economy has further hollowed out the licit economy, risking the stability of a nuclear state and calling into question the security of its nuclear materials. For Russia and Central Asian States, drug use has skyrocketed and Russia’s population has been particularly hard hit by a corresponding rise in HIV/AIDS, tripling from an estimated one million citizens in 2016 to just over three million in 2025[4].

Peace in Afghanistan has been achieved at the cost of the public health, security, and economies of nations across the Eurasian landmass. Moreover, it is a peace sustained by a tenuous illicit economy and cynical policy calculations that steadily erode the licit economies of neighboring nations and transit states. Without multinational cooperation to address the corrosive fallout of Afghan heroin exports, the international community will continue to feel the negative effects for years to come.


Endnotes:

[1] Looted U.S. Army Gear For Sale in Pakistan,
Chris Brummitt – http://www.nbcnews.com/id/39542359/ns/world_news-south_and_central_asia/t/looted-us-army-gear-sale-pakistan/#.XR0AcZNKgb0

[2] World Drug Report 2018 (United Nations publication, Sales No. E.18.XI.9).

[3] Crimintern: How the Kremlin Uses Russia’s Criminal Networks in Europe,
Mark Galeotti – https://www.ecfr.eu/publications/summary/crimintern_how_the_kremlin_uses_russias_criminal_networks_in_europe

[4] Russia At Aids Epidemic Tipping Point As Hiv Cases Pass 1 Million – Official,
Andrew Osborn – https://www.reuters.com/article/russia-aids/russia-at-aids-epidemic-tipping-point-as-hiv-cases-pass-1-million-official-idUSL2N1551S7

Afghanistan Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers Chris Wozniak Drug Trade

Assessment of U.S. Counterinsurgency Efforts in Laos 1954-1962

Harrison Manlove is a Cadet in the U.S. Army’s Reserve Officer Training Corps at the University of Kansas and is currently studying History and Peace and Conflict Studies. Harrison has also written for The Strategy Bridge, where he examined Russia’s strategy in Syria and the Middle East. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of U.S. Counterinsurgency Efforts in Laos 1954-1962

Date Originally Written:  June 21, 2019.

Date Originally Published:  September 30, 2019.

Author and / or Author Point of View:  This article is written from the point of view of the U.S. National Security Council after the 1962 Geneva Accords to determine the effectiveness of programs in Laos and their use in future foreign policy actions.

Summary:  From 1954-1962 the deployment of U.S. Army Special Forces teams, Central Intelligence Agency officers, economic and military aid prevented a communist takeover of Laos, considered a strategically important country in Southeast Asia. A pro-West Laos was desired under Eisenhower, but the transition to a neutral coalition government was ultimately supported by the Kennedy administration to keep Laos from becoming a Communist foothold in Indochina.

Text:  Counterinsurgency (COIN) can be defined as government actions to counter the “organized use of subversion and violence to seize, nullify, or challenge political control of a region[1]”. U.S. COIN in Laos had a broad focus to include: building the capacity of the Forces Armées du Royaume (FAR) – the Lao Royal Armed Forces, training a thousands-strong Hmong paramilitary force, economic and military aid packages, and defeating insurgent threats within Laos. Despite little strategic value, the French war in Indochina had convinced the Eisenhower administration that Laos could be the first potential ‘domino’ to cause Cambodia, Thailand, and Vietnam to fall to communism[2]. 

In 1954, economic aid began flowing into Laos through a United States Operations Mission (USOM) based in Vientiane[3]. The 1954 Geneva Agreement brought the fighting to a (relative) end, established an independent and neutral Laos, and issued a withdrawal of French military units and Viet Minh elements, leaving only a small French force to train the FAR. The Pathet Lao, a communist political movement and organization in Laos, would move to the northeast for eventual demobilization[4]. 

The Programs Evaluation Office (PEO) was established in 1955 as an element of USOM to facilitate defense aid to the FAR, supporting the fight against the Pathet Lao and the North Vietnamese Army (NVA) presence in northeastern Laos. Laotian neutrality meant the PEO was staffed and led by civilians who were almost all former military[5]. The Vientiane Agreements, signed in 1957, incorporated the Pathet Lao into the FAR. However, a 1959 coup conducted by Laotian General Phoumi Savanna signaled the continued tenuous situation in Laos[6]. 

In 1959 U.S. Army Special Forces (SF) personnel deployed to Laos as part of Project Hotfoot to train FAR personnel. Hotfoot was spread across the five military regions within Laos. Led by U.S. Army Lieutenant Colonel Arthur ‘Bull’ Simons of the 77th Special Forces Group, training responsibilities for Hotfoot were divided in two. “France would provide the tactical training to Laotian forces while non-uniformed U.S. SF would equip and provide technical training[Emphasis in original][7].” Hotfoot transitioned and expanded after Kennedy took office. 

In August 1960, Laotian Captain Kong Le led an FAR airborne battalion to Vientiane in a coup against the Royal Lao Government (RLG) to form a neutralist government. Lack of pay and the burden of continuous operations led to the coup[8]. While U.S. efforts under Hotfoot became Operation White Star in 1961, SF began Operation Pincushion, a training program for the Kha tribal areas with village defense units each up to 100 strong[9]. The PEO also became a Military Assistance Advisory Group with personnel donning uniforms, signaling the transition to an overt military presence[10]. During French rule the Auto Defense Choc (ADC), or self defense units, were established at the village level and filled by local populations. CIA began a covert operation, called Momentum, to build off the ADC program and establish a large paramilitary force of ethnic Hmong to fight the Pathet Lao insurgents and Kong Le’s forces[11].

Vang Pao was a Hmong officer in the FAR who had earlier received assistance from SF to create an irregular Hmong force. In 1961, CIA paramilitary officer James W. Lair approached Vang Pao to expand the operation which became Momentum. The second White Star rotation in the spring of 1961 became part of Momentum. The operation would equip and train nearly 10,000 recruits who proved extremely effective in the field[12].

CIA used its proprietary airline – Air America –  to support operations taking place throughout Laos. H-34 helicopters (replacing the weaker H-19), C-46, C-47, C-123 transport aircraft, and single-engine short take-off and landing aircraft provided airlift capabilities to CIA officers moving throughout the country, and FAR and Hmong units who received supplies through airdrops[13].

U.S. activities were critically challenged by Pathet Lao radio broadcasts (with Soviet support) which “were convincingly portraying the U.S. as obstructing peace and neutrality in Laos (while downplaying their own efforts to do so)[14].” The U.S. Information Agency field office in Laos “had two main objectives: improve the credibility of the Laotian government in the eyes of the population, and counter-Communist propaganda[15].” Small radios were distributed to provide pro-government messages in the Lao language, which was limited by the various local dialects around the country. In 1961 the U.S. Army deployed the 1st Psychological Warfare Battalion consisting of 12 men, whose “primary role was augmenting the U.S. Information Service (USIS).” and their under-resourced staff[16]. 

Under U.S. policy from 1954-1962, COIN efforts to support the RLG were a relative success. In 1962 a neutralist-majority coalition government was formed including rightists (from the RLG) and members of the Pathet Lao. The 1962 Geneva Accords again declared Laotian neutrality and barred any re-deployment of foreign forces to Laos. Fighting had slowed, but the Kennedy administration was disappointed with the political result. Neutrality was not a complete policy failure for the Kennedy administration, as a communist government would not be in place[17]. In accordance with the agreement SF teams withdrew from Laos, while Air America flights slowed[18]. However, future American operations would be covert, and conducted primarily by the CIA beginning after the coalition collapse in 1964 to the Pathet Lao defeat of the RLG in 1975. 

From a policy perspective, the American commitment to Laos was consistent with containment and halting the global spread of communism. The covert nature of U.S. operations reflected not only the declarations of neutrality by the RLG, but the larger possibility of U.S. embarrassment on the domestic and world stages if U.S. objectives did fail. Even with no discernible strategic interests in the region, particularly Laos, “National prestige was, as always, closely linked to its apparent success or failure in foreign policy[19].”


Endnotes:

[1] United States, Joint Chiefs of Staff. (2018). Joint Publication 3-24 Counterinsurgency (p. ix)

[2] Mcnamara, R. S. (1996). In retrospect. Random House Usa. (pp. 35-37)

[3] Leeker, J. F. (2006). Air America in Laos II – military aid (p. 1, Rep.). Part I

[4] Adams, N. S., & McCoy, A. W. (1970). Laos: War and revolution. New York: Harper & Row. (p. 128).; United Nations. (1954). Agreement on the Cessation of Hostilities in Laos 20 July 1954.

[5] Castle, T. N. (1991). At war in the shadow of Vietnam: United States military aid to the Royal Lao government, 1955-75 (Doctoral dissertation).

[6] Adams, N. S., & McCoy, A. W. (1970). Laos: War and revolution. New York: Harper & Row. (p. 147).

[7] Tracy, J. M., PhD. (2018). Shoot & Salute: U.S. Army Special Warfare in Laos. Veritas, 14(1), (p. 2). Retrieved from https://www.soc.mil/ARSOF_History/articles/v14n1_shoot_and_salute_pt1_page_2.html. 

[8] Celeski, J. D. (2019). The Green Berets in the land of a million elephants: U.S. army special warfare and the secret war in Laos, 1959-74. Havertown: Casemate. (p. 80). 

[9] Celeski, J. D. (2019). The Green Berets in the land of a million elephants: U.S. army special warfare and the secret war in Laos, 1959-74. Havertown: Casemate. (p. 171). 

[10] Celeski, J. D. (2019). The Green Berets in the land of a million elephants: U.S. army special warfare and the secret war in Laos, 1959-74. Havertown: Casemate. (p. 87).

[11] Celeski, J. D. (2019). The Green Berets in the land of a million elephants: U.S. army special warfare and the secret war in Laos, 1959-74. Havertown: Casemate. (p. 121).

[12] Ahern, T. L., Jr. (2006). Undercover Armies: CIA and Surrogate Warfare in Laos 1961-1973. (p. 45).; Leary, W. M. (1999-2000). CIA Air Operations in Laos, 1955-1974. Studies in Intelligence. Retrieved from https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/winter99-00/art7.html.

[13] Leary, W. M. (1999-2000). CIA Air Operations in Laos, 1955-1974. Studies in Intelligence. Retrieved from https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/winter99-00/art7.html. 

[14] Tracy, J. M., PhD. (2018). Shoot & Salute: U.S. Army Special Warfare in Laos. Veritas, 14(1), (p. 2). Retrieved from https://www.soc.mil/ARSOF_History/articles/v14n1_shoot_and_salute_pt1_page_2.html.

[15] Tracy, J. M., PhD. (2018). Shoot & Salute: U.S. Army Special Warfare in Laos. Veritas, 14(1), (p. 2). Retrieved from https://www.soc.mil/ARSOF_History/articles/v14n1_shoot_and_salute_pt1_page_2.html.

[16] Tracy, James M., PhD. “More Than Shoot & Salute: U.S. Army Psywar in Laos.” Veritas 14, no. 2 (2018): 1. https://www.soc.mil/ARSOF_History/articles/v14n2_shoot_and_salute_pt2_page_1.html.

[17] Goldstein, M. E. (1973). American policy toward Laos. Rutherford: Fairleigh Dickinson University Press. (pp. 263-267).; United Nations. (1962). No. 6564. DECLARATION 1 ON THE NEUTRALITY OF LAOS. SIGNED AT GENEVA, ON 23 JULY 1962https://treaties.un.org/doc/Publication/UNTS/Volume 456/volume-456-I-6564-English.pdf.

[18] Celeski, J. D. (2019). The Green Berets in the land of a million elephants: U.S. army special warfare and the secret war in Laos, 1959-74. Havertown: Casemate. (p. 247).

[19] Koprowski, D. C. (2000). John F. Kennedy, the development of counterinsurgency doctrine and American intervention in Laos, 1961-1963 (Doctoral dissertation). University of Massachusetts Amherst. Masters Theses 1911 – February 2014. 1682 https://scholarworks.umass.edu/theses/1682.

Assessment Papers Harrison Manlove Insurgency & Counteinsurgency Laos United States

Alternative Futures: Assessment of the Afghanistan Bureau 2001-2021

Michael Barr is a military historian and Director of Ronin Research, which specializes in high stress performance improvement.  He has 47 years’ experience in close quarter control and combat and is also the Director of the Jiki Ryu Aikijujutsu Association.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Afghanistan Bureau 2001-2021

Date Originally Written:  May 30, 2019.

Date Originally Published:  September 23, 2019.

Author and / or Article Point of View:  This assessment paper provides an alternative history and therefore an alternative future to U.S. actions in Afghanistan following the 9/11 attacks.  This paper is written from the point of view of a staff officer providing an overview of U.S. efforts in Afghanistan from 2001-2021 to an incoming political appointee in the Department of Defense.

Summary:  Despite conventional force cries for large troop footprints in Afghanistan following the ousting of the Afghan Taliban in late 2001, the U.S. chose a different route.  The combined interagency efforts of U.S. Special Operations Forces, the Central Intelligence Agency, and the Department of State have enabled minimization (not defeat) of threats to U.S. interests in Afghanistan thus enabling the U.S. military to remain prepared for large scale threats posed by Russia and China.

Text:  The initial response to the Afghan Taliban and al Qaeda elements in Afghanistan after 9/11 involved U.S. Special Operations Forces (SOF) and the Central Intelligence Agency (CIA). The CIA restored old ties with Afghan tribal leaders in the Northern Alliance. Backed by U.S. air power, the operation toppled the Taliban within two months and leveled the playing field allowing for the aspirations of various tribal leaders. 

With these initial operations complete, conventional force proponents argued for a text book counterinsurgency operation using a series of forward operating bases to project force and prop up a weak central government in Kabul. Asymmetric proponents argued for a return to influence and shaping operations and a strategy of stabilization and deterrence. No matter how noble the objective or heroic the effort, the U.S. would not achieve a political victory through a massive intervention that would have a large foreign footprint that even our Afghan allies did not favor. In Afghanistan, the U.S. had something to lose but nothing to gain in the conventional sense. Stability was the objective and that would be better achieved by helping the Afghans fight their own war rather than U.S. troops fight it for them. The more the U.S. efforts were unseen, the better. Instead of fighting a pointless counterinsurgency, a pragmatic strategy of forging relationships necessary to keeping Islamists from developing any significant power base in Afghanistan was pursued. 

The Afghanistan Bureau (AFBU) was created as part of U.S. Special Operations Command Central (SOCCENT), to follow a strategy of realistic, attainable goals, and restricted rules of engagement, with operations calibrated to the Afghan political, cultural, physical, and mental landscapes. AFBU allowed strategy to be custom-tailored to the reality on the ground. As a result AFBU has created stability through an often tedious and contentious negotiation of tribal interests with a minimum use of force. AFBU is primarily an intelligence and influence / shaping organization that makes suggestions and entreaties to various tribal elements. Within AFBU is the Afghan Operations Group (AOG) which includes both FID (foreign internal defense) and UW (unconventional warfare) elements:

  • 100 long term advisors from CIA, SOF, and the Department of State are embedded at the tribal leadership level.
  • A fluctuating number of specialists rotate through AOG based on tribal requests and advisor observations. These specialists have included military trainers, civil affairs, engineers, teachers, medical and even civilian specialist in blacksmithing and agriculture.
  • Sufficient procurement and logistics elements to both support the AFBU and train their partners in the Afghan military.
  • AOG forces: A light, strong, mobile force of 2000 men that continually rotates its presence living and purchasing from the various tribes. This rotation creates a pragmatic symbiotic relationship. Various force components have been temporarily added. An active drone force is maintained. Support Force provides intelligence to AFBU, solidifies tribal relations, acts as a deterrent, and makes periodic strikes to reduce opposition build ups. Terrorists may never be eliminated but AOG keeps them minimized. In this way AOG imitates the Israeli response to terrorism threats. 
  • A clandestine force works from within tribal support areas to collect human intelligence and reduce the need for intervention.

Despite public claims, Afghanistan is not a nation state but a tribal society with tribal interests. Even the urban elite are really a tribe. Cash and other assets which can be measured and accounted for, are capable of accommodating many tribal needs. Limited cash and assets help solidify existing relations with tribal leaders. Refusal to provide assets, threats by other leaders, the presence of AOG forces, and loss of prestige has proven an effective mix in maintaining the peace. There is a constant battle among interested parties to supplant opium income, but the broad mix of assets available to AFBU has served as a greater inducement than illicit income. 

AFBU’s strategy leverages the fact that the parties do not like or get along with each other. AFBU’s small but effective presence and its outsider position allows it to orchestrate adversaries more as a referee. This relationship works to U.S. benefit and against U.S. enemies. AFBU is not creating Jeffersonian liberals but selectively supporting dependable leaders who can create stability and minimize Islamist capability. Sometime this means winning over factions of the Taliban. This winning over has been controversial, but a 51% reduction in extremism is sometimes better than nothing at all. Every tribal leader affiliated with AFBU is one less enemy and it allows us to monitor and influence their behavior.

AFBU has succeeded because of:

  • Sufficient funding and bipartisan Congressional support.
  • General public support or at least no vocal opposition.
  • Clear, pragmatic policy objectives.
  • Restraint imposed by the force size and the acceptance that there are limits to U.S. influence.
  • Emphasis on assembling tools in innovative ways which are applied with sufficient foresight and duration to achieve lasting effect while avoiding major combat operations.
  • High priority on intelligence.  

AFBU has converted some opposition tribes, neutralized others to ineffectiveness, and isolated most resistance to the Waziristan region. Pakistan’s ambiguous blind eye support of the Taliban, although still operative, has been muted by AFBU operations. AFBU has been able to provide long term stability for the past 20 years at a minimum investment of money, materiel, and manpower. AFBU has established a template for an overall influencing and shaping strategy which provides a structure for projecting power with a minimum of intrusion and risk. By calibrating to local concerns, similar strategies have been successful in Syria. Venezuela, Central America, Cuba, the Philippines, and even larger states like Ukraine. These small operations have allowed more resources to go to conventional near peer preparation while creating a matrix of support and influence in areas distant from the United States. 

In conclusion, AFBU has provided outsized results for its limited investment, while providing a first option for achieving U.S. objectives without large expenditures of personnel, material, and political support. The model has proven an excellent counter to gray zone conflicts related to Russia, China, and Iran.


Endnotes:

None.

Afghanistan Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers Michael Barr United States

Assessment of the American-led Constabulary during the American Occupation of Haiti from 1915-1934 in Comparison to Later Occupations

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which ran from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Travis Prendergast has served in the United States Army for eight years as a Rifle Platoon Leader, Staff Officer, and Rifle Company Commander. He currently works in USAREC. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the American-led Constabulary during the American Occupation of Haiti from 1915-1934 in Comparison to Later Occupations

Date Originally Written:  May 31, 2019.

Date Originally Published:  September 16, 2019. 

Summary:  During the American occupation of Haiti from 1915-1934, the United States Marines officered a native constabulary called the Gendarmerie d’Haiti. Throughout the occupation, the Gendarmerie built infrastructure and assisted in the administration of the country. The success of the Gendarmerie can be compared with the failures of the Coalition Provisional Authority during the occupation of Iraq.

Text:  The United States of America began its longest military occupation of a foreign country in August 1915 when United States Marines landed in Port-Au-Prince, Haiti. The occupation was the Wilson administration’s reaction to the potential establishment of a European naval base that could control the Windward Passage, combined with growing instability in Haiti. This instability culminated in the violent execution of Haitian President Guillaume Sam by a group of Haitian elites. After landing, the Marines met little resistance and rapidly established control of the country. By September, the Marines had established garrisons in all the major towns in Haiti. In 1915 and again in 1918, the Marines used superior training and tactics to quell uprisings of the native cacos during the First and Second Caco Wars. Between these two wars and for the rest of the time that the Marines administered the government in Haiti, the Americans ran a native constabulary called the Gendarmerie d’Haiti[1].

The constabulary was comprised mostly of the noirs, which made up most of the population, but the officers of the constabulary were Marines. This was an attractive assignment for the Marines stationed in Haiti, as they would receive an additional stipend and a higher rank. For instance, a Corporal or Sergeant in the Marine Corps would be an officer in the Gendarmerie. In the same way, then Lieutenant Colonel Smedley Butler held the rank of Major General in the Gendarmerie while acting as its first commandant. The Gendarmerie d’Haiti was as a joint army-police organization, but their role didn’t stop there. The American-led constabulary also “administered prisons, roads, bridges, the water supply, telegraph lines, sanitation, and other vital services[2].” Despite allegations of war crimes and three resulting investigations, the American military presence in Haiti continued throughout the 1920s with general success. Towards the end of the decade, the Gendarmerie d’Haiti became gradually more comprised of Haitians, and in 1928, the government renamed it the Garde d’Haiti. With the help of the Garde d’Haiti, the American administrators ran an efficient government while reducing graft and increasing stability. Upon leaving Haiti in 1934, the American-run government left behind “1,000 miles of roads constructed, 210 major bridges, 9 major airfields, 1,250 miles of telephone lines, 82 miles of irrigation canals, 11 modern hospitals, 147 rural clinics” and more[3]. America also achieved its strategic goals of keeping out the Germans and creating stability. The occupation was ultimately a success, with the Gendarmerie a large part of that success.

Although the model used by the Gendarmerie d’Haiti had seen use in previous small wars, once the United States withdrew from Haiti, the native constabulary model did not see use again in the many counter-insurgency operations in the following century. The ensuing general distaste for overt American Imperialism ensured that white officers leading black foreigners in the service of an American-led government would not be a viable option. Instead, America favored train, advise, and assist (TAA) operations during the Vietnam, Iraq, and Afghanistan conflicts to the extent that the United States Army is now establishing units to carry on TAA operations as an enduring mission[4]. However, these operations were and are mainly concerned with establishing security to enable the success of a new government in an unstable nation. To truly examine the legacy of the American-led constabularies of the early 1900s, we must look to institutions that sought to exercise authority over a foreign government in an unstable state. The best example of this is the Coalition Provision Authority (CPA) of the early Iraq War.

Formed in the early days of the Iraq War and led by L. Paul Bremer, the CPA exercised executive, legislative, and judicial power in Iraq for 14 months from April 2003 to June 2004 as a caretaker government which attempted to set the conditions for a sovereign Iraqi government to take control of the country[5]. Planners for the occupation of Iraq had looked to the military occupation of Japan for guidance, considering that if they modeled the occupation off a previously successful one, the occupation would transform Iraq into a functioning democracy[6]. In 2019, we know that this was not the case. Looking back at the CPA through the lens of the Haitian Gendarmerie can help us understand why.

The occupation of Haiti was successful compared to the occupation of Iraq due to the continuity and command-structure provided by the Gendarmerie d’Haiti. By giving enlisted Marines commissions in the Haitian constabulary, the occupying force garnered a commitment to the institution for which they were working. Furthermore, the Gendarmerie benefited from having the “advisors” in a command position over those they were seeking to influence. Unlike the current model of organizations tasked with TAA missions, placing Marines in command positions added to the buy-in needed to garner a vested interest in the organization. Finally, the constabulary gave the American administration the benefits of a military-run government. Like in the successful military occupation of Japan, the Marines of the Gendarmerie stayed for long periods of time, with a clear military structure. Compare these facts with the experience of the CPA. Few leaders in the CPA stayed for the duration of its short lifespan, and organizations within the CPA suffered from the lack of a clear structure[7]. The continuity and structure of the American-led constabulary allowed the Marines to see successes in their administration of the country.

Even considering the above, it is important to remember that the American-led Gendarmerie was not without its problems. The reintroduction of the corvée labor system and sometimes brutal methods of enforcing the corvée were morally wrong and almost immediately led to the Second Caco War, despite Butler’s predecessor abolishing the system in 1918. Also, not all Gendarmerie officers had enlightened views of their Haitian subordinates. Smedley Butler led them with affection, but Colonel Tony Waller had a decidedly more racist and less compassionate view of the Haitian gendarmes under his command[8]. Even with these problems, the Gendarmerie d’Haiti showed how an American-led military organization can aid in the occupation and administration of another nation. While the United States will likely not employ this type of organization in the future, the successes of the Gendarmerie d’Haiti are worth remembering if the United States once again engages in the risky act of nation building.


Endnotes:

[1] Boot, M. (2014). The savage wars of peace: Small wars and the rise of American power. NY, NY: Basic Books.

[2] Ibid.

[3] Ibid.

[4] Lopez, C. T. (2017, June). SFABs to Free BCTs from Advise, Assist Mission. Infantry Magazine, 4.

[5] Ward, C. J. (2005, May). United States Institute of Peace Special Report: The Coalition Provisional Authority’s Experience with Governance in Iraq (Rep. No. 139). Retrieved May 29, 2019, from https://www.usip.org/sites/default/files/sr139.pdf

[6] Dower, J. W. (2003, April 01). Don’t expect democracy this time: Japan and Iraq. Retrieved May 30, 2019, from http://www.historyandpolicy.org/policy-papers/papers/dont-expect-democracy-this-time-japan-and-iraq

[7] Hunter-Chester, D. (2016, May/June). The Particular Circumstances of Time and Place: Why the Occupation of Japan Succeeded and the Occupation of Iraq Failed. Military Review, 41-49.

[8] Boot, M. (2014). The savage wars of peace: Small wars and the rise of American power. NY, NY: Basic Books.

2019 - Contest: Small Wars Journal Assessment Papers Haiti Insurgency & Counteinsurgency Iraq Travis Prendergast

An Assessment of Air Force Advising Concepts in Small Wars, “Paper Falcons”

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Riley Murray is a Second Lieutenant in the United States Air Force currently pursuing his master’s degree in the Georgetown Security Studies Program.  He can be found on Twitter @rileycmurray.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Air Force Advising Concepts in Small Wars, “Paper Falcons”

Date Originally Written:  May 29, 2019.

Date Originally Published:  September 9, 2019.

Author and / or Article Point of View:  The author is an active duty Air Force Officer. The Article is written from the Point of View of the United States Air Force in Air Advising and Security Cooperation operations.

Summary:  Andrew Krepinevich’s “Army Concept” provides a useful model for understanding the mindset military organizations take towards advising operations, which subsequently shapes outcomes, including the U.S. Air Force’s advising efforts in small wars. Efforts to advise the South Vietnamese Air Force and Afghan Air Force demonstrate that U.S. Air Force advising concepts have been poorly suited towards irregular conflicts, creating counterproductive effects.

Text:  Andrew Krepinevich coined the term “Army Concept” in his 1986 study of the Vietnam War. The U.S. Army uses the Army Concept framework to hypothesize how wars will be fought, and to shape its operational planning and training[1]. During the Vietnam War, the Army Concept focused on large-scale conventional warfare against the Soviets in Central Europe with emphasis on firepower and technology[2]. Krepinevich criticizes the Army for using this conventionally oriented concept to advise the Army of the Republic of Vietnam (ARVN) during its campaign against an irregular foe: The National Liberation Front (Viet Cong)[3]. This counterproductive (ineffective) assistance program resulted from a failure to understand the threat faced by the ARVN, a poorly conceived plan to address the insurgency, and advisors that had spent their careers preparing for conventional warfare[4]. The U.S. Air Force (USAF) has made similar mistakes when advising its partner forces.

Any conceptual approach to advising begins by assessing the environment and threats partner forces face. This analysis is the basis for decisions regarding prioritization and risk that result in concepts of what air elements should be able to do[5]. This strategic view is then translated into operational and tactical tasks. However, planning and execution are heavily impacted by variety of factions involved in advising missions, each with unique concepts and different decision-making processes, leading to mixed outcomes. In an ideal world, planning any advising mission would be a cyclical process of tightly coordinated activities that continually reconsiders assumptions and adjusts policy accordingly. However, even under clear planning guidance, this policy-tailoring process can be undermined by the interests of subordinate organizations.

In Vietnam, the U.S. military attempted to meet the Kennedy administration’s directive to prepare for “wars of national liberation.” The USAF responded to this challenge by establishing the 4400th Combat Crew Training Squadron with the mission to develop and train foreign air forces on counter-guerrilla tactics[6]. Outside of this unit though, the USAF made no major changes in organizational guidelines or doctrine. Although the counterinsurgency mission was accepted, USAF doctrine did not highlight the role of local air forces or advising[7]. The USAF developed “what amounted to an absolute model of airpower in warfare,” based on the principles of classical airpower theory (primarily the primacy of offensive, strategic, and independent air operations)[8]. This single-minded view drove the USAF’s organization and mentality, but largely neglected the lessons learned from irregular conflicts since World War II and assumed that alternate concepts were unnecessary. The USAF failed to understand airpower’s role in effective irregular warfare strategy and to foresee the potential negative effects airpower could have when fighting a guerrilla force. This made the USAF ill-equipped to develop a reliable partner force in Vietnam.

U.S. President John F. Kennedy authorized an advising mission in 1961 to assist the South Vietnamese military in countering the Viet Cong and their North Vietnamese supporters. The USAF was tasked with training the South Vietnamese Air Force (VNAF), but its actions and ideas were often counterproductive to the VNAF[9]. The USAF entered Vietnam planning to develop tactics for fighting guerrillas but was unprepared and unwilling to effectively assess and address strategic and operational issues. USAF advisors helped the VNAF develop a centralized air control system in alignment with USAF doctrine, which increased efficiency, but also dramatically hindered air-ground coordination and resulted in operations that had little strategic value in counterinsurgency[10]. When the USAF and VNAF did develop useful tactics, many of these innovations were simply relearning the lessons of previous conflicts (such as the Marine Corps’ small wars in the Caribbean)[11]. U.S. assistance dramatically increased the VNAF’s size, but contemporary USAF emphasis on jet aircraft led to a force that was incredibly difficult to maintain without U.S. assistance. Rapid growth was coupled with USAF advisors frequently flying the missions themselves and neglecting the tactical development of the VNAF[12]. After a decade of advising efforts, the end result was a VNAF that could not independently perform many key processes and was poorly oriented towards the threat faced by South Vietnam.

Many of these conceptual failures continue to plague the USAF’s mission to advise the Afghan Air Force (AAF). As the Afghan Taliban resurgence threatened security in Afghanistan in 2007, the original USAF advisory mission of establishing an AAF presidential airlift capability was expanded and the AAF became a “helicopter/transport/light-attack-based fleet” oriented towards counterinsurgency[13]. Developing these capabilities has been difficult, particularly without consensus on the roles and missions the AAF should be able to conduct. USAF advisors have labored to develop a centralized control system, but this doctrinal solution continues to conflict with the structure of the Afghan military and its entrenched habits[14]. There is also a split between the conventional AAF and the Special Mission Wing and their respective advisors which focuses on direct support for Afghan special operations forces, resulting in two parallel concepts that remain poorly integrated at both the tactical and strategic levels[15]. The mission statement of the 428th Air Expeditionary Wing in 2014 emphasized the importance of developing “a professional, capable, and sustainable [Afghan] Air Force[16].” However, without a clear concept driving what these terms mean and how they should be pursued, air advising operations cannot be successful. In 2018, a DoD Inspector General report highlighted that Train Advise Assist Command-Air (TAAC-Air) lacked a defined end state for AAF development and failed to explain how the AAF would integrate with U.S. forces in Afghanistan[17]. Without an end state or effective strategic plan, the USAF cannot integrate and leverage its full range of advising capabilities.

While Vietnam highlighted the dangers of applying the wrong concept to air operations in counterinsurgency, Afghanistan demonstrates that the lack of a unified concept that similarly undercuts advising operations. Concepts are difficult to quantify, but they have had an unmistakable impact on advising operations. Success requires both a holistic view of the strategic value of air operations in irregular warfare and the capability to assess individual cases and tailor advising approaches. With a clear strategic concept, advising, planning and operations can be synchronized, ensuring that the United States effectively leverages its capabilities to assist partners and allies.


Endnotes:

[1] Krepinevich, A. F. (1990). The Army and Vietnam. Baltimore, MD: Johns Hopkins Univ. P. p. 5.

[2] Ibid.

[3] Krepinevich, A. F. (1990). The Army and Vietnam. Baltimore, MD: Johns Hopkins Univ. P. pp. 258-260.

[4] Ibid.

[5] Krepinevich, A. F. (1990). The Army and Vietnam. Baltimore, MD: Johns Hopkins Univ. P. pp. 11-14.

[6] Corum, J. S., & Johnson, W. R. (2003). Airpower in South Vietnam, 1954-1965. In Airpower in small wars: Fighting insurgents and terrorists (pp. 225-278). Lawrence, KS: University Press of Kansas. pp. 238-239.

[7] Corum, J. S., & Johnson, W. R. (2003). Airpower in South Vietnam, 1954-1965. In Airpower in small wars: Fighting insurgents and terrorists (pp. 225-278). Lawrence, KS: University Press of Kansas. pp. 242-243, 246-247.

[8] Corum, J. S., & Johnson, W. R. (2003). Airpower in South Vietnam, 1954-1965. In Airpower in small wars: Fighting insurgents and terrorists (pp. 225-278). Lawrence, KS: University Press of Kansas. pp. 267-270.

[9] Corum, J. S., & Johnson, W. R. (2003). Airpower in South Vietnam, 1954-1965. In Airpower in small wars: Fighting insurgents and terrorists (pp. 225-278). Lawrence, KS: University Press of Kansas. pp. 241-244.

[10] Sheehan, N. (2013). A Bright Shining Lie: John Paul Vann and America in Vietnam. New York, NY: Vintage Books, a division of Random House. pp. 112-115.

[11] Corum, J. S., & Johnson, W. R. (2003). Airpower in South Vietnam, 1954-1965. In Airpower in small wars: Fighting insurgents and terrorists (pp. 225-278). Lawrence, KS: University Press of Kansas. p. 261.

[12] Corum, J. S., & Johnson, W. R. (2003). Airpower in South Vietnam, 1954-1965. In Airpower in small wars: Fighting insurgents and terrorists (pp. 225-278). Lawrence, KS: University Press of Kansas. pp. 271-273.

[13] Marion, F. L. (2018). Flight Risk: The Coalition’s Air Advisory Mission in Afghanistan: 2005-2015. Annapolis, MD: Naval Institute Press. pp. 51-52.

[14] Marion, F. L. (2018). Flight Risk: The Coalition’s Air Advisory Mission in Afghanistan: 2005-2015. Annapolis, MD: Naval Institute Press. p. 156.

[15] Marion, F. L. (2018). Flight Risk: The Coalition’s Air Advisory Mission in Afghanistan: 2005-2015. Annapolis, MD: Naval Institute Press. p. 55.

[16] Marion, F. L. (2018). Flight Risk: The Coalition’s Air Advisory Mission in Afghanistan: 2005-2015. Annapolis, MD: Naval Institute Press. p. 186.

[17] United States, Department of Defense, Inspector General. (2018). Progress of U.S. and Coalition Efforts to Train, Advise, and Assist the Afghan Air Force (pp. 1-76). Arlington, VA: U.S. Department of Defense.

2019 - Contest: Small Wars Journal Afghanistan Assessment Papers Capacity / Capability Enhancement Riley Murray Training United States

Assessment of the European Intervention Initiative and Overcoming Nationalist Barriers

Editor’s Note: This article is the result of a partnership between Divergent Options and a course on nationalism at the George Washington University.


David Perron is a recent graduate of The George Washington University, with a B.A. in International Affairs and concentration in international economics.  His interests lie in the intersection of international relations and private enterprises, and regionally in France and the European Union.  He can be found at https://www.linkedin.com/in/david-perron/. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the European Intervention Initiative and Overcoming Nationalist Barriers

Date Originally Written:  August 10, 2019.

Date Originally Published:  September 6, 2019.

Author and / or Article Point of View:  This article examines the European Intervention Initiative (EI2) within the long-term goals and vision of French president Emmanuel Macron: that EI2 would lead to a “real European army,” which would increase security and foreign policy-making capabilities for the continent. 

Summary:  EI2 is a proposed joint-European military force which would protect European security interests abroad. Member states would benefit from increased power projection capabilities which would enhance collective security and reduce military reliance on the U.S. However, nationalism may pose risks to future EI2 membership and its long-term durability.

Text:  French President Emmanuel Macron has become a leading supporter of the European Intervention Initiative (EI2). EI2 will be a joint military force which would deploy forces abroad in response to European security interests. Work on EI2 began in response to threats posed by Russia after their 2014 annexation of Crimea. EI2 has been further catalyzed due to recent uncertainty in European Union (EU)-U.S. relations. EI2’s official objective is to “develop a shared strategic culture, which will enhance our ability, as European states, to carry out military missions and operations under the framework of the EU, NATO, the UN and/or ad hoc coalition[1].” However, Macron has publicly stated that he envisions a “real European army” which would remove the continent’s security dependence on the U.S.[2].

EI2 would create European joint operations, which could involve the use of military forces outside of Europe, in both combat and non-combat operations. EI2 is intended to increase the security of its member states while maximizing their total military resources. For Macron, and other EI2 proponents, the long-term strategic benefits would be vast. Europe would not only have greater collective security, but it would gain a powerful option in its foreign-policy toolkit. EI2 would secure Europe’s long-term position against rising actors such as Russia, China, and transnational terrorist groups.

But EI2’s goals also imply that member states will lose some level of sovereignty with regards to use of their military forces. Similar characteristics can be observed in the integration policies of the EU. EU members give up some sovereignty in exchange for greater social, economic, or political benefits. This surrendering of sovereignty has led to backlash from populist movements, with right-wing nationalist movements calling for the dissolution of the EU. The consequences of such backlash have been increased political division and economic uncertainty, such as in the case of Brexit. But in other cases, the surrendering of sovereignty has led to violence, as seen in the Yellow Vest protests in France. The areas that nationalist-populist groups in Europe contest include immigration, culture, and security[3]. These protested areas are issues in national identity, and the link between what the national unit is and what the state is. These are subjects which are inherently national. 

Conflicts with European integration policies have created national sentiment. As scholar Ernest Gellner states in Nations and Nationalism, “nationalist sentiment is the feeling of anger aroused by the violation of the principle, or the feeling of satisfaction aroused by its fulfilment[4].” The principal nationalist violation which arises from European integration policies is that of political rule. Nationalist sentiment can arise “if the rulers of the political unit belong to a nation other than that of the majority ruled[5].” In this case, sentiment will arise when the EI2, as a supranational institution governed by people who are not all members of the nation, make decisions which are perceived as either neglecting or hurting the nation. The world should expect a positive relationship between the increase in military cooperation and reactionary nationalist sentiment in EI2 member states.

National sentiment would challenge the development and durability of EI2. States will need to be convinced to set aside some sovereignty and national interests as EI2 integration continues. Furthermore, Brexit and the rise of nationalist-populist political parties have shown that European integration can be fragile. Thus, the durability of EI2 will continue to be contested by certain groups within member states. This is an area Russia can continue to exploit to destabilize European nations. If Macron and other EI2 proponents want the initiative to be successful, they will need to address nationalist sentiments through accommodation or construction.

There have already been some concerns voiced over EI2, as Germany has signaled a reluctance to take a part in “unnecessary military adventures” led by French foreign interests[6]. France’s foreign interventions have been largely related to its former colonies. Meanwhile, Germany’s memories of the World Wars have made them cautious of military operations. The different foreign policy focuses of France and Germany are guided by their distinct constitutive stories. From a constructivist view, these are stories which shape national identity. As Rogers M. Smith states, constitutive stories typically have three features: (1) they are intrinsically normative, (2) explain the importance of membership in the nation, and (3) are “less subject to tangible evidence than economic or political power stories[7].” Each member of EI2 has a distinct constitutive story, recurrent in their politics and culture, and distributed through mass-schooling and social traditions. Currently, the way that EI2 has been drafted has accommodated these differing stories by making compromises in its policies.

But another possibility which may be pursued is to change the construct of nationality. An important element of this change will be to alter Europe’s constitutive story, just as the EU is attempting to. This change is implied within the first part of the EI2 objective statement: “The ultimate objective of EI2 is to develop a shared strategic culture[8].”  The EU, for example, emphasizes values such as pluralism, secularism, and suffrage as preconditions to acceptance and profiting from various economic and political agreements. These are values which deemphasize Europe’s historical legacies of feudalism, non-secularism, and authoritarianism. This EI2 “strategic culture” could create a shared constitutive story which unifies members under a new narrative thereby defining when intervention is morally correct and what its benefits are, beyond strictly political or economic terms. If all EI2 members accept and recirculate this story, it could create popular support for the project, increasing membership in EI2 and make it more durable.

For Macron, nationalism presents a great barrier to EI2 and his aspirations for a “real European army.” For EI2 to work, it must transcend barriers created by distinct constitutive stories. EI2 will either develop in a manner which reduces nationalist sentiments by accommodating each nation’s unique demands, or leaders will change the constitutive story all together. If these nationalist barriers are overcome, the payoff would be a more secure, more capable, and more unified Europe.


Endnotes:

[1] Ministère des Armées. (2018). Letter of Intent Between Defense Ministers of Belgium, Denmark, Estonia, France, Germany, the Netherlands, Portugal, Spain, and the United Kingdom Concerning the Development of the European Intervention Initiative (EI2). Paris, FR: Author.

[2] Europe 1. (2018, November 26). Emmanuel Macron: son interview par Nikos Aliagas sur Europe 1 (INTEGRALE) [Video file]. Retrieved from https://youtu.be/ilggBgh8Lhw

[3] Gramlich, J., & Simmons, K. (2018). 5 key takeaways about populism and the political landscape in Western Europe. Pew Research Center. Retrieved from: https://pewrsr.ch/2N6j8cx

[4] Gellner, E. (1983). Nations and Nationalism. Ithaca, NY: Cornell University Press.

[5] Gellner, E. (1983). Nations and Nationalism. Ithaca, NY: Cornell University Press.

[6] Sanders, L. (2018). Germany cautious as France leads European defense initiative. DW News. Retrieved from: https://p.dw.com/p/37r61

[7] Smith, R. M. (2001). Citizenship and the Politics of People-Building. Citizenship Studies, 5(1), 73-96.

[8] Ministère des Armées. (2018). Letter of Intent Between Defense Ministers of Belgium, Denmark, Estonia, France, Germany, the Netherlands, Portugal, Spain, and the United Kingdom Concerning the Development of the European Intervention Initiative (EI2). Paris, FR: Author.

Allies & Partners Assessment Papers David Perron Europe European Union France Nationalism

Assessing the Goals of U.S. Counterterrorism Efforts in Somalia

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Mathew Daniels is a graduate of Old Dominion University, holding a Bachelor of Arts in History with a minor in International Relations.  He served six years in the U.S. Coast Guard Reserves.  He has a diverse professional background including both Law enforcement and education.  Fluent in both Spanish and English he is currently learning Japanese, while residing in Japan as a military spouse.  He has moved three different times in the past three years.  He just concluded student teaching and is preparing to take the Foreign Service Officer Test while awaiting to start employment with the Child Youth Military Program.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Goals of U.S. Counterterrorism Efforts in Somalia

Date Originally Written:  May 31, 2019.

Date Originally Published:  September 5, 2019.

Author and / or Article Point of View:  Author is a former member of the U.S. Coast Guard  and a military spouse.

Summary:  As the Global War on Terror continues to expand, the U.S. believes it is important to maintain sound strategy and policy in order to bring about success and avoid costly foreign policy and militaristic commitments. This is especially true in Somalia, where the U.S. is engaged in a small war which currently has a light footprint approach, but risks of increased involvement are possible. 

Text:  The Global War on Terror continues to wax and wane with the foreign policy objectives of the United States. This is especially true in Africa, specifically in Somalia, where a U.S. presence has been in country intermittently since 2003. Somalia is one of the United States’ many small wars that are part of the campaign against Islamist Terrorism post 9/11.  The current terrorist organization that warrants a U.S. military presence is Al Shabaab. It is important to understand that Al Shabaab is allied with and mimics Al Qaeda.  However, some members claim that “they do not wish to wage a global jihad, merely to dominate East Africa[1].”  In this way Al Shabaab may differ from Al-Qaeda but this difference makes them no less of a threat to U.S. national security.  Furthermore, Al Shabaab routinely attacks civilian populations and is a threat to the  U.S.-backed government in Mogadishu. In 2007 African Union Forces were able to drive out Al Shabaab militants and retake most of Mogadishu, however Al Shabaab continued to exist in the suburbs and threaten the capital[2]. 

Presently, the Somalia National Army and police forces with assistance from African Union, Kenyan, and Ethiopian militaries, continue to wage a counter insurgency campaign against Al Shabaab. The United States continues to be involved indirectly in combating Al Shabaab by supporting regional forces with  military advisors. However, without a clear-cut purpose and end goal, the United States risks mission creep and more potential long-term militaristic commitments. 

As part of the Global War on Terror the U.S. has had a presence in Somalia since as early as 2003[3].  This early presence in Somalia was made up of the Central Intelligence Agency and small elements of Joint Special Operations Command (JSOC), specifically the Naval Special Warfare Development Group (DEVGRU), also known as SEAL Team 6. These early elements  focused on intelligence gathering and relying on local warlords bankrolled with U.S. cash to eliminate Islamist groups in the region[3]. 

In 2011 U.S. President Barack Obama authorized a drone strike campaign in Somalia targeting Al Shabaab[2].  This was a shift from the Bush administration whose primary focus was intelligence gathering and counter-piracy operations.   Under the current Trump administration, Obama’s  policy of drone strikes has continued, and JSOC has become heavily involved in Somalia[2]. This involvement  represents an increase of American commitment to the anti-Al Shabab effort over a significant amount of time. Combat by American forces is not officially confirmed. Multiple sources report that the Pentagon is extremely tight- lipped on operations in Africa and especially Somalia[2][4]. According to The New Yorker, the Pentagon did not respond to a request for information on ongoing operations in Somalia[2]. Nick Terse quotes a “reliable source within the JSOC community who stated, we are heavily engaged in combat as well as advise missions and have sustained casualties, but things are kept as quiet as possible[5].” It appears that the advise and assist role requires members of the U.S. military to accompany local forces on missions which can lead to actual combat for U.S. troops.  

Whatever the official policy, if U.S. forces are at risk, American public and policy makers awareness is of value so they can realize the potential consequences, should mishaps or potential loss of life occur. In fact, casualties have occurred in Somalia, Kenya, Chad and Cameroon  according to Retired U.S. Army Brigadier General Donald Bolduc formerly in charge of special operations in Africa[5]. Make no mistake, American service members are at risk in these advise and assist operations, with or without public knowledge of their presence. Furthermore, absence of sound policy or strategy may mean that these service members sacrifices are in vain.

It is unclear whether U.S. policymakers and senior defense officials consulted the Powell-Weinberger doctrine prior to the deployment of forces to Somalia. Consulting this doctrine  would have helped provide needed clarification for the U.S. military mission in Somalia. For example, why is the U.S. in Somalia? To fight Al Shabaab? To preserve geopolitical stability? At what point will Al Shabaab be defeated? The Powell-Weinberger doctrine would ask if it is politically feasible to win in Somalia, and more importantly what does winning look like? What size of force would be needed to accomplish the goal? Also, what is the compelling U.S. national interest in Somalia?

It is significant to note that African Union forces will be withdrawing from Somalia in 2020[2]. Is the United States going to fill this security void by increasing their footprint, or maintain its current approach?  Without a clear end goal in mind, the American military in Somalia is left without a real direction, other than to train Somali forces and conduct joint raids against Al Shabaab.  It is worth considering that Somalia has lacked any real centralized government that maintained control since it was a colonial possession.  As a result of this weak government, insurgencies such as Al Shabaab thrive and prosper. The likelihood of the United States defeating the insurgency and propping up a stable government  in Somalia without a large  militaristic and diplomatic commitment is slim. Development of clear goals and strategy can help the U.S. achieve victory in Somalia without being dragged into a quagmire abroad. 


Endnotes:

[1] Who are Somalia’s al-Shabab? (2017, December 22). Retrieved from https://www.bbc.com/news/world-africa-15336689

[2] Ferguson, J. (2018, March/April). Trump’s Military Escalation in Somalia Is Spurring Hope and Fear. The NewYorker.

[3] Naylor, S. (2016). Relentless strike: The secret history of Joint Special Operations Command. New York, NY: St. Martins Griffin.

[4] Bowman, T. (Writer). (2019, February/March). How Global Is The Global War On Terror?[Radio broadcast]. In 1A. Washington D.C.: NPR.

[5] Turse, N. (Writer). (2019, February/March). How Global Is The Global War On

2019 - Contest: Small Wars Journal Assessment Papers Mathew Daniels Policy and Strategy Somalia United States

Assessment of the Inclusiveness of American Nationalism

Editor’s Note:  This article is the result of a partnership between Divergent Options and a course on nationalism at the George Washington University.


George Taboada has worked in the 19th District New Jersey State Legislative Office in the United States of America.  He currently is an undergraduate student at The George Washington University.  He can be reached at gleetaboada@gmail.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Inclusiveness of American Nationalism

Date Originally Written:  August 9, 2019.

Date Originally Published:  August 19, 2019.

Author and / or Article Point of View:  The author is a grandchild of Cuban immigrants to the United States of America. He believes that progressive political action (anti-discrimination, improved access to healthcare, debt-relief, etc.) is necessary to form a truly democratic society in the USA. 

Summary:  The rise of far-right terrorism in the United States is bringing the question of who and what constitutes the American nation to the forefront of public consciousness. If Americans fail to write their own history as one of inclusion rather than exclusion, violence and ostracization will continue.

Text:  In the wake of two mass shootings and the new surge in far-right terrorism, Americans peer further and further into the belly of the beast that is their nation. What has been statistically clear has slowly drilled itself into the center of the public consciousness: most terrorist attacks in the United States are perpetrated by domestic far right elements rather than Islamist actors. Between 2009 and 2018, 73.3% of murders related to extremist political ideologies were committed by those on the right-wing[1]. The names of innocent communities such as Charlottesville, Pittsburgh, and Parkland have become synonymous with fascist violence. The United States as a whole is beginning to garner a similar dark reputation; Uruguay and Venezuela joined an already expansive list of countries that issue travel warnings to citizens visiting the US due to white supremacist and gun violence[2]. 

It is no coincidence that Jill Lepore published her article “A New Americanism” in the midst of a very old kind of American violence. Indeed, she writes that the conflict between egalitarian and ethnocentric forces “was a struggle over two competing ideas of the nation-state. This struggle has never ended; it has just moved around[3].” In this, Lepore explores a framework of understanding American history that is most condensed in Michelle Alexander’s The New Jim Crow. Alexander describes an America where successive generations “have not ended racial caste in America… but… merely redesigned it.” The slavery, the lynching, the segregation, the poverty, and the police brutality inflicted upon African Americans are not separate systems, but rather the same perpetual phenomenon that is modified to make their suffering palatable to the white majority[4]. At the essence of both of these arguments are the questions that floats through the minds of Americans after the terror and sorrow of a brutal hate crime subsides. Who are we and how much more are we willing to tolerate fascist violence?

There are new factors in this current discourse, but it is also retreading themes of classical literature on nationalism. In fact, Jill Lepore cites Ernest Renan’s defining work, “What is a Nation?[5].” According to Renan, nationalist ideology “presupposes a past but is reiterated in the present by a tangible fact: consent, the clearly expressed desire to continue a common life[6].” Despite the myths of great men being the writers of history, the core dynamic of nationalism is in the hands of anyone who reads, writes, and reforms it. The discourse that defines the nation occurs not just in Congress, but in classrooms, in cafes, in homes, and in the street. Renan’s theory of nationalism is at its core democratic; in the “daily plebiscite,” the people themselves give the nation substance by supporting it and participating in its reformations.

However, republics are vulnerable to those who participate in their institutions with the intent to destroy the values that define and defend democracy. The danger of democratic backsliding is that those who are assaulting human rights do so while wrapping their language in the rhetoric used by those trying to defend it. White supremacists have a long history of doing just that. Leading Nazi figure Joseph Goebbels wrote, “We enter the Reichstag to arm ourselves with democracy’s weapons. If democracy is foolish enough to give us free railway passes and salaries, that is its problem… We are coming neither as friends or neutrals. We come as enemies! As the wolf attacks the sheep, so come we[7].”

This “boots for suits” tactic is not a foreign phenomenon; Lepore and Alexander have both chronicled its centrality to the American republic. The Confederate government formalized white supremacy by writing it into their constitution[8]. Alexander traces the family history of Jarvious Cotton, an American man. Time and time again, the Cottons are denied the fundamental ability to participate in Renan’s daily plebiscite: the ballot. Either through legal restrictions or through real physical violence. The slave-owner, the Klansman, and the police beat black people out of the discourse; constitutions, Jim Crow, and laws make the public feel as though that abuse is justified[9].

Beyond the question an American may ask themselves regarding who they are and how much longer they are willing to tolerate fascist violence lies another question: How much longer should we wait to end fascist ostracization? There is only one answer: immediately. But answering that question has eluded Americans of all kinds for over four centuries. The United States’ constitutive story as a nation is one that promises people freedom and viciously excludes wide swaths of humanity from those inalienable rights. To academicize the question of, “Who are we?”, the author posits, “How do we include people in a constitutive story written to specifically exclude them?”

Without a truly democratic daily plebiscite, those who are victimized by far-right violence will continue to be pushed to the margins of American society. To counter disenfranchisement, a discursive space where all are able to contribute to the building of the nation is necessary. However, open discourse about the nation’s path cannot exist as long as people who seek to raze it to the ground are afforded the same privileges as those who seek to enrich it. Without safeguards that prevent those who target the most vulnerable in society from disenfranchising them, marginalization will persist.

By including the experiences of other nations in the fight for liberation, Americans can further shatter the illusion of a racial ethnostate. Americans can find answers to their soul-searching in a wide range of countries and societies. There is already a prolific literature comparing denazification in Germany to American Reconstruction after the Civil War. From Germans, Americans can learn how to secure justice after a civilizational crime[10]. Another example is the progress of LGBTQ+ rights in Cuba. After the Revolution succeeded in 1959, Cuba was the second country in the world to establish marriage as a strictly heterosexual institution. Since the turn of the century, Cuban society has been more inclusive and more proactive towards achieving LGBTQ+ equality. Those LGBTQ+ who were once violently excluded from the foundation of the Cuban nation were able to write themselves into the Revolution and make it their own. 

To conclude, if Americans fail to write their own stories, those who carry the torches of Klansmen will gladly pick up the pen.


Endnotes:

[1] Anti-Defamation League (2019). Murder and Extremism in the United State in 2018. ADL. 

[2] Hu, Caitlin (2019, August 10). What they really think: America seen through the world’s travel warnings. CNN.

[3] Lepore, Jill (March/April 2019). A New Americanism. Foreign Affairs, 98.

[4] Alexander, M. (2010). The New Jim Crow: Mass incarceration in the age of colorblindness. New York: New Press.

[6] Renan, Ernest (1882, March 11) What is a Nation? text of a conference delivered at the Sorbonne on, in Ernest Renan, Qu’est-ce qu’une nation?, Paris, Presses-Pocket, 1992. (translated by Ethan Rundell).

[7] Goebbels, Joseph (1935) Aufsätze aus der Kampfzeit. Der Angriff, pp. 71-73.

[8] Lepore, Jill (March/April 2019). A New Americanism. Foreign Affairs, 98.

[9] Alexander, M. (2010). The New Jim Crow: Mass incarceration in the age of colorblindness. New York: New Press.

[10] Neiman, Susan (2013, August 12). History and guilt: Can America face up to the terrible reality of slavery in the way that Germany has faced up to the Holocaust? Aeon.

[11] De Llano, Pablo (2018, July 23). After decades of homophobia, Cuba closer to allowing same-sex marriage. El País.

Assessment Papers George Taboada Human Rights / Universal Rights Nationalism United States

Turning “Small” Wars into “Big” Wars: How Tacticians Endanger Us All

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which ran from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Dr. Heather Venable is an Assistant Professor of Military and Security Studies at the Air Command and Staff College, where she teaches classes on airpower and the historical experience of combat. She has written a forthcoming book entitled How the Few Became the Proud: Crafting the Marine Corps Mystique, 1874-1918.  She also has written for War on the Rocks, Strategy Bridge, and other online blogs.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Turning “Small” Wars into “Big” Wars: How Tacticians Endanger Us All

Date Originally Written:  May 31, 2019. 

Date Originally Published:  August 26, 2019.

Author / or Article Point of View:  The author is a professor of airpower. The author wants to point out the tensions in military thinking between the tactical and the strategic and how this has the potential to lead to escalation of “small” wars amidst the return to great power conflict.  

Summary:  Small wars remain highly likely even as the U.S. stresses the return to great power conflict. In these coming conflicts, some frustrated military leaders will exhibit tension between strategic and tactical thinking. This tendency can be seen in the following discussion of Air Force Chief of Staff Hoyt Vandenberg, who had a problematic vision of targeting the Chinese mainland during the Korean War that exemplifies tactical thinking at the expense of considering strategic ends. 

Text:  He talked the talk. But he did not walk the walk. In a lecture given to the Air War College in May of 1953, Air Force Chief of Staff General Hoyt Vandenberg initially exemplified strategic thinking by providing compelling reasons why the Korean War should remain confined to the peninsula. In the subsequent question and answer session, however, he demonstrated a clear desire to widen the war and target the Chinese mainland. Vandenberg’s lecture epitomizes the tensions in the minds of military leaders between tactical and strategic thinking, which pose dangerous risks of escalation, particularly in small wars. 

In the lecture, Vandenberg explained that he had no easy solutions “tied up in pink bows[1].” He also shared how his vantage point provided him with unparalleled perspective on the importance of allies and Cold War grand strategy. As such, he pointed out the problems he saw in expanding the war into China, explaining that striking a key air base inside Chinese territory required the U.S. to “do it with our eyes open” in light of a Sino-Soviet mutual defense treaty. Vandenberg also highlighted the risks of lengthening the United Nations’ own lines of communication. These comments epitomize a solid strategic consideration characterized by continually asking: then what? 

In the ensuing question and answer session, however, Vandenberg dangerously undercut his previous comments. When asked to discuss the Far East’s “strategic importance” during a “hot war,” Vandenberg ignored realities like the aforementioned treaty[2].  Caveating his opinion as being “almost as dangerous” as clamoring for preventative war against the Soviet Union, Vandenberg continued on recklessly:  “My solution has always been . . . we ought to put on a very strong blockade of the Chinese Coast; that we ought to break her rail lines of communication that carry the wheat from the North and the rice from the South . . . that we ought to mine her rivers . . . and that we ought to destroy those small industrial installations . . . .”

In addition to expanding the war and possibly inciting a famine, he suggested that the U.S. start its own “brushfire” to demonstrate, “BY GOD, that we are getting fed up with it.” Vandenberg’s address to War College students on the challenges of making sound strategic decisions devolved into sharing his emotionally-laden tactical responses, which lacked careful consideration of desired ends. Yet Vandenberg characterized his approach as “realistic[3].” 

Ironically, Vandenberg believed himself to be thinking rationally when, in fact, he was thinking romantically. In 1959, Bernard Brodie counterintuitively described the military mind as romantic, explaining how officers preferred “strong action over negotiation, boldness over caution, and feeling over reflection[4].” Vandenberg’s irrational suggestion that the U.S. start a new war because he was “fed up” epitomizes the mentality Brodie sketched. Today, many military officers also characterize themselves as pragmatic realists; in practice, though, they may act very differently.

This romantic attitude permeates tactical thinking, which can undermine a strategic vision. In theory, the tactical, operational, and strategic levels of war are neatly bundled together. In reality, the frustrations of small wars often reveal the gaping seams between the tactical and the strategic as the limitations of military force to quickly meet political objectives become evident. 

A tactical thinker concentrates on the short-term prospect of winning a clear-cut victory. A strategic one, by contrast, seeks to play the long game. At times, these two inter-related but competing perspectives cause tension. In the case of a parent teaching a child to play chess, the tactical mindset of seeking to “win” a game sits at odds with the more strategic perspective of keeping children motivated to learn by letting them win[5]. 

Meanwhile, this seductive tactical vision entices military thinkers and decision makers with the promise of decisive action, with the potential to solve a problem once and for all. But nothing in warfare is ever final. The Army officers who produced a recent study on Operation Iraqi Freedom entitled The U.S. Army in Iraq epitomize the dangers of this tactical tendency. Chafing at what they consider to be the imposition of problematic “artificial geographic boundaries,” they wish the U.S. had enlarged the war to include Iran, thus eliminating the sanctuary areas of small wars that are understandably so frustrating to officers[6]. This “if only” mindset seeks short-term military advantage at the cost of a stronger, more durable state of peace that should be the guiding principle underlying and linking together each level of war. 

Small wars on the periphery remain highly likely even as the U.S. returns to stressing great power conflict. In these coming conflicts, some frustrated military leaders will demonstrate tension between the strategic and the tactical just as Gen Vandenberg did. Indeed, the likelihood of this tendency has increased because the U.S. military has become imbued with a “killing and destroying things” mindset[7].  In focusing more on how to kill and destroy than why, the military has reified the tactical and operational at the expense of the strategic. We can only hope that politicians choose not to follow through on fool-hardy tactical ventures; amidst the democratization of weapons technology, such impulses risk endangering us all[8]. 


Endnotes:

[1] Vandenberg, H. (1953, May 6). Lecture Presented by General Vandenberg to Air War College. K239.716253-118, Air Force Historical Research Agency (AFHRA). 

[2] Ibid.

[3] Ibid.

[4] Brodie, B. (1959). Strategy in the Missile Age. Palo Alto, CA: Rand, p. 266.

[5] Dolman, E. (2016). “Seeking Strategy” in Strategy: Context and Adaptation from Archidamus to Airpower. Eds. Richard Bailey and James Forsyth. Annapolis: Naval Institute Press, 2016, pp. 5-37.

[6] Finer, J. (2019, May 28). Learning the Wrong Lessons from Iraq. Foreign Affairs. https://www.foreignaffairs.com/reviews/review-essay/2019-05-28/last-war-and-next. 

[7] Kagan, F. (2006). Finding the Target. New York: Encounter Books, 2006, p. 358.

[8] Krepinevich, A. (2011, August 15). Get Ready for the Democratization of Destruction. Foreign Affairs. https://foreignpolicy.com/2011/08/15/get-ready-for-the-democratization-of-destruction/.

 

 

2019 - Contest: Small Wars Journal Assessment Papers Dr. Heather Venable Mindset Policy and Strategy United States

Assessment of Civilian Next-Generation Knowledge Management Systems for Managing Civil Information

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Ray K. Ragan, MAd (PM), PMP is a Civil Affairs Officer in the U.S. Army Reserve and an Assistant Vice President of Project Management for a large Credit Union.  As a civilian, Ray worked in defense and financial technology industries, bringing machine learning, intelligence systems, along with speech and predictive analytics to enterprise scale.  Ray holds a Master’s degree in Administration from Northern Arizona University and a Certificate in Strategic Decision and Risk from Stanford University. He is a credentialed Project Management Profession (PMP) and has several Agile Project Management certifications.  Ray has served small and big war tours in Iraq and the Philippines with multiple mobilizations around the world, working in the U.S. National Interests.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Civilian Next-Generation Knowledge Management Systems for Managing Civil Information 

Date Originally Written:  May 25, 2019.

Date Originally Published:  August 19, 2019.

Summary:  Current Civil Information Management Systems are not taking advantage of the leaps of technology in knowledge management, specifically in the realm of predictive analytics, Natural Language Processing, and Machine Learning. This creates a time cost that commanders must pay in real-time in their operating environment, particularly felt in small wars. This cost also diverts resources away from direct mission-enabling operations.

Text:  Currently Civil Information Management (CIM) systems employed by the U.S. Military are not keeping pace with the current revolution seen in civilian next-generation knowledge management systems (KMS)[1][2]. These KMS are possible through the convergence of modern computing, predictive analytics, Natural Language Processing (NLP), and Machine Learning (ML)[3]. This CIM limitation is unnecessary and self-imposed as a KMS offers persistent and progressing inputs to the common operating picture. This assessment explores how civilian business harnessed this revolution and how to apply it to CIM.

Generally, CIM represents the operational variables (OV) of an operational environment (OE) and as practiced today, resides in the domain of information rather than knowledge[4]. The DIKW pyramid framework, named for its Data, Information, Knowledge, Wisdom structure informs the structure of learning[5]. Further, one can infer that traversing each step represents time and effort, a price paid by commanders in real-time during operations. Small wars demand speed and agility. Current CIM takes time to gather data, input it into a database, run queries, overlay on maps, and eventually infer some knowledge to inform decision making by the commander[6]. 

Using the 1999-invented Cynefin Framework to aid decision-making, commanders needlessly leave many of the OVs in the chaotic domain[7]. Moving from the chaotic to the complex domain the OVs must come from a KMS that is persistent and automatically progressing. Current CIMs do not automatically update by gathering information from public sources such as broadcast, print, and digital that are digitized with NLP and speech/text analytics[8].   Instead, human operators typically located in the OE, manually update these sources. Because of this, today’s CIMs go stale after the operators complete their mission or shift priorities, making what information was gathered devolve to historic data and the OE fog of war revert to chaos[9].

The single biggest advantage a quality KMS provides to a commander is time and decision-making in the OE[10]. Implemented as a simple search engine that is persistent and progressing for all OEs, would mean a commander does not need to spend operational time and effort on basic data gathering missions. Rather, a commander can focus spending operational resources on direct mission-enabling operations. Enticingly, this simple search engine KMS allows for the next advancement, one that businesses around the world are busily employing – operationalizing big data.

Business systems, such as search engines and other applications scour open sources like in court records and organizes them through a myriad of solutions. Data organized through taxonomy and algorithms allow businesses to offer their customers usable information[11]. The advent of ML permits the conversion of information to knowledge[12]. Civilian businesses use all these tools with their call centers to not only capture what customers are saying, but also the broader meta conversation: what most customers are not saying, but revealing through their behavior[13]. 

This leap in application of informatics, which civilian business use today, is absent in today’s CIM systems. The current model of CIM is not well adapted for tomorrow’s battlefield, which will almost certainly be a data-rich environment fed by robotics, signals, and public information[14]. Even the largest team of humans cannot keep up with the overwhelming deluge of data, let alone conduct analysis and make recommendations to the commander of how the civilian terrain will affect his OE[15].

In civilian business, empiricism is replacing the older model of eminence-based decision-making. No longer is it acceptable to take the word of the highest-paid person’s opinion, business decisions need to have evidence, especially at the multi-billion dollar level company level[16]. KMS enables for hypothesis, experimentation, and evidence. Applied in the civilian terrain, if the hypothesis is that by drilling a well reduces insurgency, a global KMS will reveal the truth through the metrics, which cannot be influenced, as former-U.S. Secretary of State Condoleezza Rice criticized[17]. 

Using text preprocessing with speech analytics and NLP, the KMS would solve an OE problem of data quality, as operators when supplementing the KMS with OE reports, would use speech whenever possible. This overcomes a persistent problem of garbage in and garbage out that plagues military and business systems alike. Rather than re-typing the field notes into a form, the human operator would simply use an interactive spoken dialog for input where feasible[18].

A persistent and progressive KMS also addresses a problem with expertise. During Operation Iraqi Freedom, the U.S. State Department could not find enough experts and professionals to fill the voids in transitional governance. This problem was such that then-Secretary of Defense Robert Gates volunteered to send Department of Defense civilians in their place[19]. With a KMS, commanders and policymakers can draw on a home-based cadre of experts to assess the data models of the KMS and offer contextualized insights into the system to commanders in the field.

As the breadth and quality of the data grows, system administrators can experiment with new algorithms and models on the data in a relentless drive to shorten OV-derived insights into operations planning. Within two years, this KMS data would be among the richest political science datasets ever compiled, inviting academia to write new hypothetical models and experiment. In turn, this will assist policy makers in sensing where new sources of instability emerge before they reveal themselves in actions[20].

“How do you put the genie of knowledge back in the bottle,” P. W. Singer rhetorically asked[21] in his book, Wired for War about the prospect of a robotic, data-enabled OE. This genie will not conveniently return to his bottle for robotics or data, instead commanders and policy makers will look to how to manage the data-enabled battlefield. While it may seem a herculean task to virtually recreate OEs in a future KMS, it is a necessary one. Working through the fog of war with a candle and ceding OVs to chaos is no longer acceptable. Civilian business already addressed this problem with next-generation knowledge management systems, which are ready for today’s OE.


Endnotes:

[1] APAN Staff (n.d.) Tools. Retrieved May 9, 2019, from https://www.apan.org/(S(12adofim0n1ranvobqiyfizu))/pages/tools-communities

[2] Williams, Gregory (2016, December 2). WFX 16 tests Civil Affairs Soldiers. Retrieved May 12, 2019, from https://www.dvidshub.net/news/189856/wfx-16-tests-civil-affairs-soldiers

[3] Szilagyi and P. Wira (2018) An intelligent system for smart buildings using machine learning and semantic technologies: A hybrid data-knowledge approach, 2018 IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, pp. 22-24.

[4] Chief, Civil Affairs Branch et al. (2011). Joint Civil Information Management Tactical Handbook, Tampa, FL, pp. 1-3 – 2-11.

[5] Fricke, Martin (2018, June 7). Encyclopedia of Knowledge Organization: Knowledge pyramid The DIKW hierarchy. Retrieved May 19, 2019, from http://www.isko.org/cyclo/dikw

[6] Chief, Civil Affairs Branch et al. (2011). Joint Civil Information Management Tactical Handbook, Tampa, FL, pp. 5-5, 5-11.

[7] Kopsch, Thomas and Fox, Amos (2016, August 22). Embracing Complexity: Adjusting Processes to Meet the Challenges of the Contemporary Operating Environment. Retrieved May 19, 2019, from https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2016-Online-Exclusive-Articles/Embracing-Complexity-Adjusting-Processes/

[8] APAN Staff (n.d.) Tools. Retrieved May 9, 2019, from https://www.apan.org/(S(12adofim0n1ranvobqiyfizu))/pages/tools-communities

[9] Neubarth, Michael (2013, June 28). Dirty Email Data Takes Its Toll. Retrieved May 20, 2019, from https://www.towerdata.com/blog/bid/116629/Dirty-Email-Data-Takes-Its-Toll

[10] Marczewski, Andrzey (2013, August 5). The Effect of Time on Decision Making. Retrieved May 20, 2019, from https://www.gamified.uk/2013/08/05/the-effect-of-time-on-decision-making/

[11] Murthy, Praveen et al. (2014, September). Big Data Taxonomy, Big Data Working Group, Cloud Security Alliance, pp. 9-29.

[12] Edwards, Gavin (2018, November 18). Machine Learning | An Introduction. Retrieved May 25, 2019, from https://towardsdatascience.com/machine-learning-an-introduction-23b84d51e6d0

[13] Gallino, Jeff (2019, May 14). Transforming the Call Center into a Competitive Advantage. Retrieved May 25, 2019, from https://www.martechadvisor.com/articles/customer-experience-2/transforming-the-call-center-into-a-competitive-advantage/

[14] Vergun, David (2018, August 21). Artificial intelligence likely to help shape future battlefield, says Army vice chief.  Retrieved May 25, 2019, from https://www.army.mil/article/210134/artificial_intelligence_likely_to_help_shape_future_battlefield_says_army_vice_chief

[15] Snibbe, Alana Conner (2006, Fall). Drowning in Data. Retrieved May 25, 2019, from https://ssir.org/articles/entry/drowning_in_data

[16] Frizzo-Barker, Julie et al. An empirical study of the rise of big data in business scholarship, International Journal of Information Management, Burnaby, Canada, pp. 403-413.

[17] Rice, Condoleezza (2011) No Higher Honor. New York, NY, Random House Publishing, pp. 506-515.

[18] Ganesan, Kavita (n.d.) All you need to know about text preprocessing for NLP and Machine Learning. Retrieved May 25, 2019, from https://www.kdnuggets.com/2019/04/text-preprocessing-nlp-machine-learning.html

[19] Gates, Robert (2014). Duty. New York, NY, Penguin Random House Publishing, pp. 347-348.

[20] Lasseter, Tom (2019, April 26). ‘Black sheep’: The mastermind of Sri Lanka’s Easter Sunday bombs. Retrieved May 25, 2019, from https://www.reuters.com/article/us-sri-lanka-blasts-mastermind-insight/black-sheep-the-mastermind-of-sri-lankas-easter-sunday-bombs-idUSKCN1S21S8

[21] Singer, Peter Warren (2009). Wired for War. The Penguin Press, New York, NY, pp. 11.

2019 - Contest: Small Wars Journal Assessment Papers Information and Intelligence Information Systems Insurgency & Counteinsurgency Ray K. Ragan

Assessment of French Intervention in the Sahel Region, 2013-2019

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which ran from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Hannah Richards has an M.A. in Conflict, Security and Development from the University of Exeter and has recently completed a research internship for the Development, Concepts and Doctrine Centre, the United Kingdom’s Ministry of Defense think tank. She can be found on Twitter at @h_k_richards.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of French Intervention in the Sahel Region, 2013-2019

Date Originally Written:  May 31, 2019.

Date Originally Published:  August 12, 2019.

Summary:  Despite the initial success of Operation Serval in 2013, French intervention in the Sahel region has now reached impasse. The already intricate situation is further complicated by France’s status as a former colonizer operating in the region. Understanding how France’s former colonial status translates into relationships between local communities, French troops, and armed terrorist groups will influence long term engagement. 

Text:  In light of the growing instability in Libya, the enduring presence of Boko Haram in Nigeria and the territorial decline of the Islamic State in the Middle East, attention will increasingly turn to the Sahel as a crucial battleground in the fight against violent non-state actors. As such, the significance of recent French operations in the region cannot be understated.

Due its sheer scale, inaccessibility and geopolitical complexity, the Sahel provides optimal conditions that enable armed terrorist groups to prosper. It is no surprise, therefore, that the region has long served as an important theater for international counterterrorist operations. Launched in 2013 at the behest of the Malian government, the French-led Operation Serval marked an evolution in the level of international engagement in the region. Widely regarded as a military success, Serval was lauded for the rapid reaction and deployment of French troops and for meeting the ultimate objective of pushing back armed terrorist groups from the center of the country. Perhaps more unusually, it also received initial widespread praise from both local and international actors[1].  

However, time has revealed Serval’s successes to be momentary. The operation did little to contribute to the overall stabilization and restoration of Malian state authority, with the security situation now widely accepted to have worsened since 2014[2]. The decision to launch Operation Barkhane in 2014 confirmed that Serval, despite its strengths, had failed to address the underlying causes of the Malian conflict; causes which have only been compounded and exploited by the enduring presence of the armed terrorist groups and fighters traveling to the region from the Middle East[3]. 

Unlike Serval, which fielded small, highly agile forces that were tailored to the specific political goals of the intervention[4], Barkhane reflects a much broader regional counterterrorist effort. The declared aims of the operation are carefully aligned to those countries of the G5 Sahel (Burkina Faso, Chad, Mali, Mauritania, and Niger) and emphasize the need for capacity building that enables local partners to secure their own safety independently[5]. This close coordination with, and emphasis on, local state actors in the region signifies a clear departure from the operational independence of Serval. Barkhane has had some notable achievements in terms of both hard and soft power[6], however, what constitutes success at a broader strategic level remains unclear. The wide-ranging aims of the current operation are ambiguous and ill-defined, ultimately rendering France’s departure an uncertain prospect. This vagueness, when viewed alongside the complexity of the region, is a clear indicator of the impasse that lies immediately ahead of French forces.

Despite these foreboding circumstances, there are numerous factors that have influenced France’s decision to remain firmly engaged with the region. The initial framing of Serval in the context of the ‘War on Terror’ is crucial to understanding continued involvement. Since Serval’s launch in 2013, France has suffered numerous domestic terrorist attacks. France’s continued investment in tackling terrorism overseas thus represents not only an attempt to ensure regional stability within the Sahel, but a broader commitment to safeguarding its own citizens both abroad and at home. With the acknowledgement that a premature departure could in fact worsen the situation and create conditions that would facilitate the expansion of international terrorist organisations, the idea of a quick exit for France is therefore difficult to entertain[7]. 

In addition, by presenting intervention predominantly through the lens of a counterterrorist mission, France has distanced itself from the intricate political problems within Mali and allowed for the expansion of operations into neighboring countries[8]. As such, a second motivation for remaining in the region becomes evident; Serval and Barkhane have enabled the establishment of French military bases across the region, placing it in a unique position amongst its allies. By redressing its diminished authority in the Sahel, these interventions have presented France with the opportunity to reaffirm its role as a key player on the international stage. 

However, certain international observers have interpreted this strong narrative of counterterrorism as a thinly veiled attempt to detract attention from France’s actual aim of furthering its own national interest in the region, with clear inferences being made to a neo-colonial agenda[9]. Although often crude and reductionist, such criticism does serve to highlight the symbolic connotations of a permanent French military presence in the Sahel for the first time since the end of the colonial period. Although theoretical discussions centered on neo-colonialism may appear ancillary to an assessment of military intervention to date, how these translate into dynamics on the ground will prove crucial to France’s ability to combat armed terrorist groups in the longer term.

The polarizing effect of French intervention on local communities is becoming apparent, demonstrating that it is not just foreign opinion that harbors skepticism about the enduring international presence in the region[10]. Journalistic accounts from Mali have highlighted that, in the aftermath of Serval, questions were raised about continued Malian dependence upon the French state which, followed by Barkhane, has left “many in the region to talk of neo-colonialism[11].” Similarly, images from recent protests, show the disdain felt by certain portions of the Malian population towards continued French presence[12].Should the armed terrorist groups operating in the region harness this acrimony and exploit such narratives to motivate, recruit and encourage others to commit acts of terrorism, the mere presence of French troops may ultimately prove beneficial to those that they are there to combat. 

Although the overall contribution of Barkhane to the stability of the Sahel is as yet unclear, France’s military commitment remains steadfast. When viewed in the context of its historic engagement with the region, the implications of a permanent French presence are vast. As such, a nuanced understanding of the different narratives at play will be increasingly important in determining whether French intervention is ultimately regarded as a success or failure. 


Endnotes:

[1] Boeke, S., & Schuurman, B. (2015). ‘Operation ‘Serval’: A Strategic Analysis of the French Intervention in Mali, 2013–2014’. Journal of Strategic Studies, 38(6), 801-825.

[2] Charbonneau, B. (2019, March 28). The Military Intervention in Mali and Beyond: An Interview with Bruno Charbonneau. Oxford Research Group. Retrieved May 1, 2019, from https://www.oxfordresearchgroup.org.uk/blog/the-french-intervention-in-mali-an-interview-with-bruno-charbonneau

[3] Carayol, R. (2018, July 1). Mali disintegrates. Le Monde Diplomatique. Retrieved April 27, 2019, from https://mondediplo.com/2018/07/02mali

[4] Shurkin, M. (2014). France’s War in Mali: Lessons for an Expeditionary Army. RAND Corporation. Retrieved April 28, 2019 from https://www.rand.org/pubs/research_reports/RR770.html

[5] Le Drian, J. (2013, January 12). Conférence De Presse Du Ministre De La Défense, Jean-Yves Le Drian (France, Ministère des Armées). Retrieved April 28, 2019, from https://www.defense.gouv.fr/actualites/operations/conference-de-presse-samedi-12-janvier-2013-mali-somalie

[6] Ministère des Armées. (2019, February). Dossier de Presse : Opération Barkhane [Press release]. Retrieved April 28, 2019, from https://www.defense.gouv.fr/operations/barkhane/dossier-de-presentation/operation-barkhane

[7] Chalandon, M. & Gérard, M. (Producers). (2019, May 17). Table ronde d’actualité internationale Opération Barkhane : La France s’est-elle enlisée au Sahel ? [Audio podcast]. Retrieved May 29, 2019, from https://www.franceculture.fr/emissions/cultures-monde/table-ronde-dactualite-internationale-operation-barkhane-la-france-sest-elle-enlisee-au-sahel

[8] S. D. Wing (2016) French intervention in Mali: strategic alliances, long-term regional presence?. Small Wars & Insurgencies, 27:1, 59-80

[9] See for example; Galy, M. (2014, December 4). Cinquante ans de fiasco de la « Françafrique ». Le Monde. Retrieved April 28, 2019, from http://www.lemonde.fr/idees/article/2013/12/04/cinquante-ans-de-fiasco-de-la-francafrique_3525416_3232.html, or Kane, P. S. (2014, September 6). Mali: The forgotten war. Al Jazeera. Retrieved April 28, 2019, from http://www.aljazeera.com/indepth/opinion/2014/09/mali-forgotten-war-20149691511333443.html

[10] Chalandon, M. & Gérard, M.

[11] Hicks, C. (2016). How the French Operation Serval was viewed on the ground: A journalistic perspective. International Journal of Francophone Studies, 19(2), 193-207

[12] Mali attacks: Protests held against jihadist violence. (2019, April 5). BBC News. Retrieved April 28, 2019, from https://www.bbc.co.uk/news/world-africa-47834214

2019 - Contest: Small Wars Journal Assessment Papers France Hannah Richards Sahel

Assessment of U.S. Strategic Goals Through Peacekeeping Operations in the 1982 Lebanon Intervention

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which ran from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Edwin Tran is a political analyst with the Encyclopedia Geopolitica and is an editor for the International Review.  Edwin focuses on Levantine politics and civil society, and can be found on Twitter at @En_EdwinT.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of U.S. Strategic Goals Through Peacekeeping Operations in the 1982 Lebanon Intervention

Date Originally Written:  May 31, 2019.

Date Originally Published:  August 8, 2019.

Summary:  The United States’ intervention in the Lebanese Civil War was a peacekeeping operation defined by long term strategic goals centered around increasing American hegemony in the region. The United States sought to leverage its position as a peacekeeper against Israeli and Syrian advances. However, significant overreach and unplanned events would play a substantial role in limiting the extent of American success in Lebanon. 

Text:  In 1975, tensions between Lebanon’s sectarian groups erupted into civil war[1]. The influx of Palestinian refugees throughout the 1940s-1960s threatened the political status quo of the country and civil war saw Palestinian militias engage Maronite militias[2]. As the Lebanese Civil War waged on, various peacekeeping operations were attempted. June 1976 saw the entrance of the Syrian military on behalf of Maronite President Suleiman Frangieh. This entrance was followed by a task force known as the Arab Deterrent Force founded in October of that year[3]. In response to the 1978 Israeli invasion of South Lebanon, the United Nations Security Council enacted resolutions 425 and 426, which created the United Nations Interim Force in Lebanon (UNFIL)[4]. Despite these measures, further instability was promoted by the 1982 Israeli invasion of Lebanon. The U.S. Reagan administration was deeply divided by these actions, and after serious cabinet discussions, Secretary of State Alexander Haig resigned. Haig was replaced by George Shultz, and after further discussions with the Lebanese regime of Elias Sarkis, it was decided that the U.S., United Kingdom, France, and Italy would establish a peacekeeping mission[5]. Known as the Multinational Force in Lebanon (MNF), this iteration of international peacekeeping operations would, as described by U.S. Deputy Press Secretary Larry Speakes, “facilitate the restoration of Lebanese Government sovereignty and authority over the Beirut area and thereby further its efforts… to bring an end the violence which has tragically recurred[6].”

On August 21, 1982, the U.S. 2nd Battalion 8th Marines entered Beirut[7]. Additional forces would arrive in the following days. From the onset, the U.S. and its allies were chiefly involved in establishing peace in the direct vicinity of Beirut. Such ideations were made clear in covert meetings conducted between Israeli Prime Minister Menachem Begin and U.S. Ambassador Philip Habib. Declassified Department of State documents reveal that in the months prior to the MNF intervention, negotiations with the Israelis emphasized “the serious situation in the city of Beirut, where [Habib was] informed of the lack of gas, electricity and other basic needs[8].” Contingent on such peace developments was the removal of Yasser Arafat and the Palestinian Liberation Organization (PLO) from Lebanon. The removal was believed to be paramount for peace developments in the country[9]. August 30 became the climax of these operations, as the U.S. and its allies were successful in moving Yasser Arafat and a sizeable portion of the PLO out of Lebanon[10].

However, such actions in the first weeks of MNF operations represented a small aspect of more complicated designs. The Reagan administration, recognizing the strategic importance of the region, hoped to use these developments as leverage against the Israelis, Lebanese, and Syrians. Significant weight was placed on furthering the Camp David agreement between Egypt and Israel, though this time with Lebanon and Jordan[11]. This culminated in the development of the Reagan Peace Plan, which was shown to Israeli Prime Minister Menachem Begin on September 1. This plan emphasized the U.S.’s commitment to peace throughout the region and to its specific operations in Lebanon[12]. More contentious were the Peace Plan’s desires for the Israelis to vacate the Palestinian territories, and for a potential merger between Palestinians and Jordan. Although Egypt accepted the deal, every other party was either hostile or highly suspicious.

Other strategic goals of the U.S. became threatened in the immediate aftermath of the PLO’s expulsion. It was believed by many that U.S. intervention would correlate with a weakened Syrian presence and a stronger central government. Such thought was justified by the results of the 1958 Lebanon War, where U.S. intervention resulted in the immediate stability of Lebanon and in the strengthening of Lebanese President Fuad Chehab’s political grip[13]. In the case of the 1982 intervention, the U.S. and its plans were abruptly derailed by the September 14th assassination of Bachir Gemayel, a senior member of the Christian Phalange party and the founder and supreme commander of the Lebanese Forces militia. Peacekeeping attempts by the MNF hinged on a strong Maronite presence in Beirut. With Bachir Gemayel assassinated, the Maronites would be prone to infighting, the Syrians would see a resurgence in military capabilities, and the MNF would have to exert additional efforts in maintaining stability as the Maronites attempted to find new leaders. 

Even before the 1983 bombings of the U.S. embassy and the Beirut barracks, it was clear that the U.S. had failed in its strategic goals. According to U.S. intelligence officers, the unveiling of the Reagan Peace Plan created a situation that threatened Israeli sovereignty[14], and some postulated that the Israelis “could react to the President’s peace initiative by stirring up the pot[15].” Such ideas came to fruition as the Israelis strengthened their hold over West Beirut and engaged in additional attacks. The death of Gemayel, who had also been crucial for the Israelis, meant that Israel was now forced to act in Lebanon without internal actors they could coordinate with. For the U.S. the death of Gemayel meant its own actions would face similar problems and lacking a principle leader to rally behind meant U.S. peacekeeping operations would be examined with a sense of extra-judiciality[16].

In the aftermath of the 1983 bombings, President Reagan addressed to the U.S. public his reasoning for why Lebanon was so valuable. It was, according to the President, a region of substantial importance, an area that was “key to the economic and political life of the west[17].” While such ideals may have been the impetus for the U.S.’s involvement in Lebanon, the reality of the situation proved to be one of catastrophic failure, and the political blunders made by the Reagan administration meant that its efforts were wasted. These points are made somberly in a 1983 memo from National Intelligence Officer Graham E. Fuller to Acting Director William Casey of the Central Intelligence Agency. In it, Fuller writes that “the events of the past… present us with a singularly bleak outlook for U.S. interests in Lebanon… we must face the prospect that our current policies towards Lebanon are not going to work[17].”


Endnotes:

[1] Rabinovich, I. (1989). The War for Lebanon, 1970-1985. (pp.40-41) Ithaca: Cornell University Press.

[2] Khalaf, S. (2002). Civil and Uncivil Violence in Lebanon: A History of the Internationalization of Human Contact. (pp. 167, 229) New York: Columbia University Press.

[3] Rabil, R. (2005). From Beirut to Algiers: The Arab League’s Role in the Lebanon Crisis. Retrieved 23 May 2019 from https://www.washingtoninstitute.org/policy-analysis/view/from-beirut-to-algiers-the-arab-leagues-role-in-the-lebanon-crisis

[4] United Nations Security Council (1978). Resolution 425. Retrieved 23 May 2019 from https://undocs.org/S/RES/425(1978)

[5] Goldschmidt, A. (1996). A Concise History of the Middle East. (pp. 348-350) Colorado: Westview Press.

[6] Speakes, L. (1982). Ronald Reagan Administration: Deputy Press Secretary Speakes on the Situation in Lebanon. Retrieved 23 May 2019 from https://www.jewishvirtuallibrary.org/deputy-press-secretary-speakes-on-the-situation-in-lebanon-september-1982

[7] Cimbala, S. and Foster, P. (2010). Multinational Military Intervention: NATO Policy, Strategy, and Burden Sharing. (pp. 37) Abingdon: Routledge.

[8] Lebanon: Second Meeting with Begin – June 1982 (1982). Retrieved 23 May 2019 from https://www.cia.gov/library/readingroom/docs/CIA-RDP84B00049R000601490020-5.pdf

[9] National Intelligence Daily (Cable) 27 August 1982 (2016). Retrieved 23 May 2019 from https://www.cia.gov/library/readingroom/docs/CIA-RDP84T00301R000400010198-5.pdf

[10] P.L.O Troops begin Pullout in Beirut; French Enter City (1982). The Associated Press. Retrieved from https://www.nytimes.com/1982/08/22/world/plo-troops-begin-pullout-in-beirut-french-enter-city.html

[11] Aruri, N. H. (1985). The United States’ Intervention in Lebanon. Arab Studies Quarterly 7(4), 60-61.

[12] The Reagan Plan (1982). Retrieved 23 May 2019 from https://ecf.org.il/media_items/551

[13] Geyelin, P. (1982). Lebanon—1958 and Now. The Washington Post. Retrieved 23 May 2019 from https://www.washingtonpost.com/archive/politics/1982/08/03/lebanon-1958-and-now/66bde27f-c951-4a7c-bbd7-068ef601e5ad/

[14] Harkabi, Y. (1988). Israel’s Fateful Hour. (pp. 111) New York: Harper and Row Publishers.

[15] Talking Points on Lebanese Internal Situation for 3 September (1982). Retrieved 23 May 2019 from https://www.cia.gov/library/readingroom/docs/CIA-RDP84B00049R001800230010-2.pdf

[16] Talking Points on Lebanon: Post-Assassination Update (1982). Retrieved 23 May 2019 from https://www.cia.gov/library/readingroom/docs/CIA-RDP84B00049R001403460004-5.pdf

[17] Aruri, N. H. (1985). The United States’ Intervention in Lebanon. Arab Studies Quarterly 7(4), 60.

[18] Downward Spiral in Lebanon (1983). Retrieved 23 May 2019 from https://www.cia.gov/library/readingroom/docs/CIA-RDP85M00364R001402440042-4.pdf

2019 - Contest: Small Wars Journal Assessment Papers Edwin Tran Lebanon United States

An Assessment of the Private Military Industry and its Role in the Iraq and Afghanistan Wars

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which ran from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Naiomi Gonzalez is currently a doctoral student in history at Texas Christian University. She can be found on twitter at @AmericanUnInte1.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Private Military Industry and its Role in the Iraq and Afghanistan Wars

Date Originally Written:  May 31, 2019.

Date Originally Published:  August 5, 2019.

Summary:  The wars in Iraq and Afghanistan required the support of the private military industry. However, the United States government’s increased reliance and dependency on private military firms has not been without controversy. In fact, the lack of accountability that has allowed certain sectors of the private military industry to act with impunity have arguably complicated the U.S. military’s already difficult missions in Iraq and Afghanistan.

Text:  The wars in Iraq and Afghanistan have brought the United States government’s increased reliance on private military firms to the forefront[1]. During the Vietnam War, it is estimated that there was 1 contractor for every 55 uniformed military personnel. In Iraq the ratio has hovered around 1 contractor for every 1 military personnel and in Afghanistan the number is 1.43 for every 1 military personnel[2]. During specific time periods, the number of contractors has even surpassed that of uniformed military personnel[3].

Private military firms undoubtedly provide much needed services and therefore, should not be discounted for their services. Private military firms, for instance, can draw on a large pool of expertise in a variety of fields while the military is limited by who they can recruit. This private military firm manpower flexibility is particularly important as technology continues to develop at a rapid pace. The Department of Defense (DoD), like most other government agencies, already heavily relies on the private sector to meet many of its technological needs. For example, the DoD has close relationships with many commercial agencies and contractors in order to develop and maintain the latest computer systems. If the DoD were to focus on developing their own computer systems, it would take about seven years for it to become operational. By that time the system would be obsolete and the efforts a waste[4]. For the DoD, which is often inundated by numerous other concerns and responsibilities, it makes sense to team up with private enterprises whose expertise lie in remaining on the cutting edge of new technological advances. Likewise, when it comes to maintaining the military’s vast and increasingly sophisticated technological arsenal, it benefits the DoD to hire contractors who already have years of experience on using and maintaining these specialized weapon rather than rely on military technicians who are most likely not trained in the nuances of a specific piece of equipment[5].

Another benefit of using contractors is that they provide a degree of political flexibility that enables political and military leaders to engage in policies the larger American citizenry might find objectionable. For instance, since the Vietnam War, Americans have shown a disdain for large scale conflicts that result in a large number of U.S. military causalities[6]. This low tolerance for long, drawn out wars became more pronounced as the wars in Iraq and Afghanistan dragged on, year after year. However, this aversion to American casualties does not always extend to those working as contractors, especially if those contractors are locals or third-world nationals. Because their roles in the Afghanistan and Iraq wars is not always obvious, contractor deaths and injuries usually attract little attention. Exceptions to this disinterest usually center on particularly vicious deaths or injuries[7]. While not a panacea for increasingly unpopular wars, the use of contractors, especially in place of uniformed military personnel, ensures that extended conflicts remain palpable to the American public for a longer period of time.

However, the use of private military firms also comes with some severe drawbacks. On the economic front, their cost-effectiveness is in doubt. By 2012 the U.S. had spent about $232.2 billion on contractors and about $60 billion had been lost as a result of waste, fraud and abuse on the part of the contractors[8].

Much more concerning is the lack of accountability and impunity that has plagued the industry. In April 2004, CBS News published photographs showing the abuse of Iraqi prisoners by American personnel. While media focus centered on uniformed American personnel who were abusing prisoners and on their courts martial, contractors also played a role in the scandal. Two private military firms, Titan[9] and CACI provided all of the translators and about half of the interrogators involved in the abuse case[10]. Yet no contractor was held legally responsible for their role in the abuse.

Private military provider/security firms have their own unique sets of issues and problems. While they make up the smallest number of contractors[11], the controversy they provoke belies their relatively small numbers. Blackwater Security[12] was the most notorious of these private military provider firms.

The 2007 Nisour Square case involving Blackwater helped spur the wider American population to question the utility of private provider/security firms. On September 16, 2007, Blackwater contractors shot, killed, and injured dozens of Iraqi civilians, in what they claimed was an act of self-defense[13].” The killings provoked widespread outrage. The Iraq government claimed, “The murder of citizens in cold blood…by Blackwater is considered a terrorist action against civilians[14]…” At that time, questions arose regarding whether private provider firms aid or hinder the United States’ mission in Iraq. Then U.S. Secretary of Defense Robert Gates admitted that the provider firms’ singular focus on completing their mission, can at times mean that they are working “at cross-purposes to our larger mission in Iraq[15].”

This obsession with ensuring that they complete their assigned task, no matter their costs, can be attributed to the for-profit nature of the companies and the personnel they hire, many of whom have a mission-focused mindset from their former military experiences. Before the Nisour Square incident, Blackwater took pride in its ability to get the job done, no matter what. Such a mindset ensured its success and profitability. However, the Nisour Square episode forced contractors, the government and the public at large to doubt the utility of such a mindset, especially when it results in the deaths of civilians, which only inflames anti-American sentiment. It is difficult to win “hearts and minds” by killing civilians. Moreover, the process of holding the contractors legally responsible for civilian deaths has met with many obstacles. The legal cases against four contractors involved in the Nisour Square incident has dragged on for years[16] while mainstream media attention has faded.

Private military firms have played vital roles in the wars in Iraq and Afghanistan. Their roles will only continue to expand. However, the U.S. government’s increased dependency on private military firms has not been without controversy or problems. These problems and controversies have hindered rather than aided the U.S. in completing their already difficult missions in Iraq and Afghanistan.


Endnotes:

[1] Peter W. Singer divides private military firms into three groups: military provider firms (aka private security firms), military consulting firms, and military support firms. While in some cases it is clear which firms fall into what category, in other cases the lines are more blurred as some companies take on a variety of roles. For an in-depth explanation of the different groups see Singer, P. W. (2008). Corporate Warriors: The Rise of the Privatized Military Industry. Ithaca, NY: Cornell Univ. Press

[2] Taylor, W. A. (2016). Military Service and American Democracy: From World War II to the Iraq and Afghanistan Wars. (pg. 172) Lawrence, KS: University Press of Kansas.

[3] For instance, during the third quarter of fiscal year 2008, there were 162,428 total contractors in Iraq, compared to 153,300 uniformed military personnel. In Afghanistan the contrast in numbers is much more pronounced. During the fourth quarter of the 2009 fiscal year there were 104,101 total contractors compared to 62,300 uniformed personnel. See Peters, H. M., & Plagakis, S. (2019, May 10). Department of Defense Contractor and Troop Levels in Afghanistan and Iraq: 2007-2018. Retrieved May 23, 2019, from https://www.everycrsreport.com/reports/R44116.html

[4] Ettinger, A. (2016). The Patterns, Implications, and Risks of American Military Contracting. In S. V. Hlatky & H. C. Breede (Eds.), Going to War?: Trends in Military Interventions (pp. 115-132). Montreal, CA: McGill-Queen’s University Press.

[5] Ibid.

[6] Stanger, A., & Williams, M. E. (Fall/Winter 2006). Private Military Corporations: Benefits and Costs of Outsourcing Security. Yale Journal of International Affairs, 4-19.

[7] For instance, on March 31, 2004 four Blackwater contractors were killed, dismembered and their body parts paraded through the streets of Fallujah. Blackwater faced criticism for its decision to send only four contractors instead of six into an incredibly hostile part of Iraq in jeeps that were armored only with one steel plate. See In Re: BlackWater Security Consulting LCC, http://www.ca4.uscourts.gov/Opinions/Published/051949.P.pdf 1-28 (United Court of Appeals for the Fourth Circuit 2006).

[8] Taylor, 117. This number is most likely an undercount.

[9] In 2005 Titan was acquired by L3 Communications. See Staff, SSI. “L-3 Communications Agrees to Merger With Titan Corp.” Security Sales & Integration, Security Sales & Integration, 7 June 2005, www.securitysales.com/news/l-3-communications-agrees-to-merger-with-titan-corp/.

[10] Singer, P. (2005, April). Outsourcing War. Retrieved May 24, 2019, from https://www.foreignaffairs.com/articles/2005-03-01/outsourcing-war.

[11] The number of private military provider/security firms peaked in Iraq at 15,000 individuals and in 2012 at 28,000. See Peters, H. M., & Plagakis, S. (2019, May 10). Department of Defense Contractor and Troop Levels in Afghanistan and Iraq: 2007-2018. Retrieved May 23, 2019, from https://www.everycrsreport.com/reports/R44116.html

[12] Blackwater was eventually sold and it underwent numerous name changes. It is currently called Academi. See Ukman, J. (2011, December 12). Ex-Blackwater Firm gets a Name Change, Again. Retrieved May 23, 2019, from https://www.washingtonpost.com/blogs/checkpoint-washington/post/ex-blackwater-firm-gets-a-name-change-again/2011/12/12/gIQAXf4YpO_blog.html

[13] A subsequent FBI investigation found the shooting to be unjustified. See Johnston, D., & Broder, J. M. (2007, November 14). F.B.I. Says Guards Killed 14 Iraqis Without Cause. Retrieved May 27, 2019, from https://www.nytimes.com/2007/11/14/world/middleeast/14blackwater.html

[14] Tolchin, M., & Tolchin, S. J. (2016). Pinstripe patronage: Political favoritism from the clubhouse to the White House and beyond. Pg. 183 London, UK: Routledge.

[15] Spiegel, P. (2007, October 19). Gates: U.S., Guards are at Odds in Iraq. Retrieved May 23, 2019, from https://www.latimes.com/archives/la-xpm-2007-oct-19-na-blackwater19-story.html

[16] See Collins, M. (2018, December 19). Former Blackwater Guard Convicted of Instigating Mass Shooting in Iraq. Retrieved May 23, 2019, from https://www.usatoday.com/story/news/politics/2018/12/19/iraq-war-jury-convicts-ex-blackwater-guard-second-time-massacre/1941149002/

2019 - Contest: Small Wars Journal Afghanistan Assessment Papers Iraq Naiomi Gonzalez Private Military Companies (PMC etc) United States

Assessment of U.S. Involvement to Counter Hutu Extremists’ Plans for Tutsi Genocide in Early 1994

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which ran from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Scott Martin is a career U.S. Air Force officer who has served in a multitude of globally-focused assignments.  He studied Russian and International Affairs at Trinity University and received his Masters of Science in International Relations from Troy University.  He is currently assigned to Ft. Meade, Maryland.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of U.S. Involvement to Counter Hutu Extremists’ Plans for Tutsi Genocide in Early 1994

Date Originally Written:  May 31, 2019.

Date Originally Published:  July 29, 2019.

Summary:  The U.S. could have countered the genocide the April 1994 genocide in Rwanda. While it is very difficult to envision a scenario whereby the U.S. conducted unilateral military actions once the genocide started, the various indicators prior to that date offered the U.S. the opportunity, working through the United Nations (UN), to act to prevent the genocide before it started. 

Text:  On April 6, 2019, the world reflected on the 25th anniversary of the genocide of 800,000 Tutsi and sympathetic Hutus by Hutu extremists in Rwanda. Since then, many asked the question “Why didn’t someone stop this?” Since 1994, the U.S. expressed remorse at the genocide in Rwanda. Yet in 1994, the U.S. took pains to avoid direct involvement/action in Rwanda. Given a lack of significant geo-political or economic equities and disgusted by the failures of their humanitarian action in Somalia, the U.S. argued they had no role in Rwanda. Yet, with the U.S. taking a remorseful tone with the Rwandan Genocide, it begs the question: What if the U.S. did take action?

There is no shortage of debate on this issue. Some, such as former United Nations (UN) Ambassador Samantha Power, felt that U.S. military involvement, even on a small scale could have reduced if not halted the genocide[1]. Such actions ranged from the deployment of an Army Brigade (overseas or stateside based) to the use of the Air Force’s Commando Solo Electronic Warfare / Information Operations platform. Others, such as scholar Alan Kuperman, note that the U.S. did not have enough confirmation of genocide until April 20, by which time, most of the killing was completed[2]. Thus, the deployment of U.S. forces, in addition to not being in position to significantly impact the genocide, would place undue burdens on the U.S. military, and present America with another unnecessary U.S. humanitarian quagmire.  Subsequent analyses looked at options from the deployment of 5,000-150,000 troops, but a unilateral U.S.-led deployment, no matter the options, is always seen as unlikely, given the lack of bi-partisan political support in Washington D.C.  

Yet, the genocide did not spontaneously start in April 1994. After Rwandan independence in 1961, the long-standing differences between Hutu and Tutsi populations manifested themselves into multiple conflicts. Since 1990, conflict between displaced Tutsi (Rwandan Patriotic Front (RPF)) and the Hutu led-military/militia forces plagued the country. Despite international-led efforts to end the warfare, many within the Hutu-dominated government planned for actions to eliminate the Tutsi from Rwanda. The international community had indications of such plans as far back as 1992[3]. From 1990-1993, Hutu militias executed nearly 2000 Tutsi, a preview of Hutu plans[4]. By January 1994, the United Nations Assistance Mission in Rwanda (UNAMIR) received intelligence that the Hutu-led government was actively planning for a mass extermination of all known Tutsi and sympathetic elements within the country. The UNAMIR commander, Canadian General Romeo Dallaire, notified the UN Security Council on 11 January of this development and asked for authorization to deal with this emerging threat[5]. 

It is in this January 1994 scenario that the U.S. could have plausibly acted to counter the genocide, leveraging the UN Security Council to modify and increase the authority and resources of UNAMIR. Instead of working to withdraw forces from Rwanda, the U.S. and the UN Security Council could have reauthorized and increased troop deployments from the 2,500 in country in early 1994[6]. While 5,000 troops (the number requested by Dallaire to aid UNAMIR in 1994) would not be enough to halt a nation-wide genocide if it kicked off, a strong international presence, combined with a public proclamation and demonstration of increasing troop deployments to maintain peace and thwart extremist actions, might have curtailed Hutu ambitions[7]. While a major strategy of the Hutu extremists was to kill several of the international peacekeepers, taking active measures to protect those forces while not redeploying them would also thwart Hutu strategy. 

In this scenario, the U.S. would have provided political and logistical support. The U.S. faced logistical challenges dealing with a land-locked country, but its airpower had the capability to use existing airfields in Rwanda and neighboring countries[8]. While Hutu extremists could target U.S. assets and personnel, they were more likely not to directly interfere with international forces. During the actual genocide, while Hutu extremists killed 10 Belgian peacekeepers, Tutsis protected by the limited number of international forces usually found themselves safe from attack[9]. Even in situations where Hutu killers greatly outnumbered international forces, the Hutu did not attack the international peacekeepers[10]. 

This is not to say that increased authorities and manpower for the UN Peacekeepers would have solved all the problems. How the UN could have dealt with the Tutsi forces looking to reenter Rwanda and defeat the Hutu forces presented a difficult long-term problem. The Hutu extremists would not have simply stopped their efforts to drum up support for Tutsi elimination. It is possible the Hutu extremists would look to target UN forces and logistics, especially if it was an American asset, in a repeat of Somalia. Even by offering American equipment and indirect support, domestic political support would be tenuous at best and U.S. President William Clinton’s opponents would use those actions against him, with Clinton’s party still suffering historic losses in the 1994 midterm elections. It is possible that the Hutu and Tutsi would try to wait out the UN forces, coming to a “peaceful” government, only to hold their fire until after the peacekeepers are sent home. 

Yet, acting through the UN Peacekeepers before April might have stopped the genocide and all the ills that followed. While Paul Kagame may never come to power and Rwanda’s economic and social resurgence would have taken a different path, there may have been hundreds of thousands of Rwandans still alive to make their mark in improving the life of the nation. Additionally, the Hutu extremists may not have been so active in spreading their ethnic hatreds beyond their borders. The Congo Wars of the late 1990s/early 2000s have their genesis in the Hutu extremists who fled into the refugee camps[11]. If there is no mass displacement of those extremists into Democratic Republic of Congo, perhaps Africa avoids a brutal conflict and over 5 million lives are saved[12]. Perhaps assisting the UNAMIR with U.S. support/logistics might not have been a popular move in 1994, but if executed, the U.S. may not have to look back in 2019 to say “We should have done something.” 


Endnotes:

[1] Power, Samantha (2001, September). Bystanders to Genocide. The Atlantic. retrieved 15 Mar 2019 from (https://www.theatlantic.com/magazine/archive/2001/09/bystanders-to-genocide/304571/. 

[2] Kuperman, Alan J (2000, January/February). Rwanda in Retrospective. Foreign Affairs (Vol 79, no.1) 101. 

[3] Stanton, Gregory H. (2004, June). Could the Rwandan Genocide have been Prevented? Journal of Genocide Research. 6(2). 212

[4] Ibid 

[5] Ibid

[6] Rauch, J. (2001) Now is the Time to Tell the Truth about Rwanda, National Journal, 33(16) retrieved 14 Mar 2019 from http://search.ebscohost.com/login.aspx?direct=true&db=asn&AN=4417527&site=ehost-live

[7] Wertheim, Stephen. (2010). A Solution from Hell: The United States and the Rise of Humanitarian Interventionism, 1991-2003. Journal of Genocide Research, 12(3-4), 155. 

[8] Stanley, George (2006) Genocide, Airpower and Intervention, 71. 

[9] Power, Samantha (2001, September). Bystanders to Genocide. The Atlantic. retrieved 15 Mar 2019 from https://www.theatlantic.com/magazine/archive/2001/09/bystanders-to-genocide/304571/.

[10] Ibid

[11] Beswick, Danielle (2014). The Risks African Military Capacity Building: Lessons from Rwanda. African Affairs, 113/451, 219. 

[12] Reid, Stuart A (Jan/Feb 2018). Congo’s Slide into Chaos. How a State Fails. Foreign Affairs, 97/1. 97. 

2019 - Contest: Small Wars Journal Assessment Papers Mass Killings Rwanda Scott Martin

Assessing the Jefferson Administration’s Actions During the First Barbary Wars and their Impact on U.S. Small War Policy

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Samuel T. Lair is a research associate at the Kenny Guinn Center for Policy Priorities.  He received his undergraduate degree from the University of Nevada, Reno studying U.S. Foreign Policy and American Constitutionalism.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Jefferson Administration’s Actions During the First Barbary War and their Impact on U.S. Small Wars Policy

Date Originally Written:  May 24, 2019.

Date Originally Published:  July 25, 2019.

Summary:  The First Barbary War of 1801 was the first significant American engagement outside of the Western Hemisphere and the second significant engagement against a foreign state without a formal declaration of war. Furthermore, this war’s multilateral strategy of using a coalition and diplomatic pressure provides valuable insight into the elements of a successful limited military operation. 

Text:  In the early 18th century, the independent state of Morocco and the Ottoman vassal states of Algeria, Tunisia, and Tripolitania (comprising modern-day Libya) formed what is known as the Barbary States. These rogue states would frequently engage in piracy, slave trading, and extortion along the Mediterranean coast, harassing the mercantile fleets of Europe in a form of textbook state-sponsored terrorism[1]. Prior to 1776, the American mercantile fleet under the tutelage of the British Empire was provided indemnity from the molestation of its Mediterranean trade. However, with the procurement of self-determination came an abrogation of many of the former Colonies’ favorable commercial pacts, including that with the Barbary States of North Africa. The United States’ mercantile fleet soon became frequently subject to the harassment of the Berber corsairs, subjecting American citizens to foreign slave camps and threatening the economy of the fledgling republic. In response, U.S. President George Washington agreed to pay tribute to the Barbary States in 1796. Following the election of U.S. President Thomas Jefferson in 1801, the Pasha of the Eyalet of Tripoli demanded increased tribute then shortly after declared war on the United States. In an unprecedented display of executive authority, President Jefferson responded by sending U.S. Navy Commodore Dale to protect U.S. interests in the Mediterranean and thus began the nation’s first small war.

Among the most impactful consequences of the First Barbary War was the now established authority of the Executive Branch to engage in limited military operations against foreign adversaries without a formal declaration of war. The President of the United States, although the Commander in Chief of the Armed Forces, has no expressed Constitutional authority to engage in acts of war without U.S. Congressional approval. Prior to the War Powers Resolution of 1973, the authority of the Executive Branch to proactively respond to threats against American interests abroad relied on the precedent of limited military operations beginning with Thomas Jefferson’s conduct during the First Barbary War. Jefferson received no formal authority from Congress before sending Commodore Dale in command of a small squadron to the courts of the Berber rulers to negotiate terms and protect U.S. merchant vessels, and it was not until after hostilities began that Congress retroactively authorized military force nearly nine months later[2]. Regardless, President Jefferson’s tactful use of executive authority in the commencement of the campaign and subsequent negotiation with the Maghreb states left an indelible mark for the standard of response to affronts on American interests.

Other notable precedents set during the First Barbary War was the multilateral approach of the Jefferson Administration. The war, though fought primarily by the United States Navy, was not entirely unilateral. The United States at the beginning of the war conducted operations jointly with the Royal Navy of Sweden in its blockade of Tripoli. Moreover, American forces received valuable logistical support from the Kingdom of Sicily, who provided ships, sailors, and a base of operations in the port city of Syracuse[2]. The American mission also applied ample diplomatic as well as military pressure in order to achieve its aims. In an apparent precursor to the Perry Expedition and the opening of Japanese markets to U.S. goods through gunboat diplomacy, the American mission was able to force the capitulation of both Morocco and Tunisia by employing bellicose diplomacy. The only Barbary State that the United States actively engaged in combat with was the Eyalet of Tripolitania under Pasha Yusuf Qaramanli.

In the commencement of military action against Pasha Qaramanli, the United States utilized both conventional and unconventional warfare. The first strategy was to deploy the United States Navy to blockade Tripoli and when appropriate, commence naval assaults on combatant naval forces and naval bombardments on Tripolitan cities. However, following the limited success of the naval operations, William Eaton, American consul to neighboring Tunisia, conspired to depose the Pasha and install his exiled brother, Hamet Qaramanli, on the Tripolitan throne[1]. Meeting in Alexandria, Egypt, Eaton and Hamet with a small squadron of six U.S. Marines and a homogenous force of 400-500 Greek, Arab, and Turkish mercenaries began their march to Tripoli. En route, the motley force with naval support from U.S. Naval warships commenced the first land battle fought on foreign soil, assaulting and capturing the port city of Derna.

Despite the success of the Derna operation, it would be the joint use of force and diplomacy that would end hostilities between the United States and the Eyalet of Tripoli. With the Treaty of Tripoli, the United States agreed to abandon support for Hamet Qaramanli and pay 60,000 U.S. dollars. In return, the Pasha released all the American nationals taken as prisoner throughout the war and the United States once again received assurance its Mediterranean trade would commence unabated[2]. If not for the success of the Battle of Derna and the U.S. Naval Blockade, it is likely that such an agreeable settlement would not have been impossible. Although Eaton’s and Hamet’s forces may have been able to take Tripoli and forced peace without having to pay ransom for the American prisoners, it is equally plausible the continued campaign would have turned into a drawn out and increasingly costly venture. Therefore, an assured and expedient end to the war required both skilled diplomacy and military ferocity. 

The First Barbary War stands as a model for pragmatic foreign policy and whose lessons touch upon the nuance necessary for even contemporary issues of national interest. Its lessons demonstrate that sound foreign policy requires a balanced, multilateral approach which recognizes that military aggression ought to be matched with ample diplomatic pressure, the benefit of coalition building, the necessity of combined arms operations, and the opportunity in unconventional warfare. The United States’ engagement on the shores of Tripoli echoes in future engagements from Nicaragua to China and numerous other small wars which act as an indelible mark on American foreign policy. These engagements range in scope and outcome, geography and foe, but regardless, it is upon the bold precedent set by President Jefferson during the First Barbary War that all proceeding American small wars stand.


Endnotes:

[1] Turner, R. F. (2003). State Responsibility and the War on Terror: The Legacy of Thomas Jefferson and the Barbary Pirates. Chicago Journal of International Law, 121-140. Retrieved April 7, 2019, from https://heinonline org.unr.idm.oclc.org/HOL/Page?collection=journals&handle=hein.journals/cjil4&id=145&men_tab=srchresults

[2] Boot, M. (2014). The Savage Wars of Peace: Small Wars and the Rise of American Power. Retrieved April 7, 2019, from https://books.google.com/books?hl=en&lr=&id=YX7ODQAAQBAJ&oi=fnd&pg=PR11&dq=savage+wars+of+peace+barbary+wars&ots=GxfcnIpmJY&sig=B7XyieNfzbC50MINDvo-92k4y7I#v=onepage&q=savage%20wars%20of%20peace%20barbary%20wars&f=false

2019 - Contest: Small Wars Journal Africa Assessment Papers Piracy Samuel T. Lair United Nations

Assessment of the Existential Threat Posed by a United Biafran and Ambazonian Separatist Front in West Africa

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Ekene Lionel presently writes for African Military Blog as a defense technology analyst.  His current research focuses on how technology intersects national defense.  He holds a Bachelor’s Degree from Michael Okpara University.  He can be found on Twitter @lionelfrancisNG.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Existential Threat Posed by a United Biafran and Ambazonian Separatist Front in West Africa

Date Originally Written:  May 11, 2019.

Date Originally Published:  July 11, 2019.

Summary:  The Nigerian separatist group the Indigenous People’s of Biafra, under pressure from the Nigerian military, recently met with representatives from the Cameroonian separatist forces who operate under the banner of the Ambazonian Defense Force.  If these two organizations form an alliance, it could represent an existential threat to both Nigeria and Cameroon and lead to civil war.

Text:  Two countries currently at war, one against ravaging Islamist terrorists trying to carve out a new caliphate governed on the basis of Sharia law, the other, against Anglophone separatist forces seeking to establish a new autonomous nation. Nigeria is currently neck-deep in a bitter war against both the Islamic State’s West African Province (ISWAP), as well as Boko Haram colloquially known as the Jamaa’atu Ahlis-Sunnati Lid-Da’wati Wal-Jihad. However, Nigeria has successfully curtailed a growing threat in the form of the Indigenous People of Biafra (IPOB)– a highly organized separatist group led by Mazi Nnamdi Kano; a Nigerian with British citizenship. The IPOB was formed as a breakaway group of the Movement for the Actualisation of Biafra with the sole purpose of completely severing ties with Nigeria through non-violent secession.

Meanwhile, across Nigeria’s eastern border towards Cameroon, a new war has been brewing for some months’ now, the Ambazonia War. For years, Southern Cameroonian citizens predominately located in the Anglophone territories of the Northwest and Southwest region have been constantly oppressed by the Cameroonian Regime led by Paul Biya, a former rebel leader. This oppression led to protests across the Southern Cameroon region. Biya responded by cracking down on the protesters resulting in at least 17 people killed. As calls for either integration or autonomy grew louder, the regime stepped in with heavy-handed tactics. Security forces were deployed to the regions; protests were met with violence, arrests, killings, and hundreds of homes were razed. Biya’s actions forced separatist forces under the banner of the Ambazonian Defense Force (ADF) to initiate a full-fledged guerrilla war in Southern Cameroon[1].

At the moment, the West African battleground poses a unique challenge to defense planners in the region simply because the ADF continue to grow stronger despite determined efforts by the Cameroonian Military to dislodge them. Several different armed groups have since emerged in support of the ADF such as the Red Dragons, Tigers, ARA, Seven Kata, ABL amongst others[2].

The Ambazonian War has since caused the death of more than 2000 people while 530,000 have been displaced. About 180,000 Cameroonians have fled to Nigeria putting more pressure on the already stressed infrastructure in the country’s Eastern flank[3]. Furthermore, the Cameroonian military which was focused on the Boko Haram insurgency, has divided its attention and deployed on multiple fronts, resulting in an upsurge in Boko Haram activities in the country. On a more tactical level, the Cameroonian Military’s most elite fighting force, the Rapid Intervention Battalion, which has been traditionally tasked with halting the rampaging Boko Haram terrorist’s onslaught, has also been largely withdrawn from the North and redeployed to the Anglophone region[4].

On the Nigerian front, as the IPOB continuously loses focus, ground, and drive as a result of the Nigerian Government’s “divide and destroy tactics” coupled with the intimidation of the Biafran separatist members, this breeds resentment amongst the rank and file. With this in mind, the top echelons of the Biafran separatist struggle under the banner of the Pro Biafra Groups, met in Enugu State, with the prime minister of Biafra Government in Exile in attendance and some other diaspora leaders of other pro-Biafra groups where they resolved to work together. The coalition met with the leadership of the Ambazonian Republic from Southern Cameroon where it discussed bilateral relationship as well as a possible alliance in achieving their objective[5].

Leveraging cultural and historical sentiments, since they share a common history and heritage, both the Biafran and Ambazonian separatists could band together and present a more formidable opponent to national forces in the region. On a strategic level, this partnership or alliance makes perfect military sense, given that both share a similar ideology and ultimately, the same goal. In an asymmetric conflict, the separatist forces can easily share valuable scarce resources, bolster their depleted ranks, accumulate valuable combat experience, provide a safe haven for fighters and also acquire human intelligence through the notoriously porous Nigeria/Cameroon border. 

Such an alliance poses an existential threat to the unity and existence of both Nigeria and Cameroon given that at the moment, Boko Haram and ISWAP are constantly pushing and probing from the Northeast of Nigeria, bandits are ravaging the Northcentral along with the current farmer/herder crises still troubling Nigeria’s center. The Nigerian military, although quite tenacious, cannot realistically hold these multiple forces at bay without crumbling.

Nigeria is the largest oil and gas producer in Africa, with the majority of its crude oil coming from the delta basin. Nigeria desperately needs its oil revenue to keep its battered economy running. Also, the bulk of Cameroon’s industrial output, including its only refinery, is in the Ambazonian region[6][7]. Hence, the economic impact of such an alliance could threaten the integrity of the West Africa, the future of the Economic Community of West African States, also known as ECOWAS, and the overall security, stability and progress of the entire subcontinent. 

With the militaries of both Nigeria and Cameroon already stretched thin and battered by years of constant war, if an alliance of ADF and Biafran separatist is allowed to succeed, it would open up opportunities for Boko Haram and ISWAP to grow stronger and overrun several key cities in the region, destabilize the economic balance and also the equipoise of military region in Africa.


Endnotes:

[1] Sarah, L. (2018, June 14). Cameroon’s anglophone war, A rifle is the only way out. Retrieved May 14, 2019, from https://www.africanmilitaryblog.com/2018/06/cameroon-ambazonia-war

[2] BBC. (2018, Oct 4) Cameroon’s Anglophone crisis: Red Dragons and Tigers – the rebels fighting for independence. Retrieved 14 May 2019, from https://www.bbc.com/news/world-africa-45723211 

[3] Aljazeera (2018, August 2). In Nigeria, Anglophone Cameroonians turn to low paid labor. Retrieved 13 May 2019, from https://www.aljazeera.com/indepth/features/nigeria-anglophone-cameroonians-turn-paid-labour-180801222453208.html

[4] The National Times. (2019, March 12). Insecurity Escalates In North Region As Gov’t, Military Concentrate In Anglophone Regions. Retrieved May 14, 2019, from  https://natimesnews.com/cameroon-national-times-there-has-been-growing-insecurity-in-the-three-northern-regions-of-cameroon-as-both-the-government-and-the-military-concentrate-their-strength-and-might-in-fighting-an-endles/ Archived

[5] Jeff, A. (2018, June 27). Pro-Biafra groups vow to be under one leadership. Retrieved 14 May 2019, from  https://www.sunnewsonline.com/biafra-pro-biafra-groups-vow-to-be-under-one-leadership/

[6] John, D. (2012, March 25). Cameroon, West Africa’s Latest Oil Battleground. Retrieved May 14, 2019, from https://oilprice.com/Energy/Crude-Oil/Cameroon-West-Africas-Latest-Oil-Battleground.html

[7] Ajodo, A. (2017, September 12). Towards ending conflict and insecurity in the Niger Delta region. Retrieved May 13, 2019, from https://reliefweb.int/report/nigeria/towards-ending-conflict-and-insecurity-niger-delta-region

2019 - Contest: Small Wars Journal Africa Assessment Papers Cameroon Ekene Lionel Existential Threat Nigeria

Assessment of Rising Extremism in the Central Sahel

Chris Wozniak is an independent analyst. He holds a BA in Political Economy from the University of Washington. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Rising Extremism in the Central Sahel

Date Originally Written:  May 15, 2019.

Date Originally Published:  July 8, 2019.

Author and / or Article Point of View:  The author is a civilian analyst with an interest in national security, diplomatic, and development issues. This article is written from the point of view of a United States committed to its strategic objective of denying transnational terrorists safe havens in ungoverned spaces. 

Summary:  Violent extremist organizations in the Central Sahel (the Fezzan in Libya’s south, Niger and the Lake Chad Basin) are exploiting environmental change, economic grievances, and longstanding social cleavages to recruit and expand. United States Africa Command is explicitly tasked with countering significant terrorist threats but fluctuating resources and underuse of diplomatic and economic tools risks allowing extremists to consolidate their gains and establish safe havens. 

Text:  The 2018 National Defense Strategy advocates for the use of multilateral relationships to address significant terrorist threats in Africa. Tasked with the execution of this goal, the United States Africa Command (USAFRICOM) has adopted a “by, with, and through” approach emphasizing partner-centric solutions in a challenging operating environment. Africa’s population is expected to nearly double by 2050 while climate change continues unabated[1]. These twin pressures increase food insecurity and exacerbate social cleavages, providing opportunities for violent extremist organizations (VEOs) to operate, recruit, and expand. African governments struggling to respond to the threat find themselves resource constrained, lacking training, and derelict in their governance of vulnerable areas.  As one of the regions most vulnerable to these pressures, the Central Sahel is a key area for USAFRICOM to mobilize its limited resources in the global campaign against extremism in order to deny terrorists access to ungoverned territory where they can consolidate their organizations.  

USAFRICOM faces intensifying VEO activity in the Central Sahel and efforts to stem the violence have centered primarily on joint exercises with partner nations. The number of reported violent events linked to militant Islamist group activity in the Sahel has doubled every year since 2016, with 465 instances recorded in 2018. Reported fatalities have also risen from 218 in 2016 to 1,110 in 2018[2]. Joint training exercises such as the annually recurring Operation Flintlock incepted in 2005, are designed to enhance the capabilities of the G5 Sahel nations (Burkina Faso, Chad, Mali, Mauritania, and Niger), foster coordination with regional and western partners, bolster the protection of civilians, and deny VEOs safe havens. Mali’s 2012 crisis underscores the need for these exercises. In the absence of adequate training and security coordination between Sahel and western nations, a coalition of extremist Islamist groups and separatists – chiefly Al Qaeda affiliate Ansar Dine and Tuareg separatists – were able to cooperate and seize several cities. It ultimately took a multiple brigade, eighteen-month unilateral French military intervention to oust the extremists. Mali remains the epicenter of violence in the region, accounting for roughly 64 percent of the reported events in the region in 2018[3].

Mali is not only the focal point of violence in the Sahel, it is also exemplary of how efforts to stamp out VEOs must address the inter-communal conflicts, lack of economic opportunity, and poor governance that fuel them. Operating in central Mali, the Macina Liberation Front (FLM) has exploited these factors to operate, recruit, and expand.  Invoking the memory of the 19th century Macina Empire – which was primarily composed of the Fulani ethnic group – the FLM has exploited the absence of economic opportunity available to Fulani herdsmen to drive a wedge between them, local farmers, and the Malian government[4]. FLM leadership relentlessly propagandizes longstanding tensions between Fulanis and farmers with whom they compete for land, pasture, and water resources in an increasingly arid environment. The growing intensity of competition increasingly boils over into tit-for-tat ethnic violence, driving desperate herdsmen into the arms of VEOs in search of security and a reliable wage[5]. Malian government attempts to provide security and basic services in the area have been followed by complaints of corruption, poor oversight, and retaliatory violence[6]. Similar cleavages exist in all Sahel nations and the cost of economic, environmental, and governance problems that drive VEO recruitment in the Central Sahel are quantifiable; Al Qaeda in the Islamic Maghreb was the only operational group in 2012 compared to more than ten active groups in 2018[7]. 

USAFRICOM’s capability to address this proliferation of VEOs has been complicated by fluctuations in resources and autonomy that the command is able to wield in the region. Currently USAFRICOM commands approximately 6,000 troops supported by 1,000 civilians or contractors, but plans to cut personnel ten percent overall by 2022. This reduction will disproportionately affect operations troops, who will experience a fifty percent reduction[8]. Cutbacks in special operations troops will be keenly felt given that they are well suited to carrying out the training and assist operations core to USAFRICOM’s strategy. Over the same timeline, the United States plans a tenfold increase of military equipment support for the Burkinabe military totaling $100 million from a total of $242 million in military aid to the G5 Sahel as a whole[9]. The effect of reducing training resources yet increasing equipment and funding remains to be seen. However, the memory of a well-equipped Iraqi army’s 2014 defeat by Islamic State militants is still fresh. Operational autonomy within USAFRICOM has also been curtailed following the widely publicized 2017 Niger ambush that left four American Special Forces Soldiers killed in action. Restrictions stemming from fallout of the ambush include a requirement for sufficient Intelligence, Surveillance and Reconnaissance (ISR) resources and stricter mission planning[10]. USAFRICOM can expect a reduction in the number of operations it can conduct overall due to the frequently limited availability of ISR platforms. Fewer personnel and tighter oversight could make it more difficult for AFRICOM to provide a healthy security environment crucial to any diplomatic or economic project addressing the causes of VEO proliferation. 

Nearly twenty years into the war on terror, VEOs continue to thrive and proliferate amid escalating violence in the Sahel. USAFRICOM’s multilateral strategy has enhanced the Sahel G5 nations’ ability to cooperate and mitigate the risk of campaigns analogous to Mali’s 2012 crisis. However, the strategy has been slow to address underlying causes of extremism. U.S. diplomatic and economic instruments will play a key role in any future moves to address the environmental pressures, economic grievances, and governance issues plaguing the region and fueling extremist activity. Reducing the U.S. footprint in the area does not signal USAFRICOM will be equipped to provide the security environment necessary for such projects. If the United States neglects the increasingly stressed Central Sahel region, it risks allowing extremist exploitation of ungoverned areas that has historically enabled VEOs to consolidate, train, and launch international attacks.


Endnotes:

[1] United States, Department of Defense, Africa Command. (2018, March 13). Retrieved April 3, 2019, from https://www.africom.mil/about-the-command/2018-posture-statement-to-congress

[2] The Complex and Growing Threat of Militant Islamist Groups in the Sahel (Rep.). (2019, February 15). Retrieved April 12, 2019, from Africa Center for Strategic Studies website: https://africacenter.org/spotlight/the-complex-and-growing-threat-of-militant-islamist-groups-in-the-sahel/

[3] Ibid 

[4] Le Roux, P. (2019, February 22). Confronting Central Mali’s Extremist Threat (Publication). Retrieved April 17, 2019, from Africa Center for Strategic Studies website: https://africacenter.org/spotlight/confronting-central-malis-extremist-threat/

[5] Dufka, C. (2018, December 7). “We Used to Be Brothers” Self-Defense Group Abuses in Central Mali (Rep.). Retrieved April 18, 2019, from Human Rights Watch website: https://www.hrw.org/report/2018/12/07/we-used-be-brothers/self-defense-group-abuses-central-mali

[6] Le Roux 

[7] Africa Center for Strategic Studies, 2019, February 15

[8] Schmitt, E. (2019, March 1). Where Terrorism Is Rising in Africa and the U.S. Is Leaving. The New York Times. Retrieved April 9, 2019, from https://www.nytimes.com/2019/03/01/world/africa/africa-terror-attacks.html

[9] Ibid

[10] Department of Defense, United States Africa Command. (2018, May 10). Department of Defense Press Briefing on the results of the Investigation into the October 4, 2017, Ambush in Niger [Press release]. Retrieved May 3, 2019, from https://dod.defense.gov/News/Transcripts/Transcript-View/Article/1518332/department-of-defense-press-briefing-on-the-results-of-the-investigation-into-t/

Africa Assessment Papers Chris Wozniak Lake Chad Niger Violent Extremism

Assessment of the Legion as the Ideal Small Wars Force Structure

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Brandon Quintin is the marketing manager of a museum in Dayton, Virginia.  He is a former editorial assistant at MHQ—The Quarterly Journal of Military History.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Legion as the Ideal Small Wars Force Structure

Date Originally Written:  May 2, 2019.

Date Originally Published:  June 24, 2019.

Summary:  After the Massacre at the Wabash in 1791, George Washington and Henry Knox reformed the U.S. Army as the Legion of the United States. The Legion was a self-contained modular army composed of four identical combined-arms units. During the Fallen Timbers campaign, the Legion proved itself the ideal force structure for use in small wars. The Brigade Combat Team is the closest the U.S. Army has ever come to reviving the legionary structure. 

Text:  In 1791 the United States Army suffered one of the greatest defeats in its history. At the Massacre at the Wabash in modern Ohio, also known as St. Clair’s Defeat, a force of regulars and militia 1,000 strong was destroyed by an army of Indian warriors. The Northwest Indian War, as the greater conflict was called, was the definitive “small war.” President George Washington directed and oversaw the response: a punitive use of asymmetric military force against a loosely-organized tribal confederacy in contested territory. The Battle of Fallen Timbers in 1794 was the climax of the war, in which a reformed American army routed its Indian opponents and forced a peace where one could not be negotiated. 

But in 1791 the path to victory was far from clear. Year after year, American forces marched into the Northwest Territory only to be beaten back by an aggressive, experienced, and knowledgeable enemy. George Washington and Secretary of War Henry Knox knew that significant change had to be made if the status quo was to be overcome. Tactical changes would not suffice. A redesign of the core force structure of the United States Army was required. 

The inspiration for Washington and Knox’s reformed army came from four primary sources: Ancient Rome, French Marshal Maurice de Saxe, British Colonel Henry Bouquet, and Washington’s famous drillmaster, the Prussian Baron Frederick William von Steuben. 

The ancient Roman legion is the greatest military unit the world has ever known. It effectively fought against the “conventional” forces of Greece, Carthage, Parthia, and other Roman legions during the Civil Wars. It fought against “unconventional” forces from Gaul and Britannia, to Judea. It built roads and forts and improved the state of infrastructure wherever it was sent. In all areas, and against all opponents, it was successful. It is no wonder that the Roman legion had so many admirers, especially among the early American officer corps. In a letter exchange, Henry Knox and South American revolutionary Francisco de Miranda called the legion “infinitely superior to any other organization or military arrangement we know yet[1].”

Maurice de Saxe took the operational concept of the legion and adapted it to the eighteenth century. The legion of ancient Rome predated much of the technology that allowed for combat arms designation. It was  was an almost entirely heavy infantry unit. Its excellence lie not in its composition, but in its effect. In his writings, Saxe advocated a resurrected legion that achieved the adaptability of its ancient forefather by adopting a combined-arms force structure—a revolutionary concept in its time[2]. Henry Bouquet, a Swiss-born Colonel in the British army, took the idea a step further and wrote that the modular combined-arms force structure was ideal for Indian-fighting in the Americas, i.e. for use against irregulars in unfavorable terrain[3]. 

Baron von Steuben wrote a letter in 1784 advocating that the United States adopt a permanent legionary force structure:

Upon a review of all the military of Europe, there does not appear to be a single form which could be safely adopted by the United States; they are unexceptionally different from each other, and like all human institutions, seem to have started as much out of accident as design … The Legion alone has not been adopted by any, and yet I am confident in asserting, that whether it be examined as applicable to all countries, or as it may more immediately apply to the existing or probable necessity of this, it will be found strikingly superior to any other[4].

Initially ignored upon publication, the letter acquired new meaning after the Massacre at the Wabash. Congress acceded to Washington’s demands and allowed the creation of the Legion of the United States.

President Washington and Secretary Knox abandoned the traditional regimental structure. Instead of a reliance on large regiments of either infantry, cavalry, or artillery, the Legion of the United States was one coherent unit with four self-contained armies making up its constituent parts. The armies, called Sub-Legions, contained 1,280 soldiers each, with two infantry battalions, one rifle battalion, an artillery company, and a cavalry company. The Legion of the United States was meant to address the failures of regimental design while accentuating the benefits of each combat arm. The end result was an adaptable, standardized force of 5,120 men—in no coincidence, exactly the same size as the famed legions of Julius Caesar.

The Battle of Fallen Timbers took place on August 20, 1794. The Legion of the United States proved its excellence by dispersing the opposing army, pacifying the Northwest Territory, and restoring order to the frontier. Its mission accomplished, the Legion was promptly disbanded.

The modular, combined-arms legion is an ideal small wars force structure. The same organizational principles that made the Legion of the United States a success in 1794 apply today. When a conventional power is faced with a number of different potential conflicts, over all scales of intensity and in all types of terrain, the unpredictability of the situation necessitates a standardized, generalist formation like the legion. Especially in an asymmetric scenario of regular versus irregular forces.

The modern Brigade Combat Team (BCT) is the closest the United States Army has ever come to reviving the legionary structure. Semi-combined-arms units of nearly 5,000 soldiers, Brigade Combat Teams come in three varieties: Infantry, Stryker, and Armored. As of 2018, the  active U.S. Army has 31. While the advent of BCTs represents a step toward legionary warfare, a true revival of the design and spirit of the Legion of the United States would see the elimination of arms-designation between the BCTs and all echelons of unit organization above them. Small wars are the future of American warfare, and the legion has proven itself the perfect unit organization to overcome every situation such wars present. 


Endnotes:

[1] De Miranda, F. (1791, February 2). The Form of the Roman Legion [Letter to Henry Knox]. London.

[2] De Saxe, M. (1944). Reveries Upon the Art of War. Harrisburg, PA: Military Service Publishing Company.

[3] Bouquet, H. (1764). Reflections on the War with the Savages of North America.

[4] Von Steuben, F. (1784). A Letter on the Subject of an Established Militia, and Military Arrangements, Addressed to the Inhabitants of the United States.

2019 - Contest: Small Wars Journal Assessment Papers Brandon Quintin Insurgency & Counteinsurgency

Assessment of the Role of Small Wars within the Evolving Paradigm of Great Power Competition in a Multipolar World

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


James P. Micciche is an Active Component U.S. Army Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific.  He is currently a Master’s candidate at the Fletcher School of Law and Diplomacy at Tufts University.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Role of Small Wars within the Evolving Paradigm of Great Power Competition in a Multipolar World

Date Originally Written:  April 25, 2019.

Date Originally Published:  June 17, 2019.

Author and / or Article Point of View:  The author is an Active Component U.S. Army Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Europe, and the Indo-Pacific.

Summary:  The U.S. is scaling down the Global War on Terrorism and focusing on threats posed by a revisionist China and Russia and rogue nations such as Iran. In this context, limited military operations (small wars) will be useful in transforming counterterrorism methods, which previously dominated U.S. foreign policy, into being only one facet of a synchronized whole of government response in pursuit of U.S. policy objectives in contested spaces.

Text:  Over the past decade, the global balance of power has shifted to a multipolar construct in which revisionist actors such as China and Russia attempt to expand their spheres of influence at the expense of the U.S.-led liberal order.  The ongoing rebalance has been gradual and often conducted through a myriad of activities beyond kinetic operations as Russia, China, and regional actors such as Iran have shown a capability to capitalize on and create domestic instability as a means to expand influence, gain access to key terrain and resources, and reduce western influence.  The capacity to utilize limited military operations (small wars) as part of a focused, tailored, and comprehensive whole of government approach to deter threats and expansion from revisionist powers is paramount in promoting U.S. and Western interests within the modern paradigm.  Despite the prominent role engaging in limited operations at or more importantly below the level of conflict fulfills within the context of great power competition, it is far from a proverbial silver bullet as the rebalancing of power brings new parameters and risks that U.S. policy makers must understand before engaging  in any small war. 

Since the collapse of the Union of Soviet Socialist Republics, the United States and her Western allies have enjoyed an exorbitant amount of freedom to execute limited military operations and foreign domestic interventions due to what scholars termed the unipolar moment[1].   The 1990s saw the principle of Responsibility to Protect (R2P) utilized as a guiding framework for Western engagement as liberal democracies intervened in the internal affairs of sovereign nations from Somalia to the Balkans to protect life and punish offenders[2].  Following the September 11, 2001 attacks, the United States and many of her longtime allies began the Global War on Terror (GWOT) fundamentally changing U.S. foreign policy for the next two decades.  The GWOT gave rise to an unprecedented increase in U.S. foreign intervention as the specter of terrorism emerged in all corners of the globe and a series of Secretary of Defense-approved Execute Orders granted the DoD broad authorities to conduct counterterrorism operations worldwide.  

The extent to which global terrorism poses an existential threat to U.S. and other Western powers has been debated with valid and well-researched positions on both sides[3], but what is not debatable is that GWOT consumed vast amounts of the West’s material resources and attention — the U.S. alone has spent an estimated $5.9 Trillion since 9/11[4].  With the West focusing on countering non-state actors, revisionist nations began to build power and expand which became evident when Russia annexed Crimea and China began aggressively expanding into the South China Sea.  The 2017 National Security Strategy marked a turning point in contemporary U.S. foreign policy by codifying an end to the CT-focused strategy of the previous sixteen years and placing an emphasis on great power competition with near-peers, as the document declares in very clear language “…after being dismissed as a phenomenon of an earlier century, great power competition returned. China and Russia reassert their influence regionally and globally[5].”   

Despite recent attempts by China and Russia to close the military capabilities gap between themselves and the U.S., the U.S. maintains an advantage, specifically in the global application and projection of power[6]. To overcome this disadvantage revisionist and rogue states utilize soft balancing (utilization of international structures to disrupt and discredit U.S. hegemony) at the strategic level[7] and hybrid warfare (population-centric operations that create instability) at the tactical and operational levels[8] to expand their influence and territory through activities that avoid direct confrontation.  The utilization and application of limited military operations (small wars) combined with other elements of state power can both identify and counter the aforementioned strategies employed by contemporary Western rivals while concurrently advancing U.S. strategic objectives. Within the small war paradigm, military actors have a wide range of applications that support U.S. strategic objectives that fall into three mutually supportive activities, mil-to-mil engagement, civ-mil engagement, and resistance operations.  

Persistent mil-to-mil engagements, exercises, and training missions help establish the U.S. as a partner of choice in strategically significant nations while simultaneously building partner capabilities within or adjacent to contested regions.  The deployment of Civil Affairs and Psychological Operations elements foster resiliency within vulnerable populations, denying adversaries access to key human terrain needed to conduct hybrid operations.  Resistance operations can manifest in defensive or offensive postures either supporting a partner nation from externally provoked and supported insurrection or undermining the capacity of rival nations to exert malign influence by supporting armed and unarmed opposition to the state. Military interventions are best as only one facet of a synchronized whole of government response in which the DoD might not be the lead agency.  Furthermore, as rivals compete over contested spaces the chances for escalation and international incident grows, a threat exponentially increased by the internationalization of civil wars, placing increased risk in direct military engagements. 

In the evolving context of great power competition, U.S. assets may not always be the best funded or equipped.  They will often face bureaucratic restrictions their rivals do not and potentially be deprived of access to key individuals or institutions.  These conditions will place a premium on individual interpersonal skills and international U.S. perception, so the U.S. can maintain a comparative advantage in soft power. To facilitate that advantage the U.S. will likely need to differentiate and categorize partners on not only their geopolitical importance but also the values that they represent and the company they keep.  Specifically the U.S. will likely examine the risks of collaborating with autocratic governments whose actions have the propensity to create domestic instability and an environment conducive to hybrid warfare.  Additionally, any government with substantial human rights concerns degrades the soft power of those that the international community perceives as their partners, a perception adversary information operations can greatly amplify.

As U.S. security strategy adapts and returns to a construct that places emphasis on challenges and threats from state actors the function, employment, and role of the small war will be useful to transform from a method of CT into a strategic instrument of national power that can support long-term U.S. objectives across the globe often below levels of conflict. 


Endnotes:

[1] Krauthammer, C. (1990). The Unipolar Moment. Foreign Affairs, 23-33. Retrieved from Foreign Affairs.

[2] Evans, G., & Sahnoun, M. (2002). The Responsibility to Protect. Foreign Affairs, 99-110.

[3] Brookings Institution. (2008, February 21). Have We Exaggerated the Threat of Terrorism. Retrieved from The Brookings Institution : https://www.brookings.edu/events/have-we-exaggerated-the-threat-of-terrorism/

[4] Crawford, N. C. (2018, November 14). United States Budgetary Csts of the Post-9/11 Wars Through FY2019: $5.9 Trillion Spend and Obligated. Retrieved from Watson Institute: https://watson.brown.edu/costsofwar/files/cow/imce/papers/2018/Crawford_Costs%20of%20War%20Estimates%20Through%20FY2019%20.pdf

[5] United States. (2017). The National Security Strategy of the United States of America. Washington D.C. : The White House.  Retrieved from: https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

[6] Heginbotham, E. M. (2019). The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017. Santa Monica: Rand Corporation.

[7] Pape, R. A. (2005). Soft Balancing Against the United States. International Security, 7-45.

[8] Chives, C. S. (2017, March 22). Understanding Russian “Hybrid Warfare” and What Can Be Done About IT. Retrieved from Rand Corporation : https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT468/RAND_CT468.pdf

2019 - Contest: Small Wars Journal Assessment Papers Below Established Threshold Activities (BETA) Great Powers & Super Powers James P. Micciche

Counterfactual: Assessment of Risks to the American Reunification Referendum by the Confederate States of America’s Counterinsurgency Campaign in Cuba

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Hal Wilson lives in the United Kingdom, where he works in the aerospace industry. A member of the Military Writers Guild, Hal uses narrative to explore future conflict.  He has been published by the Small Wars Journal, and has written finalist entries for fiction contests with the U.S. Army Training and Doctrine Command, and the Atlantic Council’s Art of the Future Project.  Hal graduated with first-class honours in War Studies and History from King’s College, London, and is studying an MA on the First World War.  He tweets at @HalWilson_.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of Risks to the American Reunification Referendum by the Confederate States of America’s Counterinsurgency Campaign in Cuba

Date Originally Written:  March 6, 2019.

Date Originally Published:  June 13, 2019. 

Author and / or Article Point of View:  This article presumes the Battle of Gettysburg resulted in a Confederate victory in the U.S. Civil War. Now, in the counterfactual year 1965, the Confederate States of America (CSA) are pursuing a counterinsurgency campaign in their conquered island colony of Cuba. The United States of America (USA) are meanwhile on the cusp of reunifying with the CSA through an historic referendum, but must prevent an escalation in Cuba that could derail the reunification process.  The audience for this Assessment Paper is the National Security Advisor to the President of the USA.

Summary:  The historic opportunity of the American Reunification Referendum (ARR) is directly challenged by the ongoing CSA counterinsurgency campaign in Cuba. Unless the USA applies diplomatic pressure to the CSA to achieve CSA-de-escalation in Cuba, the ARR is at risk.

Text:  The ARR, which was delayed this year due to CSA intransigence over Cuba, represents the culmination of a literal generation of effort. Decades of trans-American outreach have overcome cultural obstacles and built positive relations between the USA and the CSA. Following the 1963 Gettysburg Presidential Summit two years ago, commemorating 100 years since General Robert E. Lee’s narrow victory, Presidents Barnes and Nixon redoubled long-established policies of cross-border cooperation. These policies included a transnational committee to oversee the final dismantling of the former Mason-Dixon Demilitarised Zone. The underlying drivers of this trend – including robust cross-border trade and persistent financial crisis within the CSA – are unlikely to change. However, the CSA’s violent counterinsurgency in Cuba may provoke third-party intervention and thereby derail the ARR.

Cuba remains an emotionally charged topic within the CSA, reflecting as it does the ‘high-water-mark of the Confederacy’: the victorious Spanish War of 1898, which saw Spanish Caribbean possessions ceded to Richmond. We assess that CSA determination over Cuba is nevertheless fragile. Proposals for increased trans-American trade liberalisation could be used to entice short-term, de-escalatory moves from the CSA. Likewise, discrete offers to use our good offices for bilateral mediation could lessen tension while earning mutual goodwill. We also possess a remarkable asset in the shape of personal friendship between Presidents Barnes and Nixon, which may expedite top-down progress.

Our efforts will also benefit from the growing human cost of the CSA’s occupation. Last month’s destruction of two battalions of the 113th Florida Light Infantry near Holguin underlined the increasingly formidable abilities of the Cuban revolutionaries. Our efforts on Cuba should avoid antagonise the rebels, who have aligned around increasing desires for autonomy from Richmond. Notably, in an effort to enhance their credibility in any negotiated peace, the rebels have eliminated extremists from their own ranks such as the rogue Argentine, Che Guevara, who advocated the radical ideas of an obscure Russian writer, V.I. Lenin. Our efforts on Cuba should also not directly assist the rebels: should USA activity result in the death of even a single CSA serviceman, the ARR will be permanently compromised. 

By leveraging support from the Deutsches Kaiserreich, which offers German military and financial aid for preferential oil contracts in the Gulf of Mexico, Richmond has sustained military pressure against the Cuban rebels. In particular, the CSA’s Cuban Command (CUBACOM) numbers over 100,000 personnel and, following last month’s visit to Richmond by Kronprinz Maximilian von Thunn, boasts the latest ‘Gotha’ jet-bomber models. The USA faces no direct military threat from these developments. Indeed, CUBACOM represents a CSA military ‘best effort’, achieved only by hollowing-out mainland formations. 

While London remains focused on combating Islamist terrorism against the British Raj, organised and conducted from the German client-state of Afghanistan, London has demonstrated mounting displeasure over CSA conduct in Cuba. Last week’s wayward airstrike by CSA jets, for example, killed twenty Cuban civilians and drew further condemnation from the British Empire. The revived Wilberforce Act, first used by the British Empire to strong-arm the cessation of CSA slave-trading in 1880, once again prevents the carriage of CSA goods on British or Imperial merchant marine. Combined with wider sanctions, the British Empire has driven growing inflation within the CSA, not least by forcing Richmond to take the CSA Dollar off the gold standard. Recent evidence of illicit British support to Cuban rebels underlines London’s willingness to punish a perceived German client, and we assess a mounting risk of military escalation by the British Empire against the CSA.

Direct British intervention over Cuba would fatally compromise the likelihood of a successful ARR. USA public opinion will not tolerate overt support for CSA dominion over Cuba, and any direct conflict with London risks repeating our loss in the War of 1812. Conversely, our failure to offer tangible aid would poison CSA goodwill on the ARR. As such, any British military escalation should be forestalled by inducing a CSA climb-down.  

CSA persistence with their ‘small’ war likely demands that the USA exerts diplomatic pressure against Richmond. This is for the preservation of Cuban life and the USA’s interests: namely, to avert the risk of British military escalation against the CSA, and thereby assure a successful ARR.  

Our diplomatic pressure against the CSA would likely result in the establishment of a Cuban ‘Home Rule’ model, as pioneered by the British Empire in Ireland at the start of this century. Increased Cuban civil rights will undercut the revolutionary casus belli, and diminish the violence which offers the British Empire a pretext to intervene. Simultaneously, the CSA will be able to claim a victory by retaining its Cuban possessions – and the door can be reopened to a successfully completed ARR. 

2019 - Contest: Small Wars Journal Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers Hal Wilson United States

Assessment of the Effects of Chinese Nationalism on China’s Foreign Policy

Adam Ni is a China researcher at the the Department of Security Studies and Criminology at Macquarie University in Sydney. He can be found on his personal website here or on Twitter. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Effects of Chinese Nationalism on China’s Foreign Policy

Date Originally Written:  April 15, 2019.

Date Originally Published:  June 10, 2019.

Summary:  Chinese nationalism can affect Beijing’s foreign policy deliberations through: 1) framing narratives and debates; 2) restricting Beijing’s foreign policy options; and 3) providing justifications for Chinese actions and/or leverages in negotiations. However, the effects of popular nationalism on foreign policy outcomes may not be significant. 

Text:  Chinese nationalism today is rooted in narratives of China’s past humiliations and weaknesses, present day revival, and aspirations for national rejuvenation. The Chinese Communist Party (CCP) actively tries to shape nationalist discourses to bolster its popular legitimacy. State-led nationalism attempts to cast Chinese foreign policy in a positive light, and to prevent discontent on foreign policy issues from kindling widespread criticism of the Chinese government for its perceived weaknesses and inability to uphold Chinese interests and dignity.

The rise of Chinese nationalism is often seen as a cause of China’s increasing assertive foreign policy, including its approach to territorial disputes. The argument is quite simple: China is becoming richer and more powerful, and as a result its citizens are more proud, and this is reflected in China’s new-found confidence. Despite the simple and intuitive appeal of this line of reasoning, the empirical evidence is unclear[1]. Putting aside the complexity of defining Chinese nationalism in the first place, it is unclear that Chinese nationalism is in fact rising. Indeed, there are trends that may be working against rising nationalism, including increased exposure to foreign peoples and cultures due to economic globalization, and improved education.

Despite the lack of clarity regarding Chinese nationalism,  there is evidence that Chinese public opinion is generally hawkish[2]. The Chinese support greater defense spending and using armed forces to deal with territorial disputes, such as these in the East and South China Seas. They also see U.S. military presence in Asia as a threat. Generally speaking, younger Chinese hold more hawkish views than their parents.

Given these hawkish views, and even if assuming Chinese nationalism have risen over recent years, it does not necessarily follow that popular sentiments have a major effect on Chinese foreign policy. One study looking at China’s foreign policy in the South and East China Seas since 2007, for example, found that popular nationalism had minimal effects on China’s assertive turn[3]. Indeed, other factors may be more important in Beijing’s foreign policy deliberations, including strategic considerations and preferences of top Chinese leaders.

The current international environment makes caution all the more important in China’s foreign policy-making. The intensifying strategic competition between the U.S. and China, and the increasing wariness with which countries around the world are viewing China’s growing power, makes China adopting nationalist prescriptions to its international challenges all the more risky.

In addition, China’s authoritarian political system arguably better insulates foreign policy making from public opinion than liberal democracies. For one, the ruling CCP does not face public elections. In fact, the Chinese government has at its disposal a range of powerful tools to shape public opinion, and if need be, shut down public debates. This include powerful state media and censorship systems, and the ability to silence dissent with swift and harsh efficiency.

Another difficulty in linking popular nationalistic sentiments to foreign policy outcomes is that Chinese nationalism gives rise to all kinds of foreign policy prescriptions, including contradictory ones. For example, nationalist discourses can prescribe a cautious approach to China’s international relations that focus on keeping a low profile, instead of advocating a confrontational approach.

Despite the difficulties in conceptualizing and measuring Chinese nationalism, there are a number of ways in which public opinion can affect China’s foreign policy. First, popular nationalist narratives, such as ones based on China’s past humiliations at the hands of encroaching foreign powers, frame and color contemporary foreign policy debates. In fact, a mentality of victimhood makes China more likely to react with a sense of grievance and moral righteousness to perceived slights to its dignity.

Second, Beijing’s spectrum of foreign policy options are constrained by popular sentiments. Perceived weakness and inability to defend China’s interests and dignity is costly for the Chinese government and leaders. The CCP have long feared that popular discontent on international issues could kindle widespread criticism directed at the Chinese government. Moreover, Chinese leaders are keen to appear tough on international issues to the domestic audience lest they weaken their position in the party system vis-à-vis their internal rivals.

Third, domestic pressures are sometimes used as justifications for Chinese actions or leverages in negotiations. Chinese leaders, for example, have attributed China’s more assertive stance in the South China Sea to the hardening of popular opinion[4]. Appeals to domestic pressures driven by nationalistic sentiments do play a role in China’s foreign policy. Whether these purported pressures are real or not is another question all together.

The above analyses indicate that Chinese nationalism could affect China’s foreign policy in a number of ways despite the difficulties of working out precisely how much popular sentiments influence Beijing’s foreign policy deliberations. This inability to measure influence is complicated by the fact that China’s authoritarian system enables the CCP to shape public debates in a way that would be impossible in liberal democracies. The lines between state-led and popular nationalism are blurry at the best of times.

Lastly, understanding nationalist discourses in China is still important for analysing Chinese foreign policy because it provides the domestic context for China’s international actions. There is little doubt that nationalist discourses in China will continue to exert an important influence on Chinese perceptions of its national past and aspirations for the future.


Endnotes:

[1] Alastair Iain Johnston, “Is Chinese Nationalism Rising? Evidence from Beijing,” International Security, Vol. 41, No. 3 (Winter 2016/17), 7-43. Available at: https://www.mitpressjournals.org/doi/pdf/10.1162/ISEC_a_00265.

[2] Jessica Chen Weiss, “How Hawkish Is the Chinese Public? Another Look at “Rising Nationalism” and Chinese Foreign Policy,” Journal of Contemporary China, published online March 7, 2019. Available at: https://www.tandfonline.com/doi/full/10.1080/10670564.2019.1580427.

[3] Andrew Chubb, “Assessing public opinion’s influence on foreign policy: the case of China’s assertive maritime behavior,” Asian Security, published online March 7, 2018. See https://doi.org/10.1080/14799855.2018.1437723.

[4] Ying Fu and Shicun Wu, “South China Sea: How We Got to This Stage,” The National Interest, May 9, 2016. Available at: https://nationalinterest.org/feature/south-china-sea-how-we-got-stage-16118.

 

Adam Ni Assessment Papers China (People's Republic of China) Nationalism

An Assessment of the U.S. Punitive Expedition of 1916

Roger Soiset graduated from The Citadel in 1968 with a B.S. in history, and after serving in the U.S. Army graduated from California State University (Long Beach) with a Master’s degree in history.   Roger’s fields of specialization are ancient history and the Vietnam Era.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the U.S. Punitive Expedition of 1916

Date Originally Written:  April 7, 2019.

Date Originally Published:  June 3, 2019.

Summary:  Prior to the 9/11 attacks was Pancho Villa’s 1916 attack on Columbus, New Mexico.  Large-scale efforts to capture Villa failed.  Border violence continued until the success of a more focused U.S. response in 1919.  Today the U.S.-Mexico border remains unsecured and discussions continue to determine the best approach. 

Text:  The attack by Al Qaeda on 9/11/2001 was the second such attack on the continental U.S., the first being in the 20th century.  In view of ongoing discussions about U.S. border security, it is useful to look at the U.S. response to terrorist attacks from Mexico a hundred years ago.  

Emerging as the hero of the Mexican Revolution was Francisco Madero, elected president in 1911 and soon enjoying cordial relations with U.S. President Woodrow Wilson.  The U.S. and Mexico both had presidents who were liberal reformers until Madero was murdered.  Madero’s purported murderer was his successor, Victoriana Huerta.  Following Madero’s death, rebellions promptly broke out in several areas, led by men like “Pancho” Villa,  Emiliano Zapata, and Venustiano Carranza.

The U.S. had already occupied a Mexican seaport, Veracruz, in April 1914 in order to prevent the landing of arms for rebels by a German ship.  Believed to be Mausers direct from Hamburg, it turned out the rifles were Remingtons from New York, but that was not discovered until later. The occupation of Veracruz lasted five months and saw lives lost on both sides.  Huerta’s departure in 1915, the successful blocking of “German” arms and U.S. recognition of Carranza’s government smoothed the troubled U.S.-Mexico relations for everyone except Pancho Villa[1].  Wilson’s arms embargo applied to all the parties involved in the revolution except for the legitimate government, so this meant Carranza was not affected–but Villa was[2].

Villa’s anger resulted in U.S. civilian casualties in Mexico when 17 U.S. mining personnel were executed by Villa’s men in January 1916[3].  Then on March 6, 1916, Villa and about a thousand of his men raided Columbus, New Mexico, killing nine civilians and eight soldiers.  The demand for Wilson to “do something” was not to be denied and he invoked the “hot pursuit” doctrine.  President Carranza’s foreign minister Jesus Acuna informed Wilson that he agreed in principle “to the reciprocity of hot pursuit of bandits…if the raid at Columbus should unfortunately be repeated elsewhere[4].”  Wilson chose to ignore this last caveat and took the message to be an unrestricted right to pursue Pancho Villa into Mexico.  Carranza desperately needed U.S. support, so remained largely silent.  

Despite the ruthless treatment of many Mexican towns by Villa and his men, he was still supported by most Mexicans; or perhaps they feared the local bandit more than their weak government and the “yanquis” whom they hoped would soon go home.  Carranza, seeing his popularity sinking due to his corruption and tolerance of this “gringo” invasion, increasingly made life difficult for U.S. Army General John J. Pershing and his 10,000 men who were pursuing Villa in Mexico.   Perhaps the best examples of Carranza’s efforts were his denial to Pershing the use of the Mexican Northwestern Railway to move troops and positioning Mexican federal troops in the Americans’ path[5].  

Notwithstanding the politics, weather, terrain and the difficulty of the mission, Pershing continued the pursuit some 300 miles into Mexico before two skirmishes occurred between the U.S. and Mexican Army forces with casualties on both sides.  After six weeks, the punitive expedition had come to its Rubicon: fight the hostile Mexican Army before them and possibly start a war, or withdraw.  The withdrawal option was taken, although it took more than seven months before the last U.S. troops crossed back into Texas in February 1917…just in time to pack new gear for World War I in France.  Despite Pershing not capturing Villa,  the nine months in Mexico had proven invaluable insofar as getting the U.S. Army in shape for World War I and giving new equipment a field trial.         

But it wasn’t over in 1917—Pancho Villa and his “Army of the North” were busy looting and shooting up Juarez, Mexico, again in June 1919, just across the Rio Grande from Ft. Bliss.  Bullets from the raid killed and wounded U.S. personnel on the base, and this time prompt action was taken.  A combined infantry and cavalry force attacked Villa’s band of approximately 1200 men and destroyed or disbursed them so effectively that Villa never rode again[6].  One wonders what the course of events might have been after a similar action in January 1915 at the town of Naco in Sonora, Mexico, when a Villa band had driven Carranza’s forces from that border town.  Stray bullets killed one American and wounded twenty-six more in Douglas, Arizona.  The U.S. reaction was to remove the Tenth Cavalry four miles north of the danger zone[7]. This reaction, viewed as weakness, encouraged contempt and further violence.  A limited response in 1915 like the later one in 1919 might very well have discouraged another such incident—and the violence at Columbus might never have happened.     

If President Wilson had recognized Victoriana Huerta as the legitimate ruler of Mexico as did most other countries, it is likely that the Mexican Revolution would have ended in 1913.  If Wilson had not decided to stop Germany from supplying arms to rebels in 1914, Pancho Villa’s relations with the U.S would not have soured.  The revolutions in Morelos (Zapata), Coahuila (Carranza) and Chihuahua (Villa) might very well have burned themselves out without the added incentive of a foreign army invading their land.  As it was, Carranza would become the undisputed president after the murder of his rival Zapata in 1919 and the bribing of Villa into retirement (which was made permanent in 1923 with his murder).  One is reminded of that description of Europe after the Hundred Years War: “They made a desert and called it peace.”

It is said that good fences make good neighbors.  The incidents cited in this paper show the truth of this from a hundred years ago, and certainly events today beg the question: What is the best approach to securing the U.S. border with Mexico?    


Endnotes:

[1] Mason, Herbert Molloy, Jr, pp. 45-50.  “The Great Pursuit: Pershing’s Expedition to Destroy Pancho Villa”, Smithmark Publishers, 1970.”  Hereafter, “Mason”.

[2] Eisenhower, John S. D., p. 185. “Intervention! The United States and the Mexican Revolution, 1913-1917”. W.W. Norton & Co., 1993.  Hereafter, “Eisenhower”.

[3] “U.S. Imperialism and Progressivism 1896 to 1920”, ed. Jeff Wallenfeldt, p. 41. 

[4] Mason, p. 71.

[5] Eisenhower, p. 236.

[6] Eisenhower, p. 312.

[7] Eisenhower, p. 171.

Assessment Papers Border Security Mexico Roger Soiset United States

Assessment of the Threat of Nationalism to the State Power of Democracies in the Information Age

James P. Micciche is an Active Component U.S. Army Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific.  He is currently a Master’s candidate at the Fletcher School of Law and Diplomacy at Tufts University.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Threat of Nationalism to the State Power of Democracies in the Information Age

Date Originally Written:  April 9, 2019.

Date Originally Published:  May 20, 2019.

Summary:  Historically, both scholars and political leaders have viewed nationalism as an advantageous construct that enhanced a state’s ability to both act and exert power within the international system.  Contrary to historic precedence, nationalism now represents a potential threat to the ability of modern democracies to project and exercise power due to demographic trends, globalized economies, and the information age. 

Text:  At its very core a nation is a collection of individuals who have come together through common interest, culture, or history, ceding a part of their rights and power to representatives through social compact, to purse safety and survival against the unknown of anarchy.  Therefore, a nation is its population, and its population is one measure of its overall power relative to other nations.  Academics and policy makers alike have long viewed nationalism as a mechanism that provides states an advantage in galvanizing domestic support to achieve international objectives, increasing comparative power, and reducing the potential impediment of domestic factors within a two-level game.  Globalization, the dawn of the information age, and transitioning demographics have fundamentally reversed the effects of nationalism on state power with the concept now representing a potential threat to both domestic stability and relative power of modern democracies. 

Looking beyond the material facets of population such as size, demographic trends, and geographic distribution, Hans Morgenthau identifies both “National Character” and “National Morale” as key elements of a nation’s ability to exert power. Morgenthau explains the relationship between population and power as “Whenever deep dissensions tear a people apart, the popular support that can be mustered for a foreign policy will always be precarious and will be actually small if the success or failure of the foreign policy has a direct bearing upon the issue of domestic struggle[1].  Historically, scholars have highlighted the role nationalism played in the creation and early expansion of the modern state system as European peoples began uniting under common identities and cultures and states utilized nationalism to solidify domestic support endowing them greater autonomy and power to act within the international system[2].  As globalization and the international movement of labor has made western nations ethnically more diverse, nationalism no longer functions as the traditional instrument of state power that was prevalent in periods where relatively homogenous states were the international norm.  

Key to understanding nationalism and the reversal of its role in state power is how it not only differs from the concept of patriotism but that the two constructs are incompatible within the modern paradigm of many industrialized nations that contain ever-growing heterogeneous populations.  Walker Connor described patriotism as “an emotional attachment to one’s state or country and its political institutions” and nationalism as “an attachment to ones people[3].”  A contemporary manifestation of this concept was the rise of Scottish Nationalism during the 2014 Scottish Independence Referendum that was in direct opposition to the greater state of the United Kingdom (patriotism) leading to the prospective loss of British power.  Furthermore, the term nationalism both conceptually and operationally requires a preceding adjective that describes a specific subset of individuals within a given population that have common cause, history, or heritage and are often not restricted to national descriptors. Historically these commonalities have occurred along ethnic or religious variations such as white, Hindu, Arab, Jewish, or black in which individuals within an in-group have assembled to pursue specific interests and agendas regardless of the state(s) in which they reside, with many such groups wishing to create nations from existing powers, such as Québécois or the Scots.  

The idea that industrialized nations in 2019 remain relatively homogenous constructs is a long outdated model that perpetuates the fallacy that nationalism is a productive tool for democratic states.  The average proportion of foreign-born individuals living in a given European country is 11.3% of the total population, Germany a major economic power and key NATO ally exceeds 15%[4].   Similar trends remain constant in the U.S., Canada, and Australia that have long histories of immigrant populations and as of 2015 14% of the U.S. population was foreign-born[5].    Furthermore, projections forecast that by 2045 white Americans will encompass less than 50% of the total population due to a combination of immigration, interracial marriages, and higher minority birth rates[6].  The aforementioned transitions are byproducts of a modern globalized economy as fertility rates within Organisation for Economic Co-operation and Development nations have dropped below replacement thresholds of 2.1[7] the demand for labor remains.

One of the central components of the information age is metadata. As individuals navigate the World Wide Web, build social networks, and participate in e-commerce their personal attributes and trends transform into storable data. Data has become both a form of currency and a material asset that state actors can weaponize to conduct influence or propaganda operations against individuals or groups whose network positions amplifies effects.   Such actors can easily target the myriad of extra-national identities present within a given nation in attempts to mobilize one group against another or even against the state itself causing domestic instability and potential loss of state power within the international system.  Russian digital information operations have recently expanded from the former Soviet space to the U.S. and European Union and regularly target vulnerable or disenfranchised populations to provoke domestic chaos and weakening governance as a means to advance Russian strategic objectives[8].

As long as western democracies continue to become more diverse, a trend that is unalterable for at least the next quarter century, nationalism will remain a tangible threat, as malign actors will continue to subvert nationalist movements to achieve their own strategic objectives.  This threat is only intensified by the accessibility of information and the ease of engaging groups and individuals in the information age.  Nationalism in various forms is on the rise throughout western democracies and often stems from unaddressed grievances, economic misfortunes, or perceived loss of power that leads to consolidation of in-groups and the targeting of outgroup.  It remains justifiable for various individuals to want equal rights and provisions under the rule of law, and ensuring that systems are in place to protect the rights of both the masses from the individual (tyranny) but also the individual from the masses (mob rule) has become paramount for maintaining both state power and domestic stability.  It falls on citizens and policy makers alike within democracies to promote national identities that facilitate patriotism and integration and assimilation of various cultures into the populace rather than segregation and outgrouping that creates divisions that rival states will exploit. 


Endnotes:

[1] Morgenthau, H., & Thompson, K. (1948). Politics Among Nations: The Struggle for Power and Peace-6th edition. New York: McGraw-Hill.

[2] Mearsheimer, J. J. (2011). Kissing Cousins: Nationalism and Realism. Yale Workshop on International Relations, vol. 5.

[3] Connor, W. (1993). Beyond Reason: The Nature of The Ethnonational Bond. Ethnic and Racial Studies, 373 – 389.

[4] Connor, P., & Krogstad, J. (2016, June 15). Immigrant share of population jumps in some European countries. Retrieved April 7, 2019, from Pew Research Center: https://www.pewresearch.org/fact-tank/2016/06/15/immigrant-share-of-population-jumps-in-some-european-countries/

[5] Pew Resarch Center. (2015). Modern Immigration Wave Brings 59 Million to U.S. Driving Population Growth and Change Through 2065. Washington DC: Pew Rsearch Center.

[6] Frey, W. H. (2018, March 14). The US will become ‘minority white’ in 2045, Census projects. Retrieved April 8, 2019, from The Brookings Institution : https://www.brookings.edu/blog/the-avenue/2018/03/14/the-us-will-become-minority-white-in-2045-census-projects/

[7] World Bank. (2019). Fertility Rate, Total (Births per Women). Retrieved April 9, 2019, from The World Bank Group: https://data.worldbank.org/indicator/SP.DYN.TFRT.IN

[8] Klein, H. (2018, September 25). Information Warfare and Information Perspectives: Russian and U.S. Perspectives.Retrieved April 6, 2019, from Columbia SIPA Journal of International Affairs:https://jia.sipa.columbia.edu/information-warfare-and-information-perspectives-russian-and-us-perspectives

Assessment Papers Information Systems James P. Micciche Nationalism

Assessment of the Efficacy of the French Military Intervention in the Northern Mali Conflict

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Greg Olsen is a cyber security professional and postgraduate researcher at University of Leicester doing his PhD on peacekeeping and civil wars.  He can be found on Twitter at @gtotango.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Efficacy of the French Military Intervention in the Northern Mali Conflict

Date Originally Written:  April 7, 2019.

Date Originally Published:  May 13, 2019.

Summary:  The French military intervention in the Northern Mali Conflict in 2013 (Operation Serval) was a military success and met the criteria for success established by civilian leadership, however, it did not alter the trajectory of conflict in the region.  It subsequently became conjoined to a United Nations liberal peacebuilding effort in Mali with low prospects for rapid success, resulting in a lengthy “forever war” in the Sahel.

Text:  In January 2012, an insurgency broke out in the Azawad region of northern Mali, as the Tuareg’s fought for an independent or at least autonomous homeland.  The Northern Mali Conflict began as a classic example of an ethnic conflict in a weak state[1].  However, the chaotic conflict enabled multiple domestic and transnational Islamist insurgent groups to enter it in the summer of 2012. By fall 2012, Mali was partitioned between multiple factions.  But in January 2013, the conflict entered a new phase towards either an Islamist victory or a Hobbesian conflict between multiple groups in a failed state[2].  In likely response to the United Nations (UN) Security Council authorizing an Economic Community of West African States military intervention in Mali in December 2012 (African-led International Support Mission to Mali aka AFISMA), Islamist insurgents launched an offensive which threatened to defeat the central government of Mali and capture the capital of Bamako.  Due to a slow response from other African regional security partners and intergovernmental organizations, the French government determined that it had to intervene.

Domestic political considerations in France were, as always, part of the calculus of intervention.  Mali was an opportunity for French President Francois Hollande to improve his popularity, which had been in decline from the moment he took office, but there were also real security concerns around transnational terrorism justifying intervention.  Hollande announced on January 11, 2013, the following three objectives for the intervention: (1) stop terrorist aggression, (2) protect French nationals, and (3) restore territorial integrity to Mali.  The operation would be limited in duration and not an open-ended commitment to occupation or nation-building.

French operations began with the insertion of special operations forces and an air offensive.  At the same time, ground forces were moved into theater from neighboring states and France with the help of other nations in transport, aerial refueling, and intelligence, surveillance, and reconnaissance.  Major ground operations commenced on January 15.  In total, France deployed approximately 4,000 troops to the conflict and had achieved the initial three military objectives by February. Withdrawal was announced on March 8.  According to a RAND Corporation study, Operation Serval was a high-risk operation, because it involved a small expeditionary force waging maneuver warfare with low logistical support and consisted of platoons and companies pulled from multiple units.  But in the end, Operation Serval demonstrated the viability of a force pieced together at the sub-battalion level into a competent fighting force suited for counterinsurgency warfare[3].  This piecemeal approach to deployment is a very different model than expeditionary deployment by the U.S. Marine Corps which deploys a complete combined arms unit around a reinforced division, brigade, or battalion, depending on the mission.

French military operations in Mali did not end with Operation Serval.  In April 2013, the UN Security Council authorized a Chapter VII (i.e., peace enforcement) mission, Multidimensional Integrated Stabilization Mission in Mali aka MINUSMA.  Additionally, UN Security Council resolution 2100 authorized “French troops, within the limits of their capacities and areas of deployment, to use all necessary means…to intervene in support of elements of MINUSMA when under imminent and serious threat[4].”  As a practical matter, France’s troops became the chief counter-terrorism arm of MINUSMA.  

After announced withdrawal, France relabeled its intervention to Operation Barkhane (approximately 3,000 troops deployed) and spanned the G5 Sahel in the countries of Burkina Faso, Mauritania, Niger, Chad, and Mali.  This continued deployment is a repeated pattern seen in civil wars.  With no peace to keep, the UN relies on a parallel “green helmet” force alongside “blue helmet” peacekeepers to maintain security and assist in maintaining order in a conflict zone (e.g., Unified Task Force aka UNITAF in Somalia, the Australian led International Force East Timor aka INTERFET in East Timor).  

MINUSMA followed the standard liberal peacebuilding playbook: disarmament, demobilization, reinsertion of combatants; security sector reform; some form of “truth and reconciliation commission;” constitutional democratic governance; re-establishment of state sovereignty over the territory; and rebuilding civil society.  The UN playbook of liberal peacebuilding was a qualified success in both Cambodia[5] and East Timor[6], where the UN supervised the withdrawal of foreign armies (Vietnam and Indonesia respectively) and was in effect the civilian administration and military.  The UN successfully ran free elections to bring a new democratically elected government into power.  

From a conventional military perspective, Operation Serval was a success, routing multiple irregular forces on the battlefield and securing the central government and French nationals in Mali in a month-long campaign.  It also demonstrated the viability of sub-battalion-level deployment of expeditionary units.  However, Operation Serval did not address any of the underlying state weakness that enabled the insurgency in the first place.  Instead, the French Army has become embroiled in a “forever war” as the UN attempts to build a liberal state from a failed state, under very different circumstances from their previous successes in Cambodia and East Timor.

In Mali, multiple non-state actors—various coalitions of Tuareg clans, and multiple domestic and transnational Islamist insurgent groups—pose a threat to the incumbent government.  The French are in a sense captive to a UN playbook that has worked in cases dissimilar to the situation in Mali.  According to the opportunity model of civil war, it is state capacity, not the redress of grievances, that cause civil wars.  There is an inverted U-shaped relationship between government and civil war.  Strong autocracies don’t have civil wars and strong democracies don’t have civil wars[7].  It is the middle ground of anocracies that have wars, because they are weak institutionally.  This weakness explains the difficulty that post-colonial states have in making transitions from autocracy to multi-party democracy[8], and explains the durability of rebel victories[9].  Because the UN is transitioning an autocracy, Mali will be vulnerable.  Therefore, France and any multilateral partners whom they enlist to support them are set up as the de facto guarantor of security in Mali for a long time to come.


Endnotes:

[1] Hironaka, A. (2005). Neverending Wars: The International Community, Weak States, and the Perpetuation of Civil War. (pp. 80-86) Cambridge: Harvard University.

[2] Kraxberger, B. M. (2007). Failed States: Temporary Obstacles to Democratic Diffusion or Fundamental Holes in the World Political Map?. Third World Quarterly 28(6):1055-1071.

[3] Shurkin, M. (2014). France’s War in Mali: Lessons for an Expeditionary Army. Santa Monica: RAND Corporation.

[4] United Nations Security Council (2013, April 25). Resolution 2100. Retrieved 7 April 2013 from http://unscr.com/en/resolutions/doc/2100

[5] Doyle, M. W. and Suzuki, A. (1995). Transitional Authority in Cambodia. In The United Nations and Civil Wars. Weiss, T. G., ed. (pp. 127-149). Boulder: Lynne Rienner.

[6] Howard, L. M. (2008). UN Peacekeeping in Civil Wars. (pp. 260-298) Cambridge: Cambridge University.

[7] Bates, R. H. (2008). State Failure. Annual Review of Political Science 11:1-12.

[8] Huntington, S. P. (1968). Political Order in Changing Societies. New Haven: Yale University.

[9] Toft, M. D. (2010). Securing the Peace: The Durable Settlement of Civil Wars. Princeton: Princeton University.

2019 - Contest: Small Wars Journal Assessment Papers France Greg Olsen Mali

Assessment of the Operational Implications of 21st Century Subterranean Conflict

Major Haley Mercer was commissioned in 2006 as an Engineer Officer from the United States Military Academy at West Point and is completing the U.S. Army School of Advanced Military Studies (SAMS). Prior to SAMS, Haley completed the Command and General Staff College (USCGSC) and two MS degrees from the University of Missouri S&T (2010) and Georgia Tech (2015). She served as Deputy Detachment Commander of the 521st Explosive Hazards Coordination Cell. Haley also has two operational deployments in support of Operation Enduring Freedom, Afghanistan, Consolidation II (2007-2009) and Transition I (2012-2013). She can be found on Twitter @SappersW.    Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


 Title:  Assessment of the Operational Implications of 21st Century Subterranean Conflict

Date Originally Written:  April 30, 2019. 

Date Originally Published:  May 8, 2019. 

Author and / or Article Point of View:  The article is written from the point of view of the U.S. Army and future large-scale ground combat operations. 

Summary:  At the operational level, the United States Army’s mental model does not work against the deep fight against an enemy whose subterranean networks make them impervious to lethal, deep-fires effects. The answer to the subterranean threat is not in the next tactical solution, rather it is in the operational artist’s creative and critical thinking and ability to reframe the problem, apply systematic processes, and provide better solutions to the commander. 

Text:  The subterranean battlefield poses unique challenges, and the U.S. Army lacks the requisite skills to operate within that complex environment. Success against a subterranean threat begins at the operational level of war. While tactical implications must be addressed, they do not solve the larger problem of effectively designing, planning, and executing operations against an enemy that leverages the subterranean domain. A lack of preparedness at the operational level results in the U.S. Army reaching its culminating point short of achieving its strategic aims.

Similar to quantum mechanics, no one can ever project with certainty when, where, how, and with whom the next great conflict will occur.  However, with historical trends and patterns, a keen operational planner can embrace the reality of complexity and make predictions that focus future combat preparations[1].

Today, the United States is more observable, predictable, and understandable than ever before.  While still a critical part of the equation, superior military strength and might is no longer a guaranteed formula for victory.  The 21st century battlefield is more complex than ever, and it requires new ways of thinking. Today’s operational artists must display coup d’ oeil, seeking answers beyond simplistic assessments perpetuated by past experiences, heuristics, and expertise in order to shape the deep fight against an enemy whose subterranean networks make them impervious to traditional, lethal, deep-fires effects.

Shaping the deep fight against a subterranean threat in large scale conflict requires a distinctly different approach. Figure 3 below depicts the systematic approach for effective deep area shaping against a subterranean enemy. Step 1, cognitive design.  Cognitive design is the operational planners’ ability to leverage creative and critical thinking to reframe and develop a plan that address the underlying problem rather than the symptoms. The design process requires a non-traditional systems approach involving a holistic understanding of the relationships and connections between all actors in the system. There must be a deep understanding of what reinforces the enemy’s actions and behaviors through a relational understanding of their values, desires, morals, worldview, beliefs, and language. One cannot defeat what one does not understand. All of this cannot be accomplished without cognitive patience and the ability to communicate understanding to others resulting in action.

The U.S. Army’s current mental framework focuses on combating an adversary’s use of the subterranean domain, but this domain also offers opportunities. In January 2019, the Defense Advanced Research Project Agency announced the initiative to expand the combined arms maneuver space to include a vertical dimension, to exploit both natural and man-made subterranean environments[2]. The United States can benefit from the same subterranean opportunities that are afforded to our adversaries. A friendly subterranean infrastructure could supply secure basing and extend operational reach within an area of conflict while minimizing exposure to the enemy. Furthermore, it can mitigate the logistical challenges posed by the Anti-Access and Area Denial (A2AD) threat and decrease vulnerability to enemy fires.  

Step 2, virtual effects. According to current U.S. Army doctrine, FM 3-0, Operations, Joint force commanders gain and maintain the initiative by projecting fires, employing forces, and conducting information operations[3]. Capabilities within the virtual domain are viewed as a supporting role to projecting fires and employing forces. Against a subterranean threat, virtual effects will likely serve a primary role with traditional physical effects in support. Shaping the deep fight through virtual effects includes all capabilities inherent within electronic warfare, artificial intelligence, and both offensive and defensive cyber actions. With nested and synchronized objectives, all of these assets provide the friendly forces with deception opportunities and narrative control to shape the deep fight prior to arrival of any physical effects. A formulated narrative can promote proactive thinking, gain public support, and deliver false information in support of a deception plan[4].  

Step 3, physical effects. Against a subterranean threat, physical effects are most effective subsequent to cognitive design and virtual effects. Some common physical effects include lethal fires, A2AD, counter weapons of mass destruction, boots on ground, intelligence, surveillance, reconnaissance, and humanitarian support. The physical effects include the combined arms tasks that lead to enemy destruction, exploiting opportunities, minimizing risk, and ultimately shaping the deep fight for the lower echelon elements. Countering a subterranean threat is manpower intensive thus, the solution lies in the partnerships and relationships with the joint, interagency, and multi-national forces. The subterranean threat is not just a U.S. Army problem, rather it’s a defense problem requiring combined resources and assets at all echelons. However, physical effects are most effective when they are preceded by deliberate cognitive design and virtual shaping effects.   

Mercer_Graphic

Figure 3. Shaping The Deep Fight, A Systems Approach. Source: MAJ Haley E. Mercer

Surprise is a primary principle of joint operations and creates the conditions for success at the tactical, operation, and strategic level of war. Surprise is non-negotiable and necessary for gaining and maintaining contact with the enemy.  Surprise affords the attacker the ability to disrupt rival defensive plans by achieving rapid results and minimizing enemy reaction time[5].   According to Carl von Clausewitz, “surprise lies at the root of all operations without exception, though in widely varying degrees depending on the nature and circumstance of the operation.”  Deception operations are essential to achieving surprise[6]. Deception operations do well to integrate electronic warfare capabilities and signature residue manipulation. Electronic signatures are everywhere on the modern battlefield making it difficult to hide from the enemy. From Fitbits, to Apple watches, to RFID tags, to global positioning systems, surprise is difficult to achieve unless operational planners can creatively alter virtual fingerprints to effect enemy actions.  

While still an important facet, the answer to the subterranean threat is not in the next technological advancement or tactical solution, rather it is in the operational artist’s creative and critical thinking and ability to reframe the problem, apply systematic thinking, and provide better options to the commander. Success against a subterranean threat lies at the operational level of war.


Endnotes:

[1] Everett C Dolman, Pure Strategy: Power and Principle in the Space and Information Age (London; New York: Frank Cass, 2005), 100.

[2] “The U.S. Military’s Next Super Weapon: Tactical Tunnels, The National Interest,” accessed March 27, 2019, https://nationalinterest.org/blog/buzz/us-militarys-next-super-weapon-tactical-tunnels-46027.

[3] US Army, FM 3-0 (2017), 5-1.

[4] H. Porter Abbott, The Cambridge Introduction to Narrative, 2nd ed., Cambridge introductions to literature (Cambridge ; New York: Cambridge University Press, 2008), 12.

[5] US Army, ADRP 3-90 (2012), 3-2.

[6] Clausewitz, Howard, and Paret, On War, 198.

Assessment Papers Haley Mercer Option Papers Subterranean / Underground

An Assessment of Population Relocation in 21st Century Counterinsurgencies

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Sam Canter is an Infantry Officer in the United States Army and has completed an MA in Military History at Norwich University, where his thesis focused on the failures of the Revolution in Military Affairs.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government any organization, or any group.


Title:  An Assessment of Population Relocation in 21st Century Counterinsurgencies

Date Originally Written:  March 28, 2019.

Date Originally Published:  May 6, 2019.

Summary:  Despite its endlessly debated efficacy, population relocation represents a frequently employed method of counterinsurgency warfare. Notwithstanding the military usefulness of this technique, its deployment in the 21st century is increasingly tied to questions of human rights and international law. As other methods of counterinsurgency fail, population relocation will continue to hold the fascination of military planners, even as it grows increasingly controversial.

Text:  No domain of military operations has proven quite as difficult for Western nations to master as counterinsurgency operations (COIN). Many different techniques have been brought to bear in efforts to defeat insurgencies, stabilize governments, and pacify local populations. Historically, one of the most frequently employed techniques in COIN operations is population relocation[1]. Either through brute force or more subtle coercion, this technique entails physically removing a segment of the population from the battlefield, with the purpose of depriving insurgents of their logistical and moral support base.

On a fundamental level, this population relocation makes perfect military sense. In a traditional COIN campaign, insurgents and opposing military forces compete for the “hearts and minds” of a population. For occupying forces, this technique contains a fundamental military flaw: electing to directly engage an enemy in a domain in which they possess an absolute advantage – culturally, linguistically, and fraternally. Population relocation, therefore, represents an asymmetric tactic. Rather than engage the enemy in a favorable domain, a conventional force physically alters the military paradigm by changing the human terrain. Relocating the population theoretically allows for more conventional methods of warfare to take place.

Regardless of the military wisdom of population relocation as a tactic, broader considerations inevitably come into play. The moral and legal issues associated with population relocation naturally invite condemnation from the larger international community. There are negative connotations – both Nazi Germany and the Soviet Union practiced forced population relocation with genocidal results. Given the history of population relocation, this practice is unpalatable and unacceptable to the vast majority of Western nations. The United Nations considers forced evictions a violation of human rights, except in rare cases of “public interest” and “general welfare[2].” A COIN campaign might well meet that rare case bar, but it remains an open question if such a policy – even well-intended – can ever be enacted without force.

A recent example of population relocation viewed through a human right lens occurred in Egypt. To combat the Islamic State in the Sinai Peninsula, Egypt engaged in concerted efforts to remove the insurgent group’s local base of support. However, within the context of a COIN paradigm, Egypt’s efforts represented a fifty percent solution of sorts. According to a report by Human Rights Watch, Egypt has demolished almost 7,000 buildings in the Sinai, with virtually no efforts made to relocate those displaced, many of whom do not support the Islamic State[3]. In the absence of a practical and humane relocation plan, it is difficult to discern what Egypt hopes to accomplish. While Egypt is not a Western nation and is not necessarily bound by the moral or political consideration that Western democracies are, from a purely practical standpoint their relocation efforts have achieved little other than inviting international condemnation. Even so, given that Egypt’s efforts took place within the context of a legitimate COIN campaign – rather than a wholesale ethnic slaughter as a COIN tactic, such as recently occurred in Myanmar – their case is illustrative of the inherent tension in executing population relocation[4].

For Western nations, political tensions largely outweigh purely military considerations. In Afghanistan – the proving ground for North Atlantic Treaty Organization countries to execute COIN operations – population relocation has proven unviable for many reasons. Certainly, the culture, history, and geography of Afghanistan do nothing to suggest that such a tactic would succeed. Unlike the British experience in Malaya during the 1950s – usually cited as the textbook example of successful resettlement – attempts to implement population relocation would alienate the Afghan people, in addition to encountering a myriad of practical difficulties[5]. Therefore, the opportunity for Western nations to implement a “case study” of sorts in Afghanistan did not present itself. The United States instead recalls the failed legacy of the Strategic Hamlet program in Vietnam as its most recent military experience with population relocation[6].

With all this considered, it is quite evident that in the 21st century, population relocation as a COIN tool has been the purview of some less than exemplary militaries and has remained mostly unpracticed by Western nations. However, this does not necessarily forbid its use in a future COIN operation. If population relocation is to prove viable in the future, a series of conditions must be met to make this course of action suitable to the problem at hand, feasible to implement, and acceptable to Western governments and the international community.

In pursuit of population relocation efforts that are politically acceptable, first, the population must be amenable to such a move. This scenario will only result from the satisfaction of two sub-conditions. The population selected for relocation must be actively seeking greater security and lack historical ties to the land which they inhabit, factors which may preclude this tactic’s use in agrarian societies. Only upon meeting this condition can population relocation efforts avoid the condemnation of the international community. Second, before any attempts to implement this program, a site for relocation or integration will already need to exist. Ideally, the move to a new location should also equate to an increased standard of living for those resettled. Last, verifiable forms of identification are vital, as the process of separating insurgents from the general population must remain the central focus. It is crucial that those practicing COIN not underestimate the level of local support for an insurgency, as these techniques only stand a chance of success if the locals’ primary motivation is one of safety and security rather than cultural loyalty and ideology.

These are high standards to meet, but given the bloody history associated with population relocation, they are wholly appropriate. In COIN operations, many analyze the concept of asymmetry from the standpoint of the insurgent, but asymmetric tactics have a role for conventional occupying forces as well. If insurgents possess an absolute advantage in the human domain, then it is merely foolish for counter-insurgents to engage in direct competition. Therefore, and in the absence of other asymmetric practices, population relocation may still have some utility as a 21st century COIN practice, but only in scenarios that favor its use from a combined moral, legal, and practical standpoint.


Endnotes:

[1] Examples in the 20th century include South Africa, the Philippines, Greece, Malaya, Kenya, Algeria and Vietnam among others. For a cogent examination of the effects of these various campaigns, see Sepp, Kalev I. (1982). Resettlement, Regroupment, Reconcentration: Deliberate Government-Directed Population Relocation in Support of Counter-Insurgency Operations. Fort Leavenworth, KS: Command and General Staff College.

[2] United Nations Office of the High Commissioner of Human Rights. (2014). Forced Evictions (Fact Sheet No. 25/Rev. 1). New York, NY: United Nations.

[3] Human Rights Watch. (May 22, 2018). Egypt: Army Intensifies Sinai Home Demolitions. Retrieved March 28, 2018, from https://www.hrw.org/news/2018/05/22/egypt-army-intensifies-sinai-home-demolitions

[4] Rowland, Sarah. (2018) The Rohingya Crisis: A Failing Counterinsurgency. Small Wars Journal. Retrieved March 31, 2018, from https://smallwarsjournal.com/jrnl/art/rohingya-crisis-failing-counterinsurgency

[5] For an analysis of Malaya as a prototypical COIN operation, see Hack, Karl. (2009). The Malayan Emergency as counter-insurgency paradigm. Journal of Strategic Studies, 32(3), 383–414.

[6] Leahy, Peter Francis. (1990). Why Did the Strategic Hamlet Program Fail? Fort Leavenworth, KS: Command and General Staff College.

2019 - Contest: Small Wars Journal Assessment Papers Insurgency & Counteinsurgency Sam Canter

An Assessment of the Small Wars Manual as an Implementation Model for Strategic Influence in Contemporary and Future Warfare

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Bradley L. Rees is a retired United States Army Lieutenant Colonel, retiring in March 2013 as a Foreign Area Officer, 48D (South Asia).  He has served in general purpose and special operations forces within the continental United States and in numerous combat deployments to Iraq and Afghanistan.  He is a graduate of the United States Marine Corps Command and Staff College and their School of Advanced Warfighting, and the Army War College’s Defense Strategy Course.  He presently works at United States Cyber Command where he is the Deputy Chief, Future Operations, J35.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  The opinions expressed in this assessment are those of the author, and do not represent those of the United States Government, Department of Defense, Air Force, or Cyber Command.

Title:  An Assessment of the Small Wars Manual as an Implementation Model for Strategic Influence in Contemporary and Future Warfare

Date Originally Written:  March 17, 2019.

Date Originally Published:  April 29, 2019.

Summary:  A disparity between how most within the U.S. Department of Defense (DoD) understand 20th-century information operations and 21st-century information warfare and strategic influence has produced a cognitive dissonance.  If not addressed quickly, this dichotomy will further exasperate confusion about Information as the Seventh Joint Function[1] and long-term strategic competition[2] in and through the Information Environment[3].

Text:  The United States has ceded the informational initiative to our adversaries.  As Shakespeare said, “Whereof what is past is prologue.”  If the DoD is to (re)gain and maintain the initiative against our adversaries, its actions are best informed by such a prologue.  An analogy exists between how, in Shakespeare’s The Tempest, Antonio encourages Sebastian to kill his father in order for Sebastian to become king and how most within the DoD think about responsive and globally integrated[4] military information and influence activities.  Antonio’s attempts at conveying to Sebastian that all past actions are purely contextual – an introduction or prologue –  is meant to narrow Sebastian’s focus on the future rather than the past[5].

The Department likely finds value in viewing that anecdote entirely relevant when attempting to answer what it means for Information to be a Joint Function in contemporary and future warfare.  If the Department seeks to (re)gain and maintain the initiative, appreciating history is a valuable first step, while critically important from a contextual perspective, is second only to how society today holds operational and strategic information and influence activities at a much higher premium than in years’ past.  With that, there is much to learn from the U.S. Marine Corps’ (USMC) development of its Small Wars Manual (SWM).

Today, many may question what the relevance and utility are of a 1940 USMC reference publication that focuses on peacekeeping and counterinsurgency (COIN) best practices collected from the turn of the 20th century, particularly in relation to contemporary and future warfare framed by Information as a Joint Function, strategic influence operations and their nexus with technology, and long-term strategic competition.  However, the SWM is one of those rare documents that is distinct within the broader chronicles of military history, operational lessons learned, and best practices.  It is not doctrine; it is not an operational analysis of expeditionary operations, nor is it necessarily a strategy.  Its uniqueness, however, lies in how it conveys a philosophy – an underlying theory – that addresses complexity, the necessity for adaptability,  and the criticality given to understanding the social, psychological, and informational factors that affect conflict.  The SWM reflects how ill-defined areas of operations, open-ended operational timelines, and shifting allegiances are just as relevant today, if not more so than relative combat power analyses and other more materially oriented planning factors have been in most of two century’s worth of war planning.  More so, the SWM places significant weight on how behavior, emotions, and perceptions management are central in shaping decision-making processes.

Currently, the DoD does not have the luxury of time to develop new philosophies and theories associated with military information and influence as did the USMC regarding small wars.  Similarly, the Department cannot wait an additional 66 years to develop relevant philosophies, theories, strategies, and doctrine relating to information warfare as did the U.S. Army and the USMC when they released COIN doctrine in 2006.  The Department does, however, have within the SWM a historiographic roadmap that can facilitate the development of relevant theory relating to Information as a Joint Function and strategic influence relative to long-term strategic competition.

The DoD does not intrinsically rest the development of defense and military strategies on an overarching philosophy or theory.  However, it does link such strategies to higher-level guidance; this guidance resting on a broader, more foundational American Grand Strategy, which academia has addressed extensively[6][7][8],  and on what has been termed the “American Way of War” and the broader institutional thinking behind such American ways of warfighting for more than a century[9].  Such grand strategies and ways of warfighting are best informed by deductive reasoning.  Conversely, in the absence of deductive reasoning, practitioners usually rely on induction to guide sound judgment and decisive action[10].  Despite this fact, a considerable dearth of DoD-wide organizational, institutional, and operational observations and experiences burden the Department’s ability to fully embrace, conceptualize, and operationalize globally integrated information and influence-related operations.

While the USMC did not have a century’s worth of thinking on small wars,  their three decades of experiences in peacekeeping and COIN served as the foundation to the SWM.  Throughout those three decades, the Marine Corps paid particular attention to the psychological and sociological aspects of the environment that impacted operations.  They realized that military action was doomed for failure if it was undertaken absent a well-rounded understanding of what the DoD now refers to as systems within the Operational Environment[11][12].  The SWM has an entire section dedicated to the psychological and sociological aspects that potentially motivate or cause insurrection[13].  Such considerations are just as relevant today as they were in 1940.

Today, the DoD lacks a straightforward and applicable information and influence roadmap that can be used to navigate long-term strategic competition.  The SWM provides such a navigational guide.  Studying it can provide the insights on a wide variety of factors that the Marine Corps recognized as having a significant influence on the ever-changing character of the conduct in war, the relationships and interaction between a philosophy or theory to military practice, and how its understanding of small wars impacted the development of strategy and campaign planning.  The SWM can inform the DoD on how to quickly and effectively address Information as the Seventh Joint Function, strategic influence, and long-term strategic competition in contemporary and future warfare.


Endnotes:

[1] Joint Staff, Joint Publication 3-0, Operations, pp. xiii, III-1, III-17 through III-27, (Washington, D.C., United States Printing Office, October 22, 2018).

[2] Office of the Secretary of Defense, The 2018 National Defense Strategy of the United States of America, (Washington, D.C., United States Government Printing Office, January 19, 2018).

[3] Joint Staff.  Joint Publication 2-01.3, Joint Intelligence Preparation of the Operational Environment, pp. III-19 to III-26, (Washington, D.C., United States Government Printing Office, May 21, 2014).

[4] Joint Staff. (2018), Chairman’s Vision of Global Integration [Online] briefing.  Available:  www.jcs.mil\Portals\36\Documents\Doctrine\jdpc\11_global_integration15May.pptx [accessed March 17, 2019].

[5] Shakespeare, W. (1610), The Tempest, Act II, Scene 1 [Online]. Available:  https://www.folgerdigitaltexts.org/html/Tmp.html#line-2.1.0 [accessed March 16, 2019].

[6] Weigley, R. F., The American Way of War:  A History of United States Strategy and Policy, (Bloomington, Indiana, Indiana University Press, 1978).

[7] Biddle, T. M., “Strategy and Grand Strategy:  What Students and Practitioners Need to Know,” Advancing Strategic Thought Series, (Carlisle Barracks, Pennsylvania:  Strategic Studies Institute and Army War College Press, 2015).

[8] Porter, P., “Why America’s Grand Strategy has not Changed:  Power, Habit, and the U.S. Foreign Policy Establishment,” International Security, Vol. 42, No. 4 (Spring 2018), pp. 9–46, (Cambridge, Massachusetts, MIT Press, 2018).

[9] Weigley.

[10] Bradford, A. (2017), Deductive Reasoning vs. Inductive Reasoning [Online]. Available:  https://www.livescience.com/21569-deduction-vs-induction.html [accessed March 17, 2019].

[11] Joint Staff.  Joint Publication 2-01.3, Joint Intelligence Preparation of the Operational Environment, pp. III-38 to III-40, (Washington, D.C., United States Government Printing Office, May 21, 2014).

[12] Ibid, p. xi.

[13] Department of the Navy, Headquarters United States Marine Corps. Fleet Marine Force Reference Publication 12-15, Small Wars Manual, (Washington, D.C., United States Government Printing Office, 1940).

2019 - Contest: Small Wars Journal Assessment Papers Bradley L. Rees Information and Intelligence United States

Assessing U.S. Space-Focused Governing Documents from the Astropolitik Model of State Competition  

Anthony Patrick is an Officer in the United States Marine Corps.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing U.S. Space-Focused Governing Documents from the Astropolitik Model of State Competition

Date Originally Written:  March 26, 2019.

Date Originally Published:  April 22, 2019.

Summary:  How the United States invests time and resources into space over the next few decades will have long-term strategic effects.  While current U.S. governing documents focused primarily on space align with the Astropolitik Model of state competition, which focuses on the employment of all instruments of national power, this appears to be incidental.  Without a cohesive suite of documents to focus space efforts, the U.S. could fall behind its competitors.

Text:  On April 18, 2018 the U.S. Joint Chiefs of Staff released Joint Publication 3-14 Space Operations (JPSO)[1]. The JSPO, along with the 2010 National Space Policy (NSP)[2], the 2011 National Security Space Strategy (NSSS)[3], and the Department of Defense’s Space Policy of 2016 (DOD SP)[4], are meant to guide U.S governmental actions impacting the civilian, commercial, and military efforts in space. These governing documents work together to form the bedrock of American power projection in space. It is key that these governing documents are able to harmonize action along the necessary lines of effort in order to protect U.S national interests. It is also important to assess these documents through appropriate theoretical models on space power projection. Everett C. Dolman ‘s Astropolitik Model, a determinist political theory used to describe the relationship between state power and outer space control, provides such a framework[5]. 

Space by its very nature is a radically different domain of state competition when compared to land, sea, and air. Not only are there differences in how physical objects interact but there are also key differences in the effects of these interactions on the rest of planet. Doctrines of state competition will likely find it best to recognize the global effects of space operations. Satellites can not only effect targeting of fires across a whole combatant command and the navigational abilities of units in that area but also effect the greater network that supports global operations. The JPSO and other governing documents do recognize the global nature of space operations, which will assist planners in “balancing operational level requirements for current support [in an area of operation (AO)] with strategic level requirements to preserve space capabilities for other times and places.” U.S governing documents focused on space also recognize the need for synchronization in procurement programs. Space technology is expensive and takes years to develop, and all four documents describe the necessity for a competitive and flexible U.S space industry with long-term procurement planning that is looking forward to the next battle while also being consistent across political administrations. 

Orbital space is already starting to be crowded by both civilian and governmental satellites from both U.S allies and adversaries. The 2011 NSSS recognized the need for space to be viewed as a contested and competitive domain. This concern was also described in great detail by the JPSO and is evident by the development and testing of anti-satellite capabilities by both the Peoples Republic of China (2007)[6] and the U.S (2008)[7]. While the NSP focuses mainly on the U.S right to self-defense and the importance of alliance building, it also helps guide other governing documents in the right path towards increasing the U.S’s ability to operate in a contested space environment.

Lastly, U.S governing documents focused on space, like the Astropolitik Model, recognize the importance of utilizing all aspects of state power to project power in space. The JPSO describes in detail the mutualistic relationship between space and cyber assets. The DOD SP also mentions the importance of cost sharing between the DOD and other agencies within the U.S government, while the NSP and NSSS recognize the importance of utilizing both civilian, commercial, and military resources to project power into space. 

There are however certain issues with U.S governing documents focused on space when viewed from the Astropolitik Model. First, U.S governing documents focused on space do not attempt to gain complete dominance over the space domain. Controlling certain topographic features in space, from the Earth’s ‘high point’ in the gravity well (geostationary orbit), to the use of Lagrange Points (a point in space where an object is fixed between the gravitational fields of two bodies)[8], can allow a state to dictate what happens in space during state on state conflict. Defensive satellites in geostationary orbit can detect the use of Earth based anti-satellite weapons and trigger countermeasures before they are destroyed.

While U.S governing documents focused on space do point out the importance of utilizing the current U.S. alliance structure, none of the mentioned documents describe dominating the topography of space to advance U.S interest in space. The 2010 NSP also does not recognize the inevitable militarization of space. As more and more countries deploy satellites to space, they become part of that nation’s infrastructure. Just like with any key power plant, road, or bridge, nations will, at some point, likely deploy capabilities that will allow them to defend their assets and attack an enemy’s capability. Space is the universal Center of Gravity for any country that integrates national security operations with space-based assets. The 2010 NSP does mention that peaceful use of space allows for national and homeland security activities, but that still does not provide clear guidance on how much militarization U.S policy will allow. Being clear in this matter is important since it will allow planners to begin the proper procurement programs that are needed to defend U.S national security interest. 

It is important to U.S national security interest that the U.S is able to effectively plan and execute operations in the heavens. To accomplish this task, a consistent and well thought approach to governing documents that allows guidance for planners to accomplish the tasks laid out by decision makers in the U.S government is a plus. Adopting these documents in line with the Astropolitik Model allows the U.S to effectively dominate space and secure its peaceful use for all nation. Inaction is this realm could lead to further competition from other states and degrade the U.S’s ability to operate effectively both in space and on Earth. 


Endnotes:

[1] United States., Joint Chiefs of Staff. (2018, April 10). Joint Publication 3-14 Space Operations. Retrieved March 25, 2019, from https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_14.pdf

[2] United States, The White House, The President of the United States. (2010, June 28). National Space Policy of the United States of America. Retrieved March 25, 2019, from https://history.nasa.gov/national_space_policy_6-28-10.pdf

[3] United States, Department of Defense, Office of the Director of National Intelligence. (2011). Naitonal Security Space Strategy Unclassified Summary. Retrieved March 25, 2019, from https://www.hsdl.org/?view&did=10828

[4] United States, Department of Defense, Office of the Deputy Secretary of Defense. (2016, November 4). DOD Directive 3100.10 Space Policy. Retrieved March 25, 2019, from https://fas.org/irp/doddir/dod/d3100_10.pdf

[5] Dolman, E. C. (2002). Astropolitik: Classical Geopolitics in the Space Age. London: Cass.

[6] Weeden, B. (2010, November 23). 2007 Chinese Anti-Satellite Test Fact Sheet. Retrieved March 25, 2019, from https://swfound.org/media/9550/chinese_asat_fact_sheet_updated_2012.pdf

[7] Hagt, E. (2018, June 28). The U.S. satellite shootdown: China’s response. Retrieved March 25, 2019, from https://thebulletin.org/2008/03/the-u-s-satellite-shootdown-chinas-response/

[8] Howell, E. (2017, August 22). Lagrange Points: Parking Places in Space. Retrieved March 26, 2019, from https://www.space.com/30302-lagrange-points.html

Anthony Patrick Assessment Papers Governing Documents and Ideas Space

An Assessment of the Threat Posed by Increased Nationalist Movements in Europe

Major Jeremy Lawhorn is an active duty U.S. Army Psychological Operations Officer with over a decade in Special Operations.  He has served in the United States Army for over 19 years in a variety of leadership and staff officer positions, both domestically and internationally.  His academic interest is primarily in military strategy, specifically the competition phase. His current research focuses on understanding resistance movements. He currently holds a Master’s Degree from Norwich University, Duke University, and the U.S. Army Command and General Staff College.  He is currently working on his Doctorate at Vanderbilt University.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group.  The opinions and conclusions expressed herein are those of the individual author and do not necessarily represent the views of the United States Army or any other government agency.


Title:  An Assessment of the Threat Posed by Increased Nationalist Movements in Europe

Date Originally Written:  March 18, 2019.

Date Originally Published:  April 15, 2019.

Summary:  If left unchecked, the current nationalist movements on the rise throughout Europe threaten the integrity of the European Union (EU), the future of the North Atlantic Treaty Organization (NATO) Alliance, and the overall security of Europe. Leveraging nationalist sentiments, Russia is waging a hybrid warfare campaign to support nationalist opposition parties and far-right extremist groups to  create disengagement among EU and NATO members.

Text:  In recent years there has been a groundswell of nationalism and far-right extremism across Europe, allowing far-right political parties to gain power in several countries as well as representation in the European Parliament. Today there are more than 59 nationalist parties, 15 regionalist parties, more than 60 active nationalist-separatist movements, and a growing radical right-wing extremist movements throughout the EU. Collectively, far-right nationalist groups occupy 153 of 751 seats in the European Parliament representing 21 of the 28 EU member states. This rise in nationalist sentiment is the result of growing Euroscepticism that has been driven in part by the Eurozone debt crisis, increased opposition to mass immigration, fear of cultural liberalization, and the perceived surrender of national sovereignty to external organizations. These nationalist movements threaten the integrity of the EU, the future of the NATO Alliance, and the overall security and stability of Europe. Leveraging nationalist sentiments, Russia is waging a hybrid warfare campaign to achieve their own political objectives by supporting nationalist opposition parties and far-right extremist groups to increase Euroscepticism and ultimately create disengagement among EU and NATO members.

Today’s nationalist movements are gaining strength in part because they are creating large networks of support across Europe. These movements have created transnational alliances to support each other to oppose the EU. The Europe of Nations and Freedom (ENF), Europe of Freedom and Direct Democracy (EFDD or EFD2), and the European Conservatives and Reformists (ECR) are nationalist Eurosceptic groups made up of members from several EU members states that collectively have significant representation in the European parliament. These group’s stated purpose is to work for freedom and co-operation among peoples of different States to return power back to the people of sovereign states, to focus on respect for Europe’s history, traditions and cultural values with the belief that peoples and Nations of Europe have the right to protect their borders and strengthen their own historical, traditional, religious and cultural values[1]. These groups are also committed to sovereignty, democracy, freedom and ending mass immigration so that members may advance their own interests at the domestic level[2]. The collective strength of these groups empower local nationalist movements, enabling them to gain influence and power that might not otherwise be possible. As each individual nationalist movement gains power, the larger alliance gains power to support other movements.

The rise of nationalist sentiments is also emboldening right-wing extremism groups. While not all nationalist parties are affiliated with right-wing extremism, the similarity in ideologies creates sympathetic leanings that are destructive for society. In recent years, right-wing political movements have brought together coalitions of Neo-Nazis with mainstream free-market conservatives, normalizing political ideologies[3]. These relationships can be used to serve mutually supportive positions while leaving room for plausible deniability. These violent far-right groups have not only embraced similar populist language of the nationalist political movements, they also espouse openly racist epithets and employ violence to pursue their goals of reestablishing ethnically homogenous states[4]. Not unlike the Nazi party of the past and consistent with nationalist rhetoric, these groups portray immigrants and ethnic minorities as the cause for economic troubles and demonize as threats to the broader national identity[5]. In essence, nationalist parties benefit from national fervor generated by these right-wing extremist without having to openly support their violent activities.

European nationalist parties are not the only ones benefitting from the growth in nationalist sentiments. Russia is also a key beneficiary and benefactor of European nationalist movements. Russia generally views the West with contempt as they see the expansion of NATO and the influence of the EU as an encroachment on their sphere of influence. Anything that challenges the cohesion of NATO and the EU is seen as a benefit for Russia. While Russia may not be responsible for creating these movements, they have supported a variety of nationalist opposition and far-right extremist groups throughout Europe to achieve their own political aims. Russia is playing a vital role to empower these groups with offers of cooperation, loans, political cover and propaganda. The Kremlin is cultivating relationships with these far-right parties, by establishing ‘‘cooperation agreements’’ between the dominant United Russia party and parties like Austria’s Freedom Party, Hungary’s Jobbik, Italy’s Northern League, France’s National Front, and Germany’s AfD (Alternative for Germany)[6]. Kremlin-linked banks are also providing financial support for nationalist parties like France’s National Front party to support their anti-EU platform. Kremlin-linked oligarchs are also supporting European extremist groups like Germany’s neo-Nazi NPD party, Bulgaria’s far-right Ataka party, Greece’s KKK party, and the pro-Kremlin Latvian Russian Union party[7].

Russian propaganda is also playing a major role in destabilizing the EU and fueling the growth of nationalist and anti-EU sentiment. According to a resolution adopted by the European Parliament in November 2016, Russian strategic communication is part of a larger subversive campaign to weaken EU cooperation and the sovereignty, political independence and territorial integrity of the Union and its Member States. Russia’s goal is to distort truths, provoke doubt, divide EU Member states, and ultimately undermine the European narrative[8]. In one example, Russian attempted to create division by manipulating the Brexit referendum. Researchers at Swansea University in Wales and the University of California at Berkeley found that more than 150,000 Russian-sponsored Twitter accounts that tweeted about Brexit in order to sow discord. In the 48 hours leading up to referendum, Russian-sponsored accounts posted more than 45,000 divisive messages meant to influence the outcomes[9]. Another example of Russian interference was during the Catalan crisis in 2017. Pro-Kremlin Twitter accounts amplified the Catalan crisis by 2,000% in an effort to support the Catalan Independence Referendum and cause further friction within Europe[10]. On October 1, 2017, 92 percent of the population voted in favor of independence and on October 27 the Parliament of Catalan declared independence from Spain sparking unrest in Spain.

This rise in nationalism presents a challenge not only to the future integrity of the EU, but also the security and stability of the region. Continuing to capitalize on the growing nationalist sentiments, Russia is achieving its interests by supporting nationalist political parties and far-right extremist groups that are increasing fractures within and between European states. These actions present an existential threat to European security and the future viability of the EU and NATO.


Endnotes:

[1] Janice, A. (n.d.). About Europe of Nations and Freedom. Retrieved February 15, 2019, from http://www.janiceatkinson.co.uk/enf/

[2] Europe of Freedom and Direct Democracy. (n.d.). Retrieved February 15, 2019, from http://www.europarl.europa.eu/elections-2014/en/political-groups/europe-of-freedom-and-direct-democracy/

[3] Holleran, M. (2018, February 16). The Opportunistic Rise of Europe’s Far Right. Retrieved February 15, 2019, from https://newrepublic.com/article/147102/opportunistic-rise-europes-far-right

[4] Frankel, B., Zablocki, M., ChanqizVafai, J., Lally, G., Kashanian, A., Lawson, J., Major, D., Nicaj, A., Lopez, R., Britt, J., Have, J.,&  Hussain, A., (Eds.). (2019, March 06). European ethno-nationalist and white supremacist movements thrive. Homeland Security Newswire. Retrieved March 10, 2019, from http://www.homelandsecuritynewswire.com/dr20190306-european-ethnonationalist-and-white-supremacist-movements-thrive

[5] Ibid., 2019

[6] Smale, A. (2016, December 19). Austria’s Far Right Signs a Cooperation Pact With Putin’s Party. The New York Times. Retrieved February 15, 2019, from https://www.nytimes.com/2016/12/19/world/europe/austrias-far-right-signs-a-cooperation-pact-with-putins-party.html

[7] Rettman, A, (2017, April 21) Illicit Russian Money Poses Threat to EU Democracy, EUobserver, Retrieved February 20, 2019, from https://euobserver.com/foreign/137631

[8] European Parliament Resolution of (2016, November 23) EU Strategic Communication to Counteract Propaganda against it by Third Parties, 2016/2030(INI), Nov. 23, 2016. . Retrieved February 15, 2019, from https://oeil.secure.europarl.europa.eu/oeil/popups/printficheglobal.pdf

[9] Mostrous, A., Gibbons, K., & Bridge, M. (2017, November 15). Russia used Twitter bots and trolls ‘to disrupt’ Brexit vote. The Times. Retrieved February 15, 2019, from https://www.thetimes.co.uk/article/russia-used-web-posts-to-disrupt-brexit-vote-h9nv5zg6c

[10] Alandete, D. (2017, October 01). Pro-Russian networks see 2,000% increase in activity in favor of Catalan referendum. El Pais. Retrieved February 19, 2019, from https://elpais.com/elpais/2017/10/01/inenglish/1506854868_900501.html

 

Assessment Papers Europe Jeremy Lawhorn Nationalism Option Papers

Assessment of the Impacts of Saudi Arabia’s Vision2030 on U.S. Efforts to Confront Iran

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Scott Harr is a U.S. Army Special Forces officer with deployment and service experience throughout the Middle East.  He has contributed articles on national security and foreign policy topics to military journals and professional websites focusing on strategic security issues.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Impacts of Saudi Arabia’s Vision2030 on U.S. Efforts to Confront Iran

Date Originally Written:  March 7, 2019.

Date Originally Published:  April 2, 2019.

Summary:  The Kingdom of Saudi Arabia’s Vision2030 plan to transform its economy and society will have significant effects on the U.S. ability to confront and counter Iran. In either success or failure, Vision2030 will alter the balance of power in the Middle East, conferring advantages to either a strong American ally (Saudi Arabia) or the most formidable and long-standing U.S. adversary in the region (Iran).

Text:  Amidst the continuing turmoil and instability that touches many parts of the Middle East, the Kingdom of Saudi Arabia (KSA) and the Islamic Republic of Iran (IRI) maintain a fierce rivalry vying for regional and Islamic dominance. Both countries factor prominently into U.S. regional goals and interests as Iran (since its Islamic Revolution in 1979) serves as the preeminent regional threat and adversary to the U.S. while the KSA, in many ways, serves as the centerpiece of U.S. efforts to counter and degrade Iranian influence in the region[1]. As the region’s premiere Islamic rivals, internal social, economic, and political movements within the KSA and the IRI inherently shape and inform U.S. actions and efforts aimed at undermining hostile (IRI) objectives while supporting friendly (KSA) initiatives. U.S. President Trump, for instance, was quick to voice support in early 2018 for protesters in Iran railing against (among other things) perceived regime inaction and contribution to the stagnant Iranian economy[2]. Alternatively, Trump preserved U.S. support to the KSA even after allegations of KSA government involvement in the killing of a prominent and outspoken journalist[3]. Such dynamics underscore how the inner-workings of regional rivals create venues and opportunities for the advancement of U.S. interests confronting regional threats by applying pressure and defining alliances using different elements of national power.

In 2016, Saudi Crown Prince Muhammad bin Salman, known as “MBS,” unveiled an ambitious and grandiose plan for economic, cultural, and social change in the Kingdom. In response to a worldwide decline in oil prices that drastically shrunk Saudi cash reserves and simultaneously highlighted the precarious state of the Kingdom’s oil-dependent economy, MBS released “Vision2030”- a sweeping program of reform that aimed to create a vibrant society, build a thriving economy, and establish a culture of ambition within the Kingdom[4]. Motivating these ideas was a desire to increase the privatization of the economy and make Saudi society attractive to foreign investment to diversify the economy and decrease its dependence on oil[5]. Whether explicitly or implicitly, the mechanisms of change that drive the execution of MBS’ Vision2030 rest on the extent to which Western values (namely free-market principles and social liberalism) can be inculcated into a historically conservative and closed society. Given the magnitude of Vision2030’s scope, targeting all of Saudi society, the ideology involved in its execution (incorporating Western values), and the KSA’s geopolitical status as a key U.S. ally against Iranian foreign policy objectives, the implementation and execution of Vision2030 cannot fail but to have far-reaching impacts on both Middle Eastern regional stability in general and U.S. efforts confronting Iran in particular.

Whether Vision2030 succeeds or fails, the sheer scope and scale of its desired effects will shape (or re-shape) the momentum of America’s ongoing conflict with Iran and perhaps play a decisive role in determining who (American friend or foe) holds sway in the Middle East. On an ideological plane, if Vision2030 succeeds and successfully introduces Western values that contribute to a balanced and prosperous economy as well as a (more) foreigner-friendly open society, the KSA immediately serves as a blueprint for other Middle Eastern societies plagued by government corruption, limited economic opportunities, and social restrictions. In Iran specifically, Saudi success at transforming their society will perhaps reinvigorate popular protests against a ruling regime that many perceive as purveyors of exactly the kind of corruption and social control described above[6]. That the impetus for change in KSA sprang from the government’s desire for reform (and not citizens engaged in resistance –as in Iran) may further buoy popular unrest in Iran as Vision2030 allows the Saudi government to be cast as benevolent leaders in stark contrast to the Iranian regime’s reputation as corrupt and heavy-handed rulers. Increased unrest in Iran opens the door for increased American support and actions aimed at dislodging the current hostile regime and supporting popular Iranian efforts to introduce democratic reforms. On an economic plane, the success of Vision2030 will potentially decrease the economic capability of the IRI as the desired foreign investment into the KSA resulting from Vision2030 will presumably draw resources from traditional IRI economic partners and cause them to re-invest in a more open and friendly KSA market[7]. This potential economic success will potentially make it more difficult for the IRI to circumvent U.S. actions in the economic realm (sanctions) designed to coerce the IRI into abandoning hostile policies towards U.S. interests.

There will also be significant regional repercussions should Vision 2030 fail and the KSA proves unsuccessful in transforming its economy and society. On an ideological plane, Vision 2030’s failure will likely serve as a referendum on the viability of Western values in the Islamic world and, as such, help sustain the IRI ruling regime. Just as a failing Venezuela has become a symbol and warning of the dangers of socialism to America, so too will the KSA become fodder for IRI propaganda denouncing Western values[8]. On an economic plane, the failure of Vision2030 will, by default, mean that the KSA was unsuccessful in diversifying its economy and severing its reliance on oil for prosperity. Given the tumultuous state of oil prices and the gradual (but palpable) desire of advanced countries to decrease their dependence on oil, this will likely mean that the KSA, as a whole, will be a weakened and less-capable ally against the IRI.

The success of Vision2030 is far from a foregone conclusion in the KSA as recent government implementation measures have encountered staunch resistance from a Saudi citizenry not accustomed to a reduced supporting role from the government[9]. However, what seems clear enough is that the endeavor, regardless of its success or failure, will create effects that reverberate across the Middle East and alter (for better or worse) the balance of power and impact the U.S. ability to confront, counter, and compete against the IRI in the region.


Endnotes:

[1] David, J. E. (2017, May 20). US-Saudi Arabia seal weapons deal worth nearly $110 billion immediately, $350 billion over 10 years. Retrieved March 05, 2019, from https://www.cnbc.com/2017/05/20/us-saudi-arabia-seal-weapons-deal-worth-nearly-110-billion-as-trump-begins-visit.html

[2] Mindock, C. (2018, January 03). Donald Trump says Iranian protesters will see ‘great support’ from US. Retrieved March 6, 2019, from https://www.indepeent.co.uk/news/world/americas/us-politics/donald-trump-iran-protests-us-support-twitter-hassan-rouhami-iranians-corruption-terrorism-a8139836.html

[3] Harte, J., & Holland, S. (2018, November 17). Trump calls CIA assessment of Khashoggi murder premature but possible. Retrieved March 6, 2019, from https://www.reuters.com/article/us-saudi-khashoggi-trump-idUSKCN1NM0FI

[4] Full text of Saudi Arabia’s Vision 2030. (2016, April 26). Retrieved March 6, 2019, from http://english.alarabiya.net/en/perspective/features/2016/04/26/Full-text-of-Saudi-Arabia-s-Vision-2030.html

[5] Khashan, H. (2017). Saudi Arabia’s Flawed “Vision 2030”. Middle East Quarterly, 24(1), 1-8. Retrieved February 27, 2019.

[6] Pourzand, A. (2010). Change They Don’t Believe In: The Political Presence of the Basij in the Islamic Republic of Iran. Kennedy School Review, 10, 99. Retrieved March 6, 2019.

[7] Al Gergawi, M. (2017, October 26). China Is Eyeballing a Major Strategic Investment in Saudi Arabia’s Oil. Retrieved March 6, 2019, from https://foreignpolicy.com/2017/10/26/china-is-eyeballing-a-major-strategic-investment-in-saudi-arabias-oil/

[8] Montgomery, L. K. (2018, May 22). Venezuela should remind Americans about the dangers of socialism. Retrieved March 6, 2019, from https://www.foxbusiness.com/politics/venezuela-should-remind-americans-about-the-dangers-of-socialism-kennedy

[9] Ghitis, F. (2017, April 27) Is Saudi Arabia’s Vision 2030 Reform Plan Faltering—or Succeeding? Retrieved March 6, 2019 from https://www.worldpoliticsreview.com/articles/21969/is-saudi-arabia-s-vision-2030-reform-plan-faltering-or-succeeding

2019 - Contest: Small Wars Journal Assessment Papers Iran Saudi Arabia (Kingdom of Saudi Arabia) Scott Harr

An Assessment of Daesh’s Strategic Communication Efforts to Recruit in Syria

Kierat Ranautta-Sambhi works at Le Beck International as a regional security analyst focusing on the Middle East. She can be found on Twitter @kieratsambhi. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Daesh’s Strategic Communication Efforts to Recruit in Syria

Date Originally Written:  February 4, 2019.

Date Originally Published:  March 4, 2019.

Summary:  In the Syrian theatre, Daesh’s strategic communications included incorporating a trifecta of local issues: (1) anti-Assad sentiment, (2) sectarian cleavages, and (3) socio-economic challenges, all of which continue to exist. Consequently, these long-lasting issues at the heart of Daesh’s local narratives may continue to pose a threat, holding some potency with Daesh’s target audience(s) in the country, despite the collapse of its physical caliphate.

Text:  With the U.S. Department of Defense estimating some 14,000 Daesh militants remain in Syria despite the fall of the group’s physical caliphate[1], the “enduring defeat” of Daesh is yet to be achieved[2]. In the Syrian theatre, the group (initially) gained support within the local context – at least in part – by preying on long-standing grievances (with others having joined Daesh for its ideology, amongst other reasons). In relatively simple terms, Daesh’s strategic communications included incorporating a trifecta of local issues: (1) anti-Assad sentiment, (2) sectarian cleavages, and (3) socio-economic challenges. All three issues remain unresolved despite the collapse of the territorial caliphate. Given the initial success of such narratives in gaining support for the group, and the fact that such issues have outlasted Daesh’s initial territorial successes, this trifecta of grievances could still pose a threat moving forward, even as Daesh shifts (back) towards insurgency.

Firstly, for some Daesh recruits, the initial attraction to the group resulted from the perception that it was “the only force standing up to Assad.” According to interviews with two Daesh defectors, joining Daesh provided them with a means to “take revenge” against the Assad regime for killing family members, a prospect which resonated with several recruits from Homs (at least in the early days of caliphal rule)[3]. 

Subsequently, while its own brutal rule became increasingly apparent in Daesh-controlled territory – and resulted in some defections[4] – the grievances at the heart of its narrative remain. Indeed, allegations since levelled against Assad – including the use of chemical weapons and barrel bombs, torture, and extrajudicial killings – feed Daesh’s strategic communications efforts. Failure to adequately address such actions leaves open the risk for Daesh to capitalise on the continued hostility towards the Syrian regime as part of its recruitment strategy. 

Secondly, beyond appealing to those seeking to confront the brutality of the Assad regime, Daesh strategic communications also enflamed sectarian cleavages, preying on the feeling of marginalisation and appealing to those feeling sidelined under the Alawite (a minority sect) regime. As such, the Syrian civil war has provided ripe breeding ground for Daesh’s influence: Daesh’s narrative provides a particularly “empowering narrative for a disenfranchised, disengaged individual.[5]” 

Such grievances (including corruption, nepotism and associated socio-economic divisions) contributed to the outbreak of the civil war, with Daesh narratives during the war itself compounding the existence of sectarian bias. This notably included Daesh depicting itself as the “protector of Sunnis against oppression and annihilation by ‘apostate’ regimes,” including the Syrian regime[6]. The group’s propaganda materials propagated an illusion of equality and unity for those who supported the caliphate[7], constructing a narrative that effectively resonated with some marginalised Sunnis. 

Despite the fall of the caliphate, and, with it, Daesh’s ability to offer (the perception of) belonging to a meritocratic state, such narratives still maintain some potency. With Sunnis seemingly being blamed by association (despite being counted among Daesh’s victims), these narratives have the potential to continue resonating with certain individuals, “creating fertile conditions for a repeat of the cycle of marginalization and radicalization that gave rise to the Islamic State in the first place[8].” Indeed, while much of the territory previously under Daesh’s control has been recaptured, issues of marginalisation and discrimination in any post-war period remain, especially considering liberating forces sizeably include Shiites and Kurds.

Thirdly, and in relation to the aforementioned narrative strand, Daesh has also tapped into more long-standing socio-economic grievances, inevitably exacerbated by almost eight years of war. For instance, Assad’s regime failed to properly address socio-economic concerns, particularly those affecting rural areas which housed a significant proportion of Syria’s poor, and, prior to the outbreak of war, were particularly “restive[9].” Amidst such economic woes and disenfranchisement, coupled with the fact that tribal areas often lacked a significant state security presence[10], Daesh managed to depict itself as capable of fulfilling the “social contract[11],” seeming to step up where the Assad regime had not (or, at the very least, providing an economically convincing alternative). In this context, Daesh proved particularly adept at tapping into local concerns. 

One such example is the group’s publicising of its ability to provide bread in areas under its control, highlighting its understanding of location- and context-specific factors when targeting its audience(s). In Syria, the provision of (subsidised) bread has long constituted “an indisputable governmental responsibility towards its citizenry[12],” tied to “governmental legitimacy[13].” As such, Daesh publicised its efforts to provide bread, including, for example, the distribution of pamphlets incorporating a promise to “manage bakeries and mills to ensure access to bread for all” in Aleppo, as well as outlining longer-term plans to plant and harvest wheat[14]. 

While such narratives held more sway while the caliphate was at its peak and Daesh was credibly able to depict itself as a capable ruler and provider, the long-standing socio-economic cleavages used in its strategic communications still remain. While in the contemporary context, Daesh is no longer able to credibly portray itself as financially and physically capable of addressing such issues as it had under the caliphate, the Assad regime is similarly unlikely to be able (or even willing) to adequately address such socio-economic issues. That’s to say nothing of additional issues such as infrastructural damage, food security issues and inflation provoked by more than seven years of war.

Many, if not all, such grievances still exist despite the crumbling of the caliphate. With regional precedent in Iraq[15] highlighting the risk for the Syrian regime’s gains to similarly be temporary, coupled with its ongoing unpopularity, Daesh’s utilisation of this trifecta of narratives suggests that the group is, indeed, prepared for the “long game”. While these three narrative strands undoubtedly held more sway while presented alongside a physical caliphate, the issues at the heart of Daesh’s strategic communications campaigns are long-lasting. As such, the risk remains that they may continue to hold some potency with Daesh’s target audience(s) in Syria, with the potential to feed into a (adapted) strategy for the new state of play, and still serve as a means to gain/maintain support, even as it shifts (back) towards insurgency.


Endnotes:

[1] BBC. (2018, December 20). After the Caliphate: Has Is Been Defeated? Retrieved February 4, 2019, from https://www.bbc.co.uk/news/world-middle-east-45547595 

[2] Seldin, J. (2018, December 19). Defeat Of Islamic State’s Caliphate Is Not Defeat Of Is. Retrieved February 4, 2019, from https://voanews.com/a/defeat-of-islamic-state-caliphate-is-not-the-defeat-of-is/4708131.html

[3] Revkin, M. & Mhidi, A. (May 1, 2016). Quitting Isis. Retrieved February 4, 2019, from https://www.foreignaffairs/com/articles/syria/2016-05-01/quitting-isis

[4] Ibid.

[5] Levitt, M. (2016, April 12). The Islamic State, Extremism, and the Spread of Transnational Terrorism. Retrieved February 4, 2019, from https://www.foreign.senate.gov/imo/media/doc/041216_Levitt_Testimony.pdf

[6] Munoz, M. (2018, November).  Selling the Long War: Islamic State Propaganda after the Caliphate. Retrieved February 4, 2019, from https://ctc.usma.edu/selling-long-war-islamic-state-propaganda-caliphate/

[7] See Revkin, M. & Mhidi, A. (May 1, 2016). Quitting Isis. Retrieved February 4, 2019, from https://www.foreignaffairs/com/articles/syria/2016-05-01/quitting-isis

[8] Sly, L. (2016, November 23). ISIS: A Catastrophe for Sunnis. Retrieved February 4, 2019, from https://www.washingtonpost.com/sf/world/2016/11/23/isis-a-catastrophe-for-sunnis/?utm_term=.4d2a1544150b 

[9] Coutts, A. (2011, May 18). Syria’s uprising could have been avoided through reform. Retrieved February 4, 2019, from https://www.theguardian.com/commentisfree/2011/may/18/syria-uprising-reform-bashar-al-assad 

[10] Khatib, L. (2015, June). The Islamic State’s Strategy: Lasting and Expanding. Retrieved February 4, 2019, from https://carnegieendowment.org/files/islamic_state_strategy.pdf 

[11] Revkin, M. (2016, January 10). ISIS’ Social Contract. Retrieved February 4, 2019, from https://www.foreignaffairs.com/articles/syria/2016-01-10/isis-social-contract

[12] Martínez, J. & Eng, B. (2017). Struggling to Perform the State: The Politics of Bread in the Syrian Civil War. International Political Sociology, 1-18. doi: 10.1093/ips/olw026

[13] Martínez, J. & Eng, B. (2014, July 29). Islamic State works to win hearts, minds with bread. Retrieved February 4, 2019, from https://www.al-monitor.com/pulse/originals/2014/07/islamic-state-bread-subsidies-syria-iraq-terrorism.html 

[14] Ibid.

[15] Hassan, H. (2018, September 18). ISIS Is Poised to Make a Comeback in Syria. Retrieved February 4, 2019, from https://www.theatlantic.com/ideas/archive/2018/09/isis-is-poised-to-make-a-comeback-in-syria/569986/ 

Assessment Papers Islamic State Variants Kierat Ranautta-Sambhi Syria

An Assessment of the Role of Unmanned Ground Vehicles in Future Warfare

Robert Clark is a post-graduate researcher at the Department of War Studies at King’s College London, and is a British military veteran. His specialities include UK foreign policy in Asia Pacific and UK defence relations.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Role of Unmanned Ground Vehicles in Future Warfare

Date Originally Written:  February 17, 2019.

Date Originally Published:  February 25, 2019.

Summary:  The British Army’s recent land trials of the Tracked Hybrid Modular Infantry System of Unmanned Ground Vehicles, seeks to ensure that the British Army retains its lethality in upcoming short to medium level intensity conflicts.  These trials align with the announcements by both the British Army’s Chief of General Staff, General Carleton-Smith, and by the Defence Secretary, Gavin Williamson, regarding the evolving character of warfare.

Text:  The United Kingdom’s (UK) current vision for the future role of Unmanned Ground Vehicles (UGVs) originates from the British Army’s “Strike Brigade” concept, as outlined in the Strategic Defence Security Review 2015[1]. This review proposed that British ground forces should be capable of self-deployment and self-sustainment at long distances, potentially global in scope. According to this review, by 2025 the UK should be able to deploy “a war-fighting division optimised for high intensity combat operations;” indeed, “the division will draw on two armoured infantry brigades and two new Strike Brigades to deliver a deployed division of three brigades.” Both Strike Brigades should be able to operate simultaneously in different parts of the world, and by incorporating the next generation autonomous technology currently being trialled by the British Army, will remain combat effective post-Army 2020.

The ability for land forces of this size to self-sustain at long-range places an increased demand on logistics and the resupply chain of the British Army, which has been shown to have been overburdened in recent conflicts[2]. This overburdening is likely to increase due to the evolving character of warfare and of the environments in which conflicts are likely to occur, specifically densely populated urban areas. These densely populated areas are likely to become more cluttered, congested and contested than ever before. Therefore, a more agile and flexible logistics and resupply system, able to conduct resupply in a more dynamic environment and over greater distances, will likely be required to meet the challenges of warfare from the mid-2020s and beyond.

Sustaining the British Armed Forces more broadly in densely populated areas may represent something of a shift in the UK’s vision for UGV technology. This UGV technology was previously utilised almost exclusively for Explosive Ordnance Disposal (EOD) and for Countering-Improvised Explosive Devices for both the military and the police, as opposed to being truly a force-multiplier developing the logistics and resupply chains.

Looking at UGVs as a force multiplier, the Ministry of Defence’s Defence Science and Technology Laboratory (DTSL) is currently leading a three-year research and development programme entitled Autonomous Last Mile Resupply System (ALMRS)[3]. The ALMRS research is being undertaken to demonstrate system solutions which aim to reduce the logistical burden on the entire Armed Forces, in addition to providing new operational capability and to reduce operational casualties. Drawing on both commercial technology as well as conceptual academic ideas – ranging from online delivery systems to unmanned vehicles – more than 140 organisations from small and medium-sized enterprises, to large military-industrial corporations, submitted entries.

The first phase of the ALMRS programme challenged industry and academia to design pioneering technology to deliver vital supplies and support to soldiers on the front line, working with research teams across the UK and internationally. This research highlights the current direction with which the British vision is orientated regarding UGVs, i.e., support-based roles. Meanwhile, the second phase of the ALMRS programme started in July 2018 and is due to last for approximately twelve months. It included ‘Autonomous Warrior’, the Army Warfighting Experiment 18 (AWE18), a 1 Armoured Infantry Brigade battlegroup-level live fire exercise, which took place on Salisbury Plain in November 2018. This live fire exercise saw each of the five remaining projects left in the ALMRS programme demonstrate their autonomous capabilities in combined exercises with the British Armed Forces, the end user. The results of this exercise provided DSTL with user feedback, crucial to enable subsequent development; identifying how the Army can exploit developments in robotics and autonomous systems technology through capability integration.

Among the final five projects short-listed for the second phase of ALMRS and AWE18 was a UGV multi-purpose platform called TITAN, developed by British military technology company QinetiQ, in partnership with MILREM Robotics, an Estonian military technology company. Developing its Tracked Hybrid Modular Infantry System (THeMIS), the QinetiQ-led programme impressed in the AWE18.

The THeMIS platform is designed to provide support for dismounted troops by serving as a transport platform, a remote weapon station, an IED detection and disposal unit, and surveillance and targeting acquisition system designed to enhance a commander’s situational awareness. THeMIS is an open architecture platform, with subsequent models based around a specific purpose or operational capability.

THeMIS Transport is designed to manoeuvre equipment around the battlefield to lighten the burden of soldiers, with a maximum payload weight of 750 kilograms. This 750 kilogram load would be adequate to resupply a platoon’s worth of ammunition, water, rations and medical supplies and to sustain it at 200% operating capacity – in essence, two resupplies in one. In addition, when utilised in battery mode, THeMIS Transport is near-silent and can travel for up to ninety minutes. When operating on the front-line, THeMIS Transport proves far more effective than a quad bike and trailer, which are presently in use with the British Army to achieve the same effect. Resupply is often overseen by the Platoon Sergeant, the platoon’s Senior Non-Commissioned Officer and most experienced soldier. Relieving the Platoon Sergeant of such a burden would create an additional force multiplier during land operations.

In addition, THeMIS can be fitted to act as a Remote Weapons System (RWS), with the ADDER version equipped with a .51 calibre Heavy Machine Gun, outfitted with both day and night optics. Additional THeMIS models include the PROTECTOR RWS, which integrates Javelin anti-tank missile capability. Meanwhile, more conventional THeMIS models include GroundEye, an EOD UGV, and the ELIX-XL and KK-4 LE, which are surveillance platforms that allow for the incorporation of remote drone technology.

By seeking to understand further the roles within the British Armed Forces both artificial intelligence and robotics currently have, in addition to what drives these roles and what challenges them, it is possible to gauge the continued evolution of remote warfare with the emergence of such technologies. Specifically, UGVs and RWS’ which were trialled extensively in 2018 by the British Army. Based upon research conducted on these recent trials, combined with current up-to-date in-theatre applications of such technology, it is assessed that the use of such equipment will expedite the rise of remote warfare as the preferred method of war by western policy makers in future low to medium level intensity conflicts seeking to minimise the physical risks to military personnel in addition to engaging in conflict more financially viable.


Endnotes:

[1] HM Government. (2015, November). National Security Strategy and Strategic Defence and Security Review 2015. Retrieved February 17, 2019, from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/478933/52309_Cm_9161_NSS_SD_Review_web_only.pdf

[2] Erbel, M., & Kinsey, C. (2015, October 4). Think again – supplying war: Reappraising military logistics and its centrality to strategy and war. Retrieved February 17, 2019, from https://www.tandfonline.com/doi/full/10.1080/01402390.2015.1104669

[3] Defence Science and Technology Laboratory. (2017). Competition document: Autonomous last mile resupply. Retrieved February 17, 2019, from https://www.gov.uk/government/publications/accelerator-competition-autonomous-last-mile-supply/accelerator-competition-autonomous-last-mile-resupply

 

Assessment Papers Capacity / Capability Enhancement Emerging Technology Robert Clark United Kingdom

Does Rising Artificial Intelligence Pose a Threat?

Scot A. Terban is a security professional with over 13 years experience specializing in areas such as Ethical Hacking/Pen Testing, Social Engineering Information, Security Auditing, ISO27001, Threat Intelligence Analysis, Steganography Application and Detection.  He tweets at @krypt3ia and his website is https://krypt3ia.wordpress.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Does Rising Artificial Intelligence Pose a Threat?

Date Originally Written:  February 3, 2019.

Date Originally Published:  February 18, 2019. 

Summary:  Artificial Intelligence or A.I. has been a long-standing subject of science fiction that usually ends badly for the human race in some way. From the ‘Terminator’ films to ‘Wargames,’ an A.I. being dangerous is a common theme. The reality though is that A.I. could go either way depending on the circumstances. However, at the present state of A.I. and it’s uses today, it is more of a danger than a boon in it’s use on the battlefield both political and militarily.

Text:  Artificial intelligence (A.I.) has been a staple in science fiction over the years but recently the technology has become a more probable reality[1]. The use of semi-intelligent computer programs and systems have made our lives a bit easier with regard to certain things like turning your lights on in a room with an Alexa or maybe playing some music or answering questions for you. However, other uses for such technologies have already been planned and in some cases implemented within the military and private industry for security oriented and offensive means.

The notion of automated or A.I. systems that could find weaknesses in networks and systems as well as automated A.I.’s that have fire control on certain remotely operated vehicles are on the near horizon. Just as Google and others have made automated self-driving cars that have an A.I. component that make decisions in emergency situations like crash scenarios with pedestrians, the same technologies are already being talked about in warfare. In the case of automated cars with rudimentary A.I., we have already seen deaths and mishaps because the technology is not truly aware and capable of handling every permutation that is put in front of it[2].

Conversely, if one were to hack or program these technologies to disregard safety heuristics a very lethal outcome is possible. This is where we have the potential of A.I. that is not fully aware and able to determine right from wrong leading to the possibility for abuse of these technologies and fears of this happening with devices like Alexa and others[3]. In one recent case a baby was put in danger after a Nest device was hacked through poor passwords and the temp in the room set above 90 degrees. In another instance recently an Internet of Things device was hacked in much the same way and used to scare the inhabitants of the home with an alert that North Korea had launched nuclear missiles on the U.S.

Both of the previous cases cited were low-level attacks on semi dumb devices —  now imagine one of these devices with access to weapons systems that are networked and perhaps has a weakness that could be subverted[4]. In another scenario, such A.I. programs as those discussed in cyber warfare, could also be copied or subverted and unleashed not only by nation-state actors but a smart teen or a group of criminals for their own desires. Such programs are a thing of the near future, but if you want an analogy, you can look at open source hacking tools or platforms like MetaSploit which have automated scripts and are now used by adversaries as well as our own forces.

Hackers and crackers today have already begun using A.I. technologies in their attacks and as the technology becomes more stable and accessible, there will be a move toward whole campaigns being carried out by automated systems attacking targets all over the world[5]. This automation will cause collateral issues at the nation state-level in trying to attribute the actions of such systems as to who may have set them upon the victim. How will attribution work when the system itself doing the attacking is actually self-sufficient and perhaps not under the control of anyone?

Finally, the trope of a true A.I. that goes rogue is not just a trope. It is entirely possible that a program or system that is truly sentient might consider humans an impediment to its own existence and attempt to eradicate us from its access. This of course is a long distant possibility, but, let us leave you with one thought — in the last presidential election and the 2020 election cycle to come, the use of automated and A.I. systems have and will be deployed to game social media and perhaps election systems themselves. This technology is not just a far-flung possibility, rudimentary systems are extant and being used.

The only difference between now and tomorrow is that at the moment, people are pointing these technologies at the problems they want to solve. In the future, the A.I. may be the one choosing the problem in need of solving and this choice may not be in our favor.


Endnotes:

[1] Cummings, M. (2017, January 1). Artificial Intelligence and the Future of Warfare. Retrieved February 2, 2019, from https://www.chathamhouse.org/sites/default/files/publications/research/2017-01-26-artificial-intelligence-future-warfare-cummings-final.pdf

[2] Levin, S., & Wong, J. C. (2018, March 19). Self-driving Uber kills Arizona woman in first fatal crash involving pedestrian. Retrieved February 2, 2019, from https://www.theguardian.com/technology/2018/mar/19/uber-self-driving-car-kills-woman-arizona-tempe

[3] Menn, J. (2018, August 08). New genre of artificial intelligence programs take computer hacking… Retrieved February 2, 2019, from https://www.reuters.com/article/us-cyber-conference-ai/new-genre-of-artificial-intelligence-programs-take-computer-hacking-to-another-level-idUSKBN1KT120

[4] Jowitt, T. (2018, August 08). IBM DeepLocker Turns AI Into Hacking Weapon | Silicon UK Tech News. Retrieved February 1, 2019, from https://www.silicon.co.uk/e-innovation/artificial-intelligence/ibm-deeplocker-ai-hacking-weapon-235783

[5] Dvorsky, G. (2017, September 12). Hackers Have Already Started to Weaponize Artificial Intelligence. Retrieved February 1, 2019, from https://gizmodo.com/hackers-have-already-started-to-weaponize-artificial-in-1797688425

Artificial Intelligence / Machine Learning / Human-Machine Teaming Assessment Papers Emerging Technology Scot A. Terban

Assessing Military Thought in Post-Soviet Russia

Jonathan Hall is a security and political risk analyst focused on Eurasian geopolitics, military affairs, and emerging technologies.  Follow Jonathan on Twitter at _JonathanPHall.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Military Thought in Post-Soviet Russia

Date Originally Written:  January 21, 2019.

Date Originally Published:  February 4, 2019.

Summary:  While the geopolitical landscape of the 21st century is characteristically different than it was during the time of the Union of Soviet Socialist Republics (USSR), Russia’s underlying political interests remain largely unchanged. As such, rather than any abeyance to the previously popular strategies of the USSR, Russia’s activities in the information sphere and on the battlefield are no more than the continuation, and refinement, of Soviet-era tactics and operational concepts. 

Text:  Predominantly following the illegal annexation of Crimea in 2014, the assumption that Russian tactics have drastically changed may be chiefly explained by the growing popularity of the terms “hybrid warfare” and the “Gerasimov Doctrine.” The former, a potentially applicable military concept to modern day examples of war has yet to find an agreed upon definition. Despite lacking agreement, hybrid war is, unfortunately, used as a for label nearly every example of Russian strategy. The latter, however, is neither a real doctrine, nor fully Gerasimov’s idea. The term originates from an article written by Dr. Mark Galeotti[1]. In it, Galeotti provides his commentary on a 2013 piece written in the Military-Industrial Kurier by Russian General Valery Gerasimov, Chief of the General Staff of the Russian Federation. Galeotti’s article included a disclaimer that the term “Gerasimov Doctrine” was merely used for its value as a title, however that did little good as many began to quote the term without reading the article, or likely even knowing where it came from. 

Gerasimov’s article, “The Value of Science in Prediction,” was his response to the then-recent Arab Springs, and how the face of warfare is evolving. Gerasimov’s most widely cited statement, “The very ‘rules of war’ have changed. The role of nonmilitary means of achieving political and strategic goals has grown, and, in many cases, they have exceeded the power of force of weapons in their effectiveness,” has interestingly been used by some to form their conclusion that Russian military thought has undergone a transformation. However, rather than anything new, Gerasimov’s writing – largely building on the work of his predecessor, Nikolai Makarov – repeatedly cites Soviet military strategists such as Aleksandr Svechin who wrote, “Each war represents a partial case, requiring the establishment of its own peculiar logic, and not the application of some sort of model[2].” 

Svechin’s quote provides evidence that he was invariably familiar with the writings of Carl von Clausewitz, who similarly posited that “Every age has its own kind of war, its own limiting conditions, and its own peculiar preconceptions[3].” Taken from On War, written between 1816 and 1830, Russia’s current General Staff not only anchors its strategy in Soviet-era thought – it is founded upon the principles Clausewitz first presented in the early nineteenth century. For analysts and defense planners today, understanding that they are currently facing Soviet adaptations is critical. The notion that history repeats itself is alive and well in the Russian General Staff.  

A perennial component in the Kremlin’s toolbox has been its disinformation campaign. This concept finds its roots in spetspropaganda, or special propaganda. First taught as a subject at the Russian Military Institute of Foreign Languages in 1942, it was removed from the curriculum in the 1990s. Unsurprisingly, it was reinstated by Putin, a former Komitet Gosudarstvennoy Bezopasnosti (KGB) officer, in 2000[4].  

Specific tactics within Russia’s strategy of information warfare are based upon the idea of “reflexive control.” Developed during the Soviet Union, the theory of reflexive control states that, “control can be established through reflexive, unconscious responses from a target group. This group is systematically supplied with (dis)information designed to provoke reactions that are predictable and, to Russia, politically and strategically desirable[5].” Allowing the Kremlin to exploit preconceptions and differences in opinion amongst its enemies, this tactic which was prolific during the Soviet Union is once again being used against Ukraine and North Atlantic Treaty Organization member countries. 

All of these so-called nonmilitary tactics, as the current Russian General Staff defines them, are no more than “active measures” which date back to the 1920s[6]. Once used by Cheka (the Soviet secret police organization), the OGPU (Unified State Political Administration), the NKVD (People’s Commissariat for Internal Affairs), and the KGB during the Soviet Union, the practice is being continued by the Federal Security Service (FSB), Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU), and other government agencies. Founded in Leninist-thinking, these subversive activities may be used within or without the framework of a larger kinetic operation. Detailed by former KGB general Oleg Kalugin, they were designed to “weaken the West,” and, “to drive wedges in the Western community alliances[7].” 

These concepts, alluded to by Gerasimov, more narrowly focus on the non-kinetic components of the Kremlin’s strategy. However, official Russian documents, while echoing similar language, combine them with more traditional military means of executing operational plans. The 2010 Russian Military Doctrine highlighted the importance of integrating nonmilitary resources with military forces. This was further detailed in 2014 to include, “participation of irregular armed force elements,” and, “use of indirect and asymmetric methods of operations[8].

Illustrating this in practice, the best example of Russia’s use of irregular armed forces would be – in post-annexation parlance – its “little green men.” This tactic of sending Russian Spetsnaz without insignia into a foreign country to destabilize its political environment and assume control has been discussed as somewhat of a novel concept. However, going back to December 1979, the Soviet invasion of Afghanistan began with around 700 Spetsnaz, many of them Soviet Muslims, in Afghan uniforms taking Afghanistan President Amin’s palace by storm, along with several key military, media, and government installations[9]. 

With many other useful parallels to draw upon, the idea here is not to deny change has occurred in the nearly three decades since the dissolution of the Soviet Union. Thanks to emerging technologies and progressive military thinking, tactical choice in Post-Soviet Russia has certainly advanced. But in many ways these advancements are no more than superficial – fitting in with the argument that the characteristics of war may change, but its nature may not[10]. 

The ideas Russia has presented in both word and deed surely deserve detailed analysis. That analysis, however, should be conducted with an understanding that the concepts under review are the continuation of Soviet thinking, rather than a departure. Moving forward, the Kremlin will continue to design, perfect, and implement new strategies. In looking to respond, history remains our greatest tool in discerning the practical applications of Russian military thinking. As Gerasimov would likely agree, the theoretical underpinnings of the Soviet Union provide us with a more perceptive lens of inspection than any new model of warfare ever could.


Endnotes:

[1] Galeotti, M. (2014). The “Gerasimov doctrine” and Russian non-linear war. Moscow’s Shadows, 6(7), 2014. https://inmoscowsshadows.wordpress.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/

[2] Gerasimov, V. (2013). Tsennost Nauki V Predvidenii. Military-Industrial Kurier. https://vpk-news.ru/sites/default/files/pdf/VPK_08_476.pdf 

[3] Howard, M., & Paret, P. (1976). On War (Vol. 117), pg. 593. Princeton, NJ: Princeton University Press.

[4] Smoleňová, I. (2016). The Pro-Russian Disinformation Campaign in the Czech Republic and Slovakia. per Concordiamhttps://www.marshallcenter.org/MCPUBLICWEB/mcdocs/files/College/F_Publications/perConcordiam/pC_V7_SpecialEdition_en.pdf 

[5] Snegovaya, M. (2015). “Reflexive control”: Putin’s hybrid warfare in Ukraine is straight out of the Soviet playbook. Business insider.https://www.businessinsider.com/reflexive-control-putins-hybrid-warfare-in-ukraine-is-straight-out-of-the-soviet-playbook-2015-9

[6] Watts, C. (2017). Disinformation: A Primer in Russian Active Measures and Influence Campaigns. Statement prepared for the Senate Select Committee on Intelligence.https://www.intelligence.senate.gov/sites/default/files/documents/os-kalexander-033017.pdf 

[7] Pomerantsev, P., & Weiss, M. (2014). The menace of unreality: How the Kremlin weaponizes information, culture and money (Vol. 14). New York: Institute of Modern Russia.http://www.galerie9.com/blog/the_menace_of_unreality_fin.pdf 

[8] Kofman, M., & Rojansky, M. (2015). A Closer Look at Russia’s’ Hybrid War. Woodrow Wilson International Center for Scholars. https://www.files.ethz.ch/isn/190090/5-kennan%20cable-rojansky%20kofman.pdf 

[9] Popescu, N. (2015). Hybrid tactics: neither new nor only Russian. EUISS Issue Alert, 4. https://www.files.ethz.ch/isn/187819/Alert_4_hybrid_warfare.pdf 

[10] Gray, C. S. (2015). The future of strategy. John Wiley & Sons.

Assessment Papers Jonathan Hall Russia

Assessing the Failure of Minsk II in Ukraine and the Success of the 2008 Ceasefire in Georgia

Sarah Martin is a recent graduate of George Mason University’s School for Conflict Analysis and Resolution, where she wrote her thesis on Chechen foreign fighters in Syria.  She was previously a fellow at NatSecGirlSquad, supporting the organization’s debut conference on November 15, 2018.  She can be found on Twitter @amerikitkatoreo. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title: Assessing the Failure of Minsk II in Ukraine and the “Success” of the 2008 Ceasefire in Georgia

Date Originally Written:  December 16, 2018.

Date Originally Published:  January 21, 2019.

Summary:  In 2019 the Donbass War in Ukraine will enter its fifth year. Over 10,000 people have been killed, 3,000 of them civilians, and one million displaced. Two ceasefire agreements between Moscow and Kyiv have failed, and no new agreements are forthcoming. When compared to the agreement of the 2008 August War between Russia and Georgia, ending the stalemate in Ukraine and determining a victor might be the key to brokering a lasting ceasefire.

Text:  It is easy to find comparisons between the ongoing Donbass War in Ukraine and the 2008 August War between Russia and Georgia. However, despite their similarities, one ended swiftly, in less than a month, while the other continues without even the slightest hint of deescalation in the near future. This paper seeks to assess the endpoints of these conflicts in order to begin a conversation exploring why the conflict in Georgia ended, and why the conflict in Ukraine continues.

The ceasefire agreement between Russia and Georgia did not necessarily bring about the end of hostilities, especially at first. Indeed, even into 2018, Russia has been in violation of this agreement in a number of ways, including inching the South Ossetian border fence deeper into Georgia[1]. However, major operations between Moscow and Tbilisi have ceased, while they have not in Ukraine.

The current conflict in Ukraine involves two main players: the central government of Kyiv, and factions under the self-ascribed Donetsk People’s Republic (DPR) and the Luhansk People’s Republic (LPR). The DPR and LPR are heavily supported by Moscow by way of private mercenary forces such as the Wagner Group[2] and regular soldiers and weapons [3]. Kyiv is supported by the United State (U.S.), the North Atlantic Treaty Organization (NATO) and the European Union (EU). This support is mostly political with some weapons sales and training, though the U.S. has recently begun to sell lethal weapons[4].

Kyiv seeks to maintain internal state integrity and political independence from Russia[5]. The DPR and LPR are keen not to be independent states, but to be united with the Russian Federation, as they see themselves as an ethnolinguistic minority with closer ties to Russia than their Ukrainian-speaking counterparts[6]. Other stakeholders have their own objectives. Western partners wish to maintain international order and to guarantee Ukraine’s national right to self-determination. Russia has always struggled with the concept of an independent Ukraine and is wary of any attempts of “democratic reform,” which it sees as a Western plot pursuing regime change within the Kremlin[7].

There have been two major attempts to bring this conflict to an end: the September 2014 Minsk Protocol and February 2015 Minsk II. In 2015, DPR representatives openly considered the possibility of reintegration with Kyiv[8]. Current Ukrainian President, Petro Poroshenko, ran on a platform of ending the conflict and achieving peace[9]. There was, at one time, at least some political will to see the violence stop. But the Minsk Protocol fell apart practically overnight, and despite early hopes, Minsk II did not stand much longer[10].

The August War in 2008 between Georgia and Russia was equally complex. The war broke out that summer as the endpoint of a series of escalating tensions between Tbilisi, South Ossetia/Tskhinvali Region, Abkhazia, and Moscow. Although the European Council’s fact-finding mission pointed to Georgia as the actor responsible for the start of the war by firing heavy artillery into Tskhinvali, the region’s main town, the report noted Georgia’s actions came in response to pressure and provocation from Moscow[11].

The primary actors in the August War were the Georgian government in Tbilisi and rebellious factions in South Ossetia and Abkhazia, which are two ethnic minority regions of Georgia and have sought independence from Tbilisi since the 1990s. Other stakeholders were Russia, the U.S., and the broader Western alliance. Russia acted unilaterally in South Ossetia and Abkhazia, overtly using their fleets and their soldiers, claiming to be defending peacekeepers and South Ossetians who were, as they claimed, Russian citizens[12].

In the months leading up to the outbreak of violence, Georgia sought EU and NATO membership, and Russia found such steps away from their influence unacceptable[13]. The U.S. and its Western allies supported Georgia’s desires to varying degrees; most agreed that the integration ought to happen, though when exactly it should, was left to some innocuous “future” date[14].

Moscow responded to the situation in Georgia with overwhelming force and had the city of Tbilisi in their sights within days. Having positioned themselves on the border during their quadrennial Kavkaz (Caucasus) military exercises and having a much more sophisticated army and modern weapons, Moscow was ready for combat. Georgia scrambled, underestimating Moscow’s interest in South Ossetia and overestimating Western willingness to intervene[15].

There are many similarities between the 2008 August War in Georgia and the ongoing Donbass War in Ukraine. However, what is strikingly different, and perhaps the most important element, is the swiftness and assuredness by which the conflict came to an end. There was a clear winner. When Nicolas Sarkozy, then acting president of the European Commission, and then-Russian President Dmitry Medvedev agreed to the terms which officially brought the August War to an end, Medvedev said, “the aggressor was punished, suffering huge losses[16].”

While both Ukraine and Russia have much to gain by keeping the conflict ongoing, Ukraine—on its own—does not have the capability to bring the war to an end[17]. Ending the Donbass War is squarely in Moscow’s court, so long as Kyiv bears the brunt of its own defense. Moscow is, after all, in charge of the separatists driving the conflict[18]. The failure of both Minsk agreements is an example of an unstoppable force meeting an immovable object. To both Kyiv and Moscow, the end of this conflict is positioned as a lose / lose situation. Compromise is not an option, but on a long enough timeline, something has to give.

An end of the violence will not be the end of the conflict in the Donbass, as noted in the case of Russo-Georgian relations. However, a cessation of shelling and the laying of mines means that people can return home and the dead can be properly mourned. A ceasefire is not the final step, but the first one. The road to peace in the Donbass is a long and winding journey, but it cannot and will not begin without that first step.


Endnotes:

[1] Oliphant, R. (2015, July 16). EU condemns Russia over ‘creeping annexation’ of Georgia. The Telegraph. Retrieved December 18, 2018, from https://www.telegraph.co.uk/news/worldnews/europe/georgia/11745510/EU-condemns-Russia-over-creeping-annexation-of-Georgia.html

[2] Sukhankin, S. (2018, July 13). ‘Continuing War by Other Means’: The Case of Wagner, Russia’s Premier Private Military Company in the Middle East. The Jamestown Foundation. Retrieved December 18, 2018, from https://jamestown.org/program/continuing-war-by-other-means-the-case-of-wagner-russias-premier-private-military-company-in-the-middle-east/

[3] RFE/RL. Kyiv Says 42,500 Rebels, Russian Soldiers Stationed In East Ukraine. (2015, June 8). Radio Free Europe/Radio Liberty. Retrieved December 18, 2018, from https://www.rferl.org/a/ukraine-russian-troops-fighting-poltorak/27059578.html

[4] Borger, J. (2018, September 01). US ready to boost arms supplies to Ukraine naval and air forces, envoy says. The Guardian. Retrieved December 18, 2018, from https://www.theguardian.com/world/2018/aug/31/ukraine-kurt-volker-us-arms-supplies

[5] International Republican Institute, & The Government of Canada. (2016, January 01). Public Opinion Survey Residents of Ukraine: May 28-June 14, 2016 [PPT]. Washington, DC: International Republican Institute. Retrieved December 18, 2018, from https://www.iri.org/sites/default/files/wysiwyg/2016-07-08_ukraine_poll_shows_skepticism_glimmer_of_hope.pdf

[6] Al Jazeera News. (2017, February 17). ‘Donetsk People’s Republic’ seeks sense of nationhood. Al Jazeera. Retrieved December 18, 2018, from https://www.aljazeera.com/news/2017/02/donetsk-people-republic-seeks-sense-nationhood-170217043602195.html

[7] Ioffe, J. (2018, January/February). What Putin Really Wants. The Atlantic. Retrieved December 18, 2018, from https://www.theatlantic.com/magazine/archive/2018/01/putins-game/546548/

[8] VICE News. (2015). The War May be Over: Russian Roulette (Dispatch 110). Clip. United States: Vice News. https://www.youtube.com/watch?v=zsr1J6F76XY

[9] Webb, I. (2017, February 6). Kiev Is Fueling the War in Eastern Ukraine, Too. Foreign Policy. Retrieved December 18, 2018, from https://foreignpolicy.com/2017/02/06/its-not-just-putin-fueling-war-in-ukraine-trump-donbas/

[10] The Economist. (2016, September 14). What are the Minsk agreements? The Economist. Retrieved December 18, 2018, from https://www.economist.com/the-economist-explains/2016/09/13/what-are-the-minsk-agreements

[11] Council of the European Union. (2009). Independent International Fact-Finding Mission on the Conflict in Georgia: Report (Vol. 1, Publication). Brussels: The European Council. https://www.echr.coe.int/Documents/HUDOC_38263_08_Annexes_ENG.pdf

[12] Allison, R. (2008). Russia resurgent? Moscow’s campaign to ‘coerce Georgia to peace’. International Affairs, 84(6), 1145-1171. doi:10.1111/j.1468-2346.2008.00762.x

[13] Percy, N. (Producer). (2012). Putin, Russia and the West, Part III: War. Documentary movie. United Kingdom: BBC.

[14] Ibid.

[15] Waal, T. D. (2010). The Caucasus: An Introduction. New York, NY: Oxford University Press.

[16] Finn, P. (2008, August 13). Moscow Agrees To Georgia Truce. Washington Post Foreign Service. Retrieved December 19, 2018, from http://www.washingtonpost.com/wp-dyn/content/article/2008/08/12/AR2008081200365.html

[17] Webb, I. “Kiev War.”

[18] Pifer, S. (2017, February 15). Minsk II at two years. Retrieved December 19, 2018, from https://www.brookings.edu/blog/order-from-chaos/2017/02/15/minsk-ii-at-two-years/

Assessment Papers Georgia Russia Sarah Martin Ukraine

An Assessment of North Atlantic Treaty Organization Cyber Strategy and Cyber Challenges

Ali Crawford has an M.A. from the Patterson School of Diplomacy and International Commerce where she focused on diplomacy, intelligence, cyber policy, and cyber warfare.  She tweets at @ali_craw.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of North Atlantic Treaty Organization Cyber Strategy and Cyber Challenges

Date Originally Written:  December 5, 2018.

Date Originally Published:  January 14, 2019.

Summary:  Cyber capabilities are changing the character of warfare.  Nations procure and develop cyber capabilities aimed at committing espionage, subversion, and compromising the integrity of information.  The North Atlantic Treaty Organization has evolved to meet these modern challenges by consistently implementing new policies, creating governing structures, and providing education to member-states.

Text:  In 2002, leaders from various nations met in Prague to discuss security challenges at a North Atlantic Treaty Organization (NATO) summit.  Agenda items included enhancing capabilities to more appropriately respond to terrorism and the proliferation of weapons of mass destruction, to consider the pending memberships of several Eastern European nations, and for the first time in NATO history, a pledge to strengthen cyber defenses.  Since 2002, NATO has updated its cyber policies to more accurately reflect the challenges of a world that is almost exclusively and continuously engaged in hybrid warfare. 

As NATO is a defensive organization, its primary focus is collective defense, crisis management, and cooperative security.  Early cyber policy was devoted exclusively to better network defense, but resources were limited; strategic partnerships had not yet been developed; and structured frameworks for policy applications did not exist.  When Russian Distributed Denial-of-Service (DDoS) attacks temporarily disrupted Estonian banking and business sectors in 2007, the idea of collective defense was brought to fruition.  Later, in 2008, another wave of vigorous and effective Russian DDoS attacks precluded an eventual kinetic military invasion of Georgia.  This onslaught of cyber warfare, arguably the first demonstration of cyber power used in conjunction with military force, prompted NATO to revisit cyber defense planning[1].  Today, several departments are devoted to the strategic and tactical governance of cybersecurity and policy. 

NATO’s North Atlantic Council (NAC) provides high-level political oversight on all policy developments and implementation[2].  Under the NAC rests the Cyber Defence Committee which, although subordinate to the NAC, leads most cyber policy decision-making.  At the tactical level, NATO introduced Cyber Rapid Reaction teams (CRRT) in 2012 which are responsible for cyber defense at all NATO sites[3].  The CRRTs are the first to respond to any cyber attack.  The Cyber Defence Management Board (CDMB), formerly known as the Defence Policy and Planning Committee (Cyber Defence), maintains responsibility for coordinating cyber defense activities among NATO’s civil and military bodies[4].  The CDMB also serves as the most senior advisory board to the NAC.  Additionally, the NATO Consultation, Control, and Command Board serves as the main authority and consultative body regarding all technical aspects and implementation of cyber defense[5]. 

In 2008 at the Bucharest Summit, NATO adopted its first political body of literature concerning cyber defense policy which primarily affirmed member nations’ shared responsibility to develop and defend its networks while adhering to international law[6].  Later, in 2010, the NAC was tasked with developing a more comprehensive cyber defense strategy which eventually led to an updated Policy on Cyber Defense in 2011 to reflect the rapidly evolving threat of cyber attacks[7].  NATO would continue to evolve in the following years.  In 2014, NATO began establishing working partnerships with industry leaders in cybersecurity, the European Union, and the European Defense Agency[8].  When NATO defense leaders met again at the Warsaw Summit in 2016, the Alliance agreed to name cyberspace as a domain of warfare in which NATO’s full spectrum of defensive capabilities do apply[9]. 

Despite major policy developments and resource advancements, NATO still faces several challenges in cyberspace.  Some obstacles are unavoidable and specific to the Internet of Things, which generally refers to a network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data.  First, the problem of misattribution is likely. Attribution is the process of linking a group, nation, or state actor to a specific cyber attack[10].  Actors take unique precautions to remain anonymous in their efforts, which creates ambiguities and headaches for the response teams investigating a particular cyber attack’s origin.  Incorrectly designating a responsible party may cause unnecessary tension or conflict. 

Second, as with any computer system or network, cyber defenses are only as strong as its weakest link.  On average, NATO defends against 500 attempted cyber attacks each month[11].  Ultimately, the top priority is management and security of Alliance-owned security infrastructure.  However, because NATO is a collection of member states with varying cyber capabilities and resources, security is not linear.  As such, each member nation is responsible for the safety and security of their own networks.  NATO does not provide security capabilities or resources for its members, but it does prioritize education, training, wargaming, and information-sharing[12].

To the east of NATO, Russia’s aggressive and tenacious approach to gaining influence in Eastern Europe and beyond has frustrated the Alliance and its strategic partners.  As demonstrated in Estonia and Georgia, Russia’s cyber power is as equally frustrating, as Russia views cyber warfare as a component of a larger information war to control the flow and perception of information and distract, degrade, or confuse opponents[13].  U.S. Army General Curtis Scaparroti sees Russia using cyber capabilities to operate under the legal and policy thresholds that define war. 

A perplexing forethought is the potential invocation of NATO Article 5 after a particularly crippling cyber attack on a member nation.  Article 5 bounds all Alliance members to the collective defense principle, stating that an attack on one member nation is an attack on the Alliance[14].  The invocation of Article 5 has only occurred one time in NATO history following the September 11 terror attacks in the United States[15].  The idea of proportional retaliation often arises in cyber warfare debates.  A retaliatory response from NATO is also complicated by potential misattribution.

Looking ahead, appears that NATO is moving towards an active cyber defense approach.  Active defense is a relatively new strategy that is a set of measures designed to engage, seek out, and proactively combat threats[16].  Active defense does have significant legal implications as it transcends the boundaries between legal operations and “hacking back.”  Regardless, in 2018 NATO leadership agreed upon the creation and implementation of a Cyber Command Centre that would be granted the operational authority to draw upon the cyber capabilities of its members, such as the United States and Great Britain[17].  Cyber Deterrence, as opposed to strictly defense, is attractive because it has relatively low barriers to entry and would allow the Alliance to seek out and neutralize threats or even to counter Russian information warfare campaigns.  The Command Centre is scheduled to be fully operational by 2023, so NATO still has a few years to hammer out specific details concerning the thin line between cyber defense and offense. 

The future of cyber warfare is uncertain and highly unpredictable.  Some experts argue that real cyber war will never happen, like German professor Thomas Rid, while others consider a true act of cyber war will be one that results in the direct loss of human life[18].  Like other nations grappling with cyber policy decision-making, NATO leadership will need to form a consensus on the applicability of Article 5, what precisely constitutes a serious cyber attack, and if the Alliance is willing to engage in offensive cyber operations.  Despite these future considerations, the Alliance has developed a comprehensive cyber strategy that is devoted to maintaining confidentiality, integrity, and accessibility of sensitive information. 


Endnotes:

[1] Smith, David J., Atlantic Council: Russian Cyber Strategy and the War Against Georgia, 17 January 2014, retrived from http://www.atlanticcouncil.org/blogs/natosource/russian-cyber-policy-and-the-war-against-georgia; and White, Sarah P., Modern War Institute: Understanding Cyber Warfare: Lessons From the Russia-Georgia War, 20 March 2018, retrieved from https://mwi.usma.edu/understanding-cyberwarfare-lessons-russia-georgia-war/

[2] North Atlantic Treaty Organization, Cyber defence, 16 July 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[3] North Atlantic Treaty Organization, Cyber defence, 16 July 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[4] Ibid.

[5] Ibid.

[6] Ibid.

[7] North Atlantic Treaty Organization, Cyber defence, 16 July 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[8] Ibid; and NATO Cooperative Cyber Defence Center for Excellence, History, last updated 3 November 2015, https://ccdcoe.org/history.html

[9] North Atlantic Treaty Organization, Cyber defence, 16 July 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[10] Symantec, The Cyber Security Whodunnit: Challenges in Attribution of Targeted Attacks, 3 October 2018, retrieved from https://www.symantec.com/blogs/expert-perspectives/cyber-security-whodunnit-challenges-attribution-targeted-attacks

[11] Soesanto, S., Defense One: In Cyberspace, Governments Don’t Know How to Count, 27 September 2018, retrieved from: https://www.defenseone.com/ideas/2018/09/cyberspace-governments-dont-know-how-count/151629/; and North Atlantic Treaty Organization, Cyber defence, last modified 18 February 2018, retrieved from https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2018_02/20180213_1802-factsheet-cyber-defence-en.pdf

[12] North Atlantic Treaty Organization, Cyber defence, last modified 18 February 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_78170.htm

[13] U.S. Department of Defense, “NATO moves to combant Russian hybrid warfare,” 29 September 2018, retrieved from https://dod.defense.gov/News/Article/Article/1649146/nato-moves-to-combat-russian-hybrid-warfare/

[14] North Atlantic Treaty Organization, Collective defence – article 5, 12 June 2018, retrieved from https://www.nato.int/cps/en/natohq/topics_110496.htm

[15] Ibid.

[16] Davis, D., Symantec: Navigating The Risky Terrain of Active Cyber Defense, 29 May 2018, retrieved from https://www.symantec.com/blogs/expert-perspectives/navigating-risky-terrain-active-cyber-defense

[17] Emmott, R., Reuters: NATO Cyber Command to be fully operational in 2023, 16 October 2018, retrieved from https://www.reuters.com/article/us-nato-cyber/nato-cyber-command-to-be-fully-operational-in-2023-idUSKCN1MQ1Z9

[18] North Atlantic Treaty Organization, “Cyber War Will Not Take Place”: Dr Thomas Rid presents his book at NATO Headquarters,” 7 May 2013, retrieved from https://www.nato.int/cps/en/natolive/news_100906.htm

 

Ali Crawford Assessment Papers Below Established Threshold Activities (BETA) Cyberspace North Atlantic Treaty Organization Policy and Strategy

Assessment of the Future of “Russkiy Mir” in Russia’s Grand Strategy

Gabriela Rosa-Hernández was the U.S.-Russia Relationship Research Intern at the American Security Project.  Rosa-Hernández is a David L. Boren Scholar and a Critical Language Scholarship recipient for Russian Language.  Collectively, she’s resided for nearly two years in post-soviet spaces such as Russia, Latvia, and the Republic of Georgia.  Rosa-Hernández can be found on Twitter @GabrielaIRosa.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Editor’s Note:  All translations were done by the author.

Title:  Assessment of the Future of “Russkiy Mir” in Russia’s Grand Strategy

Date Originally Written:  December 10, 2018.

Date Originally Published:  December 31, 2018.

Summary:  In October 2018, Russian President Vladimir Putin spoke at the 6th World Congress of Compatriots Living Abroad and approved a migration policy.  In 2014, Russia utilized its “Russian World” rhetoric to justify its illegal annexation of Crimea and its support of secessionist groups in the Donbass.  Following Russia’s demographic decline, and its economic issues; it is likely that the “Russian World” narrative will continue and focus on compatriot resettlement.

Text:  “Russian World” is perhaps Russia’s most controversial piece of policy.  While the terms “Compatriots” and “Russian Diaspora” were not new when President Vladimir Putin took office, the first time he officially mentioned the term “Russian World” was in 2001 before the first World Congress of Compatriots Living Abroad[1].  Specifically, Putin stated, “the notion of the Russian World extends far from Russia’s geographical borders and even far from the borders of the Russian ethnicity[2].”  From this moment on, the Russian government erased the boundaries between ethnic Russians and those who identified themselves belonging to the cultural-linguistic-spiritual sphere of the Russian Federation.  “Russian World,” can be best described as the ideological concept guiding the way in which Russia’s responsibility to “compatriots” abroad manifests itself into concrete policy[3].  Overall, “Russian World” is such a versatile piece of policy that it can be observed in Russia’s 2015 National Security Strategy just as it can be seen in Russia’s 2018 “Decree on the Concept of the State Migration Policy.”

On December 31, 2015, the Russian government released its National Security Strategy and the term “compatriot” was mentioned twice therein.  The first mention of “compatriot” was located under the “Russia in the Contemporary World” section[4].  The document directly read that “Russia has shown the ability to defend the rights of compatriots abroad.”  Right after this, the strategy remarked how Russia’s role has increased in solving important world problems.  The strategy posed “defending the rights of compatriots abroad” as an international issue where Russia could bolster its role in the international arena. “Compatriot” was also casually mentioned under the “Culture” section[5]. 

The “Culture” section of the strategy regarded Russian language as not only a tool of interethnic interaction within the Russian Federation but the basis of integration processes in the post-Soviet space.  It remarked that the function of the Russian language as a state language was also a means of meeting the language and cultural requirements of “compatriots” abroad.  Essentially, Russia visualized Russian language as something far more than its state language.  Instead, Russia views the Russian language as the means to interethnic communication in the post-Soviet space, particularly Commonwealth of Independent States (CIS) member states.  The document also mentioned that Russia supported Russian language and cultural programs in CIS member states to further the Eurasian integration process[6].  Overall, Russian language was politicized in the document, and Russia declared its intent to keep Russian language alive in at least CIS member states.  This intent is crucial to understand because Russia considers all those former-Soviet citizens with a linguistic affiliation to the Russian Federation under its compatriot policy. 

In October 2018, nearly three years after the release of Russia’s National Security Strategy, Putin stated in the 6th World Congress of Compatriots Living Abroad, “all together – represent a huge community of Russian-like compatriots, represent one large, huge, Russian world, which has never been exclusively built on only ethnic, national, or religious ground[7].”  Putin further commented that Russian World unites all with a spiritual connection with Russia and all those who consider themselves carriers of Russian language, Russian culture and Russian history[8].  Putin’s words followed the same line as Russia’s national security strategy; a strategy which listed the lowered role of Russian language in the world and the quality of its teaching as a national security threat[9].

Russia effectively visualizes the use of Russian language and culture as a soft power tool to be employed not only in the international arena but the domestic arena as well.  During the same speech, Putin declared that Russia would defend the interests and rights of compatriots by using all the international and bilateral mechanisms available to do so[10].  Putin made this statement after accusing the Baltics and Ukraine of altering historical monuments and Russian language[11].  While Putin’s speech reflected the principles written in Russia’s national security strategy, the speech did not reflect the narrative within the decree he signed and released on the same day on Russia’s state migration policy.

Instead of highlighting the role of the interests of compatriots abroad, the decree focused on facilitating conditions for compatriots to resettle in the Russian Federation.  This decree was a shift from a rhetoric which focused on international presence of foreign citizens who are native carriers of the Russian language.  The shift signaled a change in narrative from an international policy brought down to the domestic level.  Ultimately, the decree stated that the migration influx (2012-2017) into Russia compensated for Russia’s natural population decline before discussing state programs towards compatriots[12].  This present change of emphasis regarding compatriots is likely due to Russia’s demographic decline.  Overall, Russia’s new state migration policy shows how the concept of “Russian World” is adapted to fit the needs of the Russian state in a time of demographic decline. 

In conclusion, the rhetoric of “Russian World” served as justification for Russia’s illegal annexation of Crimea and support for separatists in the Donbass[13].  Because of this, Russia’s “Russian World” is looked upon with suspicion by its neighbors[14].  However, in the latest piece of policy regarding “compatriots,” instead of focusing on “Eurasian integration,” Russia seeks to attract “compatriots” into its territory.  Following Russia’s demographic decline, and its economic issues, it is likely that “Russian World’s” narrative on compatriot resettlement will become stronger.  This narrative will hold more importance over the “defending the rights of compatriots abroad” narrative.  Due to the lack of tangible benefits of “defending the rights of compatriots abroad,” compatriot resettlement is likely to play a larger role in Russia’s future national security strategy. 


Endnotes:

[1] Laurelle, M. (2015, May). The ‘Russian World’: Russia’s Soft Power and Geopolitical Aspirations. Retrieved from http://globalinterests.org/wp-content/uploads/2015/05/FINAL-CGI_Russian-World_Marlene-Laruelle.pdf

[2] Ibid.

[3] Zevelev, I. (2016, August 22). The Russian World in Moscow’s Grand Strategy. Retrieved from https://www.csis.org/analysis/russian-world-moscows-strategy

[4] President of Russia. (2015, December 31). On the National Security Strategy of the Russian Federation. Retrieved from http://static.kremlin.ru/media/events/files/ru/l8iXkR8XLAtxeilX7JK3XXy6Y0AsHD5v.pdf

[5] Ibid.

[6] Ibid.

[7] President of Russia. (2018, October 31). World Congress of Compatriots Living Abroad. Retrieved from http://kremlin.ru/events/president/news/59003

[8] Ibid.

[9] President of Russia. (2015, December 31). On the National Security Strategy of the Russian Federation. Retrieved from http://static.kremlin.ru/media/events/files/ru/l8iXkR8XLAtxeilX7JK3XXy6Y0AsHD5v.pdf

[10] President of Russia. (2018, October 31). World Congress of Compatriots Living Abroad. Retrieved from http://kremlin.ru/events/president/news/59003

[11] Ibid.

[12] President of Russia. (2018, October 21). Decree on the Concept of the State Migration Policy of the Russian Federation for 2019-2025. Retrieved from http://kremlin.ru/events/president/news/58986

[13] Zevelev, I. (2016, August 22). The Russian World in Moscow’s Grand Strategy. Retrieved from https://www.csis.org/analysis/russian-world-moscows-strategy

[14] Ibid.

Assessment Papers Gabriela Rosa-Hernández Policy and Strategy Russia

Assessing the Widening Russian Presence in Africa

Harrison Manlove is a Cadet in the U.S. Army’s Reserve Officer Training Corps at the at the University of Kansas and is currently studying History and Peace and Conflict Studies. Harrison has also written for The Strategy Bridge, where he examined Russia’s strategy in Syria and the Middle East. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Widening Russian Presence in Africa

Date Originally Written:  November 26, 2018.

Date Originally Published:  December 17, 2018.

Summary:  Africa is quickly regaining its past place in world affairs as a proxy battleground. Amidst a potential U.S. military drawdown in Africa, Russia seeks to maintain and expand political and economic influence on the continent through military deployments and arms deals with several states. While Russia may face potential blowback due to a ham-fisted approach, lack of U.S. presence in Africa could enable Russian success.

Text:  The deployment of advisers – military and civilian – and the provision of security assistance to several African states is indicative of a renewed Russian interest on the continent. Russia’s speed of action in this line of effort has caught many observers off-guard, causing the issue to be an under-reported element of Russian foreign policy actions.

Russia’s national security strategy, published at the end of 2015, identifies instability in several regions – including Africa – as a security threat. Ethnic conflict and terrorism are outlined as two key concerns. The strategy places emphasis on “reliable and equal security,” trade partnerships, and the use of diplomacy to preclude conflict. The strategy dictates force as a last resort[1].

Counter-terrorism operations and civil wars dominate the Sub-Saharan region of Africa. Continued volatility has undermined Western influence there and opened opportunities for exploitation. For the Russians, old Soviet allies in Africa – like Angola and Sudan – offer opportunities to provide military equipment, training, and technical assistance. Over the last three years, the Russian government has signed approximately 19 “military cooperation deals” with sub-Saharan states, to include U.S. allies, such as Cameroon, Chad, Nigeria and Niger. Russian cooperation ranges from arms shipments to joint exercises[2]. Resource acquisition is also potential motivating factor for Moscow, as seen in the Central African Republic with its large deposits of gold. Regarding instability, attempts to intervene with marginal force, and the provision of aid packages and security assistance is standard Russian practice. Russian aid programs are growing, however that line of effort is not covered in this assessment.

The Central African Republic (CAR) has seen a major increase in violence since the start of its civil war at the end of 2012. In 2013, an arms embargo against the CAR was put in place by the United Nations (UN) after an outbreak of violence. Outside the capital, Bangui, the rule of law is scant, enforced instead by local Muslim and Christian militias and armed groups. A French military operation, Operation Sangaris, ended in October 2016 after reports of “sexual violence and abuse against civilians” battered the deployment. A UN peacekeeping mission in the CAR has also come under attack by armed groups, losing a total of fourteen peacekeepers thus far[3]. Security in the CAR is generally limited to the capital. In December 2017, Russia was given UN authorization to supply arms to the CAR after repeated requests by CAR President Faustin Archange Touadéra[4]. Some 175 Russian advisers have deployed to supply arms and provide equipment training. Five advisers are Russian military personnel, while most others are civilians working with private contracting firms[5].

The Russian approach in the CAR is destabilizing. Brokering talks between rebel factions and the presence of Russian personnel assisting “prospectors” in mining operations in areas controlled by the primary rebel group in the CAR, the Front Populaire Pour la Renaissance de la Centrafrique (FPRC), is exacerbating an area already under crisis. Recently, FPRC leadership has called for the withdrawal of Russian personnel from the CAR, placing the Russian mission and its objectives – even at the regional level – in danger[6].

Cameroon is a likely area for Russian influence. In February 2018, reports surfaced that Russian military equipment was seized from a ship sailing for Douala, Cameroon. The ship docked at Sfaz, Tunisia due to major mechanical problems. It was searched by customs authorities who found the weapons shipment inside. To be sure, the ship’s track and timeline was followed by a Russian maritime blog, which found the ship’s track unusual for a course to Cameroon[7]. A plan for U.S. Special Forces to exit Cameroon was submitted by United States Marine Corps General Thomas Waldhauser, Commander of U.S. Africa Command, as part of an alignment with the U.S. National Defense Strategy released at the beginning of the year. The strategy moves to a focus on great power competition, rather than counterterrorism. The exit would be continent-wide, affecting several U.S. missions in Africa[8].

Elsewhere on the continent, military to military cooperation is integral to Russia’s relationship with Egypt. Bilateral airborne exercises have been held in both countries since 2015. Recent Russian arms sales and deliveries to Egypt include some 50 MiG- 29 fighter aircraft, 46 Kamov Ka- 52 Alligator attack and reconnaissance helicopters, the Ka-52K model helicopter designed for maritime use, and an advanced model of the S-300 mobile air defense system. In keeping with traditional policy stemming from its colonial history, Egypt has been careful in sidestepping foreign aid dependency. This dependence avoidance is evident in Egyptian purchases of fighter aircraft, ships, and submarines from countries like France, Germany, and South Korea[9].

Libya’s continued instability has offered another arena in which Russian influence can take hold. In March 2017, Reuters reported a possible Russian special operations unit operating near Egypt’s western border with Libya. This presence was denied by Russian officials, however U.S. military sources have posited that Russia has deployed to the region to “strengthen its leverage over whoever ultimately holds power” in Libya’s civil war[10]. Russian support for Khalifa Hiftar, the primary challenger to the Government of National Accord in Libya, seems to indicate a desire to re-forge old overseas Soviet relationships.

In early 2017, members of Russian private military contractor RSB Group were reportedly operating in Libya[11]. Similarly, Wagner – a Russian contracting firm with ties to a Putin associate – has had a reported presence in Syria, supplementing Syrian government forces in ground operations. Reporting on Wagner’s deployments to Syria have shown a high level of security and potential consequences for those members who disclose any information about the firm. The Russian government has denied any presence of contractors in Syria[12]. In August 2018, three Russian journalists were murdered in the Central African Republic under murky circumstances[13]. While investigating the Wagner deployment there, the journalists were gunned down in what has been officially called a robbery. However, Western suspicion surrounds the incident and the story has been called into question, casting even greater light on the proliferation of contractors operating in Russia’s areas of interest[14].

The Russian approach in Africa is indicative of a general trend set in its 2014 intervention in Ukraine: low-visibility, low-cost exploitation of instability to secure political and economic objectives through marginal force deployments and security assistance to areas that once held Soviet influence. The potential decline of a U.S. military presence on the continent could drive further expansion, while access to resources provides a set of economic objectives for Russia to act upon.


Endnotes:

[1] Russian National Security Strategy. 31 Dec. 2015, www.ieee.es/Galerias/fichero/OtrasPublicaciones/Internacional/2016/Russian-National-Security-Strategy-31Dec2015.pdf.

[2] “Factbox: Russian Military Cooperation Deals with African Countries.” Reuters, Thomson Reuters, 17 Oct. 2018, uk.reuters.com/article/uk-africa-russia-factbox/factbox-russian-military-cooperation-deals-with-african-countries-idUKKCN1MR0KZ.

[3] “Global Conflict Tracker.” Council on Foreign Relations, 2018, www.cfr.org/interactives/global-conflict-tracker#!/conflict/violence-in-the-central-african-republic.

[4] “UN Gives Green Light on Russia Arms to C Africa.” News24, 16 Dec. 2017, www.news24.com/Africa/News/un-gives-green-light-on-russia-arms-to-c-africa-20171216.

[5] McGregor, Andrew. “How Russia Is Displacing the French in the Struggle for Influence in the Central African Republic.” The Jamestown Foundation, 15 May 2018, jamestown.org/program/how-russia-is-displacing-the-french-in-the-struggle-for-influence-in-the-central-african-republic/.

[6] Goble, Paul. “Moscow’s Neo-Colonial Enterprise Running Into Difficulties in Central African Republic.” The Jamestown Foundation, 6 Nov. 2018, jamestown.org/program/moscows-neo-colonial-enterprise-running-into-difficulties-in-central-african-republic/.

[7] Voytenko, Mikhail. “Secret Russian Arms Shipment? Cargo Ship with Arms Detained in Tunisia. UPDATE.” Maritime Bulletin, 9 Apr. 2018, maritimebulletin.net/2018/02/16/secret-russian-arms-shipment-cargo-ship-with-arms-detained-in-tunisia/.

[8] Cooper, Helene, and Eric Schmitt. “U.S. Prepares to Reduce Troops and Shed Missions in Africa.” The New York Times, The New York Times, 1 Aug. 2018, http://www.nytimes.com/2018/08/01/world/africa/us-withdraw-troops-africa.html.

[9] McGregor, Andrew. “How Does Russia Fit Into Egypt’s Strategic Plan.” The Jamestown Foundation, 14 Feb. 2018, jamestown.org/program/russia-fit-egypts-strategic-plan/.

[10] Stewart, Phil, et al. “Exclusive: Russia Appears to Deploy Forces in Egypt, Eyes on Libya…” Reuters, Thomson Reuters, 14 Mar. 2017, www.reuters.com/article/us-usa-russia-libya-exclusive-idUSKBN16K2RY.

[11] Tsvetkova, Maria. “Exclusive: Russian Private Security Firm Says It Had Armed Men in…” Reuters, Thomson Reuters, 13 Mar. 2017, www.reuters.com/article/us-russia-libya-contractors-idUSKBN16H2DM.

[12] “Secret Flights and Private Fighters: How Russia Supports Assad in Syria.” Public Radio International, PRI, 6 Apr. 2018, www.pri.org/stories/2018-04-06/secret-flights-and-private-fighters-how-russia-supports-assad-syria.

[13] Plichta, Marcel. “What Murdered Russian Journalists Were Looking For in the Central African Republic.” World Politics Review, 22 Aug. 2018, www.worldpoliticsreview.com/articles/25640/what-murdered-russian-journalists-were-looking-for-in-the-central-african-republic.

[14] Higgins, Andrew, and Ivan Nechepurenko. “In Africa, Mystery Murders Put Spotlight on Kremlin’s Reach.” The New York Times, The New York Times, 7 Aug. 2018, www.nytimes.com/2018/08/07/world/europe/central-african-republic-russia-murder-journalists-africa-mystery-murders-put-spotlight-on-kremlins-reach.html.

Africa Assessment Papers Harrison Manlove Russia

Assessment of North Atlantic Treaty Organisation Forces in the Baltic States: Credible Deterrent or Paper Tiger?

Mr. Callum Moore currently works for Intelligence Fusion, where he operates as an analyst focusing the Baltic States and Finland.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of North Atlantic Treaty Organisation Forces in the Baltic States: Credible Deterrent or Paper Tiger?

Date Originally Written:  November 9, 2018.

Date Originally Published:  December 10, 2018.

Summary:  North Atlantic Treaty Organisation (NATO) forces deployed to the Baltic States are severely unprepared to fight a conventional war with Russia. Their presence in the Baltic States is merely a token gesture of support. The gesture is not only a paper tiger, but exposes the deployed forces to the possible risk of annihilation by Russia. Despite this, there are valid arguments to suggest that a paper tiger is enough to deter hybrid warfare.

Text:  In late 2016 NATO coalition members decided that they would send troops to support the Baltic States. This decision was made in light of the recent invasion of Crimea by Russian Federation troops in 2014 and the Russian invasion of Georgia in 2008. At this time the Baltic States were left in a vulnerable position, being both former members of the Soviet Union and current members of NATO and the European Union. The NATO troops sent to the Baltic States came largely from the United Kingdom, Canada, America, Germany, Denmark and France. The United Kingdom sent a force to Estonia, consisting of 800 British troops with handheld drones, which were accompanied by four Challenger tanks and Warrior armoured fighting vehicles. Both the German and Canadian expeditions consisted of similar numbers and equipment.

The vulnerability of the Baltic States position in 2015 is highlighted by David Blair, a writer for the Telegraph. Mr Blair indicates that Latvian troop numbers consisted of 1,250 troops and three training tanks, Lithuanian forces consisted of 3200 troops and Estonian forces consisted of 5300 troops. Opposing these Baltic forces were 1,201 Russian aircraft, 2,600 tanks and 230,000 troops[1]. It is clear militarily that the combined forces of the Russian Federation far outweigh that of the Baltic States, both in numbers and equipment. Altogether the coalition forces reinforced the Baltic States with 3,200 troops, with an additional 4,000 U.S. troops deployed just south in Poland[2]. These troops pose little threat to the Russian forces.  This lack of threat to Russia is especially true in light of Russian operations in Ukraine, were they almost entirely wiped out the Ukrainian 79th airmobile brigade in the space of a three-minute artillery strike[3]. This situation begs the question to why these NATO countries have chosen to expose some of their most capable troops and equipment, leaving them in a vulnerable position far from their familiar training grounds in Western Europe?

The most evident argument for exposing vulnerable NATO troops to a Russian threat is that these troops are used as a deterrent; it’s a message to the Russian Federation that Western Europe will support its neighbours to the east. If this token force in the Baltic States were to be attacked, the western powers would be compelled to retaliate and that they would likely nationally mobilise to fight. After the invasion of Crimea, it could be suggested that NATO was slow and unsure on how to react to a threat on its border. By sending these troops, it rids any notion that the Western Powers will sit back and allow their borders to be chipped away in order to avoid full-scale conflict. This view can be compared to that of Argentina during the Falklands war; they believed that the British would not sail across the sea in order to fight an expensive war for a small group of islands[4]. Certainly this argument can be justified with conventional warfare rearing its ugly head in recent years. Despite conventional warfare becoming apparent, it has been accompanied by destabilisation tactics.

Acknowledging the conventional threats posed by NATO, the Russian Federation over the past few years has been successful in fighting a new type of hybrid warfare. This warfare employs conventional, political, irregular and cyber warfare and all under a single banner. Hybrid warfare seeks to first destabilise a country or regime before engaging through irregular or conventional fighting. Destabilisation takes many forms from cyber attacks to inciting civil unrest; this is what the world initially saw in Ukraine. During the initial Russian attacks, there was so much initial confusion within the Ukrainian government and the military that an effective response couldn’t be coordinated. The deployment of foreign forces into to the Baltic States helps to mitigate confusion in a crisis. NATO troops would help deter and then stamp out early signs of the hybrid warfare and could be easily trusted by the Baltic States to help organise a response. The main advantage of having foreign NATO forces is that they are organised from outside of the Baltic States. So during a period of confusion or instability within the Baltic States, NATO’s own organisation and loyalty will remain intact. This then allows the Baltic State countries to employ the help of these troops however they wish. Whether it is policing their streets, or moving to secure their borders to stop foreign forces and support causing further internal instability. This is highly advantageous for the Baltic States because a significant proportion of their population is of Russian descent and could therefore be coerced into action by Russia as was seen in Crimea[5]. In a conventional war scenario the forces sent to the Baltic States are weak, but in hybrid warfare their influence is expanded.

An added advantage to the deployment of foreign NATO troops in the Baltic States is the legitimacy it gives to the government. In a time of instability and confusion, the civilian population can become confused with multiple actors rising up in order to gain local control. It would be clear to the local population that NATO troops will ultimately support the legitimate government. This helps to stop the population being coerced through propaganda onto the side of the aggressor in hybrid warfare. NATO troops would ensure that the legitimate government acts correctly and within the confines of law, making it the more desirable faction to follow.

In conclusion, it can be clearly seen that the NATO forces sent to the Baltic States are insufficiently equipped to fight a conventional war and threaten the Russian Federation with attack. Nor is the force much of a conventional deterrence, with its position being far away from sufficient reinforcement from the western countries. In this aspect the force is a paper tiger, although in the face of hybrid warfare, the detachments sent are sufficient for the task at hand. The NATO alliance has successfully acknowledged the latest threat and has acted accordingly.


Endnotes:

[1] By David Blair. (19 Feb 2015). How do we protect the Baltic States? https://www.telegraph.co.uk/news/worldnews/europe/russia/11423416/How-do-we-protect-the-Baltic-States.html

[2] Tom Batchelor. (5 February 2017). The map that shows how many NATO troops are deployed along Russia’s border. https://www.independent.co.uk/news/world/europe/russia-nato-border-forces-map-where-are-they-positioned-a7562391.html

[3] Shawn Woodford. (29 March 2017). The Russian artillery strike that spooked the US Army. http://www.dupuyinstitute.org/blog/2017/03/29/the-russian-artillery-strike-that-spooked-the-u-s-army/

[4] Peter Biles. (28 December 2012). The Falklands War ‘surprised’ Thatcher. https://www.bbc.co.uk/news/uk-20800447

[5] David Blair. (19 Feb 2015). How do we protect the Baltic States? https://www.telegraph.co.uk/news/worldnews/europe/russia/11423416/How-do-we-protect-the-Baltic-States.html

 

Assessment Papers Baltics Callum Moore Estonia Latvia Lithuania North Atlantic Treaty Organization

An Assessment of the 2018 U.S. Department of Defense Cyber Strategy Summary

Doctor No has worked in the Cybersecurity field for more than 15 years.  He has also served in the military.  He has a keen interest in following the latest developments in foreign policy, information security, intelligence, military, space and technology-related issues.  You can follow him on Twitter @DoctorNoFI.  The author wishes to remain anonymous due to the work he is doing.  The author also wishes to thank @LadyRed_6 for help in editing.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:
  An Assessment of the 2018 U.S. Department of Defense Cyber Strategy Summary

Date Originally Written:  November 11, 2018.

Date Originally Published:  December 3, 2018.

Summary:  On September 18, 2018, the U.S. Department of Defense (DoD) released a summary of its new Cyber Strategy.  While the summary indicates that the new document is more aggressive than the 2015 strategy, that is not surprising as President Donald Trump differs significantly from President Barack Obama.  Additionally, many areas of adversary vulnerabilities will likely be taken advantage of based upon this new strategy.

Text:
  The U.S. DoD released a summary of its new Cyber Strategy on September 18, 2018[1].  This 2018 strategy supersedes the 2015 version.  Before looking at what has changed between the 2015 strategy and the new one, it is important to recap what has happened during the 2015-2018 timeframe.  In 2015, President Obama met with China’s Premier Xi Jinping, and one of the issues discussed was China’s aggressive cyber attacks and intelligence gathering targeting the U.S. Government, and similar activities targeting the intellectual property of U.S. companies.  The meeting and the sanctions before that did bear some fruit, as information security company FireEye reported cyber attacks from China against the U.S. decreased after that meeting[2].

Russia on the other hand, has increased cyber operations against the U.S. and other nations.  During 2014 in Ukraine, Russia seized Crimea, participated in military operations in Eastern Ukraine, and also demonstrated its might in cyber capabilities during these conflicts.  Perhaps the most significant cyber capability demonstrated by Russia was the hacking and immobilizing of Ukrainian power grid in December 2015[3].  This event was significant in that it attacked a critical part of another country’s essential infrastructure.

The cyber attack that had the most media coverage likely happened in 2016.  The media was shocked when Russians hacked the U.S. Democratic National Committee[4] and used that data against Presidential candidate and former Secretary of State Hillary Clinton, specifically in social media during the U.S. Presidential election[5].

The U.S. had its own internal cyber-related problems as well.  “Whistleblower” Reality Winner[6] and the criminal negligence of Nghia Hoang Pho[7] have somewhat damaged the National Security Agency’s (NSA) capabilities to conduct cyber operations.  The Nghia Hoang Pho case was probably the most damaging, as it leaked NSA’s Tailored Access Operations attacking tools to adversaries.  During this timeframe the U.S. Government also prohibited the use of Kaspersky Lab’s security products[8] in its computers due to security concerns.

Also worthy of note is that the U.S. administration has changed how it conducts diplomacy and handles military operations.  Some have said during President Obama’s tenure his administration micromanaged military operations[9].  This changed when President Trump came to the White House as he gave the U.S. military more freedom to conduct military operations and intelligence activities.

Taking these events into account, it is not surprising that the new DoD Cyber Strategy is more aggressive in its tone than the previous one.  Its statement to “defend forward to disrupt or halt malicious cyber activity at its source,” is perhaps the most interesting.  Monitoring adversaries is not new in U.S. actions, as the Edward Snowden leaks have demonstrated.  The strategy also names DoD’s main adversaries, mainly China and Russia, which in some fields can be viewed as near-peer adversaries.  The world witnessed a small example of what to expect as part of this new strategy when U.S. Cyber Command warned suspected Russian operatives of upcoming election meddling[10].

Much has been discussed about U.S. reliance on the Internet, but many forget that near-peer adversaries like China and Russia face similar issues.  What China and Russia perhaps fear the most, is the so-called Orange Revolution[11], or Arab Spring-style[12] events that can be inspired by Internet content.  Fear of revolution leads China and Russia to control and monitor much of their population’s access to Internet resources via the Great Firewall of China[13], and Russia’s SORM[14].  Financial and market data, also residing on the Internet, presents a vulnerability to Russia and China.  Much of the energy sector in these countries also operates and monitors their equipment thru Internet-connected resources.  All of these areas provide the U.S. and its allies a perfect place to conduct Computer Network Attack (CNA) and Computer Network Exploitation (CNE) operations, against both state and non-state actors in pursuit of U.S. foreign policy goals.  It is worth noting that Britain, arguably the closest ally to the U.S., is  also investing in Computer Network Operations, with emphasis on CNA and CNE capabilities against Russia’s energy sector for example.  How much the U.S. is actually willing to reveal of its cyber capabilities, is in the future to be seen.

Beyond these changes to the new DoD Cyber Strategy, the rest of the document follows the same paths as the previous one.  The new strategy continues the previous themes of increasing information sharing with allies, improving cybersecurity in critical parts of the homeland, increasing DoD resources, and increasing DoD cooperation with private industry that works with critical U.S. resources.

The new DoD Cyber Strategy is good, provides more maneuver room for the military, and its content will likely be of value to private companies as they think about what cyber security measures they should implement on their own systems.


Endnotes:


[1] U.S. Department of Defense. (2018). Summary of the Department of Defense Cyber Strategy. Retrieved from https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF

[2] Fireeye. (2016, June). REDLINE DRAWN: CHINA RECALCULATES ITS USE OF CYBER ESPIONAGE. Retrieved from https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-china-espionage.pdf

[3] Zetter, K. (2017, June 03). Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid. Retrieved from https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/

[4] Lipton, E., Sanger, D. E., & Shane, S. (2016, December 13). The Perfect Weapon: How Russian Cyberpower Invaded the U.S. Retrieved from https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html

[5] Office of the Director of National Intelligence. (2017, January 6). Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution. Retrieved from https://www.dni.gov/files/documents/ICA_2017_01.pdf

[6] Philipps, D. (2018, August 23). Reality Winner, Former N.S.A. Translator, Gets More Than 5 Years in Leak of Russian Hacking Report. Retrieved from https://www.nytimes.com/2018/08/23/us/reality-winner-nsa-sentence.html

[7] Cimpanu, C. (2018, October 01). Ex-NSA employee gets 5.5 years in prison for taking home classified info. Retrieved from https://www.zdnet.com/article/ex-nsa-employee-gets-5-5-years-in-prison-for-taking-home-classified-info/

[8] Volz, D. (2017, December 12). Trump signs into law U.S. government ban on Kaspersky Lab software. Retrieved from https://www.reuters.com/article/us-usa-cyber-kaspersky/trump-signs-into-law-u-s-government-ban-on-kaspersky-lab-software-idUSKBN1E62V4

[9] Altman, G. R., & III, L. S. (2017, August 08). The Obama era is over. Here’s how the military rates his legacy. Retrieved from https://www.militarytimes.com/news/2017/01/08/the-obama-era-is-over-here-s-how-the-military-rates-his-legacy/

[10] Barnes, J. E. (2018, October 23). U.S. Begins First Cyberoperation Against Russia Aimed at Protecting Elections. Retrieved from https://www.nytimes.com/2018/10/23/us/politics/russian-hacking-usa-cyber-command.html

[11] Zasenko, O. E., & Kryzhanivsky, S. A. (2018, October 31). Ukraine. Retrieved November 1, 2018, from https://www.britannica.com/place/Ukraine/The-Orange-Revolution-and-the-Yushchenko-presidency#ref986649

[12] History Channel Editors. (2018, January 10). Arab Spring. Retrieved November 1, 2018, from https://www.history.com/topics/middle-east/arab-spring

[13] Chew, W. C. (2018, May 01). How It Works: Great Firewall of China – Wei Chun Chew – Medium. Retrieved November 1, 2018, from https://medium.com/@chewweichun/how-it-works-great-firewall-of-china-c0ef16454475

[14] Lewis, J. A. (2018, October 17). Reference Note on Russian Communications Surveillance. Retrieved November 1, 2018, from https://www.csis.org/analysis/reference-note-russian-communications-surveillance

Assessment Papers Cyberspace Doctor No Policy and Strategy

An Assessment of U.S. Navy Admiral William F. “Bull” Halsey’s Options at Leyte Gulf

Jon Klug is a U.S. Army Colonel and PhD Candidate in Military and Naval History at the University of New Brunswick.  He taught at the U.S. Air Force Academy and at the U.S. Naval Academy, and he holds degrees from the U.S. Military Academy, Louisiana State University, and the U.S. Army’s School of Advanced Military Studies.  In his next assignment, Jon will serve as a U.S. Army War College Professor.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title: An Assessment of U.S. Navy Admiral William F. “Bull” Halsey’s Options at Leyte Gulf

Date Originally Written:  October 21, 2018.

Date Originally Published:  November 19, 2018.

Summary:  On the night of 24/25 October 1944 during the Battle of Leyte Gulf U.S. Navy Admiral William “Bull” Halsey addressed competing priorities by attacking the Imperial Japanese Navy (IJN) while maintaining a significant surface force to protect the landings at Leyte Island. Halsey’s decision was influenced by the Battle of the Philippine Sea, Halsey’s understanding his operational advantage, and his aggressive spirit[1].

Text:  During the Battle of Leyte Gulf, U.S. Navy Admiral William “Bull” Halsey’s Third Fleet inflicted heavy damage on the most powerful Japanese surface group in the Sibuyan Sea, forcing IJN Admiral Kurita Takeo to retreat to the west. At roughly 5:00pm Halsey received work from search aircraft that Kurita had turned his forces around and they were once again heading east. In response to this, Halsey maneuvered Third fleet as a whole to attack Kurita’s forces[2].  Before assessing Halsey’s decision-making, some background information is needed.

First, prior to the Battle of Leyte Gulf many U.S. naval officers criticized Admiral Raymond Spruance’s decision-making during the Battle of the Philippine Sea (19-20 June, 1944) because several of the Japanese aircraft carriers escaped destruction. These officers felt that Spruance was too cautious and too focused on protecting the amphibious forces. At the time, not knowing the depths of the Japanese difficulty in replacing aircrews, many U.S. naval officers worried that the Japanese would just replenish the carriers with new aircraft and new aircrews. Halsey certainly knew of these criticisms of Spruance, and he wanted to crush the Japanese aircraft carriers once and for all[3].

In addition to the criticisms of Spruance, Halsey also knew that few Japanese aircraft had reacted to the previous U.S. carrier raids, so he may have suspected that the Japanese husbanded carrier-based and land-based aircraft for the decisive fleet action. Furthermore, Halsey knew the Japanese had used a shuttle-bombing attack against Spruance’s forces during the Marianas Campaign in mid-June 1944. The Japanese had launched planes from aircraft carriers that bombed American naval forces in route to airfields on Saipan, from which they rearmed and then attacked the American forces in route back to the aircraft carriers[4]. Although this tactic failed in the Marianas, their use of shuttle-bombing demonstrated that the Japanese were still a dangerous and creative opponent. This tactic too may have been on his mind when Halsey maneuvered Third fleet as a whole to attack Kurita’s forces.  

Historians often neglect the impact of where Halsey positioned himself with respect to his forces and the Japanese forces in their discussion of the Battle of Leyte Gulf: in other words, where was his flagship? As Halsey hailed from New Jersey, he made the new fast battleship USS New Jersey his flagship[5]. This matters. New Jersey as well as the Iowa, two more battleships, six cruisers, and fourteen destroyers made up Task Force 34 (TF 34)[6]. These battleships and their anti-aircraft weapons would be important if Japanese aircraft attacked Halsey’s three aircraft carrier groups, which were Halsey’s primary concern. If Halsey had broken out TF 34, including the New Jersey, to protect the landings at the Island of Leyte, he would have undoubtedly wanted to move to another flagship, as the new flagship would have been part of the force attacking IJN Vice Admiral Ozawa Jisaburo’s carriers. Halsey would have wanted to be close to the decisive battle. 

The Battle of Surigao Strait is the final aspect in any assessment of Halsey’s decision-making. After Halsey had made his actual decision, which was to take all of Third Fleet to destroy the Japanese carriers, U.S. Navy Vice Admiral Thomas Kinkaid sent U.S. Navy Rear Admiral Jesse Oldendorf and his Bombardment and Fire Support group to defend the Surigao Strait.  This force compromised the majority of Kinkaid’s surface combat power, which included several of the refurbished battleships from Pearl Harbor. Oldendorf’s enemy counterpart was IJN Vice Admiral Nishimura Shoji who commanded a Japanese surface group.  Oldendorf prepared a brilliant defense with a textbook example of “capping the T” that destroyed Nishimura’s force on the night of 24/25 October[7]. Thus, Halsey went north, Kinkaid’s heavy surface ships went south, and together they left the middle open for Kurita who had again turned east.

Sean Connery as Admiral Ramius in the movie Hunt for Red October was the author’s inspiration behind selecting this historical situation for analysis. Connery’s distinctive delivery helped create a classic quote when Ramius evaluated Jack Ryan’s work on Admiral Halsey at Leyte Gulf, “I know this book. Your conclusions were all wrong, Ryan. Halsey acted stupidly[8].” Did he? 

Using historical reenactment as a method one must consider the historical facts and what we can surmise about Halsey. More specifically, what did Halsey know of the strategic, operational, and tactical context, and what was his state of mind when he needed to decide on an option? He chose to attack the Japanese aircraft carriers with all of Third Fleet (Option #1 from the Options Paper), and in his report to Nimitz on 25 October, 1944, the day after the Battle of Leyte Gulf, Halsey wrote:

“To statically guard SAN BERNARDINO STRAITS until enemy surface and carrier air attacks could be coordinated would have been childish to three carrier groups were concentrated during the night and started north for a surprise dawn attack on the enemy carrier fleet. I considered that the enemy force in SIBUYAN SEA had been so badly damaged that they constituted no serious threat to Kinkaid and that estimate has been borne out by the events of the 25th off SURIGAO[9].”

This quote provides insight into what Halsey was thinking and his nature – he believed there was no need for a more cautious option. However, a more careful review shows that Halsey was very lucky that Kurita decided to withdraw. If he had not, many more U.S. lives would certainly have been lost as the Yamato and the other Japanese heavy surface vessels fought to the death in and among Kinkaid’s amphibious forces. This fight may have been like a bull fight in a ring that is too small – although the matador and his assistants are assured of ultimate victory, the bull will exact a horrible price before it expires. Given his knowledge of the situation at the time, Halsey could have left TF 34 (Option #2 from the Options Paper) with minimal risk, as the number of U.S. carriers, aircraft, and air crews handled properly should have been sufficient to destroy the remaining IJN carriers.

Protecting the landing at the Island of Leyte as Halsey’s primary focus (Option #3 from the Options Paper), goes against goes against the grain of aggressive U.S. military and U.S. Navy culture, but, Halsey had a huge advantage and knew it, just like Spruance did months before. Any escaping IJN forces would appear again at the next major operation.  There was no way for Halsey to see this far ahead, but Spruance’s decision making in the Battle of the Philippine Sea is in line with Halsey’s option to keep Third Fleet concentrated in supporting distance of the Leyte landings (Option #3 from the Options Paper). Taking page from another the movie, in this case the 1998 poker movie Rounders[10], if you have the chip lead, all you have to do is lean on them, and that was all Spruance and Halsey had to do in late 1944 and early 1945: lean on the IJN until it collapsed. Historical reenactment demonstrates that Ramius’s opinion is correct in the sense that the Japanese suckered Halsey into going “all in” and only Kurita’s mistake in turning away from the Leyte Gulf landings prevented what would have been at least a severe mauling of U.S. forces.


Endnotes:

[1] This assessment paper uses historical reenactment as its method to reconstruct historical events and senior leader’s thought processes and options, augmenting historical facts by surmising when necessary.  More information is available here: Jon Klug, Options at the Battle of Leyte Gulf, November 12, 2018,  https://divergentoptions.org/2018/11/12/options-at-the-battle-of-leyte-gulf/

[2] Samuel Eliot Morison, Leyte, June 1944-January 1945, Vol. 12 of History of United States Naval Operations in World War II (Annapolis, MD: Naval Institute Press, 1953), 192-193; Ronald H. Spector, Eagle against the Sun: The American War with Japan (New York, NY: Vintage, 1985), 431-432; and Craig L. Symonds, The Naval Institute Historical Atlas of the U.S. Navy (Annapolis, MD: Naval Institute Press, 1995), 180-181.

[3] Morison, 58-59; and Spector, 433.

[4] Spector, 307; Symonds, 168 and 169; and Samuel Eliot Morison, New Guinea and the Marianas, March 1944-August 1944, Vol. 8 of History of United States Naval Operations in World War II (Annapolis, MD: Naval Institute Press, 1953), 233 and 248-249.

[5] Merrill, 131; Spector, 428.

[6] Symonds, 180.

[7] Symonds, 180; Morison, 86-241; Merrill, 160-163.

[8] The Hunt for Red October, directed by John McTiernan, Paramount Pictures, 1990.  Symonds, 180; Morison, 86-241; Merrill, 160-163.

[9] Chester W. Nimitz, Command Summary of Fleet Admiral Chester W. Nimitz, Volume 5 (Newport, RI: United States Naval War College, 2013), 564. The quotation is an excerpt from Halsey’s reports to Nimitz.

[10] Rounders, directed by John Dahl, Miramax Films, 1998.

Assessment Papers Japan Jon Klug United States

Assessing Turkey’s Future Role in the Middle East

Nicholas Morgan is an M.A student studying Russian and Post-Soviet Politics at University College London.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Turkey’s Future Role in the Middle East

Date Originally Written:  October 2, 2018.

Date Originally Published:  November 5, 2018.

Summary:  As a result of its unilateral foreign policy choices as well as a lingering currency crisis at home, Turkey will be forced to re-evaluate many of its present policies in relation to the Middle East. With ongoing threats of greater violence on its borders, increasing diplomatic isolation and economic decline, Turkey’s aspirations for greater regional influence are seriously reduced and it is likely that its position is to decline further because mounting problems at home and abroad.

Text:  Turkey’s challenged position within the Middle East is a result of regional dynamics that have de-stabilized its neighbors, whether it be from their own internal turmoil or geopolitical intrigues by larger powers. At the dawn of the Arab Spring, Turkish leaders saw it as an opportunity to assume a leadership position amidst the ashes of political upheaval and was upheld as a model by others. However, Turkish ventures into issues such as the Syrian Civil War and the blockade of Qatar have cost it significant political capital among its neighbors. An ongoing currency crisis, domestic political changes and fighting on its borders have only served to further weaken Turkey’s position in the Middle East.

The maelstrom that is Syria’s civil war can be considered the harbinger of many of Turkey’s present woes. The spillover effects from the war threatened to escalate as Syrian President Bashar al-Assad has moved towards an offensive against Idlib province along Turkey’s southern border. Such a move would be nearly catastrophic for Turkish interests given its holdings in northern Syria, and the potential flood of refugees across its borders, when it already is the largest host of Syrians fleeing the war[1]. In addition to refugees, jihadist fighters targeted by Assad would likely retreat over the Turkish border or into holdings in Syria, raising the specter of violence there.

Caught in the spotlight of these circumstances are Turkey’s alliance with Russia. Turkish President Recep Tayyip Erdogan has invested significantly into his relationship with Russian President Vladimir Putin, frequently meeting with him to secure Russian concessions to Turkish concerns in Syria. The two have met several times in recent months to discuss Idlib, and it appears to have borne fruit as Russia recently delayed any offensive into the province while Turkey tries to disarm or remove jihadist fighters there[2]. However, Russia did not commit to a total halt of any offensive on Idlib, just to postpone one. Moscow is acutely aware of Turkey’s vulnerability in the event of an offensive and that Turkey will be unlikely to convince jihadist hardliners to abide by any ceasefire[3]. Ultimately, an attack on Idlib will come regardless given Assad’s desire to reunify his nation by force and as the past has shown, Russia will commit to assisting that goal. Neither has any desire to see a clash between their forces in the province, but Russia is more than aware of its leverage when an offensive is launched given the spillover risks to Turkey itself and the refusal of jihadist groups to abide by the ceasefire.

Another danger presented by any offensive on Idlib is the effect it would have on Turkey’s conflict with Kurdish militias it considers terrorist groups. Presently, with the looming threat of fighting Assad over Idlib, Turkey’s stance is precarious. Worried about a U.S withdrawal and the status of the lands they conquered, the Kurds have hedged their situation by opening negotiations with Damascus and Moscow[4]. If Turkey is seen as retreating under threat of confrontation with Syria, it could embolden the Kurds to seek deeper ties with the regime. Given Assad’s desire for restoring his rule over all Syria and the Kurds’ desire for recognition of their interests, an attack would call into question Turkey’s control over Afrin and other holdings. At that point, Turkey would be stuck in the unenviable position of being dragged deeper into the war or being made to surrender Kurdish lands it seized in recent years. This would defeat all of Ankara’s strategic objectives in engaging in Syria.

Beyond Syria, Turkey’s relationships with the other Middle Eastern powers are at a low point that shows little sign of improving. Its only ally within the region is Qatar because of Erdogan’s decision to back Doha in its dispute with other Gulf monarchies last year. The other Arab states allied to Saudi Arabia view Turkey with enmity, with the Saudi crown prince even declaring the Turks as part of a triangle of evil because of its support to Qatar and its position in the Syrian war[5]. Even Israel, who Turkey had just begun reproaching several years ago after a long period of tension, has found itself more aligned with the Arabs than Ankara. This alignment was evident in the Arab denunciation of Ankara for insisting the Arab League was hesitant to support the Palestinians, a cause Erdogan personally seeks to champion[6]. Given that Arab officials have gone to the point of warning Israel about excess Turkish influence in East Jerusalem, it is safe to suggest whatever leadership position Turkey aspires to in the region will remain a pipe dream[7].

Finally, considereing the fragile state of the Turkish economy in light of mounting foreign debt, high inflation and American sanctions, the country may soon be forced to focus on preventing a deeper recession than on foreign intrigues. The government’s response so far has not significantly halted either the currency’s decline nor has it halted the growth of inflation. Already, plans involve new austerity measures and support to larger institutions in restructuring their debt[8]. All the while, smaller businesses are bucking under increased costs from the lira’s weakness and consumers are beginning to feel the sting of rising inflation[9]. With the specter of renewed migration as a result of an attack on Idlib in Syria, Turkey’s domestic politics risk further unraveling. Between rising prices and the risk of unemployment as well as a reluctance to take in more refugees, Erdogan and his Justice and Development Party (AKP) may find their political position at greater risk in future elections[10].

Given its increasingly constrained position, Turkey is unlikely to be able to exert any greater influence over the wider Middle East. Facing security risks relating to the Syrian Civil War, diplomatic isolation from its decision to back Qatar and alienate the United States, and economic decline at home, Turkey will be forced to retreat from many of its policies across the region. Otherwise, Ankara’s own stability may be called into question, a scenario that all but ensures a further diminished posture and an end to any aspirations of leadership.


Endnotes:

[1] Schelin, Lisa. UN Official: Buffer Zone in Syria’s Idlib Province Averts War for Now. VOA. https://www.voanews.com/a/un-official-buffer-zone-syria-idlib-averts-war-for-now/4580255.html (September 20, 2018)

[2] DW. Russia, Turkey agree to create demilitarized zone in Syria’s Idlib. DW. https://www.dw.com/en/russia-turkey-agree-to-create-demilitarized-zone-around-syrias-idlib/a-45530727 (September 17, 2018)

[3] Decina, Alexander. ANALYSIS: How Security and Diplomacy Intersect in Russia and Turkey’s Idlib Deal. WANA Institute. http://wanainstitute.org/sites/default/files/publications/Publication_Idlib_English.pdf (October 2, 2018)

[4] Tastekin, Fehim. As conditions shift in Syria, Kurds open to talks with Damascus. al-Monitor.https://www.al-monitor.com/pulse/originals/2018/06/turkey-syria-what-pushes-kurds-deal-with-regime.html (June 21, 2018)

[5] Evans, Dominic. Saudi Prince Says Turkey part of ‘Triangle of evil’-Egyptian Media. https://www.reuters.com/article/us-saudi-turkey/saudi-prince-says-turkey-part-of-triangle-of-evil-egyptian-media-idUSKCN1GJ1WW (March 7, 2018)

[6] Sawsan, Abu Hussein. Arab League Denounces Turkish Statements on Relocating U.S Embassy to Jerusalem. Asharq al-Awsat. https://aawsat.com/english/home/article/1266991/arab-league-denounces-turkish-statements-relocating-us-embassy-jerusalem (May 13, 2018)

[7] Tibon, Amir & Kubovich, Yaniv. Jordan, Saudis and Palestineans warn Israel: Erdogan operating in East Jersusalem under your nose. Haaretz. (July 1, 2018)

[8] Albayrak, Ozlem. In Turkey, New Economic Plan Comes up Short. Asia Times. http://www.atimes.com/article/in-turkey-new-economic-plan-comes-up-short/ (September 21, 2018)

[9] Pitel, Laura & Guler, Funja. Turkey’s shopping centres at sharp end of currency crisis. Financial Times. https://www.ft.com/content/90479ce0-bb64-11e8-8274-55b72926558f (September 19, 2018)

[10[ Brandt, Jessica & Kirsici, Kemal. Turkey’s economic woes could spell trouble for Syrian refugees. Axios. https://www.axios.com/turkeys-economic-woes-could-spell-trouble-for-syrian-refugees-d1eaae2e-fcd3-45ff-a1b1-a26567115e8b.html (August 28, 2018)

Assessment Papers Middle East Nicholas Morgan Turkey

Assessment of Current Efforts to Fight the Islamic State

Ido Levy has a BA in government specializing in global affairs and counter-terrorism from the Interdisciplinary Center Herzliya in Herzliya, Israel.  He is currently pursuing a Master in Public Policy at Georgetown University.  He has researched Middle Eastern Affairs at the Institute for National Security Studies and radicalization at the International Institute for Counter-Terrorism, where he has publications on the subject. He is an editor at Georgetown Public Policy Review and has written op-eds for Jerusalem Post, The Forward, and Times of Israel. He can be found on Twitter @IdoLevy5.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Current Efforts to Fight the Islamic State

Date Originally Written:  September 15, 2018.

Date Originally Published:  October 22, 2018.

Summary:  International and regional forces have all but deprived the Islamic State (IS) of its territory, yet its apocalyptic ideology allows it to continue fighting despite these losses. IS’s goal to prepare the world for the end times does not require territory and will serve as a justification for its surviving members to maintain insurgencies in the Middle East and elsewhere. 

Text:  As of mid-2018, IS has lost most of the territory it had conquered four years ago. At its height, IS controlled a territory about the size of the United Kingdom made up of areas of Iraq and Syria, including Iraq’s second-largest city Mosul[1]. As of April 2018, IS maintains small enclaves in southern and eastern Syria[2]. IS continues to carry out sporadic attacks, using borderlands, mountains, and deserts as havens. Syrian, Iraqi, and Russian military forces, Kurdish militias, Shi’a militias, and forces of a U.S.-led international coalition are now continuing the fight to defeat IS permanently. 

In many of its former territories, IS has transitioned to an insurgent campaign. Over the past year, IS has conducted many attacks in northern Iraq, as well as Baghdad and Mosul[3]. The Iraqi military, together with predominantly Shi’a militias collectively called the Popular Mobilization Units, has responded by launching several operations in northern Iraq and training elite forces to guard the border with Syria[4]. Iraqi forces have made incursions into Syria to strike IS targets[5].

A mostly Kurdish militia called the Syrian Democratic Forces (SDF) is leading the fight against IS’s enclaves in eastern Syria. U.S. and French special operations are supporting SDF efforts while Russian forces carry out their own attacks against IS. Another terrorist organization, an al-Qaeda offshoot called Hayat Tahrir al-Sham, is also fighting IS in Syria. At the same time, IS’s former capital, Raqqa, has seen an upsurge in attacks by IS[6].

In sum, although IS has begun employing insurgent tactics in its former territories, anti-IS forces have almost defeated the “territorial caliphate[7].” One authority on IS, Graeme Wood, has claimed that IS “requires territory to remain legitimate[8].” Indeed, as William McCants has noted, many did join IS to fulfill the reestablishment of the caliphate, the Islamic empire governed by sharia, or Islamic law[9]. Through this lens, it is only a matter of time until IS loses all of its territory and disintegrates. 

Despite the collapse of the territorial caliphate, the aspirational caliphate is still alive and well. In their expert accounts of IS, both McCants and Wood note IS has differentiated and perpetuated itself within the jihadist movement through its intense awareness of an imminent apocalypse. Al-Qaeda, another organization seeking the restoration of the caliphate, scoffed at apocalyptic notions, maintaining that the gradual buildup of an Islamic army and embedding of jihadist agents around the globe toward slowly reestablishing the caliphate was the paramount endeavor. The founders of IS, convinced of the nearness of Judgement Day, contended that there was no time for gradualism, that rectitude demanded swift and bold action in the present (this also serves as justification for IS’s particularly brutal tactics). For IS, the caliphate became the bridge between the present and the end times, a place where “true” Muslims could live righteous lives free of corrupt un-Islamic influences in the present. At the same time, these soldiers of Islam could work to expand the empire, inspiring greater numbers of true Muslims and petrifying nonbelievers. This forceful division of the world between the righteous and the evil could prepare the world for Allah’s judgement.

IS’s vision suggests it does not need territory to remain viable. Ori Goldberg, a scholar who researches Islamist ideologies, notes that the pursuit of an Islamic empire “in its own right” is “particularly difficult” with regard to IS. He claims that IS rather seeks the “hollowing out” of the world, or to cause people to be so terrified that they abandon their “convictions” and live in fear[10]. In essence, while sowing fear among the nonbelievers is one half of IS’s creed, the other is to cement the believers’ righteousness. This two-pronged endeavor does not necessitate holding territory, though territory can help advance it. 

In practice, this view entails that IS can continue to function ideologically and materially in the absence of territory. Those IS members who believe in the group’s apocalyptic creed will fight to the last. Those who emphasize the group’s territoriality may second-guess their participation, though might also believe they can retake their lost territories. Of course, there are many other reasons people joined IS – attraction to violence, grievances against a home country, excitement, money. However, the apocalyptic core survives with or without territory and will serve as motivation to carry on insurgencies in Iraq, Syria, and elsewhere. 

Overall, the ground war against IS is advancing steadily toward completion while IS insurgencies are gaining momentum in former IS territories. These insurgencies will hinder efforts to rebuild Iraq and Syria while straining their security forces and budgets. IS’s apocalyptic vision will serve as the basis for insurgent morale. 


Endnotes:

[1] Johnston, I. (2014, September 3). The rise of Isis: Terror group now controls an area the size of Britain, expert claims. Retrieved September 20, 2018, from https://www.independent.co.uk/news/world/middle-east/the-rise-of-isis-terror-group-now-controls-an-area-the-size-of-britain-expert-claims-9710198.html

[2] McGurk, B. (2018, May 10). Remarks at Herzliya Conference. Retrieved September 20, 2018, from https://www.state.gov/s/seci/2018/282016.htm#Map

[3] Sly, L., &, Salim, M. (2018, July 17). ISIS is making a comeback in Iraq just months after Baghdad declared victory. Retrieved September 20, 2018, from https://www.washingtonpost.com/world/isis-is-making-a-comeback-in-iraq-less-than-a-year-after-baghdad-declared-victory/2018/07/17/9aac54a6-892c-11e8-9d59-dccc2c0cabcf_story.html

[4] Schmitt, E. (2018, May 30). Battle to stamp out ISIS in Syria gains new momentum, but threats remain. Retrieved September 20, 2018, from https://www.nytimes.com/2018/05/30/world/middleeast/isis-syria-battle-kurds-united-states.html

[5] Reuters (2018, June 23). Iraq says it bombed a meeting of Islamic State leaders in Syria. Retrieved September 20, 2018, from https://www.nytimes.com/2018/06/23/world/middleeast/iraq-syria-isis.html

[6] Sengupta, K. (2018, July 3). Amid a fractured political and military landscape, Isis are quietly regrouping in Syria. Retrieved September 20, 2018, from https://www.independent.co.uk/news/world/middle-east/isis-syria-regrouping-islamic-state-assad-a8429446.html

[7] See McGurk.

[8] Wood, G. (2015, March). What ISIS Really Wants. Retrieved September 20, 2018, from https://www.theatlantic.com/magazine/archive/2015/03/what-isis-really-wants/384980/

[9] McCants, W. (2015). The ISIS apocalypse: The history, strategy, and doomsday vision of the Islamic State. New York: St. Martin’s Press.

[10] Goldberg, O. (2017). Faith and politics in Iran, Israel, and the Islamic State: Theologies of the real. Cambridge: Cambridge University Press.

Assessment Papers Ido Levy Islamic State Variants Violent Extremism

An Assessment of the Iranian Ballistic Missile Arsenal and Regional Preparedness

Miguel Miranda is the founder of 21st Century Asian Arms Race.  He frequently writes about modern weapons and the different conflicts being fought across the world today.  He also runs the Twitter account @21aar_show to scrutinize arms fairs and military/security conferences.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Iranian Ballistic Missile Arsenal and Regional Preparedness

Date Originally Written:  September 17, 2018.

Date Originally Published:  October 8, 2018.

Summary:  As battle lines are drawn across the Middle East, the U.S. is sinking deeper into a protracted struggle with the Islamic Republic of Iran.  But any plans to confront the neighbourhood’s penultimate rogue actor don’t acknowledge its single greatest capability—an enormous ballistic missile stockpile that can strike the capital cities and military bases of its enemies.

Text:  In August 2018, Iran’s defence ministry unveiled two new weapons.  One was a long-range air-to-air missile called the Fakour[1].  The other is the latest addition to the Fateh-series of short-range tactical ballistic missiles called the “Fateh Mobin[2].”

Then in September 2018, a barrage of Fateh-110B missiles launched from northwestern Iran struck a target 200 kilometres away in Iraqi Kurdistan[3].  Although condemned by press statements, the Iranian Revolutionary Guard Corps’ (IRGC) attack on a Kurdish militant base had zero repercussions from a docile Iraq.  The Gulf Cooperation Countries (GCC) countries struggling to defeat the Houthis in Yemen are in the same pickle.  Try as they might, continuous Iranian support for the Houthis means regular launches of guided and unguided munitions aimed at Saudi Arabia and the United Arab Emirates (UAE). 

Iran’s missile activity is reason enough for the U.S. Department of Defense (DoD) to start thinking about anti-ballistic missile defences in the region.  After all, DoD outposts in Eastern Syria are very close to local Iranian proxies.  Meanwhile, the Iraqi Popular Mobilization Units or PMUs controlled by Tehran have quietly acquired large diameter battlefield rockets and perhaps a few missiles[4].  Keep in mind, DoD air defences are legacy “platforms” such as the Avenger ADS and the MIM-104 Patriot.  Neither legacy platform is suited for intercepting large diameter rockets, much less current generation ballistic missiles.  Then consider the almost two dozen DoD bases in the Gulf and the Levant.  What protection do they have from Iranian missiles?

Since 2000 at least two new large diameter rockets or ballistic missiles are unveiled each year by the Iranian media, who are complicit in spinning these as homegrown “innovations.”  While it’s true some Iranian weapons are blatant fakes[6], there are two niches where Iran’s state-owned military industries excel: drones and missiles.

Iran’s obsession with missiles dates to the war against Saddam Hussein’s Iraq from 1980-1988.  Towards the end of the bitter conflict an exhausted Iraq launched its Scud A rockets at Iranian cities[8].  With its air force crippled by attrition and a lack of spare parts, Iran’s war planners concocted an elaborate scheme to acquire the same capability as Iraq.  In an arrangement whose details remain muddled, Libya’s Muammar Gaddafi, Syria’s Hafez Assad, and North Korea’s Kim il Sung all agreed to supply Iran with hand-me-down Scud B’s after years of selling conventional weapons to Tehran.

As both Iraq and Iran endured economic sanctions in the 1990s, Tehran kept spending vast sums on its missiles because its airpower and naval fleet had atrophied.  Since the advent of the first domestically produced Shahab missile, which was modelled after a North Korean Scud C variant called the Nodong/No Dong[8], Iran persisted in improving its conventional missiles on top of an immense rocket artillery arsenal.  Imitating Soviet, Chinese, and North Korean doctrine, both the Artesh (regular army) and the IRGC have a multitude of short, medium, and long-range rockets whose quantity now surpasses those of neighbouring countries.  In recent years, only Azerbaijan’s bloated defence expenditures has produced an inventory to rival Iran’s battlefield rocket stockpile[9].  When it comes to missiles, however, there are no specifics on how many Iran has, but a total above four digits is the lowest estimate[10].

For the reader’s benefit, below is an easy guide to Iranian ballistic missiles:

Fateh-100 “family” – Comparable to the Soviet SS-21 Scarab and even the SS-26 Stone (Iskander) surface-to-surface ballistic missiles.  Fatehs are made in eight variants, with the Fateh Mobin and the Zolfaqar being the deadliest with ranges of 700 kilometres[10].

Scud C – North Korean Hwasong 6 or “Scud C” missiles with a range of several hundred kilometres.  It’s assumed Pyongyang also helped build a production facility somewhere in Iran.

Shahab “family” – Introduced in the 2000s, the Shahabs resemble the Scud C 6 but have varying capabilities.  The Shahab-3 is considered a nuclear capable medium-range ballistic missile that can reach targets more than a thousand kilometres away. 

Khorramshahr – This road mobile medium-range ballistic missile (MRBM) is suspected to have been developed with North Korean assistance and its range covers much of South Asia and the Middle East.  Analysts acknowledge its resemblance to the Musudan MRBM that Pyongyang showed off in its annual parades until early 2018[11].

Soumar – A land-based variant of the Soviet Kh-55 air-launched cruise missile.  In December 2017 Houthi fighters launched a cruise missile resembling the Soumar at a nuclear power plant in Abu Dhabi.  Although the result of the attack is unknown, it proves how Iran can strike its enemies anywhere[12].

Although the U.S.-developed Patriot surface-to-air missile (SAM) batteries are in service with Kuwait, Jordan, Saudi Arabia, and the UAE, these don’t count as serious anti-ballistic missile defenses as a layered network is best.  So far, only the UAE  is close to achieving this layered network with its Terminal High Altitude Area Defense (THAAD) and the Patriot Advanced Capability-3 (PAC-3) batteries complemented by short-range SAMs.  Of course, Israel is in a better position to stop Iranian missiles since it built a network for the PAC-3 together with its own Arrow 2/3 long-range SAM, the David’s Sling, and the Iron Dome[13].

Remarkably, Saudi Arabia is the most vulnerable to an Iranian missile barrage.  Since 2016 not a month has gone by without the Houthis in Yemen sending either large diameter rockets or ballistic missiles into the Kingdom, with successful intercepts by Saudi air defences up for debate[14].  Even with a defence budget considered the third largest in the world, Saudi Arabia’s collection of Patriot’s won’t be able to thwart multiple launches at its major cities and energy infrastructure[15].  Worse, Riyadh’s orders for either the S-400 Triumf or the THAAD have yet to arrive[16].

If the Trump Administration is serious about confronting Iran in the region, it’s doing an abysmal job preparing for the small and big fights where the IRGC and its proxies can bring asymmetric weapons to bear.  Whether or not Gulf allies agree to host a top of the line DoD ballistic missile defense capabilities like AEGIS Ashore[17], genuine layered anti-ballistic missile defences[18] are needed to protect U.S. bases against hundreds of potential missile and rocket attacks by Iran in a future war.  Thousands of American servicemen and women are at grave risk without one.


Endnotes:

[1] Miranda, M. (2018, July 29). Iran made a big deal about a copycat missile. Retrieved September 17, 2018, from https://21stcenturyasianarmsrace.com/2018/07/29/iran-made-a-big-deal-about-a-copycat-missile/

[2] Miranda, M. (2018, August 14). Iran unveiled a juiced up ballistic missile this week. Retrieved September 17, 2018, from https://21stcenturyasianarmsrace.com/2018/08/14/iran-unveiled-a-juiced-up-ballistic-missile-this-week/

[3] Miranda, M. (2018, September 11) Iran just bombarded kurdish rebels with missiles. Retrieved September 17, 2018, from https://21stcenturyasianarmsrace.com/2018/09/11/iran-just-bombarded-kurdish-rebels-with-missiles/

[4]  Karako, T. (2015, August 10). Getting the GCC to Cooperate on Missile Defense. Retrieved September 17, 2018, from https://warontherocks.com/2015/05/getting-the-gcc-to-cooperate-on-missile-defense/ 

[5] Irish, J. (2018, August 31). Exclusive: Iran moves missiles to Iraq in warning to enemies. Retrieved September 17, 2018, from https://www.reuters.com/article/us-iran-iraq-missiles-exclusive/exclusive-iran-moves-missiles-to-iraq-in-warning-to-enemies-idUSKCN1LG0WB?il=0

[6] Miranda, M. (2018, August 26). Iran military industries are promoting fake modernization. Retrieved September 17, 2018, from https://21stcenturyasianarmsrace.com/2018/08/26/iranian-military-industries-are-promoting-fake-modernization/

[7] Press, A. (1988, March 14). ‘War of Cities’ Truce Ends as Iraqi Missile Hits Tehran. Retrieved from http://articles.latimes.com/1988-03-14/news/mn-734_1_iraqi-news-agency

[8] No-dong. September 17, 2018, from https://missilethreat.csis.org/missile/musudan/

[9] Miranda, M. (2018, July 12). Azerbaijan is showing off new weapons again. Retrieved September 17, 2018, from https://21stcenturyasianarmsrace.com/2018/06/12/azerbaijan-is-showing-off-new-weapons-again/

[10] Iran’s ballistic missile capabilities. (2017, September 21). Retrieved September 17, 2018, from https://www.aljazeera.com/indepth/interactive/2017/06/iran-ballistic-missile-capabilities-170621125051403.html

[11] Iran Inaugurates Production Line Of New Missile. (2016, September 26). September 17, 2018, from http://www.israeldefense.co.il/en/content/iran-inaugurates-production-line-new-missile

[12] Musudan (BM-25). September 17, 2018, from https://missilethreat.csis.org/missile/musudan/

[13] Yemen’s Houthis claim to fire missile toward unfinished Abu Dhabi nuclear reactor. (2017, December 3). September 17, 2018, from https://www.japantimes.co.jp/news/2017/12/03/world/yemens-houthis-claim-fire-missile-toward-unfinished-abu-dhabi-nuclear-reactor/#.W56g0_ZoTIU

[14] Defense, I. (2018, February 19). Israel Successfully Test Fires Arrow 3 Missile System. Retrieved September 17, 2018, from http://www.israeldefense.co.il/en/node/33120

[15] Gambrell, J. (2018, March 26). Videos raise questions over Saudi missile intercept claims. Retrieved September 17, 2018, from https://www.defensenews.com/global/mideast-africa/2018/03/26/videos-raise-questions-over-saudi-missile-intercept-claims/

[16] Riedel, B. (2018, March 27). What you need to know about the latest Houthi attack on Riyadh. Retrieved September 17, 2018, from https://www.brookings.edu/blog/order-from-chaos/2018/03/27/what-you-need-to-know-about-the-latest-houthi-attack-on-riyadh/

[17] Saudi Arabia wants Russian help for its arms industry. (2017, October 7). Retrieved September 17, 2018, from https://21stcenturyasianarmsrace.com/2017/10/07/saudi-arabia-wants-russian-help-for-its-arms-industry/

[18] Larter, D. (2018, June 20). The US Navy is fed up with ballistic missile defense patrols. Retrieved September 17, 2018, from https://www.defensenews.com/naval/2018/06/16/the-us-navy-is-fed-up-with-ballistic-missile-defense-patrols/

Artillery / Rockets/ Missiles Assessment Papers Iran Middle East Miguel Miranda United States

Alternative Futures: An Assessment of Ongoing North Korean Troop Rotations to Finland

Mr. Jason Hansa is a retired U.S. Army officer that served in Germany, Korea, and CONUS, with two deployments each to OIF and OEF. He currently works as a military contractor at CASCOM on Fort Lee, Virginia. His twitter address is @HauptmannHansa. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Alternative Futures: An Assessment of Ongoing North Korean Troop Rotations to Finland

Date Originally Written:  July 12, 2018.

Date Originally Published:  September 24, 2018.

Summary:  Finland is a fiercely independent country that has suffered the yoke of Russian occupation twice in its short history as a sovereign nation.  Unaligned with but reluctant to join the North Atlantic Treaty Organization (NATO), Finland is very concerned of their vulnerability to a sudden Russian annexation attempt.  In this alternative future, Finland arrived at an out-of-the-box solution, to accept North Korean troops deploying to its border with Russia.

Text:  Mr. President, as we enter 2025 Finland stands ready to welcome the arrival of the fifth rotational North Korean infantry division since we formalized our mutual defense treaty in 2020.  As you recall, five years ago, we were in a very difficult situation.  Russian invaded the Ukraine to seize the Crimean Peninsula in 2014 and was rotating units through Syria to both gain deployment experience and test new equipment or doctrine under combat conditions.  NATO saw the weaknesses of their Baltic flank and began stationing troops and conducting rotational operations to shore up the defense of their member states.

It is no secret Russia craves warm-water access ports, and our lack of membership in NATO put us at risk of a Russian annexation.  Our nation is still young but proud, achieving independence in the nineteenth century from Sweden that lead to almost immediate occupation by the Russians.  Independence in the twentieth century led to reoccupation in World War 2 and a failure to prepare may well have invited Moscow to occupy us again.

Five years ago, our military strength was approximately 32,000 military members on active duty, with 23,500 of them in the Army.  Our nation has compulsorily conscription and maintains a robust reservist infrastructure, with approximately 900,000 personnel available under full mobilization.  The danger to our nation—then and now—lies in a sudden Russian offensive.  If the Russians strike before we can fully mobilize, our nation is at risk of a quick overrun[1].

The mutual defense treaty of 2020 recognized we are one of the few nations with semi-open diplomatic channels to North Korea, a famously isolationist nation who, at that time, were looking to expand trade around the world.  North Korea had promised to make good on debts they owe us from the 1970s—ones we long ago wrote off—hoping proof of fiscal responsibility would lead to global investment and the lifting of sanctions[2].

In 2020 we moved carefully, knowing that others would react with surprise, anger, and possibly disgust if we struck a formal agreement with North Korea.  It took months of quiet diplomacy with our Nordic partners and NATO neighbors ahead of the announcement for them to understand our reasoning.  We understood that we would also receive “guilt by association,” and possibly even get blamed for “not doing more” during any North Korean-created diplomatic incident.

We knew that with the North Koreans being an isolationist regime, who treated their citizens with brutality, any treaty would result in our citizens demanding immediate and real humanitarian reform in the North Korean political re-education work camps.  We prepared for that reaction, working with the North Korean embassy on what to do once the agreement became public.

The gains were worth the risks.  Militarily, the size of our ground combat forces almost doubled with the deployment of a North Korean division to our border with Russia.  With over twenty-five divisions in the North Korea People’s Army and over 5 million reservists, North Korea assumes very little risk to the defense of their nation, and can maintain rotations in Finland for decades without repeating units[3].  The presence of our North Korean friends forces the Russian Army to increase the size of any potential invasion force, an action that would not go unnoticed by intelligence agencies and give us time to mobilize.  There’s an expression gaining in popularity that Finland and North Korea are two nations only separated by one country, and it’s accurate.  In the event of a Russian invasion of North Korea, our mutual defense treaty ensures Russia must worry about war on a second front – the border they share with North Korea.

The most dangerous phase of the treaty negotiations were the months between announcing it and receiving the final North Korean reinforcements: we were concerned that tensions with Russia could spark the very invasion we were hoping to avoid.  However, our gambit took the world so completely by surprise that Russia didn’t have time to do more than issue a sputtering, angry speech at the United Nations.  Since then, the North Korean deployments have gone off smoothly, leaving their equipment in-place and simply rotating the 10,000 personnel annually.

As we expected, our people demanded humanitarian changes, and the North Koreans opened their borders to us.  It was at first a very grudging admission by North Korea, the nation leery of putting their past on display to the world.  But our persistence enabled access to their now-shuttered political prisons and we provided blankets and food by the container-full during that first, harsh winter.  The North Koreans eventually agreed to our offers of asylum to their prisoners, and we moved the last of them to our nation eighteen months ago.  This mutually benefited both nations, as they showed progress to the world in shutting down their gulags, while we received an infusion of fresh blood into our nation.  We gained thousands of refugees willing to work hard for their new home and—on a side note—helping arrest our declining birth-rate[4].

Accepting the North Korean prisoners was the catalyst for the significant changes we are now seeing in that nation.  It was inevitable, the rotation of divisions through our lands showing the North Korean troops a world outside their borders and sparking the desire for a better life back home.  But our cultural influences have been wildly successful, the North Koreans laying down the initial plans to slowly convert their monolithic realm into something akin to the British model, a democracy with the Kim family as symbolic royalty.  Their introversion is turning into a fierce independence that matches ours in a kinship they’ve never had before; they are asking for our help in economic and legal domains, assistance our populace has eagerly given back.

I must point out that our economic sector isn’t completely reaching out to the North Koreans for altruistic reasons.  While our tourism industry and globally renowned businesses did lose sales in the first couple years because of our political decision, they worked overtime to show investors that our nation did not lose our values in reaching such an accord.  Now, our businesses and banks are eagerly investing in North Korea, taking advantage of an untapped labor market next-door to over one-billion Chinese consumers.

In closing, I assess that our mutual-defense agreement with North Korea has succeeded.  Not only has it helped prevent an invasion by Russia, it has let our people help the needy of another nation, let our businesses expand into a new market, and has allowed our nation to maintain and display our values while guiding another onto the path of recovery.


Endnotes:

[1] European Defense Information, Finnish Defense Forces. Retrieved 14 June 2018.  http://www.armedforces.co.uk/Europeandefence/edcountries/countryfinland.htm

[2] Yle, (2017, April 30). North Korea owes Finland millions in decades-old debt. Retrieved 14 June 2018. https://yle.fi/uutiset/osasto/news/north_korea_owes_finland_millions_in_decades-old_debt/9588973

[3] Marine Corps Intelligence Activity, (May 1997). North Korea Country Handbook, page 122.

[4] Smith, L. (2017, September 20). Finland’s birth rate plummets to its lowest level in nearly 150 years. Retrieved 12 July 2018. https://www.independent.co.uk/news/world/europe/finland-birth-rate-drop-lowest-level-150-years-children-welfare-state-annika-saarikko-a7957166.html

Assessment Papers Finland Jason Hansa North Korea (Democratic People’s Republic of Korea) Russia

Assessment of the Role of Cyber Power in Interstate Conflict

Eric Altamura is a graduate student in the Security Studies Program at Georgetown University’s School of Foreign Service. He previously served for four years on active duty as an armor officer in the United States Army.  He regularly writes for Georgetown Security Studies Review and can be found on Twitter @eric_senlu.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Role of Cyber Power in Interstate Conflict

Date Originally Written:  May 05, 2018 / Revised for Divergent Options July 14, 2018.

Date Originally Published:  September 17, 2018.

Summary:  The targeting of computer networks and digitized information during war can prevent escalation by providing an alternative means for states to create the strategic effects necessary to accomplish limited objectives, thereby bolstering the political viability of the use of force as a lever of state power.

Text:  Prussian General and military theorist Carl von Clausewitz wrote that in reality, one uses, “no greater force, and setting himself no greater military aim, than would be sufficient for the achievement of his political purpose.” State actors, thus far, have opted to limit cyberattacks in size and scope pursuant to specific political objectives when choosing to target information for accomplishing desired outcomes. This limiting occurs because as warfare approaches its unlimited form in cyberspace, computer network attacks increasingly affect the physical domain in areas where societies have become reliant upon IT systems for everyday functions. Many government and corporate network servers host data from industrial control systems (ICS) or supervisory control and data acquisition (SCADA) systems that control power generation, utilities, and virtually all other public services. Broader attacks on an adversary’s networks consequently affect the populations supported by these systems, so that the impacts of an attack go beyond simply denying an opponent the ability to communicate through digital networks.

At some point, a threshold exists where it becomes more practical for states to utilize other means to directly target the physical assets of an adversary rather than through information systems. Unlimited cyberattacks on infrastructure would come close to replicating warfare in its total form, with the goal of fully disarming an opponent of its means to generate resistance, so states become more willing to expend resources and effort towards accomplishing their objectives. In this case, cyber power decreases in utility relative to the use of physical munitions (i.e. bullets and bombs) as the scale of warfare increases, mainly due to the lower probability of producing enduring effects in cyberspace. As such, the targeting and attacking of an opponent’s digital communication networks tends to occur in a more limited fashion because alternative levers of state power provide more reliable solutions as warfare nears its absolute form. In other words, cyberspace offers much more value to states seeking to accomplish limited political objectives, rather than for waging total war against an adversary.

To understand how actors attack computer systems and networks to accomplish limited objectives during war, one must first identify what states actually seek to accomplish in cyberspace. Just as the prominent British naval historian Julian Corbett explains that command of the sea does not entail “the conquest of water territory,” states do not use information technology for the purpose of conquering the computer systems and supporting infrastructure that comprise an adversary’s information network. Furthermore, cyberattacks do not occur in isolation from the broader context of war, nor do they need to result in the total destruction of the enemy’s capabilities to successfully accomplish political objectives. Rather, the tactical objective in any environment is to exploit the activity that takes place within it – in this case, the communication of information across a series of interconnected digital networks – in a way that provides a relative advantage in war. Once the enemy’s communication of information is exploited, and an advantage achieved, states can then use force to accomplish otherwise unattainable political objectives.

Achieving such an advantage requires targeting the key functions and assets in cyberspace that enable states to accomplish political objectives. Italian General Giulio Douhet, an airpower theorist, describes command of the air as, “the ability to fly against an enemy so as to injure him, while he has been deprived of the power to do likewise.” Whereas airpower theorists propose targeting airfields alongside destroying airplanes as ways to deny an adversary access to the air, a similar concept prevails with cyber power. To deny an opponent the ability to utilize cyberspace for its own purposes, states can either attack information directly or target the means by which the enemy communicates its information. Once an actor achieves uncontested use of cyberspace, it can subsequently control or manipulate information for its own limited purposes, particularly by preventing the escalation of war toward its total form.

More specifically, the ability to communicate information while preventing an adversary from doing so has a limiting effect on warfare for three reasons. Primarily, access to information through networked communications systems provides a decisive advantage to military forces by allowing for “analyses and synthesis across a variety of domains” that enables rapid and informed decision-making at all echelons. The greater a decision advantage one military force has over another, the less costly military action becomes. Secondly, the ubiquity of networked information technologies creates an alternative way for actors to affect targets that would otherwise be politically, geographically, or normatively infeasible to target with physical munitions. Finally, actors can mask their activities in cyberspace, which makes attribution difficult. This added layer of ambiguity enables face-saving measures by opponents, who can opt to not respond to attacks overtly without necessarily appearing weak.

In essence, cyber power has become particularly useful for states as a tool for preventing conflict escalation, as an opponent’s ability to respond to attacks becomes constrained when denied access to communication networks. Societies’ dependence on information technology and resulting vulnerability to computer network attacks continues to increase, indicating that interstate violence may become much more prevalent in the near term if aggressors can use cyberattacks to decrease the likelihood of escalation by an adversary.


Endnotes:

[1] von Clausewitz, C. (1976). On War. (M. Howard, & P. Paret, Trans.) Princeton: Princeton University Press.

[2] United States Computer Emergency Readiness Team. (2018, March 15). Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. (United States Department of Homeland Security) Retrieved May 1, 2018, from https://www.us-cert.gov/ncas/alerts/TA18-074A

[3] Fischer, E. A. (2016, August 12). Cybersecurity Issues and Challenges: In Brief. Retrieved May 1, 2018, from https://fas.org/sgp/crs/misc/R43831.pdf

[4] Corbett, J. S. (2005, February 16). Some Principles of Maritime Strategy. (S. Shell, & K. Edkins, Eds.) Retrieved May 2, 2018, from The Project Gutenberg: http://www.gutenberg.org/ebooks/15076

[5] Ibid.

[6] Douhet, G. (1942). The Command of the Air. (D. Ferrari, Trans.) New York: Coward-McCann.

[7] Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press.

[8] Boyd, J. R. (2010, August). The Essence of Winning and Losing. (C. Richards, & C. Spinney, Eds.) Atlanta.

Aggression Assessment Papers Cyberspace Emerging Technology Eric Altamura

Assessment of North Korean Strategy in Preparation for High Level Diplomacy in September 2018

David Maxwell is a Senior Fellow at the Foundation For Defense of Democracies focusing on Korea and East Asian security.  He is a retired U.S. Army Special Forces Colonel with five tours in Korea.  He tweets @DavidMaxwell161 and blogs at the Informal Institute for National Security Thinkers and Practitioners.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of North Korean Strategy in Preparation for High Level Diplomacy in September 2018

Date Originally Written:  September 4, 2018.

Date Originally Published:  September 7, 2018.

Summary:  The only way the U.S. will see an end to the nuclear program, threats, and crimes against humanity committed by the North Korean mafia-like crime family cult known as the Kim family regime is through unification and the establishment of a United Republic of Korea (UROK).  The UROK would be secure and stable, non-nuclear, economically vibrant, and unified under a liberal constitutional form of government determined by the Korean people.

Text:  For Kim Jong-un, the Panmunjom Declaration and Singapore joint statement to denuclearize the Korean peninsula are like contracts that specify the precise sequences in which negotiations and action should proceed:

1.  Declare an end to the Korean civil war

2.  Reduce and then end sanctions

3.  Denuclearize South Korea (i.e. end the Republic of Korea (ROK) / U.S. alliance, remove U.S. troops from the peninsula, and remove the U.S. nuclear umbrella over the ROK and Japan)

4.  After completing all of the above, begin negotiation on how to dismantle the North’s nuclear program[1]

The September 2018 summit in Pyongyang between South Korean President Moon Jae-in and North Korean leader Kim Jong-un could set the conditions to end the Korean civil war at the United Nations General Assembly meeting at the end of the month.  While there is disagreement among Korean analysts as to North Korea’s true intent, North Korean actions are best viewed through the lens of the Kim family regime’s decades-old strategy.  This strategy wants to ensure the survival of the Kim family regime, unify the peninsula via subversion, coercion, and use of force to guarantee regime survival, and to split the ROK / U.S. alliance to expel U.S. forces from the peninsula.  Additionally, Kim wants SALT/START-like talks in which the North is co-equal to the U.S. like the Soviets were – but Kim will likely settle for Pakistan-like acceptance.

While U.S. President Donald Trump moved past the last administration’s unofficial policy of strategic patience and now conducts unconventional[2], experimental[3], and top-down diplomacy, it is necessary to consider the full scope of the Korea problem, not just the nuclear issue.  U.S. policy towards North Korea and the U.S. / ROK alliance is based on answers to the following:

1.  What does the U.S. want to achieve in Korea?

2.  What is the acceptable and durable political arrangement than will protect, serve, and advance U.S. and ROK / U.S. alliance interests on the Korean peninsula and in Northeast Asia?

3.  Does the U.S. believe that Kim Jong-un has abandoned Pyongyang’s seven decades-old strategy of subversion, coercion, and the use of force to achieve northern domination of a unified peninsula in order to ensure the survival of the Kim family regime?

4.  Does the U.S. believe that Kim Jong-un has abandoned the objective of splitting the ROK / U.S. alliance to get U.S. forces off the peninsula?  In short, has he abandoned his “divide and conquer” strategy: divide the ROK / U.S. alliance and conquer the South[4]?

While pursuing high-level nuclear diplomacy, the U.S. and ROK will keep in mind the entire spectrum of existing threats (The Big 5) and potential surprises that can affect negotiations.

1.  War – The U.S. and ROK must deter, and if attacked, defend, fight, and win because miscalculation or a deliberate decision by Kim could occur at any time.

2.  Regime Collapse – The U.S. and ROK must prepare for this very real possibility and understand it could lead to war; both war and regime collapse could result in resistance to unification within the North.

3.  Human Rights and Crimes Against Humanity (Gulags, external forced labor, etc.) –Oppression of the population keeps the Kim regime in power and it uses slave labor to do everything from overseas work to mining uranium for the nuclear program.  Furthermore, U.S. / ROK focus on human rights is a threat to the Kim family regime because this undermines domestic legitimacy – and most importantly, addressing this issue is a moral imperative.

4.  Asymmetric Threats – North Korean asymmetric threats include provocations to gain political and economic concessions, coercion through its nuclear and missile programs, cyber-attacks, special operations activities, and global illicit activities such as those conducted by North Korea’s Department 39.  All of these asymmetric threats keep the regime in power, support blackmail diplomacy, and provide capabilities to counter alliance strengths across the spectrum of conflict.  These asymmetric threats also facilitate resistance following a potential regime collapse.

5.  Unification – The biggest challenge since the division of the peninsula is the fundamental reason for the North-South conflict.  Unification is also the solution to the Korea question.  Note that President Trump in the June 30, 2017 joint statement supported the ROK’s leading role in fostering an environment for peaceful unification of the Korean peninsula[5].

While the focus is naturally on North Korea’s nuclear and missile program, the conventional threat from the North remains significant.  Seventy percent of its 1.2 million-man army is offensively postured between the Demilitarized Zone (DMZ) and Pyongyang.  The northern artillery in deeply buried and hardened targets poses a dangerous threat to a millions of Koreans in and around Seoul[6].  Since the Moon-Kim and Trump-Kim summits in April and June 2018 respectively, there has been no reduction in these forces and no confidence-building measures from the North Korean side.

While maintaining its aggressive conventional posture, Pyongyang is also pushing for a peace treaty to remove the justification for U.S. forces on the peninsula, as ROK presidential adviser Moon Chung-in wrote in April 2018[7].  However, the legal basis for U.S. presence lies in the ROK / U.S. Mutual Defense Treaty of 1953, which makes no mention of North Korea or the
Democratic People’s Republic of Korea and exists to defend both nations from threats in the Pacific Region[8].  As such, the treaty would remain valid even if Seoul and Pyongyang were technically at peace.

It is the ROK / U.S. alliance and presence of U.S. forces that has deterred hostilities on the peninsula.  As long as there is a conventional and nuclear threat from the North, the ROK / U.S. alliance is required for deterrence.  Based upon this need for a U.S. deterrent, the North’s desire for the removal of U.S. troops must be treated with deep skepticism.

The challenge for the ROK, the U.S., regional powers, and the international community is how to get from the current state of armistice and temporary cessation of hostilities to unification.  While peaceful unification would be ideal, the most likely path will involve some level of conflict ranging from war to internal civil conflict and potentially horrendous human suffering in the northern part of Korea.  The ROK and its friends and allies face an extraordinary security challenge because of the “Big Five.” War, regime collapse, and the north’s nuclear and missile programs pose an existential threat to the ROK.  Finally, although some advocate that the U.S. should keep the human rights as a separate issue; it is a moral imperative to work to relieve the suffering of the Korean people who live in the worst sustained human rights conditions in modern history.


Endnotes:

[1]  David Maxwell. “Three Simple Things the Trump-Kim Summit Could—and Should—Achieve.” Quartz. https://qz.com/1300494/three-simple-things-the-trump-kim-summit-could-and-should-achieve/ (September 4, 2018).

[2]  James Jay Carafano. July 17, 2018. “Donald Trump and the Age of Unconventional Diplomacy.” The National Interest. https://nationalinterest.org/feature/donald-trump-and-age-unconventional-diplomacy-26011 (August 10, 2018)

[3]  Patrick M. Cronin, Kristine Lee. 2018. “Don’t Rush to a Peace Treaty on North Korea.” The National Interest. https://nationalinterest.org/feature/dont-rush-peace-treaty-north-korea-26936 (August 3, 2018).

[4]  Ibid., Maxwell

[5]  “Joint Statement between the United States and the Republic of Korea.” The White House. https://www.whitehouse.gov/briefings-statements/joint-statement-united-states-republic-korea/ (September 4, 2018).

[6]  “Defense Intelligence Agency: Military and Security Developments Involving the Democratic People’s Republic of Korea 2017 A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2012.” https://media.defense.gov/2018/May/22/2001920587/-1/-1/1/REPORT-TO-CONGRESS-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-DEMOCRATIC-PEOPLES-REPUBLIC-OF-KOREA-2017.PDF

[7]  Moon, Chung-in. 2018. “A Real Path to Peace on the Korean peninsula.” Foreign Affairs. https://www.foreignaffairs.com/articles/north-korea/2018-04-30/real-path-peace-korean- peninsula (August 6, 2018).

[8]  “Avalon Project – Mutual Defense Treaty Between the United States and the Republic of Korea; October 1, 1953.” http://avalon.law.yale.edu/20th_century/kor001.asp (August 6, 2018).

Assessment Papers David Maxwell North Korea (Democratic People’s Republic of Korea) South Korea (Republic of Korea) United States

Assessment of the North Korean Cyberattack on Sony Pictures

Emily Weinstein is a Research Analyst at Pointe Bello and a current M.A. candidate in Security Studies at Georgetown University.  Her research focuses on Sino-North Korean relations, foreign policy, and military modernization.  She can be found on Twitter @emily_sw1.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the North Korean Cyberattack on Sony Pictures

Date Originally Written:  July 11, 2018.

Date Originally Published:  August 20, 2018.

Summary:   The 2014 North Korean cyberattack on Sony Pictures shocked the world into realizing that a North Korean cyber threat truly existed.  Prior to 2014, what little information existed on North Korea’s cyber capabilities was largely dismissed, citing poor domestic conditions as rationale for cyber ineptitude.  However, the impressive nature of the Sony attack was instrumental in changing global understanding of Kim Jong-un and his regime’s daring nature.

Text:  On November 24, 2014 Sony employees discovered a massive cyber breach after an image of a red skull appeared on computer screens company-wide, displaying a warning that threatened to reveal the company’s secrets.  That same day, more than 7,000 employees turned on their computers to find gruesome images of the severed head of Sony’s chief executive, Michael Lynton[1].  These discoveries forced the company to shut down all computer systems, including those in international offices, until the incident was further investigated.  What was first deemed nothing more than a nuisance was later revealed as a breach of international proportions.  Since this incident, the world has noted the increasing prevalence of large-scale digital attacks and the dangers they pose to both private and public sector entities.

According to the U.S. Computer Emergency Readiness Team, the primary malware used in this case was a Server Message Block (SMB) Worm Tool, otherwise known as SVCH0ST.EXE.  An SMB worm is usually equipped with five components: a listening implant, lightweight backdoor, proxy tool, destructive hard drive tool, and a destructive target cleaning tool[2].  The worm spreads throughout the infected network via a trial-and-error method used to obtain information such as a user password or personal identification number known as a brute force authentication attack.  The worm then connects to the command-and-control infrastructure where it is then able to begin its damage, usually copying software that is intended to damage or disable computers and computer systems, known as malware, across to the victim system or administrator system via the network sharing process.  Once these tasks are complete, the worm executes the malware using remotely scheduled tasks[3].

This type of malware is highly destructive.  If an organization is infected, it is likely to experience massive impacts on daily operations, including the loss of intellectual property and the disruption of critical internal systems[4].  In Sony’s case, on an individual level, hackers obtained and leaked personal and somewhat embarrassing information about or said by Sony personnel to the general public, in addition to information from private Sony emails that was sensitive or controversial.  On the company level, hackers stole diverse information ranging from contracts, salary lists, budget information, and movie plans, including five entire yet-to-be released movies.  Moreover, Sony internal data centers had been wiped clean and 75 percent of the servers had been destroyed[5].

This hack was attributed to the release of Sony’s movie, The Interview—a comedy depicting U.S. journalists’ plan to assassinate North Korean leader Kim Jong-un.  A group of hackers who self-identified by the name “Guardians of Peace” (GOP) initially took responsibility for the attack; however, attribution remained unsettled, as experts had a difficult time determining the connections and sponsorship of the “GOP” hacker group.  Former Federal Bureau of Investigation (FBI) Director James Comey in December 2014 announced that U.S. government believed that the North Korean regime was behind the attack, alluding to the fact that the Sony hackers failed to use proxy servers that masked the origin of their attack, revealing Internet Protocol or IP addresses that the FBI knew to be exclusively used by North Korea[6].

Aside from Director Comey’s statements, other evidence exists that suggests North Korea’s involvement.  For instance, the type of malware deployed against Sony utilized methods similar to malware that North Korean actors had previously developed and used.  Similarly, the computer-wiping software used against Sony was also used in a 2013 attack against South Korean banks and media outlets.  However, most damning of all was the discovery that the malware was built on computers set to the Korean language[7].

As for a motivation, experts argue that the hack was executed by the North Korean government in an attempt to preserve the image of Kim Jong-un, as protecting their leader’s image is a chief political objective in North Korea’s cyber program.  Sony’s The Interview infantilized Kim Jong-un and disparaged his leadership skills, portraying him as an inept, ruthless, and selfish leader, while poking fun at him by depicting him singing Katy Perry’s “Firework” song while shooting off missiles.  Kim Jong-un himself has declared that “Cyberwarfare, along with nuclear weapons and missiles, is an ‘all-purpose sword[8],’” so it is not surprising that he would use it to protect his own reputation.

The biggest takeaway from the Sony breach is arguably the U.S. government’s change in attitude towards North Korean cyber capabilities.  In recent years leading up to the attack, U.S. analysts were quick to dismiss North Korea’s cyber-potential, citing its isolationist tactics, struggling economy, and lack of modernization as rationale for this judgement.  However, following this large-scale attack on a large and prominent U.S. company, the U.S. government has been forced to rethink how it views the Hermit Regime’s cyber capabilities.  Former National Security Agency Deputy Director Chris Inglis argues that cyber is a tailor-made instrument of power for the North Korean regime, thanks to its low-cost of entry, asymmetrical nature and degree of anonymity and stealth[9].  Indeed the North Korean cyber threat has crept up on the U.S., and now the its intelligence apparatus must continue to work to both counter and better understand North Korea’s cyber capabilities.


Endnotes:

[1] Cieply, M. and Barnes, B. (December 30, 2014). Sony Cyberattack, First a Nuisance, Swiftly Grew Into a Firestorm. Retrieved July 7, 2018, from https://www.nytimes.com/2014/12/31/business/media/sony-attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html

[2] Lennon, M. (December 19, 2014). Hackers Used Sophisticated SMB Worm Tool to Attack Sony. Retrieved July 7, 2018, from https://www.securityweek.com/hackers-used-sophisticated-smb-worm-tool-attack-sony

[3] Doman, C. (January 19, 2015). Destructive malware—a close look at an SMB worm tool. Retrieved July 7, 2018, from http://pwc.blogs.com/cyber_security_updates/2015/01/destructive-malware.html

[4] United States Computer Emergency Readiness Team (December 19, 2014). Alert (TA14-353A) Targeted Destructive Malware. Retrieved July 7, 2018, from https://www.us-cert.gov/ncas/alerts/TA14-353A

[5] Cieply, M. and Barnes, B. (December 30, 2014). Sony Cyberattack, First a Nuisance, Swiftly Grew Into a Firestorm. Retrieved July 7, 2018, from https://www.nytimes.com/2014/12/31/business/media/sony-attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html

[6] Greenberg, A. (January 7, 2015). FBI Director: Sony’s ‘Sloppy’ North Korean Hackers Revealed Their IP Addresses. Retrieved July 7, 2018, from https://www.wired.com/2015/01/fbi-director-says-north-korean-hackers-sometimes-failed-use-proxies-sony-hack/

[7] Pagliery, J. (December 29, 2014). What caused Sony hack: What we know now. Retrieved July 8, 2018, from http://money.cnn.com/2014/12/24/technology/security/sony-hack-facts/

[8] Sanger, D., Kirkpatrick, D., and Perlroth, N. (October 15, 2017). The World Once Laughed at North Korean Cyberpower. No More. Retrieved July 8, 2018, from https://mobile.nytimes.com/2017/10/15/world/asia/north-korea-hacking-cyber-sony.html

[9] Ibid.

Assessment Papers Cyberspace Emily Weinstein Information Systems

An Assessment of U.S. Women in Islamic State-related Cases

Brandee Leon is a freelance analyst of counter-terrorism and international relations, focusing on terror in Europe.  She frequently covers women in terrorism.  She has been published in Business Insider, The Strategy Bridge, and The Eastern Project. She can be found on Twitter at @misscherryjones.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of U.S. Women in Islamic State-related Cases

Date Originally Written:  June 20, 2018.

Date Originally Published:  August 13, 2018.

Summary:  Since the inception of Islamic State, ten percent of the related cases in the United States have involved women. The roles of the women involved have varied, from material support to bomb-making. The numbers are small compared to their European counterparts, but there is a definite presence in the United States. But like those in Europe, they are not a group that should be ignored.

Text:  George Washington University’s Program on Extremism (PoE) has been compiling cases of U.S persons involved in Islamic State(IS)-related offenses since 2014[1]. As of April 2018, they have found that 160 individuals have been charged. This article’s analysis to date reveals that 16 of those cases have involved women. The following is an overview of those cases, as well as why they are worth paying attention.

According to the latest infographic put out by GWU PoE, 90 percent of those charged with IS-related offenses in the U.S. have been male. This is up from 86 percent as of December 2015. The average age for the women in the cases is 33, five years older than the overall average age of 28. The oldest woman was 55, and the youngest was 19.

Thirteen of the women are U.S. citizens, six of whom are U.S.-born. Other nationalities represented among the women include Bosnia-Hercegovina[2], Pakistan, Somalia, and Saudi Arabia. Nearly half of the women have children. In one case, the woman’s sons had traveled to Syria in support of Islamic State[3].

The women involved tend to received drastically shorter prison sentences than the overall average: just 5.4 years compared to 13.4 years. One woman (so far) has been acquitted by trial, while another is still at large.

Most of the charges leveled against the women fell under 18 USC §2339, providing material support to terrorists or designated terror organizations. The next, most-frequent charge was 18 USC §1001(a)(2), providing false statements. Money laundering, transmission of a threat, and conspiracy to defraud the U.S. government were among the other charges. Two women were charged with 18 USC §2332a (a)(2), use of weapons of mass destruction, which represents the only straightforward “operational” charges against IS-connected women in America to date[4].

Several of the women conspired with a romantic partner, whether via online contact with a purported member of IS[5], or with a husband or boyfriend[6]. One woman actually traveled to Syria and married a well-known IS fighter[7].

Women in America who have been charged with crimes relating to the Islamic State tend to be slightly older than the male average. The women who have been sentenced to date have received significantly lesser sentences. Nearly all the women were charged with crimes relating to support rather than traveling to join the terror group. The women rarely act on their own, usually partnering with a significant other, either in person or virtually. While comprising just ten percent of the known cases of Americans in Islamic State related offenses, women are actively supporting the cause.

The numbers of American women getting involved with Islamic State are still small compared to the numbers of European women supporting the terror group. One estimate puts the number of European women traveling to join IS at over 500[8], with nearly 100 from Britain, and over 300 from France. The proximity to the Middle East and the larger Muslim population in Europe are likely factors in the numbers. U.S. women, however, could have greater ease of movement and agency, as some European countries are cracking down on Muslim women by way of headscarf and burka bans.

As the author has written before, the roles of women in these groups continue to evolve, and those in the business of counterterrorism and countering violent extremism will need to shed any preconceived notions of women-as-victim. Women are increasingly playing active roles in these organizations, and doing so voluntarily[9]. Most of the focus of women and terrorism remains on European women, but as shown in this article, there is a presence in the U.S.

However small the number of U.S. women actively supporting IS, it does not mean they should not be taken as serious a threat as the men. As the group’s territory disappears, they will find other areas in which to operate. They group has repeatedly called on its supporters to attack locally if they cannot physically travel to Syria or Iraq. And most recently, the group has seemingly loosened its restrictions on women taking up arms for the cause[10]. The Trump administration’s rhetoric and policies toward Muslims could also be a driving force. Whether the above mentioned factors mean there will be an increase in activity in the United States remains to be seen, but this is an issue deserving additional study, particularly regarding the motivations of Western women who choose to affiliate themselves with IS.

“To underestimate or neglect women jihadists would be a huge mistake for security services…– and one they may pay for in the near future.” – Abu Haniyah


Endnotes:

[1] ISIS in America, https://extremism.gwu.edu/isis-america

[2] Seamus Hughes & Bennett Clifford, “First He Became an American—Then He Joined ISIS,” The Atlantic, 25 May 2017, https://www.theatlantic.com/international/archive/2017/05/first-he-became-an-americanthen-he-joined-isis/527622/

[3] US Department of Justice, Collin County Couple Sentenced for Lying to Federal Agents, 13 February 2018, https://www.justice.gov/usao-edtx/pr/collin-county-couple-sentenced-lying-federal-agents

[4] “2 Women Arrested In New York City For Alleged ISIS-Inspired Terror Plot,” CBS New York, 2 April 2015, http://newyork.cbslocal.com/2015/04/02/sources-tell-cbs2-2-women-arrested-in-new-york-city-for-alleged-isis-inspired-terror-plot/

[5] “Shannon Conley, Arvada teen who tried to join ISIS to wage jihad, sentenced to 4 years in prison,” TheDenverChannel, 23 January 2015, https://www.thedenverchannel.com/news/local-news/sentencing-for-shannon-conley-arvada-teen-who-tried-to-join-isis-to-wage-jihad

[6] Joshua Berlinger and Catherine E. Shoichet, “Mississippi woman pleads guilty on charge that she tried to join ISIS,” CNN, 30 March 2016, https://www.cnn.com/2016/03/30/us/mississippi-isis-guilty-plea-jaelyn-young/index.html

[7] Tresa Baldas, “FBI translator secretly married Islamic State leader,” USA Today, 2 May 2017, https://www.usatoday.com/story/news/nation-now/2017/05/02/fbi-translator-secretly-married-islamic-state-leader/309137001/

[8] Shiraz Maher, “What should happen to the foreign women and children who joined Isis?,” New Statesman, 28 August 2017, https://www.newstatesman.com/world/middle-east/2017/08/what-should-happen-foreign-women-and-children-who-joined-isis

[9] Brandee Leon, “Thinking about women’s roles in terrorism,” The View From Here, 12 June 2017, https://misscherryjones.wordpress.com/2017/06/12/thinking-about-womens-roles-in-terrorism/

[10] Brandee Leon, “Changing Roles? Women as Terror Threat,” The View From Here, 28 February 2018, https://misscherryjones.wordpress.com/2018/02/28/changing-roles-women-as-terror-threat/

Assessment Papers Brandee Leon Islamic State Variants United States Women

Assessment of the Security and Political Threat Posed by a “Post-Putin” Russia in 2040

Sarah Martin is a recent graduate from George Mason University, where she received her Master of Science in Conflict Analysis and Resolution.  Her thesis examined the motivations of Chechen foreign fighters in Syria fighting for the Islamic State.  She can be found on Twitter @amerikitkatoreo.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Security and Political Threat Posed by a “Post-Putin” Russia in 2040

Date Originally Written:  June 5, 2018.

Date Originally Published:  July 9, 2018.

Summary:  In the upcoming decades, news feeds will probably continue to have a healthy stream of Russian meddling and Russian cyber attack articles.  However, a reliance on cyber attacks may be indicative of deeper issues that threaten Russia’s stability.

Text:  As Americans gear up for the midterm elections in November 2018, there have been a number of articles sounding the alarm on continuing disinformation campaigns from Russia[1].  Vulnerabilities exposed in 2016 have not been adequately addressed, and worse yet, the Kremlin is making their tools and methods more sophisticated, jumping even more steps ahead of policymakers and prosecutors[2].  However, in another 20 years, will the West be engaged in these same conversations, enmeshed in these same anxieties?

In short, yes.

In long—yes, but that might be an indicator of a much deeper problem.

Moscow has been deploying disinformation campaigns for decades, and when it knows the target population quite well, these operations can be quite successful.  Barring some kind of world-altering catastrophe, there is little doubt that Russia will stop or even slow their course.  Currently, disinformation stands as one of many tools the Russian Foreign Ministry can use to pursue its objectives.  However, there are political and economic trends within the country that might make meddling one of Russia’s only diplomatic tool.  Those trends are indicative of rather deep and dark issues that may contort the country to react in unpredictable ways, thus threatening its immediate neighbors, and spark trouble for the Transatlantic security apparatus.

Disinformation is a well-used tool in Russia’s foreign policy arsenal. Its current form is an inheritance from old Soviet tactics.  Under the Komitet Gosudarstvennoy Bezopasnosti (KGB), Service A was responsible for meddling in the West’s public discourse by muddying the waters and sowing discord between constituents, ultimately to affect their decisions at the polling booth[3].  These campaigns were known as “active measures.”  Some of America’s most popular conspiracy theories—like the U.S. Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI) having a role in the assassination of President John F. Kennedy—actually originated as a Service A disinformation campaign[4].  Russia has the institutional knowledge to keep the momentum rolling well into the future.

Not every campaign delivers a home run (see the French 2017 presidential elections).  However, Russia has the capability to learn, adapt, and change.  Perhaps the most appealing aspects of disinformation is its efficiency.  Cyber active measures also have the added benefit of being incredibly cost-effective.  A “regiment” of 1,000 operatives could cost as little as $300 million annually[5].

The economy is one of the trends that indicates a boggier underbelly of the Russian bear.  Russia may have to rely on its cyber capabilities, simply because it cannot afford more aggressive measures on the physical plane.

Russia, for all of its size, population and oil reserves, has no right having an economy smaller than South Korea’s[6].  Its economy is unhealthy, staggering and stagnating, showing no sign of any degree of sustained recovery.  That Russia is a petrostate is one factor for its economic weakness.  Politics—sanctions and counter-sanctions—also play a part in its weakness, though it is mostly self-inflicted.  However, each of these factors belies responsibility from the true culprit—corruption.  According to Transparency International, Russia is as corrupt as Honduras, Mexico and Kyrgyzstan[7].

Corruption in Russia isn’t simply a flaw to be identified and removed like a cancer; it is built into the very system itself[8].  Those who participate in corruption are rewarded handsomely with a seat at the political table and funds so slushie, you could find them at 7-11.  It is a corrupt system where the key players have no incentive of changing.  Everyone who plays benefits.  There has always been an element of corruption in Russia’s economy, especially during the Brezhnev years, but it only became systematic under Vladimir Putin[9].  Corruption will remain after Putin leaves the presidency, because he may leave the Kremlin, but he will never leave power.

Many Kremlin observers speculate that Putin will simply stay in politics after his final term officially ends[10].  If this does happen, taking into account that Putin is 65 years old, it is likely that he could reign for another 10-20 years.  Physically and practically then, Putinism may continue because its creator is still alive and active.  And even if Putin stepped back, the teeth of his policies are embedded so deeply within the establishment, that even with the most well-intentioned and capable executive leadership, it will take a long time to disentangle Putinism from domestic governance.

Another component of Putinism is how it approaches multilateralism.  Putinism has no ideology.  It is a methodology governed by ad hoc agreements and transactionalism.  Russia under Putinism seeks not to build coalitions or to develop friendships.  Russia under Putin is in pursuit of its former empire.  Nowhere is this pursuit more evident than with its Eurasian Economic Union.  While the European Union has its functional problems, it at least is trying to build a community of shared values. None of that exists in the EAEU[11].

Putinism, combined with a foreign policy designed to alienate potential allies and to disincentivize others from helping in times of crisis, connotes fundamental and systematic failures, that in turn, indicate weakness.  The tea leaves are muddy, but the signs for “weak” and “failing state” are starting to form, and weak states are erratic.

Weakness is what pressed Putin into Crimea and the Donbass in 2014, when the possibility of a Western-embracing Ukraine looked more probable than speculative.  Weakness is what pushed Russian troops into Georgia in 2008.  Russia had no other means of advancing their foreign policy objectives than by coercion and force.  One must wonder then what “Crimea, But Worse” might look like.

Russia will continue to use disinformation campaigns to pursue its foreign policy goals, and currently, this is one of many ways it can interact with other countries.  However, disinformation may be the only tool Moscow can afford to keep around.  This lack of other tools would indicate a rotting and faulty economic and political structure, which Russia currently has no incentive to change and may not have the ability to change after President Putin.  A sick Russia is already challenging for the world.  A failing Russia could be absolutely disastrous.


Endnotes:

[1] Rasmussen, A. F., & Chertoff, M. (2018, June 5). The West Still Isn’t Prepared to Stop Russia Meddling in Our Elections. Politico Magazine. Retrieved from https://www.politico.com/magazine/story/2018/06/05/russia-election-meddling-prepared-218594

[2] Ibid.

[3] Kramer, M. (2017, January 1). The Soviet Roots of Meddling in U.S. Politics. PONARS Eurasia. Retrieved from http://www.ponarseurasia.org/memo/soviet-roots-meddling-us-politics

[4] Ibid.

[5] Bergmann, M. & Kenney, C. (2017, June 6). War by Other Means. Center for American Progress. Retrieved from https://www.americanprogress.org/issues/security/reports/2017/06/06/433345/war-by-other-means/

[6] The World Bank. (2016). World Development Indicators. Retrieved from https://datacatalog.worldbank.org/dataset/gdp-ranking

[7] Transparency International. (2017). “Russia.” Corruption Perceptions Index 2017. Brussels. Retrieved from https://www.transparency.org/country/RUS

[8] Commission for Security and Cooperation in Europe (2017). In Brief: Corruption in Russia: An Overview. Washington, DC: Massaro, P., Newton, M. & Rousling, A. Retrieved from https://www.csce.gov/international-impact/publications/corruption-russia-overview

[9] Dawisha, K. (2015). Kleptocracy: Who Owns Russia? New York City.

[10] Troianovski, A. (2018, March 19). Putin’s reelection takes him one step closer to becoming Russian leader for life. The Washington Post. Retrieved from https://www.washingtonpost.com/world/europe/putins-reelection-takes-him-one-step-closer-to-becoming-russian-leader-for-life/2018/03/19/880cd0a2-2af7-11e8-8dc9-3b51e028b845_story.html

[11] Chatham House. (2018). The Eurasian Economic Union Deals, Rules and the Exercise of Power. London: Dragneva, R. & Wolczuk, K.

Alternative Futures / Alternative Histories / Counterfactuals Assessment Papers Russia Sarah Martin

Assessment of Al-Qaeda’s Enduring Threat Seven Years After Osama bin Laden’s Death

Tucker Berry is a rising graduate student at the Bush School of Government and Public Service, Texas A&M University.  He has conducted and briefed research on counterterrorism methods to the U.S. and three partner nations.  He has also spent time learning about the Arabic speaking Islamic world from within, in locations such as Oman, Jordan, the United Arab Emirates, and Morocco.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Al-Qaeda’s Enduring Threat Seven Years After Osama Bin Laden’s Death 

Date Originally Written:  April 26, 2018. 

Date Originally Published:  June 25, 2018. 

Summary:  A comparative analysis of al-Qaeda messaging from the Osama bin Laden-era to today demonstrates continuity. Such messaging indicates that al-Qaeda continues in the well-worn path of bin Ladenism, even with the seventh anniversary of his death, still adamantly focusing on the United States as enemy number one.

Text:  In 1996, bin Laden faxed an Arabic message from Afghanistan to newspapers titled in part, “Expel the Jews and Christians from the Arabian Peninsula[1].” Included in this message was a call for all Muslims to defend the Ummah, or the global Islamic community, from the United States. Bin Laden commanded, “Clearly after Belief there is no more important duty than pushing the American enemy out of the Holy land[2]…” Then, in 1998, bin Laden co-authored a fatwa, or Islamic legal ruling. This message demonstrates al-Qaeda’s anti-United States point of view, thereby framing the killing of Americans under bin Laden’s leadership as a legitimate strategic goal. 

Killing the Americans and their allies – civilians and military – is an individual duty for every Muslim who can carry it out in any country where it proves possible, in order to liberate Al-Aqsa Mosque and the holy sanctuary [Mecca] from their grip[3]…

A comparative analysis of messaging from the bin Laden era to that of the current al-Qaeda leadership demonstrates continuity. Just days after the death of bin Laden, al-Qaeda issued a formal response, which contained a steadfast reference to planning, plotting, and spilling the blood of Americans. Further fostering the analytical judgment that al-Qaeda maintains the strategic goal of striking any target deemed “American” is language pertaining to both temporality and endurance. If one listens to al-Qaeda, recognizing that in the past they told the world what they meant and meant what they said, this language demonstrates that al-Qaeda has absolutely no intention of replacing their black banner of terror with the white flag of surrender. Aiding analysis is a translated segment[4] of al-Qaeda’s 2011 Arabic response[5], released after the death of bin Laden.

[The death of bin Laden] will remain…a curse that haunts the Americans and their collaborators and pursues them outside and inside their country…their joy will turn to sorrow and their tears will mix with blood, and we will [realize] Sheikh Osama’s oath: America, and those who live in America, will not enjoy security until our people in Palestine do. The soldiers of Islam, together or as individuals, will continue to plot tirelessly and without desperation…until they are struck with a calamity that will make the hair of children turn white.

Reacting to bin Laden’s death, al-Qaeda wanted to demonstrate its perseverance. The tone and language of the response indicated that the death of bin Laden would not impede al-Qaeda. Furthermore, other sections highlight bin Laden’s “martyrdom.” Such language may inspire members to engage in martyrdom operations, paying a posthumous homage to their former leader. Though the death of bin Laden eliminated an unquestionably charismatic leader, the organization has demonstrated a patient commitment to continue harming the so-called far enemy, the United States. Bin Laden’s strong message still resonates loudly with his followers and the new leadership. 

Seven years after the death of bin Laden, the challenging question is now whether the new messengers can carry the same influence. Such a messenger is one of bin Laden’s sons, Hamza. Introduced as “the lion of jihad[6],” Hamza is following in the steps of his father, calling al-Qaeda adherents to attack the United States. In a message from Hamza, he orders, “Know that inflicting punishment on Jews and Crusaders where you are present is more vexing and severe for the enemy[7].” Hamza is calling for attacks wherever a fighter is. Such a call maintains, if not escalates, the threat to the United States in the form of inspired and low-intensity terrorist attacks. Therefore, even with the seventh anniversary of bin Laden’s death, Hamza continues in the well-worn path of his father. Hamza and al-Qaeda continue to perpetuate the legacy of bin Ladenism as first established in the 1996 and 1998 messaging, adamantly focusing on the United States as enemy number one.


Endnotes:

[1] Declaration of Jihad against the Americans Occupying the Land of the Two Holiest Sites, Arabic – Combating Terrorism Center at West Point. (n.d.). Retrieved from https://ctc.usma.edu/harmony-program/declaration-of-jihad-against-the-americans-occupying-the-land-of-the-two-holiest-sites-original-language-2/

[2] Declaration of Jihad against the Americans Occupying the Land of the Two Holiest Sites, English – Combating Terrorism Center at West Point. (n.d.). Retrieved from https://ctc.usma.edu/app/uploads/2013/10/Declaration-of-Jihad-against-the-Americans-Occupying-the-Land-of-the-Two-Holiest-Sites-Translation.pdf

[3] Usamah Bin-Muhammad Bin-Ladin, Ayman al-Zawahiri, Abu-Yasir Rifa’i Ahmad Taha, Shaykh Mir Hamzah, & Fazlur Rahman. (1998, February 23). Jihad Against Jews and Crusaders World Islamic Front Statement. Retrieved from https://fas.org/irp/world/para/docs/980223-fatwa.htm

[4] Al Qaeda statement confirming bin Laden’s death, English. (2011, May 6). Retrieved from https://www.reuters.com/article/us-binladen-qaeda-confirmation-text/text-al-qaeda-statement-confirming-bin-ladens-death-idUSTRE74563U20110506

[5] Al Qaeda statement confirming bin Laden’s death, Arabic. (2011, May 6). Retrieved from http://i2.cdn.turner.com/cnn/2011/images/05/06/aq_binladenmessage.pdf

[6] Riedel, B. (2016, July 29). The son speaks: Al-Qaida’s new face. Retrieved from https://www.brookings.edu/blog/markaz/2015/08/19/the-son-speaks-al-qaidas-new-face/

[7] Joscelyn, T. (2017, May 15). Hamza bin Laden offers ‘advice for martyrdom seekers in the West’. Retrieved from https://www.longwarjournal.org/archives/2017/05/hamza-bin-laden-offers-advice-for-martyrdom-seekers-in-the-west.php

Al-Qaeda Assessment Papers Tucker Berry Violent Extremism

An Assessment of Information Warfare as a Cybersecurity Issue

Justin Sherman is a sophomore at Duke University double-majoring in Computer Science and Political Science, focused on cybersecurity, cyberwarfare, and cyber governance. Justin conducts technical security research through Duke’s Computer Science Department; he conducts technology policy research through Duke’s Sanford School of Public Policy; and he’s a Cyber Researcher at a Department of Defense-backed, industry-intelligence-academia group at North Carolina State University focused on cyber and national security – through which he works with the U.S. defense and intelligence communities on issues of cybersecurity, cyber policy, and national cyber strategy. Justin is also a regular contributor to numerous industry blogs and policy journals.

Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years’ worth of experience in cybersecurity and IT project management. During his service in the Armed Forces, Anastasios was assigned to various key positions in national, NATO, and EU headquarters, and he’s been honored by numerous high-ranking officers for his expertise and professionalism, including a nomination as a certified NATO evaluator for information security. Anastasios currently works as an informatics instructor at AKMI Educational Institute, where his interests include exploring the human side of cybersecurity – psychology, public education, organizational training programs, and the effects of cultural, cognitive, and heuristic biases.

Paul Cobaugh is the Vice President of Narrative Strategies, a coalition of scholars and military professionals involved in the non-kinetic aspects of counter-terrorism, defeating violent extremism, irregular warfare, large-scale conflict mediation, and peace-building. Paul recently retired from a distinguished career in U.S. Special Operations Command, and his specialties include campaigns of influence and engagement with indigenous populations.

Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Information Warfare as a Cybersecurity Issue

Date Originally Written:  March 2, 2018.

Date Originally Published:  June 18, 2018.

Summary:  Information warfare is not new, but the evolution of cheap, accessible, and scalable cyber technologies enables it greatly.  The U.S. Department of Justice’s February 2018 indictment of the Internet Research Agency – one of the Russian groups behind disinformation in the 2016 American election – establishes that information warfare is not just a global problem from the national security and fact-checking perspectives; but a cybersecurity issue as well.

Text:  On February 16, 2018, U.S. Department of Justice Special Counsel Robert Mueller indicted 13 Russians for interfering in the 2016 United States presidential election [1]. Beyond the important legal and political ramifications of this event, this indictment should make one thing clear: information warfare is a cybersecurity issue.

It shouldn’t be surprising that Russia created fake social media profiles to spread disinformation on sites like Facebook.  This tactic had been demonstrated for some time, and the Russians have done this in numerous other countries as well[2].  Instead, what’s noteworthy about the investigation’s findings, is that Russian hackers also stole the identities of real American citizens to spread disinformation[3].  Whether the Russian hackers compromised accounts through technical hacking, social engineering, or other means, this technique proved remarkably effective; masquerading as American citizens lent significantly greater credibility to trolls (who purposely sow discord on the Internet) and bots (automated information-spreaders) that pushed Russian narratives.

Information warfare has traditionally been viewed as an issue of fact-checking or information filtering, which it certainly still is today.  Nonetheless, traditional information warfare was conducted before the advent of modern cyber technologies, which have greatly changed the ways in which information campaigns are executed.  Whereas historical campaigns took time to spread information and did so through in-person speeches or printed news articles, social media enables instantaneous, low-cost, and scalable access to the world’s populations, as does the simplicity of online blogging and information forgery (e.g., using software to manufacture false images).  Those looking to wage information warfare can do so with relative ease in today’s digital world.

The effectiveness of modern information warfare, then, is heavily dependent upon the security of these technologies and platforms – or, in many cases, the total lack thereof.  In this situation, the success of the Russian hackers was propelled by the average U.S. citizen’s ignorance of basic cyber “hygiene” rules, such as strong password creation.  If cybersecurity mechanisms hadn’t failed to keep these hackers out, Russian “agents of influence” would have gained access to far fewer legitimate social media profiles – making their overall campaign significantly less effective.

To be clear, this is not to blame the campaign’s effectiveness on specific end users; with over 100,000 Facebook accounts hacked every single day we can imagine it wouldn’t be difficult for any other country to use this same technique[4].  However, it’s important to understand the relevance of cybersecurity here. User access control, strong passwords, mandated multi-factor authentication, fraud detection, and identity theft prevention were just some of the cybersecurity best practices that failed to combat Russian disinformation just as much as fact-checking mechanisms or counter-narrative strategies.

These technical and behavioral failures didn’t just compromise the integrity of information, a pillar of cybersecurity; they also enabled the campaign to become incredibly more effective.  As the hackers planned to exploit the polarized election environment, access to American profiles made this far easier: by manipulating and distorting information to make it seem legitimate (i.e., opinions coming from actual Americans), these Russians undermined law enforcement operations, election processes, and more.  We are quick to ask: how much of this information was correct and how much of it wasn’t?  Who can tell whether the information originated from un-compromised, credible sources or from credible sources that have actually been hacked?

However, we should also consider another angle: what if the hackers hadn’t won access to those American profiles in the first place?  What if the hackers were forced to almost entirely use fraudulent accounts, which are prone to be detected by Facebook’s algorithms?  It is for these reasons that information warfare is so critical for cybersecurity, and why Russian information warfare campaigns of the past cannot be equally compared to the digital information wars of the modern era.

The global cybersecurity community can take an even greater, active role in addressing the account access component of disinformation.  Additionally, those working on information warfare and other narrative strategies could leverage cybersecurity for defensive operations.  Without a coordinated and integrated effort between these two sectors of the cyber and security communities, the inability to effectively combat disinformation will only continue as false information penetrates our social media feeds, news cycles, and overall public discourse.

More than ever, a demand signal is present to educate the world’s citizens on cyber risks and basic cyber “hygiene,” and to even mandate the use of multi-factor authentication, encrypted Internet connections, and other critical security features.  The security of social media and other mass-content-sharing platforms has become an information warfare issue, both within respective countries and across the planet as a whole.  When rhetoric and narrative can spread (or at least appear to spread) from within, the effectiveness of a campaign is amplified.  The cybersecurity angle of information warfare, in addition to the misinformation, disinformation, and rhetoric itself, will remain integral to effectively combating the propaganda and narrative campaigns of the modern age.


Endnotes:

[1] United States of America v. Internet Research Agency LLC, Case 1:18-cr-00032-DLF. Retrieved from https://www.justice.gov/file/1035477/download

[2] Wintour, P. (2017, September 5). West Failing to Tackle Russian Hacking and Fake News, Says Latvia. Retrieved from https://www.theguardian.com/world/2017/sep/05/west-failing-to-tackle-russian-hacking-and-fake-news-says-latvia

[3] Greenberg, A. (2018, February 16). Russian Trolls Stole Real US Identities to Hide in Plain Sight. Retrieved from https://www.wired.com/story/russian-trolls-identity-theft-mueller-indictment/

[4] Callahan, M. (2015, March 1). Big Brother 2.0: 160,000 Facebook Pages are Hacked a Day. Retrieved from https://nypost.com/2015/03/01/big-brother-2-0-160000-facebook-pages-are-hacked-a-day/

Anastasios Arampatzis Assessment Papers Cyberspace Information and Intelligence Information Systems Justin Sherman Paul Cobaugh Political Warfare Psychological Factors

Assessment of the Military Implication of Chinese Investment in the Port of Djibouti

David Mattingly serves on the board of directors for the Naval Intelligence Professionals and is also a member of the Military Writers Guild.  The views reflected are his own and do not represents the United States Government of any of its agencies.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Military Implication of Chinese Investment in the Port of Djibouti

Date Originally Written:  March 11, 2018.

Date Originally Published:  June 11, 2018.

Summary:  Since the 9/11 attacks, U.S. policy in Africa has focused primarily on defeating Al-Qaeda franchises and other violent extremists.  Djibouti’s natural deep-water harbor and stable government have made it the primary transshipment point for maritime trade in Northeastern Africa and as a naval base.  The People’s Republic of China’s (PRC) recent investment in the Port of Djibouti, a country with a U.S. military base, begins another chapter in geopolitical competition.

Text:  The U.S. has a standing requirement for overseas bases to support its global operations.  The U.S. Navy ship USS Cole was attacked in October 2000 in Yemen by Al Qaeda.  In 2003, the U.S. established Combined Joint Task Force-Horn of Africa (CJTF-HOA) on the French Army’s Camp Lemonnier in Djibouti, to support combat operations in Africa and the Arabian Peninsula.

In 2007, a reorganization of the U.S. military’s unified command structure created United States Africa Command (USAFRICOM) based in Germany.  In Djibouti, since the establishment of USAFRICOM, the CJTF-HOA mission has increased with the growth of al-Qaeda and other groups such as the Islamic State, the conflict in Libya and Yemen, and pirate attacks on merchant shipping in the region.  In addition to the U.S., Camp Lemonnier is used by France, Japan, and other North Atlantic Treaty Organization partners.

Djibouti’s growth as a transshipment port has increased with the global demand for containerized shipping[1].  Additionally, Africa depends on maritime shipping to carry 90% of its imports and exports.  France created the port of Djibouti in 1888 and it became the capital of French Somaliland in 1892.  Once established, the port of Djibouti quickly became an important refueling station and cargo storage facility for ships traversing the Red Sea to and from the Indian Ocean and the Mediterranean Sea via the Suez Canal.  During the closure of the Suez Canal (1967-1975) Djibouti suffered a severe decline in shipping volume.

Today, Djibouti is the linchpin to the PRC’s access to trade with Africa.  Business Tech’s 2015 assessment of African shipping ports states, “Djibouti’s is the only reliable port along the main shipping lanes between Europe and the Gulf and also between Asia on the eastern coast of Africa.” Additionally, Ethiopia lost its access to the sea during its war with Eritrea (1998-2000) and now relies on Djibouti as its transshipment access point.

In 2013, PRC President Xi Jinping, announced the resurgence of the ancient “Silk Road” which linked the PRC to markets in the Middle East and Europe and the idea was formalized in the Belt and Road Action Plan released in 2015.  This plan set out to improve trade relationships through infrastructure investments.  The PRC planned to invest $8 trillion for infrastructure in 68 countries which included Djibouti[2].  The port of Djibouti is critical to both the PRC’s African and European Roads. With the increasing demand for port services, the PRC negotiated to expand existing facilities, build new port facilities, and expand the inland transportation network of Djibouti and Ethiopia.  Due to the lack of natural resources, Djibouti depends on the revenue of its transportation facilities and a 2015 International Monetary Fund Report states “Diversifying [Djibouti’s] economic base remains difficult given that the country lacks natural resources and [its] agriculture and industrial sectors are almost non-existent[3].”

The PRC is the largest source of capital in Djibouti and has provided 40% of the financing for Djibouti’s major infrastructure projects.  Additionally, PRC-based firms built three of the largest projects in Djibouti and the PRC is the minority owners and operators of two of the three[4].

Since the emergence of the Somali pirate threat, the PRC has sought basing rights for the People’s Liberation Army (Navy) (PLA(N)) ships which joined in the international effort to protect shipping in the region.  The PRC’s interest in a navy base was born out of several ship engineering problems that developed while PLA(N) ships were deployed to the region and military ties had not been established between the PRC and Djibouti.  Although it was only speculated at the time, the PRC negotiated basing rights for the PLA(N) ships in a 2015 finance package and the base became active in September 2017.  The South China Morning Post reported, “The scale of the wharf should allow for the docking of a four-ship flotilla at least, including China’s new generation Type-901 supply ship with a displacement of more than 40,000 tons, destroyers and frigates, as well as amphibious assault ships for combat and humanitarian missions[5].”

The Trump administration released its 2017 National Security Strategy and though the administration appears to be aware of the situation in Djibouti stating, “China is expanding its economic and military presence in Africa, growing from a small investor in the continent two decades ago into Africa’s largest trading partner today,” the strategy lacks any concrete steps describing how U.S. diplomacy should proceed in the region.

An analysis of U.S. soft power in the Trump administration was recently published in Foreign Policy by Max Boot.  The article notes a recent Gallup Poll of “approval of U.S. leadership across 134 countries and areas stands at a new low of 30%.”  While the PRC is leveraging its economic power to enhance its military position, Boot opines that Trump’s America First campaign has resulted in the declining global opinion of the U.S. which in the long-term may result in a global environment more hostile to U.S. interests.

In a recent Wall Street Journal article, Henry Kissinger was quoted regarding trends and events that emerged from the Cold War and concludes, “…the rise of India and China is more important than the fall of the Soviet Union[6].”  The U.S. and PRC competition in Djibouti is only the beginning.  While both nations assess each others military forces in Djibouti, other instruments of national power are at work both in Djibouti and elsewhere on the continent.  The U.S. and PRC competition in Africa will likely expand, and be worthy of monitoring over the coming decades.


Endnotes:

[1] Africa’s biggest shipping ports. (2015, March 8). Business Techhttps://businesstech.co.za/news/general/81995/africas-biggest-shipping-ports/

[2] Bruce-Lockhart, Anna. China’s $900 billion New Silk Road. What you need to know. World Economic Forum, June 26, 2017 https://www.weforum.org/agenda/2017/06/china-new-silk-road-explainer/

[3] Djibouti Selected Subjects. International Monetary Fund. November 18, 2015 https://www.imf.org/external/pubs/ft/scr/2016/cr16249.pdf

[4] Downs Erica, and Jeffrey Becker, and Patrick deGategno. China’s Military Support Facility in Djibouti: The Economic and Security Dimensions of Chinas First Overseas Base. The CNA Corporation, July 2017. https://www.cna.org/CNA_files/PDF/DIM-2017-U-015308-Final2.pdf

[5] Chan, Minnie. (2017, September 27). China plans to build Djibouti facility to allow naval flotilla to dock at first overseas base. South China Morning Post. http://www.scmp.com/news/china/diplomacy-defence/article/2112926/china-plans-build-djibouti-facility-allow-naval

[6] Mead, W. R. (2018, February 5). A word from Henry Kissinger. Wall Street Journal. Retrieved February 6, 2018, from https://www.wsj.com/articles/a-word-from-henry-kissinger-1517876551

Africa Assessment Papers China (People's Republic of China) David Mattingly Djibouti United States

Assessing How Article 51 of the United Nations Charter Prevents Conflict Escalation

Jared Zimmerman is an M.A. candidate at American University’s School of International Service where he is studying United States Foreign Policy and National Security with a concentration in terrorism and political violence.  He can be found on Twitter @jaredezimmerman.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing How Article 51 of the United Nations Charter Prevents Conflict Escalation

Date Originally Written:  March 8, 2018

Date Originally Published:  June 4, 2018.

Summary:  Article 51 of the United Nations Charter is sufficiently vague to allow states to assert their right to self-defense without escalating a conflict. While either side in a conflict may see the other as the aggressor acting beyond mere self-defense, Article 51 is vague enough that neither side can prove the other has acted offensively. This vagueness can aid in, if not the de-escalation of conflicts, preventing the rapid escalation of conflicts.

Text:  The first sentence of Article 51 of Chapter 7 of the United Nations Charter reads as follows:

Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security[1].

This sentence is particularly vague on the following points:

  1. It does not define what constitutes an attack. Is the seizure of ships or aircraft an attack? Is the accidental or intentional violation of another country’s airspace an attack? Is industrial espionage an attack? Is a spy satellite taking photographs of military installations an attack?
  2. It does not define what constitutes an armed attack. For example, is a cyber attack an armed attack?
  3. It does not define “collective self-defence.” Does the attacked nation need to request assistance or can other nations preemptively intervene and claim their intervention constitutes collective self-defense? Requiring the attacked nation to request assistance might seem like the most responsible position, but this requires that the United Nations Security Council determine who the original aggressor and defender are. This determination may not be possible or delivered in a timely manner.
  4. The phrase “…until the Security Council has taken measures necessary to maintain international peace and security” begs several questions. What if the Security Council does nothing? What if the Security Council does act, but these actions are not sufficient to resolve the conflict? What constitutes a resolution and who decides whether a resolution is satisfactory?
  5. The phrase: “international peace and security” also begs several questions. What is international peace and security? Was the world at peace during the Cold War? Is the world not at peace when great powers are not in conflict but relatively small regional or civil wars are ongoing? Is the world at peace when there is no open conflict between states but despots murder and oppress their own people?

It is apparent from the questions in the preceding paragraphs that the first sentence of Article 51 is exceedingly vague. Opposed parties in a real-world conflict are certain to interpret portions of the sentence in their own best interest, and these interpretations could be wildly different yet equally valid[2]. But this begs the question, does this vagueness expand and escalate conflicts or limit and de-escalate them?

On the surface it might appear that a more explicit Article 51 is to be desired. If it was clear to states what actions constitute an armed attack and what circumstances allow for collective self-defense, perhaps states would judiciously aim to abide by these rules lest they risk United Nations’ intervention. There are several problems with this approach:

  1. It would be impossible to explicitly account for all types of armed attacks, not simply because of the variety that exists today, but because new types are continually being invented. For example, the authors of the United Nations Charter could hardly have conceived of cyber warfare in 1945.
  2. States are ingenious and will always find new ways to circumvent—or even outright ignore—any explicit rules that are laid out.
  3. If a state realizes it must break one explicit rule to advance its agenda, why not break more? If the United Nations Security Council does not intervene when one rule is broken, will it if two are broken? Three? Four? States will test how far they can push the boundaries because it is advantageous to do so.

Is it possible, however, that having a vague Article 51 is advantageous? The world is not rigid, so would it be beneficial to have a rigid Article 51? Given the reasons above, a rigid Article 51 is certainly not practical. Let us take the Iranian drone shot down by the Israeli Defense Force in February 2018 as an example of the advantages of a vague Article 51.

On February 10th, 2018 an Iranian drone entered Israeli airspace and was shot down by an Israeli helicopter. The Israeli Defense Force followed up by attacking what they believed to be the “drone launch components in Syrian territory[3].” Later, Israeli Air Force (IAF) aircraft attacked 12 targets in Syria, including a mix of Syrian and Iranian military targets. “During the attack, multiple anti-aircraft missiles were fired at IAF aircraft. The two pilots of an F-16 jet ejected from the aircraft as per procedure, one of whom was seriously injured and taken to the hospital for medical treatment[4].”

To summarize, Iranians in Syria used a drone to violate Israeli airspace. The Israelis responded by destroying the drone and the drone’s launch structures in Syria. The Israelis then violated Syrian airspace to attack Syrian and Iranian infrastructure. While doing so, one of their F-16’s was shot down and one of its crew was wounded. All of this has occurred, yet Iran and Israel have not declared war in response.

Incidents like this are so common that it is easy to overlook the miraculous fact that while such incidents are not “peaceful,” the world does not face open war in response to each of them. There are certainly a variety of reasons for this lack of open war that can be unique to each situation such as level-headed leaders on either side, mutually assured destruction, war-weary populations, etc. One compelling reason that many share, however, is that each side can claim it was acting in self-defense while not being able to convince the international community and United Nations Security Council that this is true. In this above example, Israel could claim that it was attacked when the Iranian drone entered its airspace so its response was in self-defense. Iran and Syria could claim that their drone was unarmed and entered Israeli airspace accidentally. Israel then attacked them and they downed an Israeli aircraft in self-defense. This familiar dance occurs in other comparable situations: opposing sides take limited aggressive actions towards each other but generally stop short of open war. Article 51 doesn’t eliminate conflict, but prevents it from escalating or at least escalating quickly.


Endnotes:

[1] United Nations. (n.d.). Charter of the United Nations: Chapter VII. Retrieved February 27, 2018, from http://www.un.org/en/sections/un-charter/chapter-vii/

[2] Glennon, M. (2018, February 13). ILO L201: Public International Law [Class discussion]. The Fletcher School of Law and Diplomacy at Tufts University, Medford, Massachusetts, U.S.

[3] IDF intercepts Iranian UAV. (2018, February 10). Retrieved February 28, 2018, from https://www.idf.il/en/minisites/press-releases/idf-intercepts-iranian-uav/

[4] IDF intercepts Iranian UAV. (2018, February 10). Retrieved February 28, 2018, from https://www.idf.il/en/minisites/press-releases/idf-intercepts-iranian-uav/

Assessment Papers Governing Documents and Ideas Jared Zimmerman United Nations

The Conflict of a New Home: African Migrants and the Push/Pull Factors during Acculturation

Linn Pitts spent a decade in law enforcement prior to transitioning into teaching on a university level.  He presently teaches as an Assistant Professor in the Social Science Department at Shorter University.  He can be found on Twitter @Professor_Pitts and is writing a dissertation on gatekeepers in Countering Violent Extremism programs in the United States.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title: The Conflict of a New Home: African Migrants and the Push/Pull Factors during Acculturation

Date Originally Written:  February 13, 2018.

Date Originally Published:  May 28, 2018.

Summary:  Whether migrant has voluntarily relocated to the US from a country in turmoil or a refugee being resettled to the US, the individual may still face factors that pull them towards the conflict of their homeland and may push them from full acculturation in their new society.

Text:  While it is important for the U.S. to have good foreign policies that are able to help address turmoil in African countries, equally important is the posture taken by entities in the U.S. towards migrants that may have moved or been displaced. According to Boyle and Ali [1] the general theories of migration include three broad categories concerning acculturation (the process of social, psychological, and cultural change that stems from blending between cultures) at the end of the migrant’s journey. The categories include group dynamics, reception of the new society, and the nature of the exit from their home country. All of these categories serve as excellent assessment points for developing an understanding of the issues faced by migrants. For the purposes of this assessment, the primary focus is group dynamics and the reception of a new society. If policy makers understand the nuances of group dynamics and the reception possibilities of a new society, they will be better prepared to provide good governance.

Group dynamics include cultural aspects and family dynamics illustrated by interactions within extended families and communities. These group dynamics can be problematic as Boyle and Ali explain as family structures are impacted by what U.S. law has deemed a family such as the exclusion of polygamy, the allowance of only nuclear family members to migrate as a group, and the lack of elder support in their transplanted home. Boyle and Ali further indicate that conflicts from their home countries have already broken some families apart. Each migratory situation will vary depending on the state of being a migrant or a refugee as noted by Bigelow [2]. Boyle and Ali further specified that the loss of extended family members severely impact the migrant families such as limiting child care and a lack of traditional family roles. In seeking to properly conceptualize these aspects, a purposeful interview was conducted with a migrant. In personal communications with Mia (pseudonym), she noted her family moved to the U.S. when she was approximately eight years of age and she is now 21 years of age. The relocation to the U.S. was prompted by tribal conflicts that limited opportunities in her home country in Central Africa. She confirmed that since arriving in the U.S., the lack of extended family was problematic, especially regarding the roles her parents once held in their home country. In general, these issues would categorically further migrant reliance on state resources such as outside parties to resolve disputes and the social service programs.

The reception of the new society as noted by Boyle and Ali entails a period of adaptation and sometimes it is a struggle due to the removal of family support. Whereas dependence on social service programs may provide time for adaptation and development of social capital, it may not completely replace the extended family. Mia stated she found it difficult to acculturate due to bullying, issues with racial identity, and struggles adapting academically primarily based on differences in English, a point supported by Bigelow. Mia was bullied by African-American children in part due to misperceptions, “African-Americans view (sic) Africans as savages, uneducated, and poor,” Mia remarked. Continuing, she said “often time I do not see myself as black but as African.” It is an interesting concept supported by the work of Bigelow revealing migrant parents of Somali youth were concerned about the perceptions of the interactions with African-American children, especially if their children are viewed as unruly. Mia noted the parental views had merit concerning an understanding of the difficult transitions to life in the United States. While Central African and Horn of African nations are distinct entities in different regions of the Africa, Mia described the cultural contexts as “that’s just African,” She found friendship with children who had relocated from Kenya and Nigeria. Bigelow noted that the migrant children are living in two worlds, their world at home and their world at school. This two-world construct was also supported by Zhou [3] in a discussion of cultural identity and the impact on children of migrants.

Another point of reception in a new society deals with the aspects of understanding local laws during a period of acculturation. The transition can be aided by groups and religious organizations seeking to aid in the transition to the U.S. While recent arrests and later convictions of Minnesota-based Somalis seeking to join the Islamic State captured headlines, consider efforts of municipal agencies in Minnesota [4] and Clarkston, Georgia located on the outskirts metro-Atlanta. According to David (personal communications), a missionary in Clarkston, the city was chosen to be a refugee resettlement area in the 1990s. He noted the area was a prime location for refugee resettlement due to the high degree of apartment complexes (near 80%), featured a low-cost of living, it was close proximity to a major airport, and it had a public transit available to Atlanta. Moreover, he detailed that Time Magazine deemed this portion of Clarkston as the most diverse square mile in the U.S. As an example, approximately 100 languages were spoken at Indian Creek Elementary School in Clarkston. When asked about the Somali population, David stated it was previously the largest migrant population in Clarkston but population dynamics recently shifted due to the Myanmar Crisis. Clarkston is a success because people who come to the U.S. as a result of U.S. asylum and refugee resettlement programs not only have a place to settle, but that place has many features which, according to Salehyan and Gleditsch [5], can help minimize tensions during acculturation. Clarkston, through its ability to make acculturation smoother, allows grievances to be addressed early so they do not lead migrants down extremist pathways.

Regarding grievances and tensions, Somalis, like most inhabitants of developing countries, have a legacy of distrust with the police [6] an aspect intensified by recent efforts of U.S. Immigration and Customs Enforcement officials [7]. Boyle and Ali found Somali men feel persecuted in the United States by law enforcement mainly due to enforcement of laws such as domestic violence. Whereas in Somalia, the family elder may intervene to address problems, due to aforementioned issues the elders are not present. Law enforcement officers have a great deal of discretion in their daily activities, unless arrest is mandated by statute such as domestic violence. Even if law enforcement acts in good faith with the intent of upholding the law, issues could still arise. Weine, Eisenman, Kinsler, Glik, and Polutnik [8] identified that law enforcement may create resentment and ultimately diminish cooperation from communities if these communities are policed in a way seen as culturally incompatible. Weine, Eisenman, Kinsler, Glik, and Polutnik suggested a community health approach. This approach was indirectly supported by Boyle and Ali in their examination and later assessed by Cummings, Kamaboakai, Kapil, and Stone. In closing, while generous U.S. policies enable migrants to come to the U.S., unless the location where they finally arrive is prepared to receive them, and local capabilities are ready to provide close and continuing support during acculturation, the migrant will likely continue to face a friction-filled existence. This existence may make the migrant feel pulled back home and simultaneously pushed into a new society which they do not understand.


Endnotes:

[1] Boyle, E.H., & Ali, A. (2010). Culture, structure, and the refugee experience in Somali immigrant family transformation. International Migration, 48(1), 47-79.

[2] Bigelow, M. (2010). Mogadishu on the Mississippi: Language, racialized identity, and education in a new land. New York: Wiley-Blackwell.

[3] Zhou, M. (2003). Growing Up American: The challenge confronting immigrant children and children of immigrants. Annual Review of Sociology. 23. 63-95. 10.1146/annurev.soc.23.1.63.

[4] Cumings, P., Kamaboakai, E. T., Kapil, A., & Stone, C. (2016). A Growing Community: Helping Grand Forks increase inclusion of new Americans.

[5] Salehyan, I., & Gleditsch, K. S. (2006). Refugees and the spread of civil war. International Organization, 60, 335-366.

[6] Haugen, G. A., & Boutros, V. (2015). The locust effect: Why the end of poverty requires the end of violence. Oxford University Press.

[7] Redmond, J. (2017, April 13). Immigration arrests target Somalis in Atlanta area. Atlanta Journal Constitutional. Retrieved from https://www.ajc.com/news/immigration-arrests-target-somalis-atlanta-area/uYatzrGTOkEGWuwocYmReJ/

[8] Weine, S., Eisenman, D. P., Kinsler, J., Glik, D. C., & Polutnik, C. (2017). Addressing violent extremism as public health policy and practice. Behavioral sciences of terrorism and political aggression, 9(3), 208-221.

Africa Assessment Papers Linn Pitts Migrants United States

Assessment of Opération Turquoise: The Paradoxical French-led Humanitarian Military Intervention During the 1994 Genocide in Rwanda

Ross Conroy is a researcher and program designer for Komaza Kenya, a social enterprise focused on poverty reduction through sustainable timber production.  Ross also serves as Public Relations advisor for Sudan Facts, a start-up which intends to build investigative journalistic capacity in Sudan.  Ross studied Political Science at the University of New Hampshire, and wrote his capstone on the French military intervention during the Rwandan Genocide.  He spent most of his senior year in Rwanda doing field and archival research to supplement this study.  Ross later attained his Master’s degree in African Studies from Stanford University, where he focused on politics in Central Africa and continued his research on French involvement during the 1994 Genocide.  Ross can be found on Twitter @rossconroy or at rconroy7@outlook.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Opération Turquoise: The Paradoxical French-led Humanitarian Military Intervention During the 1994 Genocide in Rwanda

Date Originally Written:  February 12, 2018.

Date Originally Published:  May 14, 2018.

Summary:   In response to escalating genocidal violence in Rwanda in April 1994, France launched Opération Turquoise for ostensibly humanitarian purposes.  However, much evidence has implicated this mission, and France, in the genocide and subsequent violence.  By examining archives, interviewing genocide survivors, and compiling testimonies of French soldiers, a more clear, and far more sinister, picture of Opération Turquoise emerges.

Text:  The French-led Opération Turquoise, mobilized by the United Nations (UN) Security Council through Resolution 929, was controversial from its genesis.  The debate leading up to the final vote on the resolution was riddled with arguments about France’s true intentions.  Having been the main sponsors of the Hutu regime that was now organizing and perpetrating genocide against the Tutsi minority, an abrupt change in France’s policy was viewed with suspicion.  Publicly, France argued that violence in Rwanda had escalated to the point that it necessitated international intervention on humanitarian grounds.  The wording of the resolution seemed to confirm this, stating that the mission was “aimed at contributing, in an impartial way, to the security and protection of displaced persons, refugees and civilians at risk in Rwanda[1].”  However, due to concerns over France’s intentions, and the proposed departure from the Chapter VI mandate of the United Nations Assistance Mission for Rwanda (UNAMIR) and UNAMIR II, five countries abstained from the final vote[2].  Rather than supplying and funding the existing UNAMIR mission, France wanted a Chapter VII mandate over which they had near complete jurisdiction.  When the mission was eventually condoned by the Security Council, France mobilized their force and, as some countries had feared, used it to promote their interests.  Rather than protecting Tutsis from the genocidal regime, Opération Turquoise was co-opted to allow the perpetrators to continue their campaign of violence and eventually escape the Rwandan Patriotic Front (RPF) advance by fleeing into neighboring Zaire[3].  The results of this would prove disastrous.

The origins of Opération Turquoise were rooted in the close ties between then French President François Mitterrand and his Rwandan counterpart Juvénal Habyarimana.  The Technical Military Assistance Agreement signed between the two countries after Habyarimana came to power in the 1970s solidified this relationship by formally incorporating Rwanda into the linguistic and cultural sphere of la francophonie and promising economic aid and military protection[4].  Following this agreement, military aid was passed for decades to the Rwandan army and its militias directly through the Quai D’Orsay, the French Ministry of Foreign Affairs.  These same weapons were later put to use exterminating the Tutsi minority.

In October 1990, Rwanda was invaded by Rwandese rebels from Uganda who wanted a return to their country of origin.  Due to xenophobic policies of the Rwandan regime, these Rwandese rebels had long been denied this opportunity.  The French, fearing an incursion from what they saw as ‘the anglophone bloc,’ rushed to the aid of their francophone ally.  The rhetoric of French politicians at the time indicated that the Fashoda Syndrome, the inherent French fear of francophone influence being supplanted by anglophone influence, motivated France to support the Rwandan regime, and solidified ties between the two countries further[5].

After the assassination of President Habyarimana in April 1994, it quickly became clear that the violence engulfing Rwanda was of an unspeakable magnitude; a genocide was unfolding.  Despite this, France declined to act, not wishing to aid the RPF in the fight against their erstwhile ally, the Rwandan regime.  As it became clear that the Rwandan government was failing in its fight against the RPF, France chose to intervene under the guise of a much-needed humanitarian mission.  The UN had little choice, given the dearth of alternatives, and accepted the French offer of assistance.

The French originally conceived the mission as a means to halt the advance of the RPF militarily and assist the government of Rwanda in retaking the capital, Kigali[6].  However, it soon became evident that this position was untenable as the evidence of genocide mounted.  The goal of Opération Turquoise was thus altered to aid the Rwandan government forces in fleeing the country to Zaire, with the intention to preserve the government and its hierarchy intact to pursue future power-sharing agreements[7].  It was a final, frantic attempt to avoid losing influence in the region, and one that would have devastating consequences.

In the process of assisting the genocidal regime, France often neglected to protect the Tutsi whom they were charged with safeguarding.  There is irrefutable evidence that the French demonstrated gross negligence of their mandate by abandoning thousands to die in various locations around the country, most notably at Bisesero[8][9].  Indeed, numerous reports cite French soldiers trading sexual favors for food and medical supplies, raping, and even killing Rwandan citizens[10].  The French further neglected to disarm Rwandan troops and militias whom they escorted to Zaire, and in some cases supplied them with food, weapons, and vehicles[11].  These same Rwandan forces would later profiteer in the Zairean refugee camps, syphoning humanitarian aid intended for victims of genocide.  As the refugee camps were often not the internationally required 50 miles from the border of Rwanda, the ex-Rwandan Armed Forces and militias were able to use the camps as bases and launch a devastating and deadly insurgency back into Rwanda, killing thousands[12].  In response to the insurgency, and renewed killings of Tutsi in Zaire, the new RPF-led Rwandan government invaded Zaire, setting in motion the Congo Wars, the most deadly series of conflicts worldwide since the two World Wars.  Years of suffering, disease, and death can be traced back to the decision made by the French to escort the génocidaires to Zaire and continue to supply and support them in a vain attempt to cling to their influence in the region.

Ultimately, Opération Turquoise failed on two fronts: It failed to maintain the integrity and legitimacy of the former Rwandan regime and also failed to uphold its mandate to protect victims of genocide.  Although it is impossible to establish a direct causal relationship between violence in the Great Lakes Region following Opération Turquoise and the 1994 Genocide against the Tutsis, there is ample evidence that Opération Turquoise exacerbated the humanitarian situation.  Opération Turquoise, conceived as a humanitarian mission, thus paradoxically contributed to one of the worst humanitarian disasters in modern history in the Eastern Democratic Republic of the Congo.


Endnotes:

Note: Some names have been changed to protect the identities of interview subjects. 

[1] United Nations Security Council (SC), Resolution 929. (1994, June 22). Opération Turquoise. Retrieved April 22, 2016 from https://documents-dds-ny.un.org/doc/UNDOC/GEN/N94/260/27/PDF/N9426027.pdf?OpenElement

[2] Schweigman, D. (2001). The Authority of the Security Council under Chapter VII of the UN Charter: Legal Limits and the Role of the International Court of Justice. The Hague: Kluwer Law International.

[3] Twenty Years after Genocide France and Rwanda Give Different Versions of History. (2014, April 11) Retrieved February 28, 2016 from http://www.english.rfi.fr/africa/20140410-twenty-years-after-genocide-france-and-rwanda-give-different-versions-history

[4] Totten, S, and Sherman, M. (2005). Genocide at the Millennium. New Brunswick, NJ: Transaction Publishers.

[5] Simon, M. (1998) Operation Assurance: The Greatest Intervention That Never Happened. The Journal of Humanitarian Assistance. Retrieved April 12, 2016 from http://sites.tufts.edu/jha/archives/123.

[6] Melvern, L. (2009). A People Betrayed: The Role of the West in Rwanda’s Genocide. London: Zed.

[7] Mukasarasi, J. (2016, April 17). Personal Interview.

[8] Assemblée Nationale. (1998, December 15). Rapport d’information de MM. Pierre Brana et Bernard Cazeneuve, déposé en application de l’article 145 du Règlement par la mission d’information de la commission de la Défense, sur les opérations militaires menées par la France, d’autres pays et l’ONU au Rwanda entre 1990 et 1994. Paris: French National Assembly.

[9] De Vulpian, L & Prungnaud, T. Silence Turquoise. Paris: France. Don Quichotte.

[10] Mvuyekure, A. (2016, April 16). Personal Interview.

[11] Des Forges, A. (1999). Leave None to Tell the Story: Genocide in Rwanda. New York: Human Rights Watch.

[12] Gribbin, R. (2005). In the Aftermath of Genocide: The U.S. Role in Rwanda. Lincoln, NE: IUniverse.

Assessment Papers France Mass Killings Ross Conroy Rwanda United Nations

Assessment of the Security Implications of Environmental Crime in Africa

Zachary Lubelfeld is pursuing a Master of Public Administration and a Master of Arts in International Relations at Syracuse University.  He is currently in Maputo, Mozambique on a Boren Fellowship studying Portuguese and the extractive sector in Mozambique.  All opinions in this article are those of the author and do not represent the official positions of Syracuse University or the National Security Education Program.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Security Implications of Environmental Crime in Africa

Date Originally Written:  January 22, 2018.

Date Originally Published:  April 30, 2018.

Summary:  Environmental crime is a growing component of transnational crime, as well as an increasingly lucrative one. Organized crime, militia groups, and terrorist organizations all profit off the illicit sale of everything from minerals to animals. This criminal activity poses a significant threat, not just to the communities in which it occurs or where these entities commit violence, but to the health and safety of people around the world.

Text:  As globalization continues apace, and the world becomes increasingly interconnected, the benefits, like greater access to goods and information, are matched by the costs, such as the increased space for transnational criminal activity. One of the least discussed aspects of this is environmental crime. Global environmental crime is a burgeoning market, worth an estimated $213 billion annually[1]. This environmental crime includes a wide range of illicit activities, such as illegal logging in rainforests, illegal mining of mineral resources, and poaching elephants and rhinoceroses for their ivory.  The lack of focus on environmental crime allows criminal organizations to wreak havoc with relative impunity, and nowhere is this truer than in Africa. The pernicious effects of wildlife exploitation are felt across all of Africa, the security implications of which are myriad. Regional stability, armed conflict and terrorism, and global health are all impacted by wildlife exploitation in Africa, with potentially dangerous results not just for Africans, but for people worldwide.

Environmental crime is an important driver of violence and conflict across Africa, as it provides integral revenue streams for many violent militia groups and terrorist organizations. Perhaps the most well-known example of this are conflict minerals, which refers to minerals that are sold to fund violence. Diamonds have long been a driver of conflict in Africa, a recent example of which is the ongoing civil war in the Central African Republic[2]. Violent militia groups in the Democratic Republic of Congo (DRC) profit from the sales of minerals like cassiterite, a tin ore worth about $500/kg that is used in products such as phones, laptops, and cars[3]. The value of the illicit mineral trade in East, Central, and West Africa is valued at $2.4 billion to $9 billion per year, which rivals the value of the global heroin and cocaine markets combined[4].

Another key component of environmental crime is poaching, both for bush meat and for ivory. Armed militia groups as well as military units in Africa rely on poaching for food – for example, one adult elephant can feed an average army regiment. Ivory is the more lucrative reason for poaching, however. Elephant tusks sell for an estimated $680/kg[5], while rhinoceros horn is worth upwards of $65,000/kg. Ivory can be sold, or traded for supplies and weapons, and is a major funding source across Africa, from the Lord’s Resistance Army in eastern Africa to transnational criminal networks operating in Mozambique; there is even evidence that the Somali terrorist organization al-Shabaab profits from ivory smuggling. The illicit sale of ivory is also an important revenue source for armed militias in the DRC[6] and groups like the Janjaweed, the notorious Sudanese militias responsible for the genocide in Darfur[7].

Lesser known examples of environmental crime are essential to funding the operations of terrorist organizations across Africa, such as illegal logging. One of the primary uses of illegal logging is the production and taxation of charcoal, which is a fuel source for Africans who don’t have access to electricity. Al-Shabab had earned an estimated $56 billion from illicit charcoal by 2014, making it the primary source of funding for their operations.  Additionally, there are reports that the Nigerian terrorist organization Boko Haram derives funding from the trade[8]. Furthermore, profits from the illegal timber trade are used to facilitate arms smuggling in Africa, arming terrorists, as well as rebel groups such as in Sierra Leone and Cote d’Ivoire[9].

As concerning as it is that terrorist organizations and militia groups derive significant benefit from environmental crime, a potentially even greater danger is the consequences it could have on global health. A variety of animals are trafficked internationally, from rare birds and reptiles to gorillas, as well animal parts like pelts and tusks. This contact between animals and humans increases the risk of transmission of dangerous zoonotic diseases. Zoonotic diseases are transmitted from animals to humans. One example is the Ebola virus, which is thought to come from bats and primates, the latter of which may have spread the disease while being trafficked through cities is western Africa[10].

Increased transport of wildlife internationally increased the chances of the spread of dangerous pathogens, especially in the case of illicit trafficking. Pathogens that may otherwise have been contained in one location are sent around the world, increasing the risk of pandemic. While customs procedures designed to screen for these pathogens exist, wildlife traffickers bypass these to avoid detection, so infected animals are not discovered and put in quarantine. Therefore, wildlife trafficking could lead to the international transmission of a disease like Ebola, anthrax, or Yersinia pestis, otherwise known as the bubonic plague.

It is clear that environmental crime is as lucrative for criminals as it is dangerous to everyone else, and therefore shows no signs of slowing down. Given the potential harm that it could cause, by funding groups who seek to bring violence and chaos wherever they go, as well as by increasing the probability of devastating pandemic, environmental crime will certainly continue if it is not addressed by law enforcement and policy makers.


Endnotes:

[1] Vira, V., Ewing, T., & Miller, J. (2014, August). Out of Africa: Mapping the Global Trade in Illicit Elephant Ivory. Retrieved October 18, 2017, from C4ADS: https://c4ads.org/reports/

[2] A Game of Stones: smuggling diamonds in the Central African Republic. (2017, June 22). Retrieved January 17, 2018, from https://www.globalwitness.org/en/campaigns/central-african-republic-car/game-of-stones/#chapter-1/section-3

[3] Morrison, S. (2015, May 16). ‘Conflict minerals’ funding deadly violence in the Democratic Republic of Congo as EU plans laws to clean up trade. Retrieved January 17, 2018, from http://www.independent.co.uk/news/world/africa/conflict-minerals-bringing-death-to-the-democratic-republic-of-congo-as-eu-plans-laws-to-clean-up-10255483.html

[4] Environmental Crime. (n.d.). Retrieved January 17, 2018, from https://www.stimson.org/enviro-crime/

[5] Chen, A. (2016, November 07). Poaching is on the rise – most illegal ivory comes from recently killed elephants. Retrieved January 20, 2018, from https://www.theverge.com/2016/11/7/13527858/illegal-ivory-elephant-radiocarbon-dating-poaching-stockpile

[6] Toeka Kakala, Taylor. “Soldiers Trade in Illegal Ivory” InterPress Service News Agency. 25 July 2013. Web. 25 Mar. 2014. http://www.ipsnews.net/2013/07/soldiers-trade-in-illegal-ivory

[7] Christina M. Russo, “What Happened to the Elephants of Bouba Ndjida?” MongaBay, March 7, 2013. Available at http://news.mongabay.com/2013/0307-russo-elephants-bouba-njida.html

[8] Ibid.

[9] ILLEGAL LOGGING & THE EU: AN ANALYSIS OF THE EU EXPORT & IMPORT MARKET OF ILLEGAL WOOD AND RELATED PRODUCTS(Rep.). (2008, April). Retrieved January 17, 2018, from World Wildlife Foundation website: http://assets.wnf.nl/downloads/eu_illegal_logging_april_2008.pdf

[10] Bouley, T. (2014, October 06). Trafficking wildlife and transmitting disease: Bold threats in an era of Ebola. Retrieved January 15, 2018, from http://blogs.worldbank.org/voices/trafficking-wildlife-and-transmitting-disease-bold-threats-era-ebola

Africa Assessment Papers Criminal Activities Environmental Factors Illicit Trafficking Activities Zachary Lubelfeld

Assessment of the How the Media Overstates the Threat Posed by the Erroneously Called ‘Lone-Wolves’

Cristina Ariza holds a master’s degree from the Department of War Studies, King’s College London, where she focused on radicalisation and Countering Violent Extremism (CVE.)  She is a freelance analyst, currently researching on Spanish jihadist networks and the role of families in CVE.  She can be found on Twitter @CrisAriza_C.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the How the Media Overstates the Threat Posed by the Erroneously Called ‘Lone-Wolves’

Date Originally Written:  January 23, 2018.

Date Originally Published:  April 16, 2018.

Summary:  Media outlets, commentators, and prosecutors continue to use the ‘lone wolf’ typology to refer to any kind of individual attacker, which overlooks how the majority of these perpetrators have radicalised in contact with other like-minded individuals. As a result, the threat arising from supposedly ‘undetectable terrorists’ has been markedly overstated, to the point of sowing unnecessary fear.

Text:  A quick Google search of the term ‘lone wolf terrorism’ throws about 459,000 results, which is a striking number given how misleading this concept actually is. Initially, the concept of ‘lone wolf’ was supposed to represent the threat coming from individuals who radicalised in isolation and went on to commit an attack alone. Since they were not receiving instructions from a terrorist command nor they were in contact with other extremists, lone wolves were undetectable threats that could strike at any given time. However, as shown by the media frenzy that arises every time there is an attack, this category has lost all meaning. Now, every attack committed by one individual is automatically labelled as a ‘lone wolf’ attack, regardless of whether said individual actually fits the criteria. Thus, the discourse shifts onto a meaningless debate that contributes nothing to explaining how individuals are actually driven to commit attacks.

The first stumbling block we come across when examining ‘lone wolves’ is conceptual. There seems to be a certain consensus in the literature that in order to be designated as such, ‘lone wolves’ need to be detached operationally and institutionally from larger networks. In his study on Islamist lone attackers, Raffaello Pantucci differentiated between loners, lone wolves, lone wolf packs, and lone attackers. However, only the ‘loners’ had radicalised in total isolation and proceeded to attack alone. The rest of the categories included individuals who did not formally belong to a hierarchical command but had some online or offline contact with extremists, and individuals who committed an attack in small groups[1]. Strictly speaking, only the ‘loners’ could fit the criteria of self-radicalised ‘lone wolves,’ which is why compiling all these categories under the same typology ends up being problematic. For starters, this compiling overlooks the significant differences that exist between self-radicalisation and group radicalisation. As Bart Schuurman et al correctly point out, ‘peer pressure, leader-follower interactions, group polarization and other social-psychological processes by definition rule out including even the smallest „packs‟ under the heading of lone-actor terrorism[2].’

While, in spite of disagreements, literature discussions on ‘lone wolf’ terrorism tend to be very nuanced, this meticulousness appears to be absent in other contexts. In media and public usage, every attack that is committed by an individual perpetrator is at first designated as a ‘lone wolf’ attack, which risks overestimating the threat coming from self-radicalised and independently operating individuals. In 2016, the Nice and Berlin attackers were first wrongly identified as ‘lone-wolves’, even though it later emerged that both perpetrators had radicalised in contact with like-minded individuals. Jason Burke, in his piece entitled ‘The Myth of the Lone-Wolf Terrorist’ compellingly argues that ‘this lazy term [lone wolf] obscures the real nature of the threat against us[3].’

Furthermore, there seems to be a correlation between the modus operandi of an attack and the decision to designate an individual (or even individuals) as ‘lone-wolves.’ A perfect example of this correlation is a Daily Mail headline that claimed: ‘ISIS has abandoned large-scale terror atrocities to focus on ‘lone wolf’ attacks like Nice and Berlin, government report says[4].’ The government report quoted in this article, whose authenticity could not be independently verified, referred more generally to ‘lone actors’ and ‘small groups’, which in sensational media jargon translates as ‘lone wolves.’ Despite the fact that neither the Berlin nor the Nice attacker could actually be categorised as lone-wolves, the article audaciously equated low-cost attacks with lone-wolves, as if tactics had any bearing on radicalisation. While the Daily Mail is not particularly known for its credibility, a journalist from the much more reliable British newspaper ‘The Telegraph’ also suggested that the Westminster 2017 attack and the murder of Lee Rigsby were examples of how lone-wolf attacks did not require sophisticated weapons[5].’ Whereas one could forgive a premature—and ultimately mistaken— analysis on whether Khalid Masood was a lone wolf, both perpetrators in the Lee Rigsby case were linked to Al Muhajiroun, one of the United Kingdom’s largest jihadist recruitment networks. Therefore, the apparent correlation between low-cost weapons and lone wolves—or even ‘pack of wolves’— is not immediately clear. While it stands to reason that individuals who formally belong to terrorist organisations and have planned to commit large-scale attacks might resort to more sophisticated weapons —the Paris and Brussels attackers chose to use suicide vests and bombs—, the decision to strike with a low-cost weapon does not say much about how one individual might become radicalised. Granted, true lone wolves would likely resort to low-cost weapons, but so did the London Bridge attackers or the Magnaville perpetrator. Referring to low-cost attacks as ‘lone wolf attacks’ only contributes to adding another layer of confusion to an already problematic concept.

A more recent trial case in the United Kingdom showed how prosecution has also adopted this terminology. According to The Guardian, Munir Mohammed had ‘resolved upon a lone wolf attack[6].’ Yet he had enlisted the help of his girlfriend to buy the ingredients for a chemical attack. Both had met online and frequently shared extremist content with each other. If this was not reason enough to determine that Munir Mohammed did not radicalise in total isolation, as a so-called ‘lone-wolf’ is supposed to do, the article also showed that Munir Mohammed was in contact with an Islamic State commander and that he was waiting for instructions to attack. The evidence clearly shows that the dynamics of radicalization that led Munir Mohammed to try to commit an attack were diametrically different to the mechanisms of self-radicalisation. Unfortunately, the persistent use of the ‘lone wolf typology’ prevents us from noticing these nuances and communicating them to the general public.

The inaccurate understanding of the lone wolf concept is consistently being applied to terrorism cases that fail to meet the necessary criteria, which only contributes to creating preventable fear amongst the population. It is precisely in a climate of exaggerated fear where terrorists thrive, which is why the ‘lone wolf’ categorisation is no longer adequate to analyse and understand the current terrorist threat.


Endnotes:

[1] Pantucci, R. (2011, March). A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists. ICSR. Retrieved January 23, 2018, from http://icsr.info/wp-content/uploads/2012/10/1302002992ICSRPaper_ATypologyofLoneWolves_Pantucci.pdf

[2] Schuurman, B., Lindekilde, L., Malthaner, S., O’Connor, F., Gill, P., & Bouhana, N. (2017). End of the Lone Wolf: The Typology that Should Not Have Been. Studies in Conflict & Terrorism. Retrieved January 23, 2018, from: http://www.tandfonline.com/doi/abs/10.1080/1057610X.2017.1419554

[3] Burke, J. (2017, March 30). The Myth of the Lone Wolf Terrorist. Foreign Affairs. Retrieved January 23, 2018, from: https://www.foreignaffairs.com/articles/western-europe/2016-07-26/myth-lone-wolf-terrorism

[4] Boyle, D. (2017, January 5). ISIS has abandoned large-scale terror atrocities to focus on ‘lone wolf’ attacks like Nice and Berlin, government report says. Daily Mail. Retrieved January 23, 2018, from: http://www.dailymail.co.uk/news/article-4091844/ISIS-abandoned-large-scale-terror-atrocities-focus-lone-wolf-attacks-like-Nice-Berlin-government-report-says.html#ixzz5518Phdcs 

[5] Coughlin, C (2017, March 22). London attack was simply a question of time: This was the lone wolf Britain has long been fearing. The Telegraph. Retrieved January 23, 2018, from:
http://www.telegraph.co.uk/news/2017/03/22/simply-question-time-lone-wolf-attack-britain-has-long-fearing/

[6] Grierson, J. (2018, January 8). UK couple found guilty of plotting Christmas terror attack. The Guardian. Retrieved January 23, 2018, from: https://www.theguardian.com/uk-news/2018/jan/08/uk-couple-found-guilty-of-plotting-christmas-terror-attack

Assessment Papers Cristina Ariza Violent Extremism

Assessment of the Threat Posed by the Turkish Cyber Army

Marita La Palm is a graduate student at American University where she focuses on terrorism, countering violent extremism, homeland security policy, and cyber domain activities.  She can be found on Twitter at maritalp.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of the Threat Posed by the Turkish Cyber Army

Date Originally Written:  March 25, 2018.

Date Originally Published:  April 9, 2018.

Summary:  Turkish-sympathetic hacker group, the Turkish Cyber Army, has changed tactics from seizing and defacing websites to a Twitter phishing campaign that has come remarkably close to the President of the United States.

Text:  The Turkish Cyber Army (Ay Yildiz Tim) attempted to compromise U.S. President Donald Trump’s Twitter account in January of 2018 as part of a systematic cyber attack accompanying the Turkish invasion of Syria.  They were not successful, but they did seize control of various well-known accounts and the operation is still in progress two months later.

Although the Turkish Cyber Army claims to date back to a 2002 foundation in New Zealand, it first appears in hacking annals on October 2, 2006.  Since then, the group has taken over vulnerable websites in Kenya, the European Union, and the United States[1].  As of the summer of 2017, the Turikish Cyber Army changed tactics to focus on Twitter phishing, where they used the compromised Twitter account of a trustworthy source to bait a target to surrender log-in credentials[2].  They do this by sending a direct message from a familiar account they control telling the desired victim to click on a link and enter their log-in information to a page that looks like Twitter but actually records their username and password.  Upon accessing the victim’s account, the hackers rapidly make pro-Turkish posts, download the message history, and send new phishing attacks through the new account, all within a few hours.  The Turkish Cyber Army claim to have downloaded the targets’ messages, apparently both for intelligence purposes and to embarrass the target by publicly releasing the messages[3].  Oddly enough, the group has yet to release the private messages they acquired in spite of their threats to do so.  The group is notable both for their beginner-level sophistication when compared to state hackers such as Fancy Bear and the way they broadcast every hack they make.

The first documented victim of the 2018 operation was Syed Akbaruddin, Indian Permanent Representative to the United Nations.  Before the attack on Akbaruddin, the hackers likely targeted Kurdish accounts in a similar manner[4].  Since these initial attacks, the Turkish Cyber Army moved steadily closer to accounts followed by President Trump and even managed to direct message him on Twitter[5].  In January 2018, they phished multiple well-known Western public figures such as television personality Greta van Susteren and the head of the World Economic Forum, Børge Brende.  It so happened that Greta and Eric Bolling, another victim, are two of the only 45 accounts followed by President Trump.  From Eric and Greta’s accounts, the hackers were able to send messages to Trump.  Two months later, the Turkish Cyber Army continued on Twitter, but now primarily with a focus on Indian accounts.  The group took over Air India’s Twitter account on March 15, 2018.  However, the aftereffects of their Western efforts can still be seen: on March 23, 2018 the Chief Content Officer of Time, Inc. and the President of Fortune, Alan Murray tweeted, “I was locked out of Twitter for a month after being hacked by the Turkish cyber army…” Meanwhile, the Turkish Cyber Army has a large and loud Twitter presence with very little regulation considering they operate as an openly criminal organization on the platform.

President Trump’s personal Twitter account was also a target for the Turkish Cyber Army.  This is not a secret account known only to a few.  President Trump’s account name is public, and his password is all that is needed to post unless he has set up two-factor authentication.  Trump uses his account to express his personal opinions, and since some of his tweets have had high shock value, a fake message intended to disrupt might go unquestioned.  It is fair to assume that multiple groups have gone at President Trump’s account with a password cracker without stopping since inauguration.  It is only a matter of time before a foreign intelligence service or other interested party manages to access President Trump’s direct messages, make provocative statements from his account that could threaten the financial sector or national security, and from there go on to access more sensitive information.  While the Turkish Cyber Army blasts their intrusion from the compromised accounts, more sophisticated hacking teams would be in and out without a word and might have already done so.  The most dangerous hackers would maintain that access for the day it is useful and unexpected.

While nothing immediately indicates that this group is a Turkish government organization, they are either supporters of the current government or work for it.  Both reporter Joseph Cox and the McAfee report claimed the group used Turkish code[6].  Almost a hundred actual or bot accounts have some identifier of the Turkish Cyber Army, none of which appear to be censored by Twitter.  Of particular interest in the group’s history are the attacks on Turkish political party Cumhuriyet Halk Partisi’s (CHP) deputy Eren Erdem’ın, alleging his connections with Fethullah Gulen and the 2006 and possible 2017 attempts to phish Kurdish activists[7].  The Turkish Cyber Army’s current operations occurred on the eve of massive Turkish political risk, as the events in Syria could have ended Turkish President Recep Tayyip Erdogan’s career had they gone poorly. Not only did Turkey invade Syria in order to attack trained troops of its North Atlantic Treaty Organization (NATO) ally, the United States, but Turkish representatives had been banned from campaigning in parts of the European Union, and Turkish banks might face a multi-billion dollar fine thanks to the Reza Zarrab case[8].  Meanwhile, both Islamist and Kurdish insurgents appeared emboldened within the country[9].  Turkey had everything to lose, and a cyberattack, albeit not that sophisticated but conducted against high value targets, was a possibility while the United States appeared undecided as to whom to back — its proxy force or its NATO ally.  In the end, the United States has made efforts to reconcile diplomatically with Turkey since January, and Turkey has saved face.


Endnotes:

[1]  Ayyildiz Tim. (n.d.). Retrieved January 24, 2018, from https://ayyildiz.org/; Turks ‘cyber-leger’ kaapt Nederlandse websites . (2006, October 2). Retrieved January 24, 2018, from https://www.nrc.nl/nieuws/2006/10/02/turks-cyber-leger-kaapt-nederlandse-websites-11203640-a1180482; Terry, N. (2013, August 12). Asbury park’s website taken over by hackers. McClatchy – Tribune Business News; Ministry of transport website hacked. (2014, March 5). AllAfrica.Com. 

[2] Turkish hackers target Sevan Nishanyan’s Twitter account. (2017, July 28). Armenpress News Agency.

[3] Beek, C., & Samani, R. (2018, January 24). Twitter Accounts of US Media Under Attack by Large Campaign. Retrieved January 24, 2018, from https://securingtomorrow.mcafee.com/mcafee-labs/twitter-accounts-of-us-media-under-attack-by-large-campaign/.

[4] #EfrinNotAlone. (2018, January 17). “News that people  @realDonaldTrump followers have been hacked by Turkish cyber army. TCA made an appearance a few days ago sending virus/clickey links to foreigners and my Kurdish/friends. The journalist who have had their accounts hacked in US have clicked the link.”  [Tweet]. https://twitter.com/la_Caki__/status/953572575602462720.

[5] Herreria, C. (2018, January 17). Hackers DM’d Donald Trump With Former Fox News Hosts’ Twitter Accounts. Retrieved March 25, 2018, from https://www.huffingtonpost.com/entry/eric-bolling-greta-van-susteren-twitter-hacked_us_5a5eb17de4b096ecfca88729

[6] Beek, C., & Samani, R. (2018, January 24). Twitter Accounts of US Media Under Attack by Large Campaign. Retrieved January 24, 2018, from https://securingtomorrow.mcafee.com/mcafee-labs/twitter-accounts-of-us-media-under-attack-by-large-campaign/; Joseph Cox. (2018, January 23). “Interestingly, the code of the phishing page is in… Turkish. “Hesabın var mı?”, or “Do you have an account?”.”  [Tweet]. https://twitter.com/josephfcox/status/955861462190383104.

[7] Ayyıldız Tim FETÖnün CHP bağlantısını deşifre etti. (2016, August 27). Retrieved January 24, 2018, from http://www.ensonhaber.com/ayyildiz-tim-fetonun-chp-baglantisini-desifre-etti-2016-08-28.html; Turks ‘cyber-leger’ kaapt Nederlandse websites . (2006, October 2). Retrieved January 24, 2018, from https://www.nrc.nl/nieuws/2006/10/02/turks-cyber-leger-kaapt-nederlandse-websites-11203640-a1180482.

[8] Turkey-backed FSA entered Afrin, Turkey shelling targets. (2018, January 21). BBC Monitoring Newsfile; Turkey blasts Germany, Netherlands for campaign bans. (2017, March 5). BBC Monitoring European; Zaman, A. (2017, December 07). Turkey probes US prosecutor in Zarrab trial twist. Retrieved January 24, 2018, from https://www.al-monitor.com/pulse/originals/2017/11/turkey-probes-reza-zarrab-investigators.html.

[9] Moore, J. (2017, December 28). Hundreds of ISIS fighters are hiding in Turkey, increasing fears of attacks in Europe. Retrieved January 24, 2018, from http://www.newsweek.com/hundreds-isis-fighters-are-hiding-turkey-increasing-fears-europe-attacks-759877; Mandıracı, B. (2017, July 20). Turkey’s PKK Conflict Kills almost 3,000 in Two Years. Retrieved January 24, 2018, from https://www.crisisgroup.org/europe-central-asia/western-europemediterranean/turkey/turkeys-pkk-conflict-kills-almost-3000-two-years.

Assessment Papers Cyberspace Marita La Palm Trump (U.S. President) Turkey

Assessment of Infrastructure Development in Africa and Shifting Chinese Foreign Policy

Tyler Bonin is a history and economics instructor.  He is also a veteran of the U.S. Marine Corps, where he developed and participated in host nation infrastructure projects as a construction wireman.  He can be found on Twitter @TylerMBonin.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Infrastructure Development in Africa and Shifting Chinese Foreign Policy

Date Originally Written:  January 12, 2018.

Date Originally Published:  April 2, 2018.

Summary:   The People’s Republic of China’s continued infrastructure investment in Africa through its One Belt, One Road initiative has led to incremental change in its foreign policy. Security challenges arising in Africa due to continued PRC investment might lead to an increased PRC military presence on the continent, as well as a complete revision of its non-interference policy.

Text:  In 2013, People’s Republic of China (PRC) President Xi Jinping proposed a $5 trillion international infrastructure plan entitled One Belt, One Road (OBOR), intended to advance land and maritime trade routes between Asia, Europe, and Africa[1]. Initial expansion has included approximately 1,700 road, railway, pipeline, and port projects undertaken by PRC state-owned and private enterprises. The state-developed Silk Road Fund and several multilateral development banks have financed these infrastructure projects, in addition to PRC commercial bank loans to OBOR partner countries[2].

A combination of private and state-owned PRC construction firms have built several railways between major African cities, including the Addis Ababa – Djibouti line, which is Africa’s first transnational electric railway. PRC-built railways have opened landlocked countries’ access to seaports, eased the burden of travel for workers, and ultimately facilitated the development of industrial economic corridors. Additionally, PRC companies have continued their investment in roadways and ports. Construction of a port at Bagamoyo in Tanzania will have the two-fold effect of easing congestion at neighboring ports and attracting foreign direct investment; it is slated to be Africa’s largest port[3]. Overall, views toward PRC development activities have been enthusiastic. Survey data from Afrobarometer demonstrates that 63% of Africans (averaged across all countries) view PRC influence as “somewhat” or “very” positive[4]. The PRC’s increasing global investment in infrastructure improves the country’s access to natural resources and also opens access to markets for PRC goods and services. It also serves as a powerful element of the PRC’s increasing soft power.

The PRC’s ever-expanding investment in Africa has also meant its increased role in security on the African continent. As the PRC has invested heavily in the Sudanese oil industry, civil conflict in South Sudan in 2013 led Beijing to take a proactive mediation position. In addition to promising to continue PRC participation in United Nations (UN) peacekeeping missions, President Jinping has also promised to support the development of counter-terrorism measures within African countries[5]. All of these activities have been a departure from the PRC’s traditional “non-interference” foreign policy stance. Security concerns in the past have arisen as the direct result of terrorist activity in Africa, including the kidnapping of PRC workers by the jihadist group Boko Haram. Furthermore, the PRC is now focusing on security as a manner in which to protect its infrastructure investments. Civil unrest and terrorist activity stalls PRC projects and hinders economic activity; the large upfront capital investment required of these infrastructure projects requires continuity in development, which is interrupted by civil strife.

However, security concerns in Africa may also surface as a direct result of PRC infrastructure development. While PRC activity in Africa has been viewed positively on average, PRC labor practices have received negative attention in particular regions. While PRC construction firms have used local workers for projects in regions where the pool of skilled labor is steady, PRC nationals have been brought into regions where skilled laborers do not exist in large enough numbers. Thus, a narrative of foreign workers taking jobs in which local workers could be employed has given rise to periodic populist movements in Africa. One example of populist movement activity is in Kenya, where a group demanding that a PRC project provide jobs to local citizens attacked PRC railway construction workers[6].

Furthermore, young and unemployed populations provide the foundation for rebel movements; As rebel groups may seize access to a country’s resources—and use the sales of such for continuing to fund the movement—participation in rebellion essentially provides young individuals with their only means to income[7]. Many fragile states are the product of extended civil war. Subsequently, these states have seen low levels of education and loss of skills among their working age populations. These fragile states, such as Angola and the Democratic Republic of the Congo, represent the situation in which PRC workers are used[8]. Thus, PRC activities are a possible catalyst for violence in fragile states where infrastructure projects continue.  In these fragile states, local resentment and populist fervor may build due to the perception that political elites only profit from the governmental arrangement with Beijing, while persistent unemployment exists during an ever-increasing influx of PRC workers. These factors combined may provide the impetus for rebellion that would harm the long-term goals of the PRC’s OBOR.

Due to the preceding, PRC roles in security in Africa may continue well beyond the current financing of counterterrorism measures and the provision of troops to UN peacekeeping operations. Specifically, the PRC’s non-intervention foreign policy may give way to a policy that seeks to actively finance state police forces and provide a stronger military advisory role.  While Djibouti currently maintains a permanent PRC naval station, an active PRC military presence seems likely to grow as investment in Africa increases, especially in fragile states. The dynamics of increased PRC economic and military influence in Africa are just now coming into existence and will pose interesting questions for future security considerations.


Endnotes:

[1] van der Leer, Y., Yau, J. (2016, February). China’s New Silk Route: The Long and Winding Road. Retrieved January 10, 2018, from https://www.pwc.com/gx/en/growth-markets-center/assets/pdf/china-new-silk-route.pdf

[2] Gang, W. (2017, May 9). SOEs Lead Infrastructure Push in 1,700 ‘Belt and Road’ Projects. Retrieved January 10, 2018, from https://www.caixinglobal.com/2017-05-10/101088332.html

[3] Tairo, A. (2017, October 3). Tanzania Surrenders Bagamoyo Port Project to Chinese Firm. Retrieved January 10, 2018, from http://www.theeastafrican.co.ke/business/Tanzania-Bagamoyo-port-project-to-Chinese/2560-4122244-rxa9wtz/index.html

[4] Lekorwe, M., Chingwete, A., Okuru M., and Samson R. (2016, October 24). China’s Growing Presence in Africa Wins Largely Positive Popular Reviews. Retrieved January 11, 2018, from http://afrobarometer.org/sites/default/files/publications/Dispatches/ab_r6_dispatchno122_perceptions_of_china_in_africa1.pdf

[5] Forum on China-Africa Cooperation. (2012, July 19). Fifth Ministerial Conference of FOCAC Opens Further China-Africa Cooperation. Retrieved January 11, 2018, from http://www.focac.org/eng/dwjbzjjhys/t954274.htm

[6] White, E. Analysis: Unpacking Attacks On Chinese Workers in Africa. (2016, August 5). Retrieved January 22, 2018, from https://international.thenewslens.com/article/45988

[7] World Bank’s World Development Report (2011). Retrieved January 12, 2018, from http://siteresources.worldbank.org/INTWDRS/Resources/WDR2011_Chapter2.pdf

[8] Coroado, H. and Brock, J. (2015, July 9). Angolans Resentful As China Tightens Its Grip. Retrieved January 12, 2018, from https://www.reuters.com/article/us-angola-china-insight/angolans-resentful-as-china-tightens-its-grip-idUSKCN0PJ1LT20150709

Africa Assessment Papers China (People's Republic of China) Tyler Bonin

Assessment of the Role of Authoritarianism in Fomenting Extremism in the Arab World

Hari Prasad is an independent researcher on Middle East/South Asian Politics and Security. He holds a MA in International Affairs from George Washington University.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of the Role of Authoritarianism in Fomenting Extremism in the Arab World

Date Originally Written:  December 29, 2017.

Date Originally Published:  March 19, 2018.

Summary:  Many Countering Violent Extremism (CVE) works have focused on the role of individual and enabling factors in the rise of extremism, yet it is important to not overlook larger structural factors.  In particular, authoritarianism in the Arab world has proven to help foment conditions that can help encourage the rise of extremism, or discredit counter extremism efforts.

Text:  In recent years with the rise of extremist groups like the Islamic State, the concept of CVE has gained traction in policy and academic circles.  A lot of emphasis has been put on the individual and community level with ideas such as examining the effects of discrimination, mental illness, and extremist ideology on influencing individuals to join violent extremist organizations.  However, it is also important to have an understanding of how larger structural issues, such as regime type, might allow for an environment that fosters extremism.  Using examples from throughout the Arab World, this assessment paper will show how authoritarianism contributes to extremism by encouraging divisions in society, undermining religious messaging, normalizing extremist rhetoric, denying outlets for political expression, and even facilitating the rise of extremist groups.

First and foremost, many Arab regimes fail to counteract sectarianism in the region. Instead of resolving ethnic, sectarian, or other tensions, the regimes exploit them.  As Syrian opposition intellectual Yassin al-Haj Saleh has observed, sectarianism played an important role in consolidating Syrian President Bashar al-Assad and his regime’s power[1].  Encouraging divisions in society causes the various sects to suspect one another, and ‘otherise’ them.  This ‘otherising’ continues sectarian tension and demonization, something that becomes operationalized to deadly effect during times of upheaval.  Authoritarian regimes also try to position themselves, especially to minority groups, as the sole protectors from radical groups.  This protector role provides some blackmailing towards minorities to support the regime or else, while also playing into the narratives of extremist groups that majority groups like Arabs and Sunnis are discriminated against by the regime[2].

Especially in combatting religious extremism, authoritarian Arab regimes can easily undermine religious messaging.  Often Arab regimes attempt to hold influence or control their respective official religious establishments to monitor the content as well as prevent criticism of the regime itself[3].  Although this has been used to also try to counteract extremist messaging, the fact that many religious establishments rarely stray from the regime narrative undermines counter-extremist messaging.  As official religious establishments primarily propagate a pro-regime narrative, they will be accurately perceived as simply another mouthpiece for the authoritarian regime.  Rather than serving as an important pulpit for counteracting extremist messages, the delegitimization of these religious institutions instead inadvertently encourage followers to seek out alternative narratives.

Along with this regime undermining of religious messaging, religion also is a valuable tool for regimes to turn to in times of crisis.  Former Iraqi President Saddam Hussein enacted his ‘faith campaign’ while dealing with the harsh sanctions regime.  This campaign led to the rise of new Islamic institutions and organizations, including institutions that the Islamic State’s leader, Abu Bakr al Baghdadi, attended[4].  In Egypt, despite overthrowing the democratically elected Islamist Mohammad Morsi, Egyptian President Abdel Fattah al-Sisi has also turned to Islam to help prop up his rule[5].  Regime manipulation of religion only further delegitimizes traditional religious leaders, while also normalizing religious language in denigrating their opponents.  Indeed, one of Egypt’s former Muftis went as far as to engage in similar takfirist (to declare a Muslim an apostate) justifications against Sisi’s opponents that the Islamic State and other extremist groups have engaged in[6].  Although it can be debated whether these initiatives are carried out to co-opt leaders or out of the personal faith of the leaders, these initiatives instead help normalize extremist rhetoric rather than counteracting it.

Many authoritarian regimes in the Arab World also limit political freedoms and outlets for political expression and change.  Indeed, scholars like Mohammad Hafez have demonstrated the role that repression and political exclusion has played in the rise of Islamic extremist movements around the world[7], especially in the Arab World.  Rather than serving as islands of stability, authoritarian regimes remain fragile and encourage resentment.  As there are few outlets to express one’s political opinions, and many ‘opposition’ parties are co-opted by the regimes, this encourages the rise of groups that lay outside of the realm of formal politics.

Finally, authoritarian regimes can directly facilitate the rise of extremist groups.  It is no secret that since the 9/11 attacks, many Westerners have preferred the ‘secular’ dictators instead of an ‘Islamist.’  These secular dictators have used the specter of Islamism to justify crackdowns and repression against all opposition.  While playing into the other factors that encourage victims to seek alternative ways of confronting the state, this has also proven useful for states that lack international legitimacy.  It is well-known that to support its narrative that it was simply fighting terrorists, the Assad regime released extremists and other unsavory characters from its prisons during the initial uprising in Syria[8].  As the initial protests turned to an uprising, these former prisoners formed organizations that helped paint the groups opposing Assad as extremist.  Groups like the Islamic State even temporarily received support from the Assad regime in its fight against the Free Syrian Army and other Syrian opposition groups.  Of course these are temporary alliances, but it demonstrates how authoritarian regimes will tactically allow extremist groups to form for the sake of their own survival.

Without reforming or changing these authoritarian structures in the Arab World, CVE efforts will only have a limited effect.  Of course, the demise of authoritarianism will not necessarily lead to an extremist free region.  After all, it is the newly democratic Tunisia that has become a large contributor for fighters for the Islamic State.  Nor will authoritarian reform lead to the erasure of extremist ideologies.  Yet, changing these authoritarian structures will provide a political opening that will allow better combatting of extremist ideology, while also providing a less repressive life for those that live in the region.  Authoritarian reform should not be mistaken as purely a humanitarian effort.  It is no secret that Western support for authoritarian regimes has been a common grievance for many extremist groups in the Middle East.  Mohammad Hafez in his keynote remarks to the RESOLVE Network in 2016 noted that the choice between repressive states or extremists, or rather “between barrel bombs and beheadings” is a false one, and one that the regimes themselves try to create[9].  Extremism in the region will never be fully addressed until policymakers understand the structural factors within authoritarian regimes that drive this behavior.


Endnotes:

[1] Saleh, Y. A. (2017). The Impossible Revolution: Making Sense of the Syrian Tragedy. Chicago, IL: Haymarket Books.

[2] Shabi, R. (2014, April 10). Battling Perceptions: Minorities in the Arab World. Retrieved December 29, 2017, from http://www.aljazeera.com/indepth/opinion/2014/04/battling-perceptions-minorities–20144965348535478.html

[3] Brown, N. (2017, May 11). Official Islam in the Arab World: The Contest for Religious Authority. Retrieved December 29, 2017, from http://carnegieendowment.org/2017/05/11/official-islam-in-arab-world-contest-for-religious-authority-pub-69929

[4] McCants, W. (2015, September 1). The Believer: How Abu Bakr al-Baghdadi Became Leader of the Islamic State. Retrieved December 29, 2017, from http://csweb.brookings.edu/content/research/essays/2015/thebeliever.html

[5] Springborg, R. (2014, May 24). Sisi’s Secret Islamism. Retrieved December 29, 2017, from https://www.foreignaffairs.com/articles/middle-east/2014-05-26/sisis-secret-islamism

[6] Elmasry, M. (2015, June 27). Ali Gumah: Sisi’s Most Loyal Islamic Scholar. Retrieved December 29, 2017, from http://www.middleeasteye.net/columns/ali-gumah-sisi-s-most-loyal-islamic-scholar-1205811558

[7] Hafez, M. M. (2005). Why Muslims Rebel: Repression and Resistance in the Islamic World. Boulder: Lynne Rienner .

[8] Gutman, R. (2016, December 01). Assad Henchman: Here’s How We Built ISIS. Retrieved December 29, 2017, from https://www.thedailybeast.com/assad-henchman-heres-how-we-built-isis

[9] 2016 RESOLVE Forum Flashback: Keynote Speaker Dr. Mohammed Hafez. (2017, September 15). Retrieved December 29, 2017, from http://www.resolvenet.org/news/2016-resolve-forum-flashback-keynote-speaker-dr-mohammed-hafez

Assessment Papers Government Hari Prasad Violent Extremism

Assessment of Violent Extremism: The Push of Identity Crisis and the Pull of Ideologies

Linn Pitts holds a B.S. in Marketing/Organization Management and a M.S. in Criminal Justice from the University of South Carolina.  He also has studied Public Policy on a graduate level and holds an Ed.S. in Educational Leadership from Liberty University.  Linn spent a decade in law enforcement prior to transitioning into teaching on a university level.  He presently teaches as an Assistant Professor in the Social Science Department at Shorter University.  He can be found on Twitter @Professor_Pitts and is writing a dissertation on gatekeepers in Countering Violent Extremism programs in the United States.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of Violent Extremism: The Push of Identity Crisis and the Pull of Ideologies

Date Originally Written:  November, 7, 2017.

Date Originally Published:  February 26, 2018.

Summary:  Successful recruitment of individuals into violent extremist organizations involves a recruiter leveraging the lack of social capital and identity capital to convince the radical-to-be that the organization will meet their needs.  Unless potential recruits have an established identity, resilience to deal with the overtures of recruiters, or have trusted individuals in their life that they can turn for help, the individual will be at risk for recruitment into violent extremist organizations.

Text:  Social Capital involves the problem and the potential solution to violent extremism due to the social identity that is sought by individuals at risk of recruitment for extremist groups.  Robert Putnam[1] identified that social capital aids society via collective action and empowerment.  On the opposite end of the spectrum, Lester, Maheswari, and McLain[2] noted that negative influences within family connections can create negative social capital.  In particular, groups that may exhibit extremist tendencies may seem like viable avenues for individuals struggling with identity.  James Côté[3] has further established that a branch of social capital is that of identity capital.  Identity capital is the manifestation of discovering one’s own distinctiveness and plotting their life course.   Therefore, individuals will seek purpose in their life and may turn to extremist movements if they perceive an injustice[4].  Berbrier[5] had previously found that white supremacists will take on a victim identity to exacerbate the sense of injustice of their group’s persona in order to become more attractive to individuals struggling with this aspect in their life.

Ilardi found that recruitment of potential jihadist may not be a top-down recruitment process but it may be more of an individual attraction once introduced to the material such as the messages of radical clerics or videos depicting violence in the defense of religion.  Moreover, Futrell and Simi[6] identified similar activities among white supremacist as occurring at free spaces such as home-based Bible studies, small local bars not frequented by outsiders, or private concerts.  One can easily understand that charismatic leaders may be knowledgeable of these places via organizational ties as noted by Wood[7].  Extremist groups recruit at-risk but willing volunteers, who are seeking purpose in their life.  Though Wood primarily looked at the recruiting methods of the Islamic State, researchers[8] found similar recruiting efforts of white supremacy terror groups.

The key to successful violent extremism recruitment is at-risk individuals and their vulnerabilities such as the following factors discussed by Mitchell[9] while citing Bartlett and Miller, “four often overlooked elements that can move some people toward violent extremism: an emotional impulse to correct an injustice; the thrill of doing something ‘cool’; peer pressure; and attaining a certain status in a hierarchy.”  Three of these, (thrill/cool factor, peer pressure, and status seeking,) directly relate to identity capital as defined by Côté, especially in his discussion of adolescents struggling with the transition to adulthood and identity formation.

Though no apparent correlation to the work of Côté, the emotional impulse concerning an injustice is a view parlayed by Nawaz[10] as he recounted the story of his own radicalization and described the moment of empowerment.  Nawaz’ radicalization occurred while he accompanied his brother and a group of friends when they were accosted by several white nationalists.  He noted his brother mentioned to the white nationalist’s leader that he was carrying a bomb in his backpack [see author’s note].  The incident quickly ended, the white nationalists fled, and Nawaz’s feelings of legitimate identity associated with Islamist ideology.  In this case, it is easy to see Nawaz’s lack of understanding of the radical Islamist ideology, but his nascent view of the identity traits found an appealing association and it related to Côté from the aspect of an altered life-course.  Nawaz and his immigrant family had relocated Essex, England did not feel readily accepted in his transplanted home.  It is not uncommon to find cultural identity struggles faced by second-generation immigrants[11].  In comparison, it may not be limited to strictly struggles faced only by immigrants.  According to Al Raffie[12], “[s]tudies on radicalization find identity to stand at the fore of the radicalization process.  Success partially lies in the radical’s ability to provide the radical-to-be with a distinctive identity[p. 67].”  This identity may be based on an extremist religious ideology or a distinctive worldview such as white nationalism, but the radical-to-be does not fully comprehend the lifestyle they are pursuing and may become indoctrinated because they are seeking the identity.  Consider the life-course of Frank Meeink[13], as he struggled with identity growing up as the product of a broken home, eventually moving in with his father in his preteen years.  Meeink noted that he was constantly harassed/assaulted on the way to school by African-American youth in his South Philadelphia neighborhood.  The turning point for Meeink was a summer with his cousin in a rural area of Pennsylvania that introduced him to white supremacy.  Meeink noted that it made sense to him through the lens of a child that despised African-Americans in his home neighborhood.  It should be further noted this fits Ilardi’s view and that of Lester et al. as identity struggles led to an ideology fit via causal interactions.  Therefore, factors in Nawaz’s radicalization was the result of mistreatment due to his immigrant status akin to Meeink being of a different race in his South Philadelphia neighborhood.  Meeink’s and Nawaz’s story of deradicalization also share similar themes.

In examining societal structures, Cole, Alison, Cole, and Alison[14] cited Munchie’s 1999 work as they discussed that poorly applied preventions may further embolden anti-social identities which was discussed by Mitchell.  The significance of this discussion is that individuals struggling with aspects of self-concept will experiment with different identities and will seek reactions when they sample these new identities such as forms of different dress and customs.  Ultimately, this search leads to a cognitive opening as identified by Carpenter, Levitt, and Jacobson[15] that an extremist recruiter can exploit.  It is further supported by Horgan[16] that individuals joining radical groups do not understand the ideology, but become entrenched in the ideology when isolated from their typical peers.  Therefore, Mitchell’s findings in British Columbia Schools concerning moments where youth were on the fringe of radicalization became teachable moments.  It’s worth noting Mitchell’s respondents felt training concerning bullying and safe school communities offered them the ability to diffuse situations though they had not had formal training on radicalization.

Author’s note:  Some news sources have discredited this personal account by Nawaz, though it is symbolic of his apparent beliefs.


Endnotes: 

[1] Putnam, R. D. [1995]. Bowling alone: America’s declining social capital. Journal of democracy6[1], 65-78.

[2] Lester, M., Maheshwari, S. K., & McLain, P. M. [2013]. Family Firms and Negative Social Capital: A Property Rights Theory Approach. Journal of Behavioral and Applied Management15[1], 11.

[3] Côté, J. E. [2005]. Identity capital, social capital and the wider benefits of learning: generating resources facilitative of social cohesion. London review of education3[3], 221-237.

[4] Ilardi, G. J. [2013]. Interviews with Canadian radicals. Studies in Conflict & Terrorism36[9], 713-738.

[5] Berbrier, M. (2000). The victim ideology of white supremacists and white separatists in the United States. Sociological Focus, 33(2), 175-191.

[6] Futrell, R., & Simi, P. (2004). Free spaces, collective identity, and the persistence of US white power activism. Social Problems, 51(1), 16-42.

[7] Wood, G. (2016). The Way of the Strangers: Encounters with the Islamic State. Random House.

[8] Simi, P., Windisch, S., & Sporer, K. (2016). Recruitment and Radicalization among US Far Right Terrorists Recruitment and Radicalization among US Far-Right Terrorists.

[9] Mitchell, M. R. [2016]. Radicalization in British Columbia Secondary Schools: The Principals’ Perspective. Journal for Deradicalization, [6], 132-179.

[10] Nawaz, M. [2012]. Radical: My journey from Islamist extremism to a democratic awakening. Random House.

[11] Zhou, M. [2003]. Growing Up American: The challenge confronting immigrant children and children of immigrants. Annual Review of Sociology. 23. 63-95. 10.1146/annurev.soc.23.1.63.

[12] Al Raffie, D. [2013]. Social identity theory for investigating Islamic extremism in the diaspora. Journal of Strategic Security6[4], 67.

[13] Meeink, F. and Roy, J.M. [2010]. An Autobiography of a Recovering Skinhead: The Frank Meeink Story. Hawthorne Books.

[14] Cole, J., Alison, E., Cole, B., & Alison, L. [2010]. Guidance for identifying people vulnerable to recruitment into violent extremism. Liverpool, UK: University of Liverpool, School of Psychology

[15] Carpenter, J. S., Levitt, M., & Jacobson, M. [2009]. Confronting the ideology of radical extremism. J. Nat’l Sec. L. & Pol’y3, 301.

[16] Horgan, J. [2008]. From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The ANNALS of the American Academy of Political and Social Science618[1], 80-94.

Assessment Papers Linn Pitts Psychological Factors Violent Extremism

Assessing Al Suri’s Individual Terrorism Jihadist Against Lone Wolves

Cory Newton served as a Machinegunner in the United States Marine Corps from 1996-2000 and earned a B.S. in Philosophy, Politics, and Economics form Eastern Oregon University in 2012.  Cory authored Constitutional Capitalism and Common Defense in 2014 and can be found on Twitter @corynewton78 or on the web at www.corynewton.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Al Suri’s Individual Terrorism Jihadist Against Lone Wolves

Date Originally Written:  December 11, 2017.

Date Originally Published:  February 19, 2018.

Summary:  Terrorism is a tactic and often results in dead or wounded civilians.  Both individual terrorism jihadists and lone wolves use this tactic.  Despite this tactic producing similar results by whomever uses it, there is a distinct difference between individual terrorism jihadists and lone wolves.  Until governments understand and accept this difference, data related to attacks that use terrorism tactics will be skewed.

Text:  The Global Islamic Resistance Call was published by Abu Mus’ab al-Suri in January 2005[1].  The military theory of the Resistance Call is based on applying two forms of jihad.  The first form is individual terrorism jihad and secret operational activity of small units totally separated from each other.  The second form is participation in jihad at the open fronts wherever the necessary preconditions exist.  The individual terrorism jihadist differs from an open front jihadist in that the individual jihadist is unable to make it to the open front.  The individual terrorism jihadist also differs from the small cell jihadist in that their actions are truly independent.  Individual terrorism jihad was specifically designed to maximize feelings of helplessness of the targeted population by unleashing the innovation, initiative, and creativity inherent in a decentralized structure.

Individual terrorism jihad enables anyone, anywhere, at any time to wage jihad using terrorism without formally being affiliated with a terrorist organization.  All the individual terrorism jihadist must do is be properly motivated to take action in the name of jihad, identify a weakness or vulnerability, and apply force to exploit it.  Although the attacker does not have any direct ties to a terrorist organization, the attacker has rationally chosen to wage jihad using terrorism in a manner which they expect the attack to produce more benefits than costs.

There is a clear distinction between participation in what Al-Suri identified as individual terrorism jihad and lone wolf violent extremists who use terrorist tactics in the name of their cause.

Suppose a person who is inspired by, but not directly affiliated with, any one of the 917 hate groups in the United States identified by the Southern Poverty Law Center (SPLC)[2] carries out a lone wolf terrorist attack.  Despite the violent extremists’ non affiliation with an SPLC-identified hate group, the attack will likely be investigated as an act of terror.

On the other hand, suppose a marginalized person is seduced by an outside of the mainstream Islamist organization.  The person lacks affiliation to a terrorist organization but possess “a resolute, personal decision to perform the individual duty of jihad[1]” which motivates them to conduct an active shooting, knife attack, or vehicular ramming assault in which they verbalize their intentions with an Allahu Akbar war cry.  Despite the attacker’s non affiliation with a terrorist organization, the attack will likely be investigated as an act of terror.

One difference between the two acts of terror described above is that the former is carried out by a lone wolf using terrorism to wage war on a local scale, while the latter is performed by an individual terrorism jihadist locally waging war on a global scale.  The lone wolf who carries out a terrorist attack does not belong to a decentralized military theory of global Islamist resistance, as the individual terrorism jihadist does.  Individual terrorism jihad is similar to an independent franchise.  A lone wolf attack is independent, but usually does not occur within the context of a global resistance movement.

The individual terrorism jihadist and the lone wolf are two different threats.  As terroristic violence that specifically originates from the concept of individual terrorism jihad differs from terroristic violence that originates from the lone wolf, consideration should be given to classifying each differently in order to measure the frequency and severity of individual terrorism jihadist attacks.  If the frequency and severity of terrorist attacks by lone wolves is measured separately, terrorism data will be more accurate.  Both types of terrorist attacks will often have identical consequences.  The carnage wrought by an individual terrorism jihadist may very well be indistinguishable from the carnage wrought by a lone wolf white nationalist or lone wolf ecological extremist.  One is the result of global jihad attacking locally.  The other is a localized attack seeking national media attention.

As individual terrorism jihad and lone wolf attacks continue to increase, it is important properly identify and properly categorize each.  Theodore Kaczynski is the best example of a lone wolf who waged war using terrorism.  The threat posed by a person in that category is significantly different from an individual jihadist locally attacking a variety of soft targets using rifles, blades, explosives, or vehicles in the context of a global resistance movement.

Both individual terrorism jihad attacks and lone wolf attacks will continue to increase and evolve.  In order to combat these attacks in the future it is best if government officials understand whether the terrorist actions are part of global resistance movement or based on a personal or localized motivation.  In the case of individual terrorism jihad, these attacks will continue until the cost far exceeds the benefits.  The U.S. is very effective at determining the amount of force necessary to destroy enemy personnel and equipment.  Unfortunately, the U.S. still has a long way to go in determining the fine line between the amount of force necessary to destroy the enemies’ will to fight, and the amount of force that will galvanize the enemies’ will to resist.


Endnotes:

[1] Lia, Brynjar (2008) Columbia University Press, Architect of Global Jihad, The Global Islamic Resistance Call (Key Excerpts), Military Theory of The Global Islamic Resistance Call, Page 371

[2] Southern Poverty Law Center Hate Map. (n.d.). Retrieved December 13, 2017, from https://www.splcenter.org/hate-map

Assessment Papers Cory Newton Information and Intelligence Violent Extremism

The Impact of Extremists in Civil War: Syria’s Shabbiha

Estelle J. Townshend-Denton is a post-graduate student at the University of Waikato in New Zealand.  She is currently working on a Phd on religion and foreign policy.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  The Impact of Extremists in Civil War: Syria’s Shabbiha

Date Originally Written:  December 9, 2017.

Date Originally Published:  February 12, 2018.

Summary:  Violent extremists frequently emerge when state authority breaks down within civil wars.  Escalatory dynamics are particularly hard to avoid when extremist groups emerge that are embedded in the existing social framework of their identity group.  In Syria the Shabbiha has grown from a trans-border criminal network to sectarian militias fighting for the regime.  The Shabbiha are a significant impediment to the resolution of the Syrian civil war.

Text:  Extremist groups in Syria such as the Shabbiha often emerge from existing social phenomenon.  For instance, prior to the outbreak of the Syrian civil war, the Shabbiha were Allawite smugglers and racketeers that primarily operated out of the Allawite heartland in coastal Latakia.  Given the poverty of the Allawite community opportunities were scarce, and Allawite young men saw a way to purchase highly sought after, but banned, Western items in Lebanon, and smuggle them back across the border into Syria.  This smuggling was largely overlooked by Bashar al-Assad’s regime in return for Shabihha loyalty to the Assads[1].

In order to understand the Shabbiha, their place in Syrian society, and their role within the civil war, it is necessary to look into the history of the Allawite sect to which they belong.  The Allawites are a Shia sect whose religion incorporates aspects of Islam, Christianity, Paganism and Zoroastrianism.  The Allawites have been persecuted and marginalised throughout their history.  A Syrian analyst concluded that this persecution has become built into the Allawite identity.  As a result Allawites are highly security conscious[2].

The embattled Assad regime is primarily, but not exclusively, Allawite.  The collapse of the Ottoman Empire after World War 1 provided an opportunity for the Allawites to climb out of their position at the bottom most rung of Syrian society to control the state and it’s military.  The Ottoman territory had been divided up between the French and the British.  The French received the mandate for the territory that was to become the state of Syria.  The ruling elite in Syria had been Sunni and they were resistant to French rule.  In order to subdue the Sunni resistors, the French employed a strategy of divide and rule.  Thus the French created a military that consisted of minorities, including the Allawites[3].  Soon, joining the military emerged as the key means for Allawites to climb up the social and economic ladder, and over time they came to dominate the officer class.  Eventually the military emerged as what Horowitz identifies as a “significant symbol of ethnic domination[4].”  Later, Druze and Allawite military leaders staged a coup which ultimately led to the Allawite dominated Assad regime.

Syria was relatively stable under the Assads until the “Arab Spring” of 2011, when the protests sweeping the region spread to Syria.  The regimes of Tunisia and Egypt had already toppled, and most of the world predicted that the Syrian regime would be next.  However, unlike the Tunisian officer class which contributed to the toppling of the Tunisian Government, the Syrian military leadership was heavily invested in the Assad regime.  Furthermore the Assad regime took a lesson from the Egyptian experience and dealt decisively with the protests.  As such, the Assads used the military against the protesters, working to turn the peaceful protests into an armed rebellion.  The regime then developed a narrative that denied the unrest was part of the “Arab Spring” but alternatively asserted it was spawned by external actors and led by Islamist extremists.

Soon the Assad regime faced another problem.  Whilst the Syrian army’s officer class was mostly Allawite, the rank and file was predominantly Sunni.  Sunni were more reluctant to fire on what was emerging as a largely Sunni protest movement.  The regime had Allawite crack units, but they needed to expand the loyal Allawite base of their military capacity through encouraging Allawite civilian participation in the fighting.  One of the ways the Assad regime did this was through the Shabbiha, whose networks were developed and expanded into civilian militias who fought for the Assad regime[5].  Since then, the links between the Assads and the Shabbiha have become increasingly apparent.  The European Union imposed sanctions in 2011 on two of Bashar al Assad’s cousins, Fawwar and Munzir, for their involvement in the “repression against the civilian population as members of the Shabbiha[6].”  According to a relation of the President’s cousin Rami Makhlouf, the expansion of the Shabbiha from a regime linked Allawite criminal network into an extremist paramilitary force loyal to the regime, doing the regime’s dirty work within the civil war, was planned by Makhlouf and the President’s brother Maher al Assad[1].  The presence or absence of gangs of violent fanatics such as the  Shabbiha is described by Ethnic Conflict and International Relations theorist Barry Posen as “a key determinant of the ability of groups to avoid war as central political authority erodes[7].”  Thus the Shabbiha were a significant escalatory dynamic within the Syrian civil war.

Rhetoric from the Shabbiha accessed via the internet is sectarian, brutal, and very loyal to Bashar al Assad with mottos like “Bashar, don’t to be sad: you have men who drink blood[8].”  With a corresponding brutality and sectarianism emerging amongst Sunni Islamist fanatics within the rebellion, the violence and rhetoric of extremists on both sides escalated the civil war.  This brutality and sectarianism worked to strengthen the regime’s legitimacy as protectors of Syria’s minority religious groups against repression from the Sunni majority.  The regime’s reliance on extremist sectarian militias such as the Shabbiha to support the security forces was not only responding to sectarian tension within the unrest but also heightening it[9].

Posen identified that extremists on both sides escalate retaliatory violence and drive up insecurity.  He stated that fanatics “produce disproportionate political results among the opposing group – magnifying initial fears by confirming them….the rapid emergence of organized bands of particularly violent individuals is a sure sign of trouble[7].”  The initial fears resulting from the historical persecution of Allawites under Sunni elites, coupled with fears of revenge on the sect as a whole for the violence of both the Shabbiha and the regime within the civil war, has mobilised the sect in defense of the Assad regime.  What began as a grass-roots protest movement for the removal of the autocratic regime has escalated into a sectarian driven civil war intensified by the violent acts of both the Shabbiha and the Sunni Islamist extremists, to the advantage of the Assads.


Endnotes:

[1] Amor, Salwa and Sherlock, Ruth. How Bashar al-Assad created the feared shabiha militia: an insider speaks. The Telegraph. [Online] March 23, 2014. http://www.telegraph.co.uk/news/worldnews/middleeast/syria/10716289/How-Bashar-al-Assad-created-the-feared-shabiha-militia-an-insider-speaks.html

[2] Worren, Torstein Schiotz. Fear and Resistance: The Construction of Allawite Identity in Syria. Oslo : University of Oslo, 2007.

[3] Whitman, Elizabeth. The Awakening of the Syrian Army: General Husni al-Za’am’s Coup and Rein, 1949: Origins of the Syrain Army’s Enduring Roel in Syrian Politics. Columbia University. [Online] April 4, 2011.

[4] Horowitz, D.L. Ethnic Groups in Conflict. London : University of California Press, 1985.

[5] Salih, Y. The Syrian Shabbiha and their State. Heinrich Boll Stiftung. [Online] December 21, 2012. http://www.lb.boell.org/web/52-801.html

[6] Flamand, H.M. Syria: Brutally Violent Militaia Member tell it like it is. Global Post. [Online] June 15, 2012. http://www.globalpost.com/dispatch/news/regions/middle-east/syria/120614/syria-shabbiha-thug-assad-mafia-guns-smuggling-violence-houla

[7] The Security Dilemma and Ethnic Conflict. Posen, Barry R. 1993, Survival, Vol. 35, No. 1, pp. 27-47.

[8] Sherlock, H. A. The Shabiha: Inside Assad’s Death Squads. The Telegraph. [Online] June 2, 2012. http://www.telegraph.co.uk/news/worldnews/middleeast/syria/9307411/The-Shabiha-Inside-Assads-death-squads.html

[9] Abdulhamid, A. The Shredded Tapestry. Syrian Revolution Digest. [Online] November 9, 2012. https://ammar.world/2012/09/11/the-shredded-tapestry-the-state-of-syria-today/

Assessment Papers Estelle J. Townshend-Denton Illicit Trafficking Activities Syria Violent Extremism

An Assessment of Violent Extremist Use of Social Media Technologies

Scot A. Terban is a security professional with over 13 years experience specializing in areas such as Ethical Hacking/Pen Testing, Social Engineering Information, Security Auditing, ISO27001, Threat Intelligence Analysis, Steganography Application and Detection.  He tweets at @krypt3ia and his website is https://krypt3ia.wordpress.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Violent Extremist Use of Social Media Technologies

Date Originally Written:  November 9, 2017.

Date Originally Published:  February 5, 2018.

Summary:  The leveraging of social media technologies by violent extremists like Al-Qaeda (AQ) and Daesh have created a road map for others to do the same.  Without a combined effort by social media companies and intelligence and law enforcement organizations, violent extremists and others will continue to operate nearly unchecked on social media platforms and inspire others to acts of violence.

Text:  Following the 9/11 attacks the U.S. invaded Afghanistan and AQ, the violent extremist organization who launched these attacks, lost ground.  With the loss of ground came an increase in online activity.  In the time before the worldwide embrace of social media, jihadi’s like Irhabi007 (Younis Tsouli) led AQ hacking operations by breaking into vulnerable web pages and defacing them with AQ propaganda as well as establishing dead drop sites for materials others could use.  This method was pioneered by Irhabi007, who was later hunted down by other hackers and finally arrested in 2005[1].  Five years after Tsouli’s arrest, Al-Qaeda in the Arabian Peninsula (AQAP) established Inspire Magazine as a way to communicate with its existing followers and “inspire” new ones[2].  Unfortunately for AQAP, creating and distributing an online magazine became a challenge.

Today, social media platforms such as Twitter, Facebook, VKontakte, and YouTube are now the primary modus for jihadi extremists to spread the call to jihad as well as sow fear into those they target.  Social media is perfect for connecting people because of the popularity of the platforms and the ease of use, creation of accounts, and ability to send messages that could have a large audience.  In the case of Daesh, they use Twitter and YouTube as their primary means of messaging not only for fear but also command and control as well as recruitment.  Daesh sees the benefits of using social media, and their use has paved the way for others.  Even after Twitter and YouTube began to catch on and act against the Daesh accounts, it is still easy still for Daesh to create new accounts and keep the messages flowing with a new user name followed by a digit.

AQ’s loss of terrain combined with the expansion of social media set the conditions for movement toward inciting the “far war” over the local struggle as AQ saw it before Osama bin Laden was killed.  In fact, the call to the West had been made in Inspire magazine on many occasions.  Inspire even created a section of their magazine on “Open Source Jihad” which was later adopted by Dabiq[3] (Daesh’s magazine), but the problem was actually motivating the Western faithful into action.  This paradigm was finally worked out in social media where recruiters and mouthpieces could, in real-time, talk to these potential recruits and work with them to act.

Online messaging by violent extremist organizations has now reached a point of asymmetry where very little energy or money invested on the jihadi’s part can produce large returns on investments like the incident in Garland Texas[4].  To AQ, Daesh, and others, it is now clear that social media could be the bedrock of the fight against the West and anywhere else if others can be incited to act.  This incited activity takes the form of what has been called as “Lone Wolf Jihad” which has caused several incidents like the Garland shootings to current day events like the attack in New York City on the bike path by Sayfullo Saipov, a green card holder in the U.S. from Uzbekistan[5].

With the activating of certain individuals to the cause using the propaganda and manuals put out by the jihadi’s on social media, it is clear that the medium works and that even with all the attempts by companies like Facebook and Twitter to root accounts out and delete them, the messaging still gets to those who may act upon it.  The memetic virus of violent extremism has a carrier and that is social media.  Now, with the advent of social media’s leveraging by Russia in the campaign against the U.S. electoral system, we are seeing a paradigm shift into larger and more dangerous memetic and asymmetric warfare.

Additionally, with the advent of encryption technologies to the social media platforms the net effect has been to create channels of radicalization, recruitment, and activation over live chats and messages that cannot be indicted by authorities easily.  This use for encryption and live chats and messages makes the notion of social media as a means of asymmetric warfare even more prescient.  The jihadis now have not only a means to reach out to would be followers, but also a constant contact at a distance, where before they would have to radicalize potential recruits a physical location.

Expanding this out further, the methodologies that the jihadi’s have created and used online are now studied by other like-minded groups and can be emulated.  This means that whatever the bent, a group of like-minded individuals seeking extremist ends can simply sign up and replicate the jihadi model to the same ends of activating individuals to action.  We have already started to see this with the Russian hybrid warfare at a nominal level by activating people in the U.S. such as neo nazi’s and empowering them to act.

Social media is a boon and a bane depending on it’s use and it’s moderation by the companies that create the platforms and manage them.  However, with the First Amendment protecting freedom of speech in the U.S., it is hard for companies to delineate what is free speech and what is exhortation to violence.  This is the crux of the issue for companies and governments in the fight against violent extremism on platforms such as YouTube or Twitter.  Social media utilization boils down to terms of service and policing, and until now the companies have not been willing to monitor and take action.  Post Russian meddling in the U.S. election though, social media company attitudes seems to be changing.

Ultimately, the use of social media for extremist ideas and action will always be a problem.  This is not going away, and policing is key.  The challenge lies in working out the details and legal interpretations concerning the balance of what constitutes freedom of speech and what constitutes illegal activity.  The real task will be to see if algorithms and technical means will be helpful in sorting between the two.  The battle however, will never end.  It is my assessment that the remediation will have to be a melding of human intelligence activities and technical means together to monitor and interdict those users and feeds that are seeking to incite violence within the medium.


Endnotes:

[1] Katz, R., & Kern, M. (2006, March 26). Terrorist 007, Exposed. Retrieved November 17, 2017, from http://www.washingtonpost.com/wp-dyn/content/article/2006/03/25/AR2006032500020.html

[2] Zelin, A. Y. (2017, August 14). Inspire Magazine. Retrieved November 17, 2017, from http://jihadology.net/category/inspire-magazine/

[3] Zelin, A. Y. (2016, July 31). Dabiq Magazine. Retrieved November 17, 2017, from http://jihadology.net/category/dabiq-magazine/

[4] Chandler, A. (2015, May 04). A Terror Attack in Texas. Retrieved November 17, 2017, from https://www.theatlantic.com/national/archive/2015/05/a-terror-attack-in-texas/392288/

[5] Kilgannon, C., & Goldstein, J. (2017, October 31). Sayfullo Saipov, the Suspect in the New York Terror Attack, and His Past. Retrieved November 17, 2017, from https://www.nytimes.com/2017/10/31/nyregion/sayfullo-saipov-manhattan-truck-attack.html

 

Al-Qaeda Assessment Papers Cyberspace Islamic State Variants Scot A. Terban Violent Extremism

An Assessment of the Conceptualizing of Charisma / Persuasion and Coercion

Dr. Michael Warstler has served in the United States Navy from 2008 to Present and has worked as an adjunct professor and task manager for the Department of Defense.  He recently completed a Doctorate of Philosophy in Leadership from the University of the Cumberlands and successfully defended a dissertation addressing group psychological abuse experienced in fundamental religious organizations.  He can be found on LinkedIn @ https://www.linkedin.com/in/michael-warstler-908805109.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Conceptualizing of Charisma / Persuasion and Coercion

Date Originally Written:  December 4, 2017.

Date Originally Published:  January, 29, 2018.

Summary:  Charismatic leaders embody personalized qualities that allow them to influence followers – oftentimes, in the case of destructive leaders, at the detriment of the follower.  Coercion occurs when a threat against an individual is levied in exchange for obedience and submission[1] and the influencing of an individual through various techniques to perform a task that he or she would normally not want to do[2].

Text:  Le Bon[3] wrote that it is not all that difficult for inspiring leaders to persuade individuals if their needs are being fulfilled and if they are ready to sacrifice self-interest for their “happiness.”  Coercion, on the other hand, requires that a charismatic leader leverage social elements against the better judgment of the individual – oftentimes through manipulation.  Sandberg and Moreman write that charisma is a relationship where followers typically transfer control and accountability to the leader “often in a worship-like manner[4].”  Being that charisma, in itself, is intrinsically morally neutral; instances of abuse of authority are derived when either party in the relationship is given too much influence over the other.

Coercion and persuasion are noted as the forces at work in the conceptualization of the nature of power in relationships.  Coercion, as noted by Hartshorne is the “power to determine every detail of what happens in the world,” and persuasion is the power to “significantly influence the happenings in the world[5].”  Ultimately, coercion and persuasion remain intrinsically neutral until employed for good or evil ends; but both are grounded in the nature of power.  Referring to the individual perspective of charismatic attribution from followers to leaders, if the individual has a perspective of empowerment as coercive, he or she will typically conceive any form of influence as “coercion.” While if he or she has a perspective of empowerment in terms of “love” or “compassion” then he or she might view such empowerment as “persuasion[6].”

Coercion, as noted by famed cult researcher Robert Lifton, is when a threat against an individual is levied in exchange for obedience and submission[7].  It is saying “obey, or else” – the threat of “or else” might be “anything from death to social ostracism, any form of physical or emotional pain[8].”  With any form of non-rational imbalance of authority also comes an imbalance in individual responsibility[9].  A deficit in individual responsibility allows the controlling leader to make the primary decisions for the subservient follower.  While the follower is given a semblance of control over his or her own decisions and well-being, bullying has been known to occur in imbalanced leader-follower relationships from the subtle to the more blatant and grotesque[10].

Power is a central theme in the process of coercive and persuasive influence.  “Leadership” in itself, is a process of influencing and mobilizing individuals towards the attainment of a collective goal.  It is important, then, to differentiate between leadership as a positive attribution of social influence[11] where followership is voluntary, and abuse of authority, “where followers are coerced into compliance or obedience[12].”  A charismatic leader might passively persuade an individual that a course of action is in his or her best interest, while the coercer might leverage some form of threat against the individual in order to force them into compliance.

Coercion is the “despot’s ideal of power[13].”  It involves the coercer and the coerced – and the outcome typically resembles a diminished freedom and responsibility of choice on part of the coerced. Or as Reichard notes “a violation that most would argue, at least in practical terms, is a moral violation[14].”  In a leader-follower relationship where a significant imbalance of power is granted to the leader to “adjust the psyche” of his or her followers (oftentimes masked as the attainment towards a collective goal), such influence could just as easily be abused to fulfill the motives of the respective leader.  This dilemma, as noted by Ciulla[15] has been aptly named the “Hitler problem.”  It is posited by Tourish and Pinnington, could a “Hitler,” then, be viewed as a transformational leader?  If so, could one that displays these characteristics also be grouped in the same category with those perceived as moral leaders such as Gandhi or Mother Teresa[16]?

Hitler, Mao, and Stalin are case examples of individuals that displayed high levels of charisma as well as a lack of morality and a focus on idealized influence.  Such individuals often influence followers to negatively pursue destructive ends[17].  Research has identified two forms of charismatic leadership, socialized and personalized[18].  The socialized leader focuses on the needs and service to others in the group, while the personalized leader focuses on his or her own needs[19].  A personalized leadership approach often results in magnetism towards the fulfillment of the leader’s own needs vice that of the collective group[20].  Such actions are often self-serving and any doubt of loyalty to the group and its leadership are highly discouraged[21].

While doubt and resistance to authority within these groups certainly occurs, coercion and persuasion are key methods employed by abusive charismatic leaders in order to influence individuals to obtain a “converted” mindset[22].  Oftentimes when “converted” individuals may relinquish his or her resistance to doubt and submit to authority, he or she may become more liable to display the most zealous characteristics and become the most vocal proponents “aligned with the belief system chosen for them by powerful others[23].”  In the instance of Saul’s conversion to Paul in the Book of Acts, one might find that the most zealous resistors to change are also the most likely proponents once converted.  Coercion and persuasion, when employed effectively, can evolve into a “discursive system of constraint” that is often highly difficult to challenge and resist even if one considers themselves to be a “strong-willed” individual[24].


Endnotes:

[1] Lifton, R. J. (1961). Thought Reform and the Psychology of Totalism: A Study of “Brainwashing” in China. Mansfield Centre, CT: Martino Publishing.

[2] Tourish, D., Collinson, D., & Barker, J. R. (2009). Manufacturing conformity: Leadership through coercive persuasion in business organisations. M@n@gement, 12(5), 360-383.

[3] Le Bon, G. (1917). The Crowd: A Study of the Popular Mind. Mineola, NY: Dover Publications, Inc.

[4] Sandberg, Y., & Moreman, C. M. (2015). Common threads among different forms of charismatic leadership. Journal of Religion and Business Ethics, 3(1), p. 13.

[5] Hartshorne, C. (1984). Omnipotence and Other Theological Mistakes. Albany, NY: State University of New York Press, p. 11.

[6] Reichard, J. (2014). Relational empowerment: A process-relational theology of the spirit- filled life. Pneuma: The Journal of the Society for Pentecostal Studies, 36(2), 226-245, p. 231.

[7] Lifton, R. J. (1961). Thought Reform and the Psychology of Totalism: A Study of “Brainwashing” in China. Mansfield Centre, CT: Martino Publishing, p. 438.

[8] Ibid.

[9] Sandberg, Y., & Moreman, C. M. (2015). Common threads among different forms of charismatic leadership. Journal of Religion and Business Ethics, 3(1).

[10] Samnani, A., & Singh, P. (2013). When leaders victimize: The role of charismatic leaders in facilitating group pressures. Leadership Quarterly, 24(1), 189-202.

[11] Shamir, B. (1999). Taming charisma for better understanding and greater usefulness: A response to Beyer. The Leadership Quarterly, 10, 555-562.

[12] Tourish, D., Collinson, D., & Barker, J. R. (2009). Manufacturing conformity: Leadership through coercive persuasion in business organisations. M@n@gement, 12(5), 360-383, p. 362.

[13] Hartshorne, C. (1984). Omnipotence and Other Theological Mistakes. Albany, NY: State University of New York Press, p. 12.

[14] Reichard, J. (2014). Relational empowerment: A process-relational theology of the spirit- filled life. Pneuma: The Journal of the Society for Pentecostal Studies, 36(2), 226-245, p. 231-232.

[15] Ciulla, J. (1995). Leadership ethics: Mapping the territory. Business Ethics Quarterly, 5, 5- 28.

[16] Tourish, D., & Pinnington, A. (2002). Transformational leadership, corporate cultism and the spirituality paradigm: An unholy trinity in the workplace? Human Relations, 55(2), 147-172, p. 149.

[17] Vann, B. A., Coleman, A. N., & Simpson, J. A. (2014, September). Development of the Vannsimpco Leadership Survey: A delineation of hybrid leadership styles. SBS Journal of Applied Business Research, 3, 28-38.

[18] Howell, J. M., & Shamir, B., (2005). The role of followers in the charismatic leadership process relationship and their consequences. The Academy of Management Review, 30, 96-112.

[19] Howell, J. M. (1988). Two faces of charisma: Socialized and personalized leadership in organizations. Charismatic Leadership: The Elusive Factor in Organizational Effectiveness. (pp. 213−236). San Francisco, CA: Jossey-Bass.

[20] Lussier, R. N., & Achua, C. F. (2013). Leadership: Theory, Application, & Skill Development (6 ed.). Boston: Cengage Learning.

[21] Northouse, P. G. (2013). Leadership: Theory and Practice (6th ed.). Thousand Oaks, CA: SAGE.

[22] Tourish, D., Collinson, D., & Barker, J. R. (2009). Manufacturing conformity: Leadership through coercive persuasion in business organisations. M@n@gement, 12(5), 360-383.

[23] Ibid, p. 364.

[24] Ibid.

Assessment Papers Dr. Michael Warstler Leadership

An Historic Assessment of the Role and Participation of Women as Active Agents in Violent Extremist Organizations

Brandee Leon is a freelance analyst of counter-terrorism and international relations, focusing on terror in Europe.  She frequently covers women in terrorism.  She has been published in Business Insider, The Strategy Bridge, and The Eastern Project. She can be found on Twitter at @misscherryjones.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Historic Assessment of the Role and Participation of Women as Active Agents in Violent Extremist Organizations

Date Originally Written:  December 4, 2017.

Date Originally Published:  January 22, 2018.

Summary:  Despite their continual portrayal as being exploited by violent extremist organizations, women have actually been active agents for decades. From purveyors of propaganda and operational support, to participating in combat and suicide missions, women have been involved in the anarchist campaigns of the turn of the century, the anti-colonial fights in the mid-century, and the current wave of religious-based terrorism.

Text:  “Women as victim” is a common narrative, told for ages. Its current form is manifested in stories of “jihad brides,” those women and girls supposedly lured to Iraq and Syria by the Islamic State. That narrative fails to capture the reality of the role of women in the Islamic State, or any other terrorist or violent extremist group. The real story is that women have been playing an active role in these groups for over a century.

In the late 1800s, an anarchist group founded in Russia, Narodnaya Volya, planned assassinations of state officials and other political persons. One of the group’s leaders was a woman named Vera Figner. Figner helped organize the underground, as well as help plan attacks. Several other women were involved in the group’s activities. A member named Anna Yakimova helped construct bombs, and Figner’s own home was used as a workshop[1]. Several other women played active roles in Narodnaya Volya’s plots. Narodnaya Volya’s influence lived on, most notably in the Paris terror campaign in the 1880s[2]. That campaign included the participation of many women.

Throughout the Twentieth Century, women would play prominent roles in violent extremist groups all over the world. During the Algerian War, women featured prominently, planting bombs for the National Liberation Front (FLN) during the Battle of Algiers. Djamila Bouhired[3] planted a bomb in a café which killed 11 people in 1957. Hassiba Ben Bouali was killed alongside other FLN militants during a French bombing raid. Perhaps the most well-known female militant in Algeria was Zohra Drif. Drif was very active in the anti-colonial independence movement, gathering support, running the underground, and planting bombs.

Germany’s Red Army Faction (RAF), also known as the Baader-Meinhof Group, was co-founded in 1970 by a woman named Ulrike Meinhof. During the group’s first two years, Meinhof participated in numerous robberies and bombings. Although Meinhof was captured in 1972, she was not the only woman active in RAF’s twenty-plus yearlong campaign. Verena Becker was imprisoned in 1977 for criminal involvement, but later released. She was also convicted in 2012 for a murder committed during her time with RAF.

Women’s roles in violent extremist groups took a new direction when the Liberation Tigers of Tamil Eelam (LTTE) began using women as suicide bombers in their bid for independence. In Sri Lanka, women were second-class citizens, but LTTE women were viewed as equals, having roles in military leadership, and even having their own divisions. Women were trained and participated in all areas of combat, and like their male counterparts, were given the title of martyr[4].

In the late 1990s, Germany saw another terror campaign in which a woman played a role. Between 1998 and 2011, the National Socialist Underground (NSU), a neo-Nazi group, was responsible for ten murders, three bombings, and 15 bank robberies. Though the German prosecutors say the group only comprised of three members – Uwe Mundlos, Uwe Böhnhardt, and a woman, Beate Zschäpe – others say they have ties to neo-Nazi groups all over Germany. Zschäpe, the only surviving member of NSU, has admitted to arson, but is accused of aiding in the robberies and murders. Before turning herself in, she set fire to an apartment in order to destroy evidence[5].

The insurgency in Chechnya during the First and Second wars produced some of the most well-known women as active agents. Women from the North Caucasus were responsible for over 30 suicide bombings in Russia between 2000 and 2010. Women were also participants in the Dubrovka Theater and Beslan School sieges[6]. Their actions have not been limited to Chechnya; a Dagestani woman is thought to have blown herself up in Istanbul in 2015.

Since al-Qaeda’s inception, women have played an active role. Many women in al-Qaeda have conducted surveillance, run propaganda accounts in order to recruit, and some have even conducted operations themselves. On November 6, 2005, a Belgian woman named Murielle Degauque strapped on a suicide belt and detonated herself near a U.S. Army patrol in Baquba, Iraq. Sajida al Rishawi attempted to detonate a suicide belt in Amman, Jordan. Sajida was the first woman of al-Qaeda arrested. And in December 2015, Tashfeen Malik, along with her husband, committed an act of terror in San Bernardino, California. Malik was inspired by both al-Qaeda and Islamic State[7].

As the Islamic State faces military defeat in Iraq and Syria, the roles the women are playing as supporters are evolving. Previously, women had participated in online propaganda campaigns, and in policing other women as part of the Al-Khansaa and Umm Al-Rayan brigades[8]. But in September 2016, a group of French women guided by the Islamic State were intercepted before they could carry out a bombing plot in Paris[9]. There have even been reports of Islamic State women as suicide bombers, but as of this writing, nothing has been confirmed.

Throughout the decades, women have played an active role in violent extremist organizations. Their roles have varied from organization to organization, and the ideology spans the spectrum. One thing is certain, women as violent extremists does not seem to be a phenomenon that will disappear any time soon.


Endnotes:

[1] John Simkin, “Vera Figner,” http://spartacus-educational.com/RUSfigner.htm, (accessed November 2017)

[2] John Merriman, The Dynamite Club (Boston New York: Houghton Mifflin Harcourt, 2009)

[3] Ali Adeeb Alnaemi (translator), “Djamila Bouhired: A Profile From the Archives,” http://www.jadaliyya.com/Details/27072/Djamila-Bouhired-A-Profile-From-the-Archives

[4] Mia Bloom, Bombshell (Philadelphia: University of Pennsylvania Press, 2011)

[5] Antonia von der Behrens, “The NSU Case in Germany,” https://www.nsu-watch.info/2017/03/the-nsu-case-in-germany/, (accessed November 2017)

[6] Brandee Leon, “The Curious Case of Russia: History and Russia’s Female Suicide Bombers,” https://thestrategybridge.org/the-bridge/2014/4/16/the-curious-phenomenon-of-russia-history-russias-female-suicide-bombers, (accessed November 2017)

[7] Brandee Leon, “The Roles Women Play: al Qaeda and Islamic State,” https://misscherryjones.wordpress.com/2016/01/11/the-roles-women-play-al-qaeda-and-islamic-state/, (accessed November 2017)

[8] Brandee Leon, “Women and the Islamic State,” https://wordpress.com/posts/misscherryjones.wordpress.com, (accessed December 2017)

[9] Souad Mekhennet and Joby Warrick, “The jihadist plan to use women to launch the next incarnation of ISIS,” https://www.washingtonpost.com/world/national-security/the-jihadist-plan-to-use-women-to-launch-the-next-incarnation-of-isis/2017/11/26/e81435b4-ca29-11e7-8321-481fd63f174d_story.html, (accessed November 2017)

Assessment Papers Brandee Leon Violent Extremism Women

Assessment of the Factors Leading to the Recruitment of Violent Extremists

Jason Baker is an Officer in the United States Air Force, with a recent deployment supporting the fight against the Islamic State.  Jason is also an M.A. candidate at American University’sSchool of International Service.  He can be found on Twitter @JasonBakerJB.  All opinions in this article are those of the author and do not represent the official positions of the United States Department of Defense or United States Air Force.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Factors Leading to the Recruitment of Violent Extremists

Date Originally Written:  December 3, 2017.

Date Originally Published:  January 15, 2018.

Summary:  Governments traditionally focus counterterrorism efforts on intelligence, kinetic capabilities, and enhanced domestic security policies.  Neglected still, and likely why terror attacks persist, is governments understanding the forces that motivate people to join violent extremist organizations in the first place.  Unfortunately, a marriage between counterterrorism efforts and the study of socioeconomic equality, may still be far off.

Text:  Terror attacks around the world continue to occur with a regularity that has made them a seemingly normal part of life.  As such, the response to, and prevention of, such attacks is a topic regularly covered by journalists, news anchors, and security experts.  These analyses usually focus on the need for intelligence to identify terrorists, the use of kinetic capabilities to target terrorists, and enhanced domestic security policies to prevent and protect against attacks.  While the majority of the U.S. counterterrorism strategy focuses on these three areas, terror attacks persist.  An area of study that continues to be neglected is that which seeks a better understanding of where recruits for violent extremist organizations come from and why they join, so that policy to prevent people from being radicalized in the first place can be made.  The biggest drivers of extremist propaganda and recruitment are not a religious message, but income inequality, social resentment, and unstable governments or refugee situations.

Income inequality is a growing problem throughout the world.  So much so that in 2015 the World Economic Forum ranked rising income inequality as the world’s top priority[1].  The economically disenfranchised develop strong feelings that can often turn into anger and resentment about their situation, which can drive a need for revenge when they feel they have no power to change the status quo.  Such an income equality situation creates favorable conditions for violent extremist organizations to win new recruits and operate[2].

Similar to feeling economically disenfranchised, many extremist recruits come from the ranks of the socially ostracized.  To be certain, this is not to say those who just “don’t fit in” (although that can contribute) to society, but those that are marginalized by their government or large parts of their society.  This socially ostracized population could be migrants in a new land who are not afforded the chance to assimilate into society (as seen in Europe) or religious or ethnic minorities in states with hard-line governments (Sunni majorities being governed by Shia hardliners and vice versa).  Sometimes ostracism even metastasizes into something as awful as the situation in Myanmar where many Rohingya feel as though they are left with almost no option other than to attack the government.

The greatest of all these factors that leads to terror recruitment are failed states and refugee situations.  In violent, lawless places like Syria the group that can offer a better way of life whatsoever is often the one that is joined.  Violent extremist organizations such as the Islamic State offer services and security in exchange for committing to their cause.  A similar situation is seen in Yemen.  These failed states create refugee and internally displaced persons (IDP) situations that can become breeding grounds for violent extremist recruiting.  Violent extremist organizations have their choice of recruiting tactics when dealing with refugee camps and IDPs.  Some violent extremist organizations offer food and cash in exchange for joining, and some offer a message of hope and promise of revenge to those angry about their situation.  The situation then feeds itself.  While anything from failed states to climate change can cause refugee and IDP situations, violent extremism is clearly becoming a more important factor in driving people from their homes.  In Iraq, the pre-2003 Christian population of 1.5 million is estimated to have dwindled to 400,000, while over half a million of Syria’s 1.8 million Christians have been displaced[3].  Elsewhere, there are in excess of 2.5 million displaced in Yemen[4] and over 600,000 in Myanmar[5].   The humanitarian reasons for solving the displaced persons crisis the world faces are evident, but it is also a dire security issue.

All of these are problems the world needs to address individually, for their own specific reasons, but also because they create fertile grounds for violent extremist organization recruitment.  There is not often a lot of cross over between those who care deeply about countering violent extremism, and those who care about socioeconomic equality.  Connecting the two together however, can bring more urgency to the issue of fighting violent extremist organization recruiting with more problem solvers at the table.  Policy and decision makers who focus on the drivers of violent extremism organization recruitment may be able to go further than intelligence, kinetic capabilities, and policies that enhance domestic security have thus far.


Endnotes:

[1] The Outlook on the Global Agenda 2015. World Economic Forum. Retrieved December 03, 2017, from http://reports.webforum.org/outlook-global-agenda-2015/

[2] Seaver, B. M., Hyman, G. F., Toft, M. D., & McCarthy, D. (2015, September 1). The National Interest. This Is Why Global Income Inequality Is a Real National-Security Threat. Retrieved December 03, 2017, from http://nationalinterest.org/feature/why-global-income-inequality-real-national-security-threat-13747

[3] Koser, K. (2016, July 29). IDPs, Refugees, and Violent Extremism: From Victims to Vectors of Change. The Brookings Institute. Retrieved December 03, 2017, from https://www.brookings.edu/blog/order-from-chaos/2015/02/20/idps-refugees-and-violent-extremism-from-victims-to-vectors-of-change/

[4] Internal Displacement Monitoring Centre (IDMC) – Norwegian Refugee Council. (2015, December 31—updated May 2016). Yemen IDP Figures Analysis. Retrieved December 03, 2017, from http://www.internal-displacement.org/middle-east-and-north-africa/yemen/figures-analysis

[5] Internal Displacement Monitoring Centre (IDMC) – Norwegian Refugee Council. (2017, September 28). How many internally displaced Rohingya are trapped inside Myanmar? Retrieved December 03, 2017, from http://www.internal-displacement.org/library/expert-opinion/2017/how-many-internally-displaced-rohingya-are-trapped-inside-myanmar

Assessment Papers Economic Factors Jason Baker Violent Extremism

An Australian Perspective on Identity, Social Media, and Ideology as Drivers for Violent Extremism

Kate McNair has a Bachelor’s Degree in Criminology from Macquarie University and is currently pursuing her a Master’s Degree in Security Studies and Terrorism at Charles Sturt University.  You can follow her on Twitter @kate_amc .  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  An Australian Perspective on Identity, Social Media, and Ideology as Drivers for Violent Extremism

Date Originally Written:  December 2, 2017.

Date Originally Published:  January 8, 2018.

Summary:  Countering Violent Extremism (CVE) is a leading initiative by many western sovereigns to reduce home-grown terrorism and extremism.  Social media, ideology, and identity are just some of the issues that fuel violent extremism for various individuals and groups and are thus areas that CVE must be prepared to address.

Text:  On March 7, 2015, two brothers aged 16 and 17 were arrested after they were suspected of leaving Australia through Sydney Airport to fight for the Islamic State[1].  The young boys fouled their parents and forged school letters.  Then they presented themselves to Australian Immigration and Border Protection shortly after purchasing tickets to an unknown middle eastern country with a small amount of funds and claimed to be on their way to visit family for three months.  Later, they were arrested for admitting to intending to become foreign fighters for the Islamic State.  October 2, 2015, Farhad Khalil Mohammad Jabar, 15 years old, approached Parramatta police station in Sydney’s West, and shot civilian police accountant Curtis Cheng in the back[2].  Later it was discovered that Jabar was inspired and influenced by two older men aged 18 and 22, who manipulated him into becoming a lone wolf attacker, and supplied him the gun he used to kill the civilian worker.

In November 2016 Parliament passed the Counter-Terrorism Legislation Amendment Bill (No. 1) 2016 and stated that “Keeping Australians safe is the first priority of the Turnbull Government, which committed to ensuring Australian law enforcement and intelligence agencies have the tools they need to fight terrorism[3].”  More recently, the Terrorism (Police Powers) Act of 2002 was extensively amended to become the Terrorism Legislation Amendment (Police Powers and Parole) Act of 2017 which allows police to have more powers during investigations and puts stronger restrictions and requirements on parolees when integrating back into society.  Although these governing documents aim at honing in on law enforcement and the investigation side of terrorism efforts, in 2014 the Tony Abbot Government implemented a nation-wide initiative called Living Safe Together[4].  Living Safe Together opposed a law enforcement-centric approach and instead focused on community-based initiatives to address the growing appeal of violent extremist ideologies in young people.

Levi West, a well-known academic in the field of terrorism in Australia highlighted that, in the cases of the aforementioned individuals, they have lived there entire lives in a world where the war of terror has existed.  These young men were part of a Muslim minority and have grown up witnessing a war that has been painted by some as the West vs Islam.  These young men were influenced by many voices between school, work, social events, and at home[5].  This leads to the question on whether these young individuals are driven to violent extremism by the ideology or are they trying to find their identity and their purpose in this world.

For young adults in Australia, social media is a strong driver for violent extremism.  Young adults are vulnerable and uncertain about various things in their life.  When people feel uncertain about who they are, the accuracy of their perceptions, beliefs, and attitudes, they seek out people who are similar to them in order to make comparisons that largely confirm the veracity and appropriateness of their own attitudes.  Social media is being weaponised by violent extremist organizations such as the Islamic State.  Social media, and other communicative Peer-to-Peer sharing platforms, are ideal to facilitate virtual learning and virtual interactions between young adults and violent extremists.  While young adults who interact within these online forums may be less likely to engage in a lone wolf attack, these forums can reinforce prior beliefs and slowly manipulate people over time.

Is it violent extremist ideology that is inspiring young individuals to become violent extremists and participate in terrorism and political violence?  Decentralized command and control within violent extremist organizations, also referred to as leaderless resistance, is a technique to inspire young individuals to take it upon themselves, with no leadership, to commit attacks against western governments and communities[6].  In the case of the Islamic State and its use of this strategy, its ideology is already known to be extreme and violent, therefore its interpretation and influence of leaderless resistance is nothing less.  Decentralization has been implemented internationally as the Islamic State continues to provide information, through sites such as Insider, on how to acquire the materiel needed to conduct attacks.  Not only does the Islamic State provide training and skill information, they encourage others to spread the their ideology through the conduct of lone wolf attacks and glorify these acts as a divine right.  Together with the vulnerability of young individuals, the strategy of decentralized command and control with the extreme ideology, has been successful thus far.  Based upon this success, CVE’s effectiveness is likely tied to it being equally focused on combating identity as a driver for violent extremism, in addition to an extreme ideology, and the strategies and initiative that can prevent individuals to becoming violent extremists.

The leading strategies in CVE have been social media, social cohesion, and identity focused.  Policy leaders and academics have identified that young individuals are struggling with the social constraints of labels and identity, therefore need to take a community-based approach when countering violent extremism.  The 2015 CVE Regional Summit reveled various recommendations and findings that relate to the use of social media and the effects it has on young, vulnerable individuals and the realities that Australia must face as a country, and as a society.  With the growing threat of homegrown violent extremism and the returning of foreign fighters from fighting with the Islamic State, without programs that address individual identity and social cohesion, violent extremism will continue to be a problem.  The Australian Federal Police (AFP) have designated Community Liaison Team members whose role is to develop partnerships with community leaders to tackle the threat of violent extremism and enhance community relations, with the AFP also adopting strategies to improve dialogue with Muslim communities. The AFP’s efforts, combined with the participation of young local leaders, is paramount to the success of these strategies and initiatives to counter the violent extremism narrative.


Endnotes:

[1] Nick Ralston, ‘Parramatta shooting: Curtis Cheng was on his way home when shot dead’ October 3rd 2015 http://www.smh.com.au/nsw/parramatta-shooting-curtis-cheng-was-on-his-way-home-when-shot-dead-20151003-gk0ibk.html Accessed December 1, 2017.

[2] Lanai Scarr, ‘Immigration Minister Peter Dutton said two teenage brothers arrested while trying to leave Australia to fight with ISIS were ‘saved’’ March 8th 2015 http://www.news.com.au/national/immigration-minister-peter-dutton-said-two-teenage-brothers-arrested-while-trying-to-leave-australia-to-fight-with-isis-were-saved/news-story/90b542528076cbdd02ed34aa8a78d33a Accessed December 1, 2017.

[3] Australian Government media release, Parliament passes Counter Terrorism Legislation Amendment Bill No 1 2016. https://www.attorneygeneral.gov.au/Mediareleases/Pages/2016/FourthQuarter/Parliament-passes-Counter-Terrorism-Legislation-Amendment-Bill-No1-2016.aspx Accessed December 1, 2017.

[4] Australian Government, Living Safer Together Building community resilience to violent extremism. https://www.livingsafetogether.gov.au/pages/home.aspx Accessed December 1, 2017.

[5] John W. Little, Episode 77 Australian Approaches to Counterterrorism Podcast, Covert Contact. October 2, 2017.

[6] West, L. 2016. ‘#jihad: Understanding social media as a weapon’, Security Challenges 12 (2): pp. 9-26.

Assessment Papers Australia Cyberspace Islamic State Variants Kate McNair Social Media Violent Extremism

Playing “Good Jihadi-Bad Jihadi”

Ian Wilkie is an American lawyer and terrorism expert living outside of New York City.  Wilkie has lived in Europe, Asia, and Africa and speaks multiple foreign languages.  He is a veteran of the U.S. Army (Infantry), completed French Foreign Legion commando training, and graduated from Vassar College and Tulane Law School.  Wilkie lived in South Asia post-9/11 where he conducted research and has been a consultant and advisor to two U.S. government agencies.  He has also worked for two of the three largest law firms in the world and has served as general counsel to hedge funds.  Wilkie possesses a deep knowledge of terrorist strategy and is currently working on a book called “Checkmate: Jihad’s Endgame.”  Follow Wilkie on Twitter @Wilkmaster.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Playing “Good Jihadi-Bad Jihadi”

Date Originally Written:  December 5, 2017.

Date Originally Published:  January 1, 2018.

Summary:  U.S. Presidents Jimmy Carter[1] and Ronald Reagan[2] aligned the U.S. with jihadists in Afghanistan against Russia and later gave weapons to Salafi-jihadis allied with Osama Bin Laden[3].  Less than 20 years later, Al Qaeda brought down the World Trade Center and attacked the Pentagon.  Presently the U.S. is bogged down in Syria and continues to make the foreign policy mistake of playing “Good Jihadi-Bad Jihadi.”

Text:  The United States has been fitfully fighting Muslim-majority countries since shortly after the founding of the nation.  President Thomas Jefferson saw enough of a piracy and kidnap threat to mobilize the Navy and newly formed Marine Corps and deploy them to Africa[4].  Centuries later, the use of violence against civilians is a hallmark of Islamist extremists.  Informed by Islamist interpretations of ample examples in scripture (Qu’ran[5] and Hadith[6]), religious “holy warriors” find it easy to commit atrocities and justify them on perceived religious grounds.  Some clerics support this violence, and some have even gone so far as to condone the use of nuclear[7] and biological[8] weapons against “infidels” based their interpretation of sacred texts.  The violence of these Islamist actors, whether on 9/11 or in Europe, Africa, or the various countries of the Middle East today, is not in doubt.  The history of violence associated with the Islamist jihad (“struggle”) to convert the world to Islam is rife with examples of massacres and forced conversions[9].  Put bluntly, the blood lust of these violent Islamists is not even an open question, yet the U.S. still works with some of the extremists, while trying to kill others.

Afghanistan in the decade from 1979-1989 saw the U.S. advance a strategy of opposing Russia without fighting Russia directly.  The U.S., primarily the Congress and Central Intelligence Agency (CIA), believed that Russia could be bloodied and beaten if the “right” people were given the right weapons, clandestinely.  To this end, close ties were forged between the CIA and jihadists and Salafi-jihadis who believed in pedophilia, polygamy, and the liberal application of violence against civilians, including religious minorities.  America knew what Osama bin Laden and Gulbuddin Hekmatyar stood for, yet we still worked with them according to “the enemy of my enemy is my friend” theory of geopolitics[10].  On September 11, 2001, America and the world learned the true dangers of allying with Islamist religious zealots: they may kill U.S. enemies, but they will never be U.S. allies.  Islamist religious zealots answer to their God and no one else, regardless of which faith they profess.

The cold, realpolitik calculus that the CIA made in Afghanistan to work with jihadists and Salafi-Jihadis may have hastened the break-up of the Soviet Union, but it also hastened the end of America’s moral leadership in the eyes of the world.  When these “good” jihadis the U.S. once armed and trained utilized tactics from World War 2[11] against American buildings, the American response was telling: the Saudi allies and sponsors of violent jihad were permitted to leave the U.S., no questions asked[12].  The softball investigation of official Saudi ties to Al Qaeda and 9/11 reflected yet another Machiavellian choice by Washington; the oil money and strategic advantage of remaining allied to the bandit Kingdom[13] outweighed any practical considerations of justice for the victims.  The Saudi departures and lackluster investigation were a clear case of vested interests and money overwhelming U.S. morality and yet, almost two decades later, the survivors and the almost 3,000 dead still demand justice.

America’s reaction to 9/11 consisted of removing the Afghan Taliban from power, but not eliminating their base of support in Pakistan, their illicit drug networks, or their financial backing across the Sunni Muslim world.  The American response largely ignored the fundamentalist horrors of the Afghan Taliban’s behavior towards women, children, and minorities and focused only on which “externally focused” terrorists they were giving refuge to.  Rather like its 180° shift on Osama Bin Laden, the U.S. went from bombing the Afghan Taliban to inviting them to peace talks, in effect treating them like normal people and not the barbarians that they are.  In 2017, the U.S. is still open to sitting across the table from “men” who rape little boys[14] as a matter of honor and shoot schoolgirls in the face[15] as a point of pride, which is moral capitulation of the very worst kind.

Shifting to Syria, we encounter the most egregious examples of playing “Good Jihadi-Bad Jihadi” that the U.S. has ever engaged in.  The fact that the CIA was willing to advance the fiction that foreign fighters from Sunni theocracies were anything but jihadis shows you how gullible and uninformed they believe Americans are[16].  From an ethical point of view, there is no such thing as a “moderate” Sunni foreign insurgent in Syria and there never will be.  Syria is another example of the U.S. trying to advance a larger goal (oppose Shia Iran and Syrian President Bashar al-Assad) by making a moral compromise and allying with malign forces.  In Syria, the U.S. has sent entire warehouses full of weapons to some of the most suspect killers on the planet[17].  For example, U.S. antitank missiles have been used by “friendly, moderate rebels” to attack medevac missions and even journalists[18].  Jihadis that the U.S. knows, and possibly trained[19], have used chemical weapons dozens of times in that conflict[20].  That the insurrection in Syria failed is largely due to the fact that Islamist jihadis don’t fight in lanes; they fight everyone and especially each other.  The U.S. continues to arm “bad” jihadis, as there is no such thing as a “good” jihadi, and the results speak for themselves.


Endnotes:

[1] Brzezinski, Zbigniew (Interview). “How Jimmy Carter and I Started the Mujahideen” https://www.counterpunch.org/1998/01/15/how-jimmy-carter-and-i-started-the-mujahideen/ (Accessed 22 Nov 2107).

[2] Kaplan, Fred. “Reagan’s Osama Connection” http://www.slate.com/articles/news_and_politics/war_stories/2004/06/reagans_osama_connection.html (Accessed 22 Nov 2017).

[3] Harnden, Toby. “Taliban still have Reagan’s Stingers” http://www.telegraph.co.uk/news/worldnews/asia/afghanistan/1357632/Taliban-still-have-Reagans-Stingers.html (Accessed 22 Nov 2017).

[4] Hitchens, Christopher. “Jefferson Versus the Muslim Pirates” https://www.city-journal.org/html/jefferson-versus-muslim-pirates-13013.html (Accessed 22 Nov 2017).

[5] Ali, Ayaan Hirsi. “Islam Is a Religion of Violence” http://foreignpolicy.com/2015/11/09/islam-is-a-religion-of-violence-ayaan-hirsi-ali-debate-islamic-state/ (Accessed 22 Nov 2017).

[6] Anonymous. “1.B Violence in Hadith Books” https://islamreligionofwar.wordpress.com/1b-violence-in-hadith-books/ (Accessed 22 Nov 2017).

[7] Tobey, William & Zolotarev, Pavel. “The Nuclear Terrorism Threat” https://www.belfercenter.org/sites/default/files/legacy/files/nuclearterrorismthreatthailand2014.pdf (p.10, Accessed 22 Nov 2017).

[8] Gunaratna, Rohan & Pita, René. “Revisiting Al-Qa`ida’s Anthrax Program” https://ctc.usma.edu/posts/revisiting-al-qaida’s-anthrax-program (Accessed 22 Nov 2017).

[9] Konrad, Mike. “The Greatest Murder Machine in History” http://www.americanthinker.com/articles/2014/05/the_greatest_murder_machine_in_history.html (Accessed 5 December 2017).

[10] Coll, Steve (2004). Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001. Penguin, pp. 125-128.

[11] Editor, Military History Now. “One Way Ticket – Japan’s Kamikazes Weren’t the Only Suicide Pilots of WW2” http://militaryhistorynow.com/2014/03/17/one-way-ticket-japans-kamikazes-werent-the-only-suicide-pilots-of-ww2/ (Accessed 22 Nov 2017).

[12] Sperry, Paul. “Inside the Saudi 9/11 coverup” https://nypost.com/2013/12/15/inside-the-saudi-911-coverup/ (Accessed 24 Nov 2017).

[13] Zakaria, Fareed. “Saudi Arabia: The devil we know” https://www.washingtonpost.com/opinions/saudi-arabia-the-devil-we-know/2016/04/21/2109ecf6-07fd-11e6-b283-e79d81c63c1b_story.html (Accessed 22 Nov 2017).

[14] Agence France-Presse. “Male rape and paedophilia: How Taliban uses ‘honey trap’ boys to kill Afghan police” http://www.firstpost.com/world/male-rape-and-paedophilia-how-taliban-uses-honey-trap-boys-to-kill-afghan-police-2837546.html (Accessed 22 Nov 2017).

[15] Johnston, Ian. “Malala Yousafzai: Being shot by Taliban made me stronger” https://www.nbcnews.com/news/other/malala-yousafzai-being-shot-taliban-made-me-stronger-f6C10612024 (Accessed 22 Nov 2017).

[16] Mazzetti, Mark, Goldman, Adam & Schmidt, Michael S. “Behind the Sudden Death of a $1 Billion Secret C.I.A. War in Syria” https://www.nytimes.com/2017/08/02/world/middleeast/cia-syria-rebel-arm-train-trump.html (Accessed 4 Dec 2017).

[17] Sanger, David E. “Rebel Arms Flow Is Said to Benefit Jihadists in Syria” http://www.nytimes.com/2012/10/15/world/middleeast/jihadists-receiving-most-arms-sent-to-syrian-rebels.html (Accessed 22 Nov 2017).

[18] Russia Today. “US anti-tank TOW missile used in attack on RT journalists in Syria” https://www.rt.com/news/323810-us-missile-journalists-attack-syria/ (Accessed 5 Dec 2017).

[19] Adl-Tabatabai, Sean. “State Dept: US-Backed Forces Executed Chemical Weapons Attack in Syria” http://yournewswire.com/state-dept-us-forces-chemical-weapons-syria/ (Accessed 22 Nov 2017).

[20] “State Dep. Admits Opposition in Syria Has Chemical Weapons”
https://www.telesurtv.net/english/news/State-Dep.-Admits-Opposition-in-Syria-Has-Chemical-Weapons-20171020-0006.html (Accessed 24 Nov 2017).

Allies & Partners Assessment Papers Ian Wilkie Islamic State Variants Taliban (Islamic Emirate of Afghanistan) United States Violent Extremism

Assessment on the Revised Use of Afghan Militias

Suzanne Schroeder is an independent analyst.  She can be found on Twitter @SuzanneSueS57, and on Tumblr.  She is currently working on a long-term project on school poisonings in Afghanistan and has previously written for War on the Rocks.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Date Originally Written:  November 27, 2017.

Date Originally Published:  December 25, 2017.

Summary:  A new plan is under consideration by the Afghan Government to transform the Afghan Local Police into an Afghan Territorial Army.  While this transformation contributes to the current U.S. strategy in Afghanistan, without proper oversight, the Afghan Territorial Army could be co-opted by regional strong men.

Text:  The number of U.S. and North American Treaty Organization troops currently in Afghanistan is insufficient to carry out U.S. President Donald Trump’s strategy.  This strategy has multiple parts involving an increased use of air power, employing Special Operations Forces in more ambitious ways, and a constant fight to reverse Taliban gains and prevent the Taliban from securing additional territory.  Additionally, there is a counter-terrorism part of the U.S. mission, which unilaterally focuses on containing/defeating the Islamic State-Khorasan Province[1].

On November 19, 2017, The Guardian newspaper reported that Afghanistan President Ashraf Ghani is currently considering a U.S. proposal to restructure the Afghan Local Police into the Afghan Territorial Army, modeled after the Indian Territorial Army[2].  The Guardian also reported that the proposal would start with 1,000 men, and possibly reach 20,000, over two years[3].  This proposal has raised numerous concerns with human rights groups, including the United Nations and Human Rights Watch, that fear any new iteration of the militia system will revive the serious abuses that the militias have been accused of in the past ranging  from child sexual abuse to extra judicial killings.  As global attention shifts away from Afghanistan, increased misuses of power are a concern.

If one types the word “arbakis,“ the Pashto world that generally means militias, into the search field on the Taliban’s alemarah website the result is 81 pages where the term is used.  Despite the deceptions and exaggerations that often appear in Taliban propaganda, the negative opinions regarding militias allow the Taliban to gain political capital by exploiting the distrust of these groups based on their records of abusive practices towards civilians.  If this anti-militia narrative did not produce some benefit for the Taliban, it is doubtful they would continue to adhere to it so closely.

The plans to form an Afghan Territorial Army are an attempt to provide a second-line defense against Taliban gains.  The Taliban understand that repeated attacks on military and police targets accomplish the goal of psychological intimidation.  For anyone who may be considering joining the Afghan National Security Forces, the awareness of how often security forces are targeted is a strong deterrent.  Taliban attacks on police and military targets have become increasingly ambitious, complex, and deadly.

The war in Afghanistan is both regionally strategic, and a micro-level conflict driven by local concerns.  All regional players have their own motives for involvement in the conflict in Afghanistan, whether related to security concerns (containing the Islamic State for both Russia and Iran, as an example), or economic opportunities, as in the case with India and the People’s Republic of China.  Also involved are the ever-complex machinations of Pakistan and its security services.  Concurrently, there are numerous local competitions for resources, favors, development projects, drugs, and all other commodities.  These conditions have allowed local powerbrokers, most of whom have connections to the Afghan National Unity Government, to consolidate their power and establish local fealties, policed by militias.  The idea that an Afghan Territorial Army would not be co-opted in some fashion by regional strong men seems dangerously naïve.  Afghan Territorial Army units might also be used as conduits for influence from other regional actors.  There is no reason why Russia, who already assists the Taliban with small arms and a fuel supply scheme[4], wouldn’t seek to co-opt the Afghan Territorial Army.  Any establishment of an Afghan Territorial Army must also take into account the shifting of alliances, which have been so characteristic of this conflict.

A critical part of the counter-terrorism mission in Afghanistan includes the avoidance of another civil war, such as the devastating one that followed the Soviet departure in 1989.  While the continuation of Western aid would seem to prevent this outcome, it’s still a danger that existing conditions can be worsened by sectarianism, social inequality, and the ever-present corruption, that is too entrenched to be effectively combated.  The establishment of an Afghan Territorial Army that is unregulated and operates outside of an accountability structure, would further fuel declining social and political cohesion.  Combined with abuses, and little or no means of redress, Afghan hostilities may be directed at the Afghan National Unity Government, which ironically is greatly lacking in “unity.”  The inability of Afghans to redress the actions of an unregulated Afghan Territorial Army would ensure the Taliban gains support.  One way to preempt this inability of redress is to truly model the Afghan Territorial Army after the Indian Territorial Army, which is subordinated to the Indian Army to ensure proper oversight.

An Afghan Territorial Army with sufficient oversight, including maintaining an accurate inventory of its weapons and equipment, could contribute towards the U.S. strategic goal of recapturing territory from the Taliban (80% back in Afghan government control, after two years), and sufficiently degrading Taliban capabilities to make negotiations seem a reasonable option[5]. While this strategic goal is lofty, a narrower tactical goal could be an Afghan Territorial Army that succeeds in addressing the localized nature of the conflict and offsets the high level of desertions, among other problems that plague the Afghan National Army.

Any future development of the Afghan Territorial Army will require a functioning, sustainable system of oversight, and an awareness of consequences that could potentially damage U.S. engagement in Afghanistan, thus strengthening support for the Taliban.  If the U.S. is invested the creation of an Afghan Territorial Army, then Afghan partners must be willing to adhere to mutually agreed upon guidelines for its employment and oversight, and due care must be taken to evaluate both the potential successes and failures of this type of program throughout its life.


Endnotes:

[1] Author interview, with The Guardian’s Kabul correspondent, Sune Engel Rasmussen, September 11, 2017.

[2] Rasmussen, S. E. (2017, November 19). UN concerned by controversial US plan to revive Afghan militias. Retrieved November 27, 2017, from https://www.theguardian.com/world/2017/nov/19/afghanistan-militias-us-un-diplomats

[3] Ibid.

[4] Loyd, A. (2017, November 11). Afghanistan: the war that never ends. Retrieved November 27, 2017, from https://www.thetimes.co.uk/article/afghanistan-the-war-that-never-ends-mchjpgphh

[5] Stewart, P., Ali, I. (2017, November 20).  U.S. General Sets Two-Year Goal for Driving Back Afghan Taliban.  Retrieved November 27, 2017, from www.usnews.com/news/world/articles/2017-11-20/us-general-sets-two-year-goal-for-driving-back-afghan-taliban

Afghanistan Assessment Papers Irregular Forces / Irregular Warfare Suzanne Schroeder Taliban (Islamic Emirate of Afghanistan) United States

Assessment of the Trump Administration’s Communications with the “Muslim World”

Jason Criss Howk conducted defense, intelligence, diplomatic, and education missions for the U.S. Government focusing on Afghanistan and Muslim cultures for 23 years.  He now teaches, writes, and speaks nationally to decrease anti-religious bigotry.  He shares a variety of information on Twitter @jason_c_howk and at dispatchesFromPinehurst.com. His award-winning book is The Qur’an: A Chronological Modern English Interpretation.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Trump Administration’s Communications with the “Muslim World”

Date Originally Written:  December 10, 2017.

Date Originally Published:  December 18, 2017.

Summary:  Fear of Muslims is irrational. Prohibiting a discussion of Islam’s relationship to modern terrorist groups is too. The continuing success of terror recruiting reveals their ideology is a center of gravity, but you cannot shoot an ideology. You have to expose its flaws and turn people against it. One must use the correct terminology when you speak or it empowers terrorists. This is where the Trump Administration has taken 3-steps forward but 1-step back.

Text:  Fear of Muslims is irrational.  Prohibiting a discussion of Islam’s relationship to modern terrorism is too.  President George W. Bush took America into a War on Terrorism[1], President Barack Obama shifted to countering violent extremism[2].  Both stated correctly that America was not at war with Islam.  While acknowledging the importance of countering a terrorist’s ideology[3], neither slowed the spread of violent radical Islamist or khawarij ideologies used to recruit.  Not talking about Islam and its relationship to terrorism has likely contributed to increasing bigotry against Muslims and damaged America’s ability to decrease recruiting.

The number of nations plagued by terrorists has increased, despite America’s excellence at hunting terrorists.  The continuing success of recruiting hints that their ideology is the likely center of gravity.  You cannot shoot or “drone”[4] an ideology.  You have to understand it, expose its flaws, argue about it, and turn people against it thus ensuring the world understands that violent radical Islamism (separate from the religion of Islam) is a failed political ideology causing death and destruction is critical.

Incorrect terminology further empowers mankind’s enemy.  Here the Trump Administration has improved since the campaign yet occasionally stumbles.   President Trump should listen to his advisors that have operated in the “Muslim World,” listen to solid Muslim allies, and only use precise language that helps Muslims to separate violent radicals from society.  President Trump loses ground when he echoes false experts or bigots that push him to use “alpha-male” language that sounds tough, but makes it more difficult for Muslims to stanch the bloodshed.

Not all terrorists are Muslim and not all Muslims are terrorists; only ignorant people believe otherwise.  So, put the straw-man argument aside that says explaining the role of Islam in modern terrorist propaganda will cause anti-Muslim hatred.  The majority of the deadliest terrorists think they are the most pious Muslims in the world.  Their first murder victims were likely Muslims that they deemed “not Muslim enough for them;” (an old khawarij concept).  Most terrorism victims since 2001 were Muslim. It’s illogical not talk about Islam in relation to modern terrorism.

I have spent almost three years leading talks about the religion of Islam, the political ideology of Islamism, and the khawarij or “violent radical Islamist” ideology used by terrorists.  A few things were made clear to me–often angrily.  First, the American people never felt Bush or Obama understood the enemy.  Second, they felt that neither was able to explain a logical strategy for victory.  Finally, audiences felt the Presidents failed them by not talking about how Islam, Islamism, and terrorist ideologies are connected and disconnected.  Americans felt the Presidents believed their citizens were too stupid to have a discussion about Islam.

Instead of civilly talking about Islam and how terrorists can use some parts of the Qur’an to attract fighters to their cause, previous presidents presented straw-man arguments about why they should or would not discuss Islam.  At my discussions, it takes 45 minutes for people who have never studied Islam to grasp this entire concept.  After Bush and Obama, a third president cannot underestimate the intelligence and curiosity of the American people.

If the Crown Prince of Saudi Arabia can talk about extreme interpretations of Islam[5] and its relationship to many terrorist groups, and the King of Jordan can succinctly label our enemy as Khawarij[6] using terminology from Islam’s history, the American President can have a straightforward conversation about the topic.

America’s terminology should not drive a wedge between the U.S. and our Muslim allies.  Our language should help Muslims drive a wedge between the khawarij butchers and possible recruits and supporters of this deadly cause.

America can’t use words that help our enemy by complementing murderers or lumping them in with hundreds of millions of peaceful Muslims.

Violent radical Islamists want to be called mujahedeen, jihadis, and Muslims.  The word jihad in the Qur’an means to struggle or strive nobly with all your person and wealth in the way of God.  A parallel in Catholicism is the system of sainthood.  Only the most selfless Catholics following God’s path to help others are sainted.  Similarly, in a religious sense, only the best among Muslims should be called mujahedeen (jihadis) which means someone who has performed true jihad.  The word is only used about 14 times in the Qur’an and should be returned to its religious context and taken away from butchers and human rights abusers.  You can’t make jihad into a negative term in a religious sense; so, don’t use it at all.

Instead, insult and brand these violent radical Islamists.  Use the term butcher, murderer, terrorist, khawarij, violent Islamist, loser, Islamist ideologue, distorter or corruptor of Islam, people ignorant of the Qur’an, disgraces, or betrayers of God.

Don’t call violent radical Islamists Muslims or use any negative modifiers in front of the word Islam or Muslim.  These corruptors have left Islam and should be a disgrace to their families.  “Islam” and “Muslims” are both positive words in the Islamic world.  Attaching “Radical” to it is often viewed to mean the entire religion or all Muslims are radical and therefore evil.

Every generation of violent radical Islamist butchers seems to form faster, become more radicalized, kill more gruesomely, and think they are more pious.  The world must stop this trend.

President Trump (obviously not an Islamic scholar) has asked his team and America’s allies to talk clearly about extreme interpretations of the Qur’an and the ideology used by our enemies.  His Riyadh speech[7] was pointed, and by mostly using correct terminology, supported a change[8] that is already underway[9] in the Muslim world.  Start this same discussion in America and ensure that violent radical Islamists and the people who sponsor and provide top-cover for the modern-day Khawarij are exposed and shut down.  Help decrease bigotry towards Muslims.

The world should applaud organizations like this Kuwaiti business[10] that honestly confronted those who purposely misinterpret the Qur’an to justify murder.  All governments should be this brave and clear.

Education won’t end terrorism, but it will impact the long-term fight against Islamist inspired terrorists.  No problem ever improved by refusing to fully examine it and honestly talk about it.


Endnotes:

[1] U.S. Government (2003, February) National Strategy for Combatting Terrorism, retrieved December 11, 2017,  https://www.cia.gov/news-information/cia-the-war-on-terrorism/Counter_Terrorism_Strategy.pdf

[2] U.S. Government (2011, June) National Strategy for Counterterrorism, retrieved December 11, 2017, https://obamawhitehouse.archives.gov/sites/default/files/counterterrorism_strategy.pdf

[3] U.S. Government (2006, September) National Strategy for Combatting Terrorism, retrieved December 11, 2017, https://fas.org/irp/threat/nsct2006.pdf

[4] Friedersdorf, Conor (2016, December 23) Obama’s Weak Defense of His Record on Drone Killings, retrieved December 11, 2017 https://www.theatlantic.com/politics/archive/2016/12/president-obamas-weak-defense-of-his-record-on-drone-strikes/511454/

[5] Chulov, Martin (2017, October 24) I will return Saudi Arabia to moderate Islam, says crown prince, retrieved December 11, 2017 https://www.theguardian.com/world/2017/oct/24/i-will-return-saudi-arabia-moderate-islam-crown-prince

[6] Jordan Times (2015, June 11) Nothing treats Islam with more contempt than Khawarij actions — King, retrieved December 11, 2017 http://www.jordantimes.com/news/local/nothing-treats-islam-more-contempt-khawarij-actions-—-king

[7] U.S. Government (2017, May) President Trump’s Speech in Riyadh Saudi Arabia, retrieved December 11, 2017 https://dispatchesfrompinehurst.com/2017/05/22/howks-notes-of-president-trumps-speech-in-saudi-arabia/

[8] Bergen, Peter (2017 September 27) Saudi women driving a sign bigger change is coming, retrieved December 11, 2017 http://www.cnn.com/2017/09/27/opinions/symbolism-of-saudi-women-driving/index.html

[9] IRNA, (2017 October 29) Iranian woman appointed first ever no. 2 at Oil Ministry, retrieved December 11, 2017 http://www.irna.ir/en/News/82712122

[10] Zain Mobile (2017 May 26) Anti-Terrorism Video for Ramadan 2017, retrieved December 11, 2017 https://www.youtube.com/watch?v=U49nOBFv508

Assessment Papers Jason Criss Howk Trump (U.S. President) United States Violent Extremism

Assessment of the Lone Wolf Terrorist Concept

Linda Schlegel holds a BA in Liberal Arts from the University College Maastricht (NL) and an MA in Terrorism, Security and Society from King’s College London (UK).  Her main topics of interest are radicalization, the role of identity in extremism, and societal resilience.  She can be found on Twitter at @LiSchlegel.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Lone Wolf Terrorist Concept

Date Originally Written:  November 12, 2017.

Date Originally Published:  December 11, 2017.

Summary:  The label “lone wolf” is attached easily to an individual attacker by politicians and the media, but must be used with care.  These actors do not perceive themselves as acting alone, but as part of a group.  This group is increasingly found in the virtual realm, begging the question of whether traditional notions of membership in terrorist groups is still a valid indication of whether an attack was perpetrated by a lone wolf or not.

Text:  In recent years, the phenomenon of so-called lone wolf terrorism has increased with more and more attacks perpetrated by single actors.  Lone wolf attacks occur in the context of multiple ideological frameworks and are not confined to a single group or system of belief.  The Islamist attack in Nice, France, in 2016 was just as much the work of a lone actor as the atrocities perpetrated by right-wing extremist Anders Breivik in Norway in 2011.  While governments and the media are quick to attach the label lone wolf to a single perpetrator, one needs to ask what this concept actually entails.  Individuals do not exist in a vacuum and one should not make the mistake of equating the reference to lone action to objective isolation or disengagement from society at large.  It needs to be discussed what the label actually says about the perpetrator, how the perpetrator views himself, and whether there can be lone wolves in the age of global connectivity through social media.

Politically, the concept lone wolf is used to reassure the public and communicate that the danger is no longer immanent.  Academically as well as practically, the concept entails more than this reassurance[1].  Following ideas put forward by Ramon Spaaje in 2010, a lone wolf terrorist can be defined as a person who “operates individually, does not belong to an organized terrorist group or network and whose modi operandi are conceived and directed by the individual without any direct outside command or hierarchy[2].”  Therefore, there are two conditions which need to be fulfilled in order to classify someone as a lone wolf.  Firstly, the individual perpetrating an attack cannot have formal membership in a terrorist organization or be part of a network of terrorists.  This does not mean that the lone actor needs to be completely innovative in his ideology or actions.  In fact, radicalization is often driven by organizations disseminating propaganda and terrorists learn from each other even if they belong to very different ideological backgrounds.  Breivik, for instance, took inspiration from Al-Qaeda for his attacks[3].  But lone wolves cannot be recognized members of organizations and take action on behalf of this group.  Secondly, the individual must have planned, prepared and executed the attack without operational support from others and without direct orders to do so.  While seemingly straightforward, these criteria are increasingly difficult to apply in today’s circumstances.

Sociologist Max Weber postulated in his writings that in order to understand a social phenomenon, it is not enough to judge it from the outside, one must put oneself in the shoes of the social actor.  Do lone wolves view themselves as lone wolves?  Most of the time, the answer is no.  Terrorists are rarely motivated by nihilism, they are motivated by altruism[4] and take action on behalf of a group.  Islamist terrorists often claim to act in defense of the ummah, the global community of Muslims, and right-wing extremists on behalf of the white race, the nation or, as Breivik, on a self-composed category such as “Nordic Europeans.”  Lone wolves do not view themselves as lone wolves; precisely the contrary holds true.  Lone wolves often perceive themselves as part of a heroic avant-garde seeking to protect a larger group of people.  It is important to understand that lone wolf is a label attached to an individual by external forces not the actor himself.  One could argue that this by itself does not render the above-mentioned criteria invalid, as objectively the individual was acting alone, regardless of whether he or she believes to belong to an organization or take action on behalf of a group or not.  Membership in groups and “acting alone,” however, are concepts increasingly difficult to apply in a world where terrorist organizations increasingly organize virtually through social media.

What does it mean to “belong to an organized terrorist group or network[5]” when groups of all ideological backgrounds are increasingly organizing in the virtual sphere[6]?  Online, thousands of people access, view, read, comment on and engage with extremist content disseminated by terrorist groups.  Individuals can feel strongly about the virtual community and construct their individual identity in relation to the collective online movement[7].  A network can now refer to a virtual social network spanning the globe with various degrees of real-life and virtual involvement with the organization.  In the age of clicktivism, the notion of membership in a terrorist organization is increasingly less straightforward.  Is it feasible to consider somebody to be a lone wolf if this person was an active member of an online network run by an organized group even if he or she perpetrated the attack alone?  Facilitating lone actor attacks has become part of deliberate strategies of extremist organizations[8] and attacks sometimes represent hybrids between lone actor and “normal” terrorist action.  For example, during the recent attacks in Germany, the attacker was continuously in contact with members of the so-called Islamic State through instant messaging applications[9], including receiving encouragement and practical hints.  Can a case like this still be considered lone wolf terrorism?

Terrorism is constantly evolving and the concept of lone wolf terrorism is not as unambiguous as it might have seemed previously.  Social media has changed the way membership in violent organizations can be conceptualized and calls into question how alone lone wolves really are in the age of instant virtual communication. The lone wolf concept needs to be reevaluated and adapted to changed circumstances.  Should these actors be regarded as peripheral members of terrorist organizations?  How can we conceptualize those that followed general calls for action, but executed attacks individually?  Can we understand some individuals as “remote-controlled” by official members of terrorist organizations?  Currently, there are more questions than answers on the content and validity of the lone wolf concept, but we should be alert and aware that the external conditions have changed, and old responses may not be appropriate anymore to present-day lone actor terrorism.


Endnotes:

[1] For an overview see Ellis, C., Pantucci, R., de Roy van Zuijdewijn, J., Bakker, E., Gomis, B., Palombi, S. and Smith, M. (2016). Lone-Actor Terrorism: Final Report. Royal United Service Institute: London
https://rusi.org/sites/default/files/201604_clat_final_report.pdf

[2] Appleton, C. (2014). Lone wolf terrorism in Norway. The International Journal of Human Rights. Vol. 18 (2), pp.127-142
See also Spaaij, R. (2010). The Enigma of Lone Wolf Terrorism: An Assessment. Studies in Conflict & Terrorism. Vol. 33 (9), pp. 854-870

[3] Borchgrevink, A. (2012). A Norwegian Tragedy: Anders Behring Breivik and the Massacre on Utoya. Cambridge: Polity Press

[4] Atran, S. (2010). Talking to the enemy: Violent Extremism, sacred values, and what it means to be human. Penguin Books: London

[5] Appleton, C. (2014). Lone wolf terrorism in Norway. The International Journal of Human Rights. Vol. 18 (2), pp.127-142

[6] Garcia, F. (9/3/16). White nationalist movement growing much faster than ISIS on Twitter, study finds. The Independent. http://www.independent.co.uk/news/world/americas/white-nationalist-movement-twitter-faster-growth-isis-islamic-state-study-a7223671.html

[7] Berntzen, L.E. and Sandberg, S. (2014). The Collective Nature of Lone Wolf Terrorism: Anders Behring Breivik and the Anti-Islamic Social Movement. Terrorism and Political Violence. Vol 26 (5)., pp.759-779

[8] Burke, J. (6/15/16). Islamist terror has evolved toward lone actors- and it’s brutally effective. The Guardian. https://www.theguardian.com/us-news/2016/jun/15/islam-jihad-terrorism-orlando-shooting-paris-attack

[9] Joscelyn, T. (2016). Terror Plots in Germany, France Were ‘remote-Controlled’ by Islamic State Operatives. FDD’s Long War Journal. Retrieved from: http://www.longwarjournal.org/archives/2016/09/terror-plots-in-germany-france-were-remote-controlled-by-islamic-state-operatives.php

Assessment Papers Linda Schlegel Violent Extremism

Assessment of the Threat to Southeast Asia Posed by Illegal, Unregulated and Unreported Fishing

Blake Herzinger is a private-sector maritime security advisor assisting the U.S. Pacific Fleet in implementation and execution of the Southeast Asia Maritime Security Initiative and Pacific Command-wide maritime security efforts.  He served in the United States Navy as an intelligence officer in Singapore, Japan, Italy, and exotic Jacksonville, Florida.  His writing has appeared in Proceedings, CIMSEC and The Diplomat.  He can be found on Twitter @BDHerzinger.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of the Threat to Southeast Asia Posed by Illegal, Unregulated and Unreported Fishing

Date Originally Written:  September 24, 2017.

Date Originally Published:  November 27, 2017.

Summary:  Regional conflict brews in Southeast Asia as states vie for access to fish stocks and, increasingly, rely on Illegal, Unreported and Unregulated Fishing (IUUF) to meet national requirements.  IUUF risks the collapse of targeted fish stocks, destroys the maritime environment, degrades internal security, and brings national security forces into increasingly-escalatory encounters.

Text:  Over one billion residents of the Asia-Pacific rely upon fish as their primary source of protein, and the fish stocks of the region are under a relentless assault[1].  Current estimates place IUUF at between 11 and 26 million metric tons (MMT) yearly (total legal capture is approximately 16.6 MMT yearly), with an estimated value loss to regional economies of $10-23.5 billion[2][3].  Over a 25 year period, fish stocks in the South China Sea have declined anywhere from 6 to 33 percent, with some falling as much as 40 percent over the last 5 years.  In 2015, at least 490 million people in Southeast Asia lived in chronic hunger, with millions of children throughout the region stunted due to malnutrition[4].

Illegal fishing’s pernicious by-product is the critical damage done to the maritime environment by those flouting fishery regulations.  As large fish become more scarce as a result of industrial-scale overfishing, smaller-scale fishermen turn to dangerous and illegal practices to catch enough fish to survive.  Blast fishing obliterates coral reefs and kills indiscriminately, but despite prohibitions continues at a rate of nearly 10,000 incidents a day in Philippines alone[5].  Cyanide fishing is also still widespread, despite being banned in several Southeast Asian countries.  Used to stun fish for live capture (for aquariums or regionally popular live fish restaurants), cyanide contributes to the devastation of coral reefs across the SCS.  Giant clam poaching also has deleterious effects on reefs across the region as poachers race to feed Chinese demand for these shellfish.  Reefs throughout the Coral Triangle are interdependent, relying on one another for pollination, and as the reefs are destroyed by poachers seeking short-term gains, or even by small fishermen eking out a subsistence lifestyle, the effects of collapse ripple outward across the region.  The region is approaching an inflection point at which the damage will be irreparable.

The People’s Republic of China (PRC), which accounts for one-third of global fish consumption and is the world’s largest seafood exporter, fittingly leads the way in aggressively protecting its fishing fleets with an overwhelmingly powerful coast guard that dwarfs any other maritime law enforcement body in Asia[6][7].  As IUUF and environmental destruction cut into maritime resources and competition for those increasingly scarce resources escalates, national maritime law enforcement and naval forces are being rapidly expanded and widely deployed to protect natural resources and domestic fishing fleets.  If unmanaged, the friction generated by these fleets’ increasing interaction could easily explode into violent conflict.

For many countries in the region, the state’s legitimacy rests largely upon its ability to provide access to basic necessities and protect its citizens’ livelihoods.  Tens of millions across East Asia and Southeast Asia depend on fisheries for employment and, in many cases, their survival.  Should fish stocks begin to fail, regional states’ foundations will be threatened.  The combination of inadequate food supply and loss of livelihood could reasonably be expected to spur civil unrest.  In a state such as Indonesia, where 54 percent of the population relies on fish as its primary animal protein, historically weak institutions and propensity for military intervention only amplify the potential consequences of food insecurity.  In the PRC, the Chinese Communist Party (CCP) actively encourages illegal fishing to provide its 1.379 billion people with the fish, seafood and marine products that its lower-and-middle-class, as well as elites, expect.  Legitimacy of the CCP, at least in part, is dependent on the continued production of regional fisheries and desire to buttress its legitimacy will continue to drive this vicious cycle.

The above mentioned calamities can occur in isolation, but they are most often interlinked.  For instance, in the infamous 2012 Scarborough Shoal incident, Philippines maritime law enforcement boarded a PRC fishing boat that had been engaged in giant clam and shark poaching, as well as coral reef destruction.  Armed PRC maritime law enforcement vessels intervened and sparked an external dispute that continues in 2017[8].  Ensuing flame wars between Filipino and Chinese hackers and economic measures enacted by the PRC against the Philippines threatened stability in both the domestic and international spheres of both countries.  The threat posed by IUUF is not just about fish, its direct and follow-on effects have the potential to drag Southeast Asia into disastrous conflict.


Endnotes:

[1] Till, G. (2013). Seapower: a guide for the 21st century. London: Routledge Ltd.

[2] Caputo, J. (2017). A Global Fish War is Coming. Proceedings, 143(8), 1,374. Retrieved October 10, 2017, from https://www.usni.org/magazines/proceedings/2017-08/global-fish-war-coming

[3] One of the World’s Biggest Fisheries Is on The Verge of Collapse. (2017, August 02). Retrieved October 25, 2017, from https://news.nationalgeographic.com/2016/08/wildlife-south-china-sea-overfishing-threatens-collapse/

[4] Asia-Pacific region achieves Millennium Development Goal to reduce hunger by half by 2015. (2015, May 28). Retrieved October 25, 2017, from http://www.fao.org/asiapacific/news/detail-events/en/c/288506/

[5] Guy, A. (n.d.). Local Efforts Put a Dent in Illegal Dynamite Fishing in the Philippines. Retrieved October 25, 2017, from http://oceana.org/blog/local-efforts-put-dent-illegal-dynamite-fishing-philippines

[6] Jacobs, A. (2017, April 30). China’s Appetite Pushes Fisheries to the Brink. Retrieved October 25, 2017, from https://www.nytimes.com/2017/04/30/world/asia/chinas-appetite-pushes-fisheries-to-the-brink.html

[7] Asia-Pacific Maritime Security Strategy (Rep.). (2015, August 14). Retrieved https://www.defense.gov/Portals/1/Documents/pubs/NDAA%20A-P_Maritime_SecuritY_Strategy-08142015-1300-FINALFORMAT.PDF

[8] Are Maritime Law Enforcement Forces Destabilizing Asia? (n.d.). Retrieved October 25, 2017, from https://csis-ilab.github.io/cpower-viz/csis-china-sea/

Assessment Papers Blake Herzinger Environmental Factors Resource Scarcity South China Sea Southeast Asia

Assessment of U.S. Cyber Command’s Elevation to Unified Combatant Command

Ali Crawford is a current M.A. Candidate at the Patterson School of Diplomacy and International Commerce.  She studies diplomacy and intelligence with a focus on cyber policy and cyber warfare.  She tweets at @ali_craw.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of U.S. Cyber Command’s Elevation to Unified Combatant Command

Date Originally Written:  September 18, 2017.

Date Originally Published:  November 13, 2017.

Summary:  U.S. President Donald Trump instructed the Department of Defense to elevate U.S. Cyber Command to the status of Unified Combatant Command (UCC).  Cyber Command as a UCC could determine the operational standards for missions and possibly streamline decision-making.  Pending Secretary of Defense James Mattis’ nomination, the Commander of Cyber Command will have the opportunity to alter U.S. posturing in cyberspace.

Text:  In August 2017, U.S. President Donald Trump ordered the Department of Defense to begin initiating Cyber Command’s elevation to a UCC[1].  With the elevation of U.S. Cyber Command there will be ten combatant commands within the U.S. military infrastructure[2].  Combatant commands have geographical[3] or functional areas[4] of responsibility and are granted authorities by law, the President, and the Secretary of Defense (SecDef) to conduct military operations.  This elevation of Cyber Command to become a UCC is a huge progressive step forward.  The character of warfare is changing. Cyberspace has quickly become a new operational domain for war, with battles being waged each day.  The threat landscape in the cyberspace domain is always evolving, and so the U.S. will evolve to meet these new challenges.  Cyber Command’s elevation is timely and demonstrates the Department of Defense’s commitment to defend U.S. national interests across all operational domains.

Cyber Command was established in 2009 to ensure the U.S. would maintain superiority in the cyberspace operational domain.  Reaching full operational capacity in 2010, Cyber Command mainly provides assistance and other augmentative services to the military’s various cyberspace missions, such as planning; coordinating; synchronizing; and preparing, when directed, military operations in cyberspace[5].  Currently, Cyber Command is subordinate to U.S. Strategic Command, but housed within the National Security Agency (NSA).  Cyber Command’s subordinate components include Army Cyber Command, Fleet Cyber Command, Air Force Cyber Command, Marine Forces Cyber Command, and it also maintains an operational relationship with the Coast Guard Cyber Command[6].  By 2018, Cyber Command expects to ready 133 cyber mission force teams which will consist of 25 support teams, 27 combat mission teams, 68 cyber protection teams, and 13 national mission teams[7].

Admiral Michael Rogers of the United States Navy currently heads Cyber Command.  He is also head of the NSA.  This “dual-hatting” of Admiral Rogers is of interest.  President Trump has directed SecDef James Mattis to recommend a nominee to head Cyber Command once it becomes a UCC.  Commanders of Combatant Commands must be uniformed military officers, whereas the NSA may be headed by a civilian.  It is very likely that Mattis will nominate Rogers to lead Cyber Command[8].  Beyond Cyber Command’s current missions, as a UCC its new commander would have the power to alter U.S. tactical and strategic cyberspace behaviors.  The elevation will also streamline the time-sensitive process of conducting cyber operations by possibly enabling a single authority with the capacity to make independent decisions who also has direct access to SecDef Mattis.  The elevation of Cyber Command to a UCC led by a four-star military officer may also point to the Department of Defense re-prioritizing U.S. posturing in cyberspace to become more offensive rather than defensive.

As one can imagine, Admiral Rogers is not thrilled with the idea of splitting his agencies apart.  Fortunately, it is very likely that he will maintain dual-authority for at least another year[9].  The Cyber Command separation from the NSA will also take some time, pending the successful confirmation of a new commander.  Cyber Command would also need to demonstrate its ability to function independently from its NSA intelligence counterpart[10].  Former SecDef Ash Carter and Director of Intelligence (DNI) James Clapper were not fans of Rogers’ dual-hat arrangement.  It remains to be seen what current SecDef Mattis’ or DNI Coats’ think of the “dual hat” arrangement.

Regardless, as this elevation process develops, it is worthwhile to follow.  Whoever becomes commander of Cyber Command, whether it be a novel nominee or Admiral Rogers, will have an incredible opportunity to spearhead a new era of U.S. cyberspace operations, doctrine, and influence policy.  A self-actualized Cyber Command may be able to launch Stuxnet-style attacks aimed at North Korea or speak more nuanced rhetoric aimed at creating impenetrable networks.  Regardless, the elevation of Cyber Command to a UCC signals the growing importance of cyber-related missions and will likely encourage U.S. policymakers to adopt specific cyber policies, all the while ensuring the freedom of action in cyberspace.


Endnotes:

[1] The White House, “Statement by President Donald J. Trump on the Elevation of Cyber Command,” 18 August 2017, https://www.whitehouse.gov/the-press-office/2017/08/18/statement-donald-j-trump-elevation-cyber-command

[2] Unified Command Plan. (n.d.). Retrieved October 27, 2017, from https://www.defense.gov/About/Military-Departments/Unified-Combatant-Commands/

[3] 10 U.S. Code § 164 – Commanders of combatant commands: assignment; powers and duties. (n.d.). Retrieved October 27, 2017, from https://www.law.cornell.edu/uscode/text/10/164

[4] 10 U.S. Code § 167 – Unified combatant command for special operations forces. (n.d.). Retrieved October 27, 2017, from https://www.law.cornell.edu/uscode/text/10/167

[5] U.S. Strategic Command, “U.S. Cyber Command (USCYBERCOM),” 30 September 2016, http://www.stratcom.mil/Media/Factsheets/Factsheet-View/Article/960492/us-cyber-command-uscybercom/

[6] U.S. Strategic Command, “U.S. Cyber Command (USCYBERCOM),” 30 September 2016, http://www.stratcom.mil/Media/Factsheets/Factsheet-View/Article/960492/us-cyber-command-uscybercom/

[7] Richard Sisk, Military, “Cyber Command to Become Unified Combatant Command,” 18 August 2017, http://www.military.com/daily-news/2017/08/18/cyber-command-become-unified-combatant-command.html

[8] Department of Defense, “The Department of Defense Cyber Strategy,” 2015, https://www.defense.gov/News/Special-Reports/0415_Cyber-Strategy/

[9] Thomas Gibbons-Neff and Ellen Nakashima, The Washington Post, “President Trump announces move to elevate Cyber Command,” 18 August 2017, https://www.washingtonpost.com/news/checkpoint/wp/2017/08/18/president-trump-announces-move-to-elevate-cyber-command/

[10] Ibid.

Ali Crawford Assessment Papers Cyberspace United States

Assessment of Canada’s Fighter Replacement Process

Jeremiah Cushman is a senior analyst at Military Periscope, where he writes about weapons.  He holds an M.A. in European and Eurasian Studies from the George Washington University.  He can be found on Twitter @jdcushman.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Canada’s Fighter Replacement Process

Date Originally Written:  September 30, 2017.

Date Originally Published:  November 6, 2017.

Summary:  Canada’s aging CF-18 fighters need replaced.  While the U.S. F-35 was expected to be the choice, domestic politics, rising costs, and development problems caused controversy.  As such, both the Harper and Trudeau governments have hesitated to launch an open competition for a replacement.  The current plan is to upgrade existing jets and acquire interim platforms while carefully preparing a competition.

Text:  After more than three decades of service, Canada’s CF-18 Hornet fighter jets are due for replacement. This has proven easier said than done.

Delays and ballooning costs in the U.S.-led F-35 Lightning II stealth fighter program have made it a controversial option, despite Ottawa’s participation as a Tier 2 partner.  Domestic politics and a trade dispute have become another obstacle.  The Royal Canadian Air Force (RCAF) says with additional upgrades it can keep the Hornets in the air until at least 2025.

The Hornet replacement was not expected to be so difficult.  Canada was an early contributor to the F-35 program and anticipated fielding the advanced fighter along with its closest allies.  Participating in the program was seen as a way to obtain the latest technology, while minimizing costs.  Interoperability with the allies Ottawa would most likely operate with was another bonus.  For these reasons, the RCAF has continued to favor the jet.

As development problems arose, defense officials began to emphasize that Canada’s contributions to the program did not guarantee a purchase.

In 2008, the Canadian Department of National Defense decided to reduce its planned procurement from 80 to 65 jets to compensate for growing costs.  The Conservative government of then-Prime Minister Stephen Harper continued to back the F-35 until in 2012 a government auditor reported problems with Ottawa’s procurement process and said that the purchase would cost more than publicized.

An independent review of the program reported in December 2012 that the full cost to buy 65 F-35s was around Can$44.8 billion (U.S. $36 billion), well above the Can$9 billion (U.S. $7.2 billion) indicated by the government in 2010.  Harper decided to conduct a review of other options.  The results were received in 2014, but no decision was made[1].  Instead, Ottawa announced that it would modernize the CF-18s to keep them flying until 2025[2].

The election of the Liberal Party led by Justin Trudeau in October 2015 began a new stage in the fighter replacement saga.  During the election campaign, Trudeau pledged to end participation in the F-35 program and buy a cheaper aircraft.  This move appeared to be driven by the growing costs outlined by the review in 2012 and ongoing development issues with the aircraft.  Nevertheless, Ottawa has continued to make the payments necessary to remain a program participant.

Such a hard-line seems to be out of step with the progress of the F-35 program.  The U.S. Marine Corps declared initial operational capability with its F-35s in July 2015, and the U.S. Air Force followed in August 2016.  The manufacturer, Lockheed Martin, has reported annual reductions in unit costs for the jet.  More North Atlantic Treaty Organization allies have signed on to the program, as well as countries such as Japan and South Korea.  Such progress does not seem to have affected the Trudeau administration’s position.

The Trudeau government released its defense policy review in June 2017.  The document made no promises on how a Hornet replacement might be procured or what platform might be best.  The review included a new requirement for 88 fighters, instead of the 65 jets proposed by the Harper government.  While the additional aircraft are a positive development given Canada’s myriad air requirements, the lack of clarity on the next step revealed the administration’s lack of seriousness.  Ottawa has information on several options on hand from the Harper government’s review.  There appears no good reason why a new process for selecting a Hornet replacement could not already be underway.

The government appears to be driven by a desire to keep its campaign commitment and not to purchase the F-35.  Instead of setting up a competition to select a replacement, Ottawa proposed an interim purchase of 18 F/A-18E/F Super Hornets from the U.S. to fill an alleged capability gap.  The U.S. Defense Security Cooperation Agency announced that the U.S. Department of State had approved such a sale on September 12, 2017[3].  This has been seen as a way to create a fait accompli, since it would make little financial sense to buy and maintain one jet only to switch to another later.

The slow pace of the procurement process so far might result in fewer options.  The Super Hornet line is nearing its end and there are questions about how much longer the Eurofighter Typhoon will be in production.

In any event, the Super Hornet proposal has fallen victim to a trade dispute.  Boeing, which builds the fighter, complained that Canadian aerospace firm Bombardier received government subsidies, allowing it to sell its C-series airliners at a significant discount.  The U.S. Department of Commerce agreed with the complaint, determining in late September 2017 that the aircraft should be hit with a 219 percent tariff[4].  This dispute has for the moment paused any Super Hornet purchase and led Ottawa to explore the acquisition of used Hornet aircraft.  On September 29, 2017, Public Services and Procurement Canada announced that it had submitted an expression of interest to Australia as part of the process to acquire used Hornets.  The release also said that preparatory work for a competition was underway, raising further questions about why interim fighters are needed[5].

Meanwhile, the RCAF is preparing to spend between Can$250 million (U.S.$201 million) and Can$499 million (U.S.$401 million) on further upgrades for its CF-18s to keep them in service until at least 2025.  Project definition is anticipated to begin in early 2018, with contracts being let in 2019[6].

As it stands, Ottawa appears to be trying to avoid selecting a new fighter.  It makes little sense to invest significant sums of money in interim measures when those funds would be better channeled into a new platform.  For reasons that remain unclear, it seems any decision will be postponed until after the next election, likely in 2020.  In the meantime, the RCAF will have to continue to invest scarce resources in its aging Hornets and hope for the best.


Endnotes:

[1] Pugliese, D. (2015, September 22). Canada and the F-35 – the ups and downs of a controversial fighter jet purchase. Ottawa Citizen. Retrieved Sept. 30, 2017, from http://ottawacitizen.com/news/national/defence-watch/canada-and-the-f-35-the-ups-and-downs-of-a-controversial-fighter-jet-purchase-2

[2] Canadian Press (2014, September 30). CF-18 upgrades will keep jets flying until 2025, Ottawa says. Retrieved Sept. 30, 2017, from http://www.ctvnews.ca/politics/cf-18-upgrades-will-keep-jets-flying-until-2025-ottawa-says-1.2031683

[3] U.S. Defense Security Cooperation Agency. (2017, September 12). Government of Canada — F/A-18E/F Super Hornet Aircraft with Support. Retrieved Sept. 30, 2017, from http://www.dsca.mil/major-arms-sales/government-canada-fa-18ef-super-hornet-aircraft-support

[4] LeBeau, P. (2017, September 26). US slaps high duties on Bombardier jets after Boeing complains they were unfairly subsidized by Canada. CNBC. Retrieved Sept. 30, 2017, from https://www.cnbc.com/2017/09/26/us-slaps-duties-on-bombardier-jets-after-boeing-subsidy-complaint.html

[5] Public Services and Procurement Canada. (2017, October 9). Exploring options to supplement Canada’s CF-18 fleet. Retrieved Oct. 9, 2017, from https://www.canada.ca/en/public-services-procurement/news/2017/10/exploring_optionstosupplementcanadascf-18fleet.html

[6] Pugliese, D. (2017, September 26). CF-18 upgrade plan more critical as Bombardier-Boeing spat puts Super Hornet purchase in doubt. Ottawa Citizen. Retrieved Sept. 30, 2017, from http://ottawacitizen.com/news/politics/cf-18-upgrade-plan-more-critical-as-bombardier-boeing-spat-puts-super-hornet-purchase-in-doubt/wcm/7828c1ea-ef72-4dc5-a774-92630297bb07

Assessment Papers Canada Capacity / Capability Enhancement Jeremiah Cushman

Assessment of North Korea’s Illicit Trafficking Activities

Paul Rexton Kan is professor of National Security Studies and former Henry L. Stimson Chair of Military Studies at the U.S. Army War College.  His most recent book is “Drug Trafficking and International Security” (Rowman and Littlefield, 2016).  In February 2011, he served as the Senior Visiting Counternarcotics Adviser at NATO Headquarters in Kabul, Afghanistan.  He can be found on Twitter at @DPRKan.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of North Korea’s Illicit Trafficking Activities

Date Originally Written:  October 12, 2017.

Date Originally Published:  October 30, 2017.

Summary:  As the United Nations and member states have increased the number and variety of sanctions on North Korea for its missile launches and nuclear tests, the regime of Kim Jong Un will likely increase its reliance on illicit international activities to earn hard currency.  The international community must be prepared to respond in kind.

Text:  In an effort to pressure the regime of Kim Jong Un to end its ballistic and nuclear programs, the international community is pursuing a wide-range of sanctions against North Korea.  The newest round of United Nations (UN) sanctions contained in Security Council Resolutions 2371 and 2375 passed in August and September of this year are aimed at the heart of North Korea’s ability to trade with the larger world and earn hard currency for its economy.  In keeping with the UN sanctions, the People’s Republic of China (PRC) has reduced its oil trade with North Korea and has ordered all North Korean businesses operating in the PRC to close by the spring of 2018.  Meanwhile, in addition to the UN sanctions, U.S. President Donald Trump signed an executive order in September that allows the U.S. Department of Treasury to sanction specific individuals and entities that engage in assisting North Korean textiles, fishing, information technology and manufacturing industries.

All of the recent sanctions seek to inflict sufficient economic pain on the Kim regime so that it will relent in its pursuit of improved missile and nuclear capabilities.  However, past economic sanctions have proven to be largely ineffective in changing North Korean behavior due to the regime’s ability to rely on illicit trade to finance itself.

The Kim dynasty has a long-running history of undertaking illicit trafficking activities to earn hard currency for the regime.  In fact, the nation’s founder, Kim Il Sung, created an entire government bureaucracy dedicated to pursuing criminal schemes for illicit profit.  Central Committee Bureau 39 of the Korean Workers’ Party was established in 1974 to reduce the country’s dependence on massive Soviet subsidies [1]. Also known as Office #39, this shadowy bureaucracy has proven essential for the North Korean government’s ability to weather economic hardships.  Office #39 has allowed North Korea to survive exceptionally perilous moments of potential state instability such as the collapse of its Soviet benefactor in 1991, the famines in the early 2000s and the dozens of international sanctions programs all the while giving the regime enough economic vitality to pursue nuclear weapons and ballistic programs.

The activities of Office #39 include narcotics manufacturing and distribution, currency and cigarette counterfeiting, arms trafficking, automobile smuggling and money laundering.  These illicit activities have earned billions of dollars for the Kim regime [2]. North Korean government personnel from the military and diplomatic corps carry out these criminal schemes abroad while using dummy companies to deposit launder proceeds through banks in China, Italy, Russia, and Africa[3].  Demonstrating the wide-ranging criminal network of Office #39, they have reportedly made arrangements with the Russian mafia to help the Kim regime launder its funds through the Russian embassy in Pyongyang [4]

Office #39 is also referred to as “Kim’s Cashbox”[5] and has been used to pay for the inducements that keep the North Korean elites mollified with the hereditary communist regime.  Consistent with any totalitarian dictatorship is the ability to control the economy, especially for national leaders who rule by force.  Central to the Kim dynasty’s ability to control its totalitarian regime is a “court economy,” akin to that practiced by an absolute monarch.  To prevent coups over the three generations of Kims, Office #39 has provided the funds to reward the regime’s military, government and party elites; as well as the regime’s security agents.  Such a court economy, resting on the illegal operations of Office #39, thereby promotes internal regime stability.

In addition to undergirding internal regime stability, Office #39 acts to promote North Korea’s external security by financing the weapons’ programs of the regime.  This nexus between illicit finances and sophisticated weapons programs appears to have become tighter under the leadership of Kim Jong Un.  In September 2016, the North Korean military’s organization for owning and running overseas companies, Office #38, was merged with Office #39, now operating only as Office Number 39 [6]. An expert on North Korea believes this merger indicates a growing desire to create a more efficient illicit funding stream to achieve two goals: 1) accelerate the regime’s ballistic missile and nuclear considerable advances; 2) feed even more money into Kim’s court economy as a way to strengthen his possible shaky grasp on leadership [7].

If the United States along with other members of the international community seek to bring maximum economic pressure against North Korea, it will also have to tackle the illicit overseas activities of Office #39.  The U.S. and others have previously coordinated their responses to North Korea’s criminal operations with some success [8].  The Proliferation Security Initiative initiated by the George W. Bush Administration demonstrated that regional cooperation can work to put pressure on Pyongyang’s arms trafficking.  Better coordination of these pressuring activities, through the use of fusion centers and ensuring the inclusion of law enforcement organizations, could enhance their impact.

The time appears right to tackle North Korea’s illicit activities.  North Korea’s recent provocative actions have increased the level of alarm among key regional players, providing a greater impetus for cooperation.  In addition, several North Korean officials posted overseas and who colluded with Office #39 have defected in recent months, taking with them not only vast sums of money, but information about the regime’s illicit financial activities [9] that regional players could use to stymie the regime.  North Korea is not a nation-state that is simply misbehaving. North Korea engages in criminality not as a matter of choice, but of necessity.  Finding new ways combat its illicit international activities will be challenging, but policy-makers must adapt their approaches to bring maximum pressure upon an increasingly bellicose regime.


Endnotes:

[1] Eberstadt, N. (2004).  The persistence of North Korea. Policy Review, Retrieved October 13, 2017, from https://www.hoover.org/research/persistence-north-korea

[2] Kan, P. R., Bechtol, B. E., Jr., & Collins, R. M. (2010). Criminal Sovereignty: Understanding North Korea’s Illicit International Activities. Carlisle Barracks, PA: US Army War College.

[3] A. G. (2013, September 16). Q&A: High Level Defector on North Korean Trade. Wall Street Journal. Retrieved October 6, 2017, from http://blogs.wsj.com/korearealtime/2014/09/16/qa-high-level-defector-on-north-korean-trade/

[4] Kim Jong Un’s Secret Billions. (2013, March 12). Chosun Ilbo. Retrieved October 12, 2017, from http://english.chosun.com/site/data/html_dir/2013/03/12/2013031201144.html

[5] Kim, K. (2007). The Dollarization of the North Korean Economcy. Tongit Yongu (Unification Research), 11(9), 11-34. (In Korean)

[6] N. Korea Combines 2 Units Managing Leader’s Coffers in One: Seoul. (2016, September 29). Yonhap . Retrieved October 3, 2017, from http://www.koreatimes.co.kr/www/news/nation/2016/09/485_215017.html

[7] Author interview with Bruce E. Bechtol, Jr. on 4 October 2017.

[8] Asher, D. L. (2011). Pressuring Kim Jong-Il: The North Korean Illicit Activities Initiative, 2001-2006 (pp. 25-52, Publication). Washington, DC: Center for New American Security.

[9] Yi, W. (2016, August 21). N. Korea’s Leader Secret Funds Coming to Light. Korea Times. Retrieved October 2, 2017, from http://www.koreatimes.co.kr/www/news/nation/2016/08/485_212381.html

Assessment Papers Illicit Trafficking Activities North Korea (Democratic People’s Republic of Korea) Paul Rexton Kan

Assessment of the Potential Security Challenges Posed by Water Security Between Afghanistan and Iran

Max Taylor is currently an Intern Intelligence and Security Analyst at Intelligence Fusion where he focuses on the Afghan security landscape.  Max also has a Master’s degree in International Security and Terrorism from the University of Nottingham, United Kingdom.  Max contributes to the @AfghanOSINT Twitter account.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of the Potential Security Challenges Posed by Water Security Between Afghanistan and Iran

Date Originally Written:  September 8, 2017.

Date Originally Published:  October 23, 2017.

Summary:  Whilst the relationship between Afghanistan and Iran is characterised by generations of shared history and culture, concerns over water security provide a more contemporary security challenge.  Iran’s reliance on Afghanistan’s water supply and Afghanistan’s refusal to cede control over its waterways to Iran will ensure that this issue, if left undressed, will fester.

Text:  Water security between Afghanistan and Iran is not necessarily a new concern, as disputes can be traced back to the 19th century when Afghanistan was under British control[1].  However, as time has progressed, water security as a challenge facing Afghanistan and Iran has continued to grow.  In an attempt to respond to the looming challenges posed by water security, both countries have engaged in various treaties and agreements which intended to ensure Iran received a sufficient amount of water.  The question as to how to allocate sufficient water supply to Iran has not been simple, as the treaties designed to manage the Afghan water supply have largely failed to provide effective oversight and control.  Therefore, with much of Iran’s water supply originating in Afghan sovereign territory, Iran has very little control over their own water supply.  This relative lack of reliable control over their own water supply is a particularly pressing concern for Iran, and is likely to continue to dominate the Afghan-Iran relationship.  This article will aim to expand upon this assumption by first examining the position from which both parties approach their water security, and will then analyse what Iran has done to address the problems it faces.

From Iran’s perspective, the forecast is somewhat bleak.  A study by Dr M. Molanejad and Dr A. Ranjbar[2] suggested that Iran has seen more extremes of weather as a result of climate change, such as draught, and can continue to expect additional extremes of weather.  Precipitation levels recorded in Molanejad and Ranjbar’s study show that in 1998, Iran saw its lowest total precipitation since 1969, but show that such extremes are only going to occur more often.  As within 10 years of the 1998 draught, a similar extreme low in rainfall was recorded which exceeded that of 1998.  Furthermore, agreements such as the 1973 agreement between Afghanistan and Iran which guarantees that Iran can expect to receive 22 cubic meters per second of water from Afghanistan provide little comfort.  The water allowance extract of this agreement is a static figure (albeit with the option to buy increased water allowance) and therefore does not correlate with predicted Iranian population increase.  With Iran’s population expected to be over 90 million in 2021[3], the figures of the 1973 agreement will not be sufficient in years to come.  As climate change is expected to increase the occurrence of extremes of weather, it is wise to assume that Iran’s fragile reliance on their Afghan water supply will become increasingly important.

Within this context the Afghan National Unity Government (NUG) is unlikely to commit to  agreements which may limit their control over their own water ways.  Development of water management projects such as the Baksh-Abad Hydroelectric Station is both an effective way to win over the hearts of the Afghan population in the NUG’s ongoing conflict against the Taliban and a highly symbolic move.  In Afghan provinces such as Nimroz, where agriculture characterises the majority of the province, a damming project instigated by the NUG is an effective way for the NUG to connect with a population traditionally isolated from Kabul’s central control.  Construction of water management projects also acts as a symbolic gesture to the people of Afghanistan and the international community.  The NUG’s leading role in organising the projects suggests to observers that the NUG is capable of rebuilding itself in the wake of decades of conflict.

With climate change promising to increase the frequency of extreme weather and the creation of additional water management projects continuing in Afghanistan, time is not on the side of Iran.  Iran is not ignorant of this fact, and has attempted to assert an element of control over Afghan’s water supply.  Iranian President Rouhani has attempted to voice his concerns regarding water security through traditional diplomatic means, but Iran has also been accused of pursing more covert avenues of approach.  Afghan and U.S. officials have frequently accused Iran of supporting the Taliban by funding[4] and supplying the group.  As part of this support, Iran is accused of using the Taliban to sabotage key Afghan water management projects such as the Kamal Khan Dam which Iran claims will negatively affect the Iranian Sistan-Baluchestan Province.  In 2011, a Taliban commander was allegedly offered $50,000 by Iran to sabotage the Kamal Khan Dam[5].  Predictably, Iran explicitly denies that it supports the Taliban, and justifies its dialogue with the group by highlighting their common interest in combating the Islamic State.

Iran’s alleged support for the Taliban as a foreign policy tool has led to obvious implications for the Afghan-Iranian relationship.  With Iranian support for the Taliban being denied by Iran, and largely conducted under the guise of plausible deniability, the Afghan NUG is struggling to bring Iran to justice for their accused support.  Regardless, the sheer volume of accusations of Iranian support for the Taliban emanating from analysts, policy makers and Afghans alike adds an element of credibility to the claims.  The exact nature of Iran’s support for the Taliban is unclear, as the Taliban is a largely decentralised force with local commanders having substantial autonomy.  Furthermore, the Taliban’s traditional opposition to Iranian backed Shia groups in Afghanistan also holds back an ideologically supported relationship forming freely.

In order to comprehend the complexity of the issues posed by Afghan-Iranian water security, it is important to observe the subject from the perspective of both countries.  Iran finds itself stuck between a metaphorical rock and a hard place, with climate change and a rising population acting as the rock, and the continued creation of water management projects acting as the hard place.  On the other hand, the Afghan government is faced with a powerful Taliban insurgency and a distinct lack of public support from within more remote areas of the rural south.  Therefore, improved irrigation would act as an effective bridge between the NUG and the rural Afghan population of provinces such as Nimroz.  With both Afghanistan and Iran’s disposition in mind, it is difficult to comprehend how such an issue will be resolved.


Endnotes:

[1]  Fatemeh Aman, Retrieved 10th September 2017, from: http://www.css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/resources/docs/Atlantic%20Council-Water%20Dispute.pdf

[2]  Dr M. Molanejad & Dr A. Ranjbar, Retrieved September 8th 2017, from: http://www.comsats.org/Latest/3rd_ITRGs_ClimateChange/Dr_Molanejad.pdf

[3]  Parviz Garshasbi, Retrieved September 8th 2017, from: http://www.droughtmanagement.info/literature/UNW-DPC_NDMP_Country_Report_Iran_2014.pdf

[4]  Ahmad Majidyar, Retrieved September 8th 2017, from: https://www.mei.edu/content/io/iran-and-russia-team-taliban-undermine-us-led-mission-afghanistan

[5]  Radio Free Europe, Retrieved September 10th 2017. from: https://www.rferl.org/a/captured_taliban_commander_claims_trained_in_iran/24305674.html

Afghanistan Assessment Papers Environmental Factors Iran Max Taylor

Assessment of Possible Updates to the National Security Act of 1947

Jeremy J. Grunert is an officer in the United States Air Force Judge Advocate General’s Corps, currently stationed in the United Kingdom.  He has served in Afghanistan, Qatar, and Turkey.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

Editors Note:  This article is an entry into our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  The author submitted this article under the contest heading of Most Able to be Implemented.


Title:  Assessment of Possible Updates to the National Security Act of 1947

Date Originally Written:  September 29, 2017.

Date Originally Published:  October 16, 2017.

Summary:  The National Security Act of 1947 played a significant role in establishing the U.S. as the global superpower it is today.  Despite the broad range of challenges facing the U.S. today, a large-scale update to the Act is likely as dangerous as it is politically infeasible.  Instead, Congress may adopt incremental changes to address threats facing our nation, beginning with the system of classification and security clearance review.

Text:  The National Security Act of 1947 (hereafter “NSA”), signed into law by President Harry Truman on July 26, 1947, is the progenitor of the U.S. intelligence and military establishment as we know it today.  The NSA created the National Security Council and the Central Intelligence Agency; established the United States Air Force as an independent military service; and merged the United States’ military services into what would become the Department of Defense, overseen by one Secretary of Defense.  The NSA’s reorganization of the defense and intelligence agencies set the stage for the United States’ post-World War II rise as, first, a military superpower, and, in the wake of the Soviet Union’s collapse, a global hegemon.

Seventy years after the passage of the NSA, the U.S. finds itself in an increasingly challenging security environment.  The lingering war in Afghanistan; the continued threat of terrorism; Russian military adventurism and cyber-meddling; a rising People’s Republic of China; and an increasingly bellicose North Korea all present significant security challenges for the U.S.  Given the solid foundation the NSA provided for the United States’ rise to global hegemony in the difficult period after World War II, is it time to update or amend the NSA to meet the challenges of the 21st Century?

Drastically altering the U.S. security framework as the original NSA did is likely as unwise as it is politically infeasible.  The wholesale creation of new intelligence and military services, or far-reaching changes to the structure of the Department of Defense, would result in confusion and bureaucratic gridlock that the U.S. can ill afford.  Instead, any updates to the NSA would be better done in an incremental fashion—focusing on areas in which changes can be made without resulting in upheaval within the existing security structure.  Two particular areas in which Congressional action can address serious security deficiencies are the realms of intelligence classification and security clearance review.

Proper intelligence classification and proper intelligence sharing—both among organizations within the U.S. national security establishment and between the U.S. and its foreign allies—is imperative to accomplish the U.S.’s strategic aims and protect its citizens.  Improper classification and over-classification, however, pose a continuing threat to the U.S.’s ability to act upon and share intelligence.  At the same time, a mind-bogglingly backlogged system for granting (and renewing) security clearances makes ensuring the proper people are accessing classified information a continuing challenge[1].

Congress has previously amended the NSA to address over-classification[2], and, in conjunction with other Congressional actions, may do so again.  First, whether within the NSA or in a new piece of legislation, Congress may examine amending portions of President Obama’s 2009 Executive Order (EO) 13526.  Specifically, Congress could mandate a reduction of the automatic declassification time for classified intelligence from 10 years to 5 years, absent an agency showing that a longer period of classification is necessary.  Additionally, Congress could amend § 102A of the NSA (codifying the responsibilities of the Director of National Intelligence, including for such things as “Intelligence Information Sharing” under § 102A(g)) by adding a paragraph giving the Director of National Intelligence the authority to create a rapid-reaction board for the speedy declassification or “step-down” of certain classified intelligence.  Chaired, perhaps, by the Principal Deputy Director of National Intelligence (who can be delegated declassification authority per EO 13526), this board would be used to quickly reach “step-down” decisions with respect to intelligence submitted to the board for release at a certain specified level of classification.  A particularly good example of this sort of request would be a petition to “step-down” certain SECRET//NOFORN (i.e. only releasable to U.S. persons) intelligence for release to U.S. allies or coalition partners.  The goal would be to have a clear method, with a fixed timeframe measured in weeks rather than months, for the review and possible “step-down” of classified information.

Congress may also attempt to address the ever-growing backlog of security clearance applications and renewals.  One way to confront this problem is to amend 50 U.S. Code § 3341(b) and update Title VIII of the NSA (“Access to Classified Information”) to decentralize the process of investigating security clearance applicants.  Section 3341(b) currently requires the President to select a single agency to “direct[] day-to-day oversight of investigations and adjudications for personnel security clearances” and to “serv[e] as the final authority to designate an authorized investigative agency or authorized adjudicative agency” for security clearances[3].  Currently, the Office of Personnel Management (OPM) conducts the vast majority of security clearance investigations for U.S. government employees.  The massive backlog of clearance investigations, however, belies the idea that a single government agency can or should be responsible for this undertaking.  Congress could also amend § 3341(b) to allow an agency chosen by the President to establish minimum standards for security clearance investigation, but permit the decentralization of investigative responsibility into the military and intelligence agencies themselves.

An update to Title VIII of the NSA would work in conjunction with an amendment to § 3341(b).  Specifically, Congress could add a paragraph to § 801(a) of the NSA requesting the President require each executive agency, at least within the Defense and Intelligence communities, to establish an investigative section responsible for conducting that agency’s security clearance investigations.  Under the aegis of the minimum standards set forth in § 3341(b), this would allow the various Defense and Intelligence agencies to develop additional standards to meet their own particular requirements, and subject potential clearance candidates to more rigorous review when necessary.  Allowing greater agency flexibility in awarding clearances may reduce the likelihood that a high-risk individual could obtain a clearance via the standard OPM vetting process.

The changes to the National Security Act of 1947 and other laws described above are small steps toward addressing significant security challenges.  Addressing the security challenges facing the United States requires incremental changes—changes which will address concrete problems without an upheaval in our Defense and Intelligence agencies.  Focusing on fixing deficiencies in the United States’ classification and security clearance review systems is an excellent place to start.


Endnotes:

[1] Riechmann, D. (2017, September 11). Security clearance backlog leads to risky interim passes. Retrieved September 21, 2017, from https://www.washingtonpost.com/world/national-security/security-clearance-backlog-leads-to-risky-interim-passes/2017/09/11/b9fb21dc-972b-11e7-af6a-6555caaeb8dc_story.html?utm_term=.e487926aac60

[2] Reducing Over-Classification Act of 2010, Pub. L. No. 111-258, 124 Stat. 2648 (2010). Retrieved September 21, 2017, from https://www.intelligence.senate.gov/laws/reducing-over-classification-act-2010

[3] 50 U.S.C. § 3341(b).  Retrieved September 22, 2017, from https://www.law.cornell.edu/uscode/text/50/3341

Assessment Papers Contest (General) Governing Documents and Ideas Jeremy J. Grunert Security Classification United States

Assessment of North Korea’s Proliferation of Nuclear Weapons, Chemical Weapons, and Small Arms

Sam Bocetta is a retired engineer who worked for over 35 years as an engineer specializing in electronic warfare and advanced computer systems.  Past projects include development of EWTR systems, Antifragile EW project and development of Chaff countermeasures.  Sam now teaches at Algonquin Community College in Ottawa, Canada as a part-time engineering professor and is the ASEAN affairs correspondent for Gun News Daily and is a part-time cybersecurity coordinator at AsignMywriter.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of North Korea’s Proliferation of Nuclear Weapons, Chemical Weapons, and Small Arms

Date Originally Written:  August 25, 2017.

Date Originally Published:  October 2, 2017.

Summary:  Syria has repeatedly used chemical weapons for large-scale assaults on its own citizens.  North Korea has been instrumental in helping develop those weapons, despite numerous sanctions.  Without being put in check, North Korea’s current regime, led by Kim Jong Un, will likely continue this behavior.

Text:  A confidential report released by the United Nations (U.N.) in August of 2017 indicates that North Korea had sent two shipments, which were intercepted, to front companies for the Syria’s Scientific Studies and Research Centre (SSRC)[1].  The SSRC is known to handle Syria’s chemical weapons program.  These shipments violate sanctions placed on North Korea, and U.N. experts note that they are looking into reports about Syria and North Korea working together on chemical weapons, ballistic missiles and conventional arms.

One U.N. member state believes the Korea Mining Development Trading Corporation (KOMID) has a contract with Syria and both intercepted shipments were part of that contract.  In 2009, the U.N. Security Council blacklisted KOMID under concerns that it was North Korea’s key arms dealer and exported supplies for conventional weapons and ballistic missiles.

This is just the latest example of North Korea’s ties to chemical weapons.  In February of this year, Kim Jong Nam, who is North Korean leader Kim Jong Un’s half-brother, died in Malaysia[2].  Malaysian police called the death an assassination done using the nerve agent VX, which is part of the same chemical weapons family as sarin but considerably more deadly.  North Korea has denied any involvement in Kim Jong Nam’s death and attributes the death to a medical condition.  Many didn’t believe this denial, and the incident led to people calling for North Korea to be put back on the list for state sponsors of terrorism[3].  In April, the United States’ House of Representatives voted 394-1 in favor of putting Korea back on that list[4].

North Korea has continually crossed the line and ignored sanctions regarding its weapons programs and supplying weapons to other nations.  This puts the United States and its allies in a difficult position, as they can’t let North Korea operate unchecked, but they can’t trust the country’s current regime to comply with sanctions and agreements.

North Korea’s ties to Syria are particularly concerning.  Syria has used chemical weapons for years, and even though it made a deal with the United States and Russia in 2013 to destroy these weapons, it didn’t follow through.  There have been multiple uses of weaponized chlorine and sarin, a nerve agent, although the Syrian government has repeatedly denied any wrongdoing.

North Korea has made its support for Syria clear both publicly and privately.  In April 2017 Kim Jong Un sent a message of congratulations to Syria’s president, Bashar al-Assad, for the anniversary of the country’s ruling party[5].  This was the same time that Assad was using chemical weapons on his own people, killing 86, which prompted worldwide outrage and a missile strike by the United States on the Syrian airbase of Shayrat[6].

In addition to this public message, there have been several shipments from North Korea to Syria intercepted in recent years.  Contents have included ampoules, chemical suits, masks, and other supplies vital in developing chemical weapons.  North Korea has increased its assistance of Syria during the latter nation’s civil war by sending more chemical weapons, providing advice to the Syrian military and helping with the development of SCUD missiles, which can deliver chemical weapons[7].

Although Syria’s use of chemical weapons is appalling[8], it’s North Korea which is proliferating those weapons and others.  In 2007 North Korea was building a nuclear reactor in the Syrian desert.  The Israeli Air Force destroyed the reactor.  The desert where the reactor once was, as of this writing, is territory of the Islamic State of Iraq and Syria (ISIS).  Without the attack by Israel, ISIS might have possessed a nuclear reactor that was near completion.  And with the right help and ability to operate unchecked, it is easy to imagine ISIS trying to weaponize the reactor in some manner.

Yet even when the United States catches a North Korean weapons shipment, diplomatic issues can make it difficult to take any action.  That’s what happened in December 2002, when a North Korean ship, the So San, was stopped by anti-terrorist Spanish commandos after weeks of surveillance by the United States[9].  The ship had 15 SCUD missiles on it, which were hidden beneath sacks of cement, and it was on its way to Yemen[10].  In 2001, Yemen, known for harboring terrorists, agreed to stop getting weapons from North Korea.  When the So San was first stopped, the Yemeni government said it wasn’t involved in any transaction related to the ship.

Once the United States commandeered the vessel, Yemen changed its story, filing a diplomatic protest stating that it did purchase the missiles from North Korea as part of an old defense contract and that the United States needed to release the missiles.  It took hours of negotiating between Ali Abdullah Saleh, who was president of Yemen at the time, and both Secretary of State Colin Powell and Vice President Dick Cheney.  Saleh guaranteed that the missiles would only be used for Yemen’s defense and that the nation wouldn’t make any more deals with North Korea, and the United States released the ship.  The United States was developing a counterterrorism partnership with Yemen at that time, and there were few other options to keep the relationship on good terms, but this incident shows that catching North Korea’s weapons shipments is far from the only challenge.

Efforts to halt the spread of chemical and nuclear weapons by North Korea may lead to destabilizing the current regime.  Although there are worries that this destabilization will lead to loose Weapons of Mass Destruction (WMD), the evidence suggests that the spread of WMD is even more likely under Kim Jong Un’s rule.  Sanctions and more thorough inspections of North Korea’s shipments may help here, but it will require that the United States takes a hard-line on any weapons shipments originating from North Korea, and doesn’t allow them simply for diplomatic reasons.

Other approaches may involve penalizing ports that aren’t inspecting shipments thoroughly and flagging those states that reflag ships from North Korea to conceal their country of origin.  Although this could work, it will take time.  It’s all a matter of determining whether the risk is greater with a more aggressive stance towards North Korea or allowing them to continue proliferating weapons.


Endnotes:

[1] Nichols, M. (2017, August 21). North Korea shipments to Syria chemical arms agency intercepted: U.N. report. Retrieved August 25, 2017, from http://www.reuters.com/article/us-northkorea-syria-un-idUSKCN1B12G2

[2] Heifetz, J. and Perry, J. (2017, February 28). What is VX nerve agent, and what could North Korea do with it? Retrieved August 25, 2017, from http://www.cnn.com/2017/02/23/world/vx-nerve-agent/index.html

[3] Stanton, J. (2017, February 24). N. Korea just killed a guy with one of the WMDs that caused us to invade Iraq … in a crowded airport terminal, in a friendly nation. Retrieved August 25, 2017, from http://freekorea.us/2017/02/24/n-korea-just-killed-a-guy-with-one-of-the-wmds-that-caused-us-to-invade-iraq-in-a-crowded-airport-terminal-in-a-friendly-nation/

[4] Marcos, C. (2017, April 3). House votes to move toward designating North Korea as state sponsor of terror. Retrieved August 25, 2017, from http://thehill.com/blogs/floor-action/house/327106-house-votes-to-move-toward-designating-north-korea-as-state-sponsor

[5] Stanton, J. (2017, April 7). If Assad is the murderer of Idlib, Kim Jong-un was an accessory. Retrieved August 25, 2017, from http://freekorea.us/2017/04/07/if-assad-is-the-murderer-or-idlib-kim-jong-un-was-an-accessory/

[6] Brook, T.V. and Korte, G. (2017, April 6). U.S. launches cruise missile strike on Syria after chemical weapons attack. Retrieved August 25, 2017, from https://www.usatoday.com/story/news/politics/2017/04/06/us-launches-cruise-missile-strike-syria-after-chemical-weapons-attack/100142330/

[7] Tribune, W. (2013, August 26). Reports: Cash-strapped N. Korea ‘stepped up’ chemical weapons shipments to Syria. Retrieved August 25, 2017, from http://www.worldtribune.com/archives/reports-cash-strapped-n-korea-stepped-up-chemical-weapons-shipments-to-syria/

[8] Stanton, J. (2017, August 22). Latest cases of chemical proliferation remind us why Kim Jong-Un must go. Retrieved August 25, 2017, from http://freekorea.us/2017/08/22/latest-cases-of-chemical-proliferation-remind-us-why-kim-jong-un-must-go

[9] Lathem, N. (2002, December 12). Korean SCUDs Can Skedaddle; Yemen Gets to Keep Missiles by Promising ‘Defense Only’. Retrieved August 28, 2017, from http://nypost.com/2002/12/12/korean-scuds-can-skedaddle-yemen-gets-to-keep-missiles-by-promising-defense-only/

[10] Goodman, A. (2002, December 12). U.S. lets Scud ship sail to Yemen. Retrieved August 28, 2017, from http://www.cnn.com/2002/WORLD/asiapcf/east/12/11/us.missile.ship/

Arms Control Assessment Papers Chemical, Biological, Radiological, and Nuclear Weapons North Korea (Democratic People’s Republic of Korea) Sam Bocetta United States

Assessment of the United States-China Power Transition and the New World Order

Ray Leonardo previously worked in the defense industry.  He presently works as a graduate researcher in international relations with interests that include power transition, alliance structure, great power politics, and conflict.  He can be found on Twitter @rayrleonardo and writes for rayrleonardo.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of the United States-China Power Transition and the New World Order

Date Originally Written:  July 28, 2017.

Date Originally Published:  September 11, 2017.

Summary:  The People’s Republic of China’s (PRC) overtaking of the United States as the largest global economy will bring difficult and potentially dangerous consequences.  Continued peace will depend upon the PRC’s satisfaction with the current international system created by the United States, among others.  History and PRC foreign policy indicate the odds of a peaceful power transition may be lower than expected.

Text:  “…[T]he United States welcomes the rise of a China that is peaceful, stable, prosperous, and a responsible player in global affairs[1],” was often stated by United States’ President Barack Obama during his multiple summits with PRC President Xi Jinping.  The United States has little influence in slowing the rapid economic growth of the PRC.  Most forecasters predict the PRC will overtake the United States as the largest economy sometime during the first quarter of this century.  According to the Organization for Economic Cooperation and Development, the PRC is expected to surpass the U.S. as the world’s largest economy in 2021[2].  Many scholars and practitioners in the field of international relations are concerned that the rise of the PRC will not be so peaceful and their concerns are backed up by theory.

History has shown that rising powers who challenge the status quo, and, or hegemonic nations often create a fertile environment for conflict.  Historical cases indicate that it is power parity (balance of power), rather than a dominated or disproportional relationship (hegemony), that increases the likelihood of war.  This research falls under the theory of Power Transition[3].  Power Transition theory is directly at odds with the often accepted Balance of Power theory, the latter of which states that a balance of power among nations leads to peace[4].  Various theories including nuclear deterrence have formed under the Balance of Power pretext, but the historical data does not back this theory.  Conflict is more apt to break out under conditions where states are about equal in relative power.

Research on power transitions shows that the potential for conflict is dependent on several variables, two of which include relative power and the satisfaction of the rising power[5].  Gross Domestic Product (GDP) is a common measurement for state power but measuring a state’s satisfaction within the international system is a more challenging task.  Regardless of statistical models, one can see through previous cases of great power transitions that conflict is most likely once the rising power has overtaken (regarding relative power) the previously dominant state.  Conflict is even more plausible when the rising power is highly dissatisfied with the current international system.  This is assuming, as is the case today, that the dominant state (The United States), has created an international regime that of which mirrors its own political and economic systems (Bretton Woods), but also mirrors the dominant nation’s socio-political philosophy and values.

Many factors play into a country’s satisfaction.  One can look at the PRC’s rapid economic rise as proof that they have found a way to be successful in an international system created by the West, particularly by the United States.  However, even as the PRC’s economics can be closely aligned with most of the world under the guise of “capitalism,” it must not be ignored that the PRC has very differing views on political systems, individual rights, and traditional western socio-political values.  The PRC government adopts a foreign policy that is textbook realism in so much that its use of force will never be used to promote “Chinese” or “eastern” values abroad.  The PRC has little concern for human rights domestically, never mind protecting human rights on the international stage.

Twenty-first century conflict in East Asia will be fought on water.  The PRC’s recent build up of artificial islands and claims to various islands in the South China Sea are constant and increasing[6].  This is due to many factors, most of which impact their economy and security.  The PRC’s actions show a consistent effort to leverage regional neighbors, particularly those who lay claim to various land masses throughout the South China and East China seas.  The PRC’s regional foreign policy is not surprising; however, the United States and its allies should be questioning how the future global policy of the PRC will look.  Will the PRC’s aggressive regional policy in the early parts of this century be thought of as a microcosm for their mid-century global policy?  The PRC’s aggressive policy toward countries like Vietnam, Philippines, Malaysia, and Indonesia shows a strong dissatisfaction with the regional status quo.  The PRC understands the leverage that it has over many of its smaller neighbors and seeks to capitalize on it sooner rather than later.

There is no reason why U.S. officials should assume the PRC will peacefully rise through the international system without leveraging the power and control that comes with being the hegemonic nation.  The PRC will seek to advance their interests even as it may be on the backs of other smaller or even major powers.  With the PRC calling more of the shots regarding our international institutions, capitalist economies will still flourish, the bilateral and multilateral trade will continue to grow, but the principles and values that of which upon these institutions were built will continue to erode.  Human rights will take a back seat on the world stage, and over time few nations will care about the well-being of their trade partner’s people.


Endnotes: 

[1]  Office of Press Secretary, The White House (2015, September 25). Remarks by President Obama and President Xi of the People’s Republic of China in Joint Press Conference Retrieved July 25, 2017, from https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/remarks-president-obama-and-president-xi-peoples-republic-china-joint

[2]  OECD Data (Edition 2014). GDP Long-term Forecast Retrieved July 25, 2017, from https://data.oecd.org/gdp/gdp-long-term-forecast.htm#indicator-chart

[3]  Kugler, J., & Organski, A.F.K. (1989). The Power Transition: A Retrospective and Prospective Evaluation. In Manus I. Midlarsky (Ed.), Handbook of War Studies (1st, pp. 171-194). Winchester, MA: Unwin Hyman, Inc.

[4]  Schweller, R. L. (2016, May). The Balance of Power in World Politics Retrieved July 25, 2017, from http://politics.oxfordre.com/view/10.1093/acrefore/9780190228637.001.0001/acrefore-9780190228637-e-119

[5]  Kugler, J., & Organski, A.F.K. (1989). The Power Transition: A Retrospective and Prospective Evaluation. In Manus I. Midlarsky (Ed.), Handbook of War Studies (1st, pp. 171-194). Winchester, MA: Unwin Hyman, Inc.

[6]  Ives, M. (2017, August 4). Vietnam, Yielding to Beijing, Backs Off South China Sea Drilling Retrieved August 4, 2017, from https://www.nytimes.com/2017/08/04/world/asia/vietnam-south-china-sea-repsol.html

Assessment Papers China (People's Republic of China) Power Transition Ray Leonardo United States

Assessment of Cryptocurrencies and Their Potential for Criminal Use 

The Viking Cop has served in a law enforcement capacity with multiple organizations within the U.S. Executive Branch.  He can be found on Twitter @TheVikingCop.  The views reflected are his own and do not represent the opinion of any government entities.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Cryptocurrencies and Their Potential for Criminal Use

Date Originally Written:  July 22, 2017.

Date Originally Published:  August 28, 2017.

Summary:  Cryptocurrencies are a new technology-driven virtual currency that has existed since late 2009.  Due to the anonymous or near-anonymous nature of their design they are useful to criminal organizations.  It is vital for law enforcement organizations and regulators to know the basics about how cryptocurrencies work as their use by criminal organizations is likely to continue.

Text:  Cryptocurrencies are a group of virtual currencies that relay on a peer-to-peer system disconnected from a central issuing authority that allows users an anonymous or near-anonymous method to conduct transactions[1][2].

Bitcoin, Ethereum, LiteCoin, and DogeCoin are among 820 currently existing cryptocurrencies that have a combined market capitalization of over ninety billion U.S. Dollars at the time of this assessment[3][4].

The majority of cryptocurrencies run off a system design created by an unknown individual or group of individuals published under the name Satoshi Nakamoto[2].  This system relies on a decentralized public ledger system, conceptualized by Nakamoto in a whitepaper published in October of 2008, which would later become widely known as “Blockchain.”

Simplistically, blockchain works as a system of electronic signature keys and cryptographic hash codes printed onto a publicly accessible ledger.  Once a coin in any cryptocurrency is created through a “mining” process that consists of a computer or node solving a complex mathematical calculation known as a “proof-of-work,” the original signature and hash of that coin is added to the public ledger on the initial node and then also transmitted to every other node in the network in a block.  These proof-of-work calculations are based on confirming the hash code of previous transactions and printing it to a local copy of the public ledger.  Once the block is transmitted to all other nodes they confirm that the transaction is valid and print it to their copy of the public ledger.  This distribution and cross-verification of the public ledger by multiple computers ensures the accuracy and security of each transaction in the blockchain as the only way to falsely print to public ledger would be to control fifty percent plus one of the nodes in the network[1][2].

While the electronic signatures for each user are contained within the coin, the signature itself contains no personally identifiable information.  From a big data perspective this system allows one to see all the transactions that a user has conducted through the used electronic signature but it will not allow one to know from who or where the transaction originated or terminated.

A further level of security has been developed by private groups that provide a method of virtually laundering the money called “Mixing.”  A third-party source acts as an intermediary receiving and disturbing payments removing any direct connection between two parties in the coin signature[5].

This process of separating the coins and signatures within from the actual user gives cryptocurrencies an anonymous or near-anonymous method for conducting criminal transactions online.  A level of the internet, known as Darknet, which is only accessible through the use of special software and work off non-standard communication protocols has seen a rise in online marketplaces.  Illicit Darknet marketplaces such as Silk Road and the more recently AlphaBay have levied cryptocurrencies as a go-to for concealing various online black market transactions such as stolen credit card information, controlled substances, and firearms[6].

The few large criminal cases that have involved the cryptocurrency Bitcoin, such as U.S. Citizen Ross Ulbricht involved with Silk Road and Czech national Tomáš Jiříkovský for stealing ninety thousand Bitcoins ($225 million USD in current market value), have been solved by investigators through traditional methods of discovering an IP address left through careless online posts and not through a vulnerability in the public ledger[7].

Even in smaller scale cases of narcotics transactions taking place on Darknet marketplaces local investigators have only been able to trace cryptocurrency purchases backwards after intercepting shipments through normal detection methods and finding cryptocurrency artifacts during the course of a regular investigation.  There has been little to no success on linking cryptocurrencies back to distributors that hasn’t involved regular investigative methods[8].

Looking at future scenarios involving cryptocurrencies the Global Public Policy Institute sees a possible future whereby terrorism devolves back to populist movements and employs decentralized hierarchy heavily influenced by online interactions.  In this possible future, cryptocurrencies could allow groups to covertly move money between supporters and single or small group operatives along with being a means to buy and sell software to be used in cyberterrorism attacks or to support physical terrorism attacks[9].

Cryptocurrency is currently positioned to exploit a massive vulnerability in the global financial and legal systems and law enforcement organizations are only beginning to acquire the knowledge and tools to combat illicit use.  In defense of law enforcement organizations and regulators, cryptocurrencies are in their infancy, with massive changes in their operation, trading, and even foundational technology changing rapidly.  This rapid change makes it so that until cryptocurrencies reach a stable or mature state, they will be an unpredictable moving target to track and hit[10].


Endnotes:

[1]  Arvind Narayanan, J. B. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Pinceton University Press.

[2]  Nakamoto, S. (n.d.). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved July 10, 2017, from Bitcoin: https://bitcoin.org/bitcoin.pdf

[3]  Cryptocurrency market cap analysis. (n.d.). Retrieved from Cryptolization: https://cryptolization.com/

[4]  CryptoCurrency Market Capitalizations. (n.d.). Retrieved July 10, 2017, from CoinMarketCap: https://coinmarketcap.com/currencies/views/all/

[5]  Jacquez, T. (2016). Cryptocurrency the new money laundering problem for banking, law enforcement, and the legal system. Utica College: ProQuest Dissertations Publishing.

[6]  Over 57% Of Darknet Sites Offer Unlawful Items, Study Shows. (n.d.). Retrieved July 21, 2017, from AlphaBay Market: https://alphabaymarket.com/over-57-of-darknet-sites-offer-unlawful-items-study-shows/

[7]  Bohannon, J. (2016, March 9). Why criminals can’t hide behind Bitcoin. Retrieved July 10, 2017, from Science: http://www.sciencemag.org/news/2016/03/why-criminals-cant-hide-behind-bitcoin

[8]  Jens Anton Bjørnage, M. W. (2017, Feburary 21). Dom: Word-dokument og bitcoins fælder narkohandler. Retrieved July 21, 2017, from Berlingske: https://www.b.dk/nationalt/dom-word-dokument-og-bitcoins-faelder-narkohandler

[9]  Bhatnagar, A., Ma, Y., Manome, M., Markiewicz, S., Sun, F., Wahedi, L. A., et al. (@017, June). Volatile Years: Transnational Terrorism in 2027. Retrieved July 21, 2017, from Robert Bosch Foundation: http://www.bosch-stiftung.de/content/language1/downloads/GGF_2027_Volatile_Years_Transnational_Terrorism_in_2027.pdf

[10]  Engle, E. (2016). Is Bitcoin Rat Poison: Cryptocurrency, Crime, and Counterfeiting (CCC). Journal of High Technology Law 16.2, 340-393.

Assessment Papers Criminal Activities Cyberspace Economic Factors The Viking Cop

Assessment of Alexander Zakharchenko’s “Malorossiya” Proposition

Michael Sheldon is a recent graduate of the Peace and Conflict Studies BA at Malmo University.  Through his academic pursuits and private initiatives, Michael has conducted analysis on the conflict in eastern Ukraine since 2014, specializing in rebel forces.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Alexander Zakharchenko’s “Malorossiya” Proposition

Date Originally Written:  August 16, 2017.

Date Originally Published:  August 21, 2017.

Summary:  The Malorossiya proposition, as presented on July 18, 2017 by head of Donetsk People’s Republic (DNR) Alexander Zakharchenko, was intended to absorb Ukraine in its entirety under rebel control, relocating the capital to Donetsk.  While success seemed unlikely, there were local political objectives to be gained.  After less than a month, the project was cancelled, likely to be succeeded by similar proposals.

Text:  On July 18, ‘Head of the Republic’ of ‘Donetsk People’s Republic’ Alexander Zakharchenko announced the Malorossiya project at a press briefing[1].  The news came as a surprise to virtually everyone in-and-outside of rebel territory.  Along with the press briefing, two papers were released to the public through a local “DNR” news organization “DNR-Pravda”, one being a political statement in relation to the project, and the other being a “constitutional act”[2].

Recalling the “DNR” constitution as presented in 2014[3] during the early days of separatism, the constitutional act as it was presented in written form differed in several respects.  Firstly, this act is technically not a legal document and only serves as a guideline for an actual constitution to be adopted by referendum.  The primary goal of the Malorossiya proposal was Ukrainian unification under the federal umbrella of ‘Malorossiya’, literally meaning ‘little Russia.’  The proposed capital for this new federation would be the city of Donetsk, the current capital of ‘DNR,’ granting Kyiv the status of cultural capital.  Other political provisions were also made, reflecting the Soviet nostalgia that has been salient in the separatist states.  This was made apparent especially in the clauses stipulating a union of states between Russia, Belarus and ‘Malorossiya,’ and “Rehabilitation of the Soviet legacy.”

Zakharchenko’s move came long after the apparent failure of a previous ‘Novorossiya’ (New Russia) project, which aimed to create a confederation between the two rebel entities ‘DNR’ and ‘Lugansk People’s’ Republic’ (LNR/LPR)[4].  While the Novorossiya project by and large turned out fruitless, it had come to hold great cultural value ever since the beginning of the conflict early 2014.  The very concept of Novorossiya stipulates a regional type of brotherhood in the region of Ukraine spanning from Odessa to Kharkov, regions with larger Russian ethnic populations.  This concept has come to have not only great cultural significance for inhabitants in regions controlled by rebel authorities, but has also come to dictate cooperation between the two rebel entities LNR and DNR.  This cooperation primarily comes in military support from DNR, which has lended its 7th Separate Mechanized Brigade[5] to LNR, and assisted in providing security and rapid reaction forces to internal instability in LNR[6].

In part, at least on a broader grassroots level, these factors have contributed to the chilled reception that the notion of an analogous Malorossiya project experienced.  The concept of Novorossiya and its flag had come to symbolize separatism in the east, for which many had given their lives, but would now be scrapped in favor of a unification project.  This combined with the lack of progress made with the Novorossiya project over the past three years left Zakharchenko with a skeptical population.  Denis Pushilin, chairman of the People’s Soviet (Council) of the ‘DNR’ also came out reserved on the topic of Malorossiya, stressing the need for parliamentary process, but also that there was no legal or normative basis for what Zakharchenko planned to carry out [7].  Igor Plotnitsky, head of ‘LNR’, was not enamored with the idea of ‘Malorossiya’ either, claiming that ‘LNR’ had not been notified of Zakharchenko’s plans prior to the press conference.  The Kremlin also denied involvement in the project [8], and while it is hardly a reliable source for this conflict, it is difficult to imagine that they would have any stake in a power struggle between the two rebel ‘republics.’

At first it seemed that the project could yield some positive results for Zakharchenko and solidify his personal power within ‘DNR.’  As it was planned, the project would have thrown the participating states into what was referred to as a “transitional period” for three years[9].  Possibly a motivating factor for announcing the proposition, this transitional period clause could have helped Zakharchenko put off elections even further, enabling a perpetual state of deferral.  Neither ‘DNR’ nor ‘LNR’ are strangers to putting off elections, something which each have done twice the past three years[10].  The constitutional act also speculates denying political parties to act as ‘political subjects’, and proposes transitioning to personal representations.  Other positives for Zakharchenko in this proposal are the political points he likely hopes to win with it.  For one, pushing for a ‘Malorossiya’ encompassing all of Ukraine (Crimea included) sends a signal of reconciliation, albeit on his terms, enabling him to further the narrative of an uncooperative and unreasonable Kyiv, these notions are echoed by Vladislav Surkov, advisor to president Vladimir Putin[11].  Secondly, Zakharchenko effectively brought up the notion of Donetsk having sovereignty over ‘LNR’, which had seen its fair share of instability and coup attempts in the past.

Zakharchenko soon became aware of the criticism that the proposition had received, and clarified that he was never establishing a new state, but merely proposing one shortly after the announcement[12].  Not even a month had passed before, on August 9, 2017, Zakharchenko officially abandoned the proposal as a result of the early resistance he had faced with regards to the name “Malorossiya” especially[13].  Nonetheless, Zakharchenko maintained that the proposal had not been in vain, as it had given way to a range of new interesting proposals.  Moving forward, it will be pertinent to keep an eye on similar proposals relating to a federal Ukraine under rebel control, undoubtedly other a different name.  Whether this would mean a revival of the Novorossiya project or a similar project under a new name is uncertain, but it is likely that Zakharchenko will continue to push for the underlying notions of the Malorossiya proposition.  This would entail a confederation of Ukrainian states under a pro-Russian leadership in Donetsk.  While such an undertaking is virtually impossible outside of rebel territory, it is possible that a Donetsk-led DNR-LNR confederation could gain enough local support to be feasible.  If one can ignore the overarching theme of Ukrainian unification, the proposal of a Malorossiya project serves as an important glance into the intentions of ‘DNR’ head Zakharchenko.


Endnotes:

[1] DAN-news. (2017, July 18). Представители ДНР, ЛНР и регионов Украины объявили в Донецке о создании государства Малороссия (Representatives of the DNR, LNR and regions of Ukraine announced in Donetsk the creation of the Malorossiya state). Retrieved July 26, 2017, from https://dan-news.info/politics/predstaviteli-dnr-lnr-i-regionov-ukrainy-obyavili-v-donecke-o-sozdanii-gosudarstva-malorossiya.html

[2] DNR-Pravda News Editor (2017, July 18). Декларация и Конституционный акт государственного образования Малороссия (Declaration and Constitutional act of the state formation Malorossiya). Retrieved July 26, 2017, from http://dnr-pravda.ru/2017/07/18/deklaratsiya-i-konstitutsionnyiy-akt-gosudarstvennogo-obrazovaniya-malorossiya/

[3] DNR Official Website. (2014, May 14). Конституция ДНР (DNR Constitution). Retrieved July 26, 2017, from http://dnr-online.ru/konstituciya-dnr/

[4] Lenta. (2014, June 24). ДНР и ЛНР объединятся в конфедерацию с единой конституцией (DNR and LNR will join the confederation with a single constitution). Retrieved July 26, 2017, from https://lenta.ru/news/2014/06/24/novorossia/

[5] DNR People’s Militia, 1st Army Corps. (2015, October 20). VK post. Retrieved July 26, 2017, from https://vk.com/dnrarmy?w=wall-51146063_5569

[6] Andrey, G. (2016, September 22). Захарченко: Для предотвращения переворота в ЛНР был переброшен батальон “Спарта” (Zakharchenko: To prevent the coup in the LNR, “Sparta” battalion was sent). Retrieved July 26, 2017, from https://life.ru/t/новости/907002/zakharchienko_dlia_priedotvrashchieniia_pierievorota_v_lnr_byl_pieriebroshien_batalon_sparta

[7] DAN-News. (2017, July 18). Вопрос создания Малороссии целесообразно вынести на обсуждение парламента и общественности – Пушилин (The issue of creating Little Russia is expedient for discussion of the parliament and the public – Pushilin). Retrieved July 26, 2017, from https://dan-news.info/politics/vopros-sozdaniya-malorossii-celesoobrazno-vynesti-na-obsuzhdenie-parlamenta-i-obshhestvennosti-pushilin.html

[8] TASS. (2017, July 18). Malorossiya project is personal initiative of self-proclaimed republic’s leader. Retrieved July 26, 2017, from http://tass.com/politics/956825

[9] DNR-Pravda News Editor (2017, July 18). Декларация и Конституционный акт государственного образования Малороссия (Declaration and Constitutional act of the state formation Malorossiya). Retrieved July 26, 2017, from  http://dnr-pravda.ru/2017/07/18/deklaratsiya-i-konstitutsionnyiy-akt-gosudarstvennogo-obrazovaniya-malorossiya/

[10] 112.ua. (2016, July 24). “DNR” again postponed “elections” in the occupied Donbas. Retrieved July 26, 2017, from http://112.international/conflict-in-eastern-ukraine/dnr-again-postponed-elections-in-the-occupied-donbas-7515.html

[11] Denis, A. (2017, July 20). Реакция на Малороссию (Reactions to Malorossiya). Retrieved July 26, 2017, from https://cont.ws/@artemevsepar/668685

[12] Korrespondent.net. (2017, July 26). Захарченко рассказал о проблемах с “Малороссией” (Zakharchenko spoke about problems with Malorossiya). Retrieved July 26, 2017, from http://korrespondent.net/ukraine/3872258-zakharchenko-rasskazal-o-problemakh-s-malorossyei

[13] av-zakharchenko.su. (2017, August 9). Переформатирование Украины. Дискуссия продолжается… (Reform of Ukraine. The discussion continues…). Retreived August 16, 2017, from http://av-zakharchenko.su/inner-article/Zayavleniya/Pereformatirovanie-Ukrainy-Diskussiya-prodolzhaetsya2/

Assessment Papers Irregular Forces / Irregular Warfare Michael Sheldon Russia Ukraine

Assessment of the Search for Security in the Eastern Baltic

Jeremiah Cushman is a senior analyst at Military Periscope, where he writes about weapons.  He holds an M.A. in European and Eurasian Studies from the George Washington University.  He can be found on Twitter @jdcushman.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Search for Security in the Eastern Baltic

Date Originally Written:  July 15, 2017.

Date Originally Published:  August 14, 2017.

Summary:  For much of the last 800 years, the natives of the Baltic States and Finland were ruled by others, whether Baltic Germans, Swedes, Russians or Hitler’s Germany.  History shows these countries that, to retain independence, they must be willing and able to fight for it, and possibly join collective security organizations.

Text:  Lithuania existed as an independent nation prior to 1918, in contrast to Estonia, Latvia and Finland.  In 1385, the Grand Duchy of Lithuania joined with the Kingdom of Poland via a dynastic marriage.  Although not specifically made for security purposes, the result was a great Central European power that eventually spread from the Baltic to the Black Sea.  This was, however, an unstable union, with divergent interests between the Lithuanian and Polish halves.  (Poland ultimately became the dominant power.)  Efforts were made to strengthen the union, culminating with the establishment of the Polish-Lithuanian Commonwealth in 1569.  The commonwealth eventually succumbed to its own weaknesses and the machinations of neighboring powers, Austria, Prussia and Russia, which divided it among themselves in the partitions of 1772, 1790 and 1795.  If ultimately unsuccessful, the commonwealth nevertheless provided security for the Lithuanians for centuries.

Upon gaining independence in 1918, the Baltic States struggled to navigate their security environment.  For the most part, they sought refuge in the collective security arrangements of the League of Nations.  Different threat perceptions, a territorial dispute over Vilnius between Lithuania and Poland, and the maneuvers of the Germans and Soviets hindered trilateral defense efforts.  A proposed four-way alliance among Estonia, Finland, Latvia and Poland foundered on Finnish reservations.  Helsinki elected to focus on a Scandinavian orientation.  Estonia and Latvia managed to conclude a defense alliance in 1923.

The Soviet Union saw Baltic cooperation as a threat and worked to undermine it.  The Baltic States concluded their own treaty of cooperation and friendship in 1934, although little came from it.  Non-aggression pacts signed with Moscow and Berlin came to nought and the three nations were occupied by Soviet forces in 1940 and annexed.  While Finland fought for its independence and survived World War II, Baltic failures to prepare, and the overwhelming strength of the Soviet and German states that opposed them, ended their initial experiment with independence.

Finland was able to maintain its independence during and after World War II, fighting the Soviet Union twice in the Winter War of 1939-1940 and the Continuation War of 1941-1944.  The Finnish state was saved, though it lost the Karelia region to the Soviets.  Viewing Moscow as a direct threat, Helsinki allied with the Nazi regime as Berlin prepared its own attack on the Soviet Union.  The Finnish government took pains to portray its own war as separate from that of Germany’s, without much success.

At the end of the war, Finland was left with an 830-mile border with Russia and a difficult position between its preferred partners in the democratic West and the Soviet Union.  Moscow was able to dictate terms as the Finnish war effort collapsed in 1944 along with the fortunes of its German allies.  In 1948, the Finnish government concluded a mutual assistance treaty with Moscow, including military obligations to come to the Soviet Union’s assistance in the event of an attack by Germany or its allies, or an attack from Finnish territory.  The goal was to maintain independence and reduce the chance of conflict in Northern Europe.

By resolving Moscow’s security concerns, Finland was able to pursue trade with Western countries and play an active role in détente during the 1970s.  The Nordic country benefited from trade with its eastern neighbor, while holding off Soviet efforts to tighten military relations.  While this “Finlandization” policy ensured the nation’s sovereignty during the Cold War, it came at a cost to Finland’s freedom of action.  Habits formed over those decades continue to influence national policy, including hindering those who might prefer new security arrangements in light of Russia’s increasingly aggressive posture.

The Baltic States declared their independence from the Soviet Union in 1990.  Remembering the lessons of 1940, they immediately focused on trilateral cooperation and integration with European security organizations to secure their freedom.  Their security bodies focused on developing modern, capable forces on the Western model with the object of joining the North Atlantic Treaty Organization (NATO) and the European Union (EU).  These goals were achieved in 2004.  NATO’s Article 5 pledge that an attack on one is an attack on all is seen as the cornerstone of Baltic security.  Accordingly, all three countries recognize the United States as their most important security partner.  The Baltic States also pursue regional cooperation with their Nordic neighbors.  These multilateral cooperation efforts have, in some cases, detracted from trilateral endeavors. Small countries have limited resources.

Accession to NATO and the EU, which has its own security mechanisms, seemed to resolve the security concerns of the Baltic States.  However, the election of Donald Trump in the U.S. has led to uncertainty about the wisdom of relying on Washington.  Trump has threatened to assist only those NATO members who meet the alliance’s defense spending goals and his commitment to Article 5 appears uncertain, despite efforts from other administration officials to reinforce American support for the Baltic allies.  Trump’s apparent ties to Russia cause additional discomfort in the region.

Officially, the governments of Estonia, Latvia and Lithuania emphasize the continued importance of security ties with the U.S. and a belief that Trump will live up to Washington’s NATO commitments should it become necessary.  So far, U.S. and NATO activities in the Baltic region have been unchanged from the previous administration, with multinational battalion task groups active in all three countries.

As for Finland, it has eschewed its former relationship with Moscow in favor of closer security relations with NATO and the U.S., and strengthened ties with neighboring Sweden.  Helsinki still sees a strong national defense capability as vital for its security.  NATO membership remains politically challenging, although Finland potentially benefits from E.U. mutual assistance mechanisms.

The lessons of history for this region are simple.  To retain independence, one must first be willing and able to fight for it.  States as small as Estonia, Latvia and Lithuania must additionally find allies to bolster their own defense efforts.  If one cannot be a great power, joining a great power organization, such as NATO, is the next best thing.


Endnotes:

[1]  Kirby, David. (1998). Northern Europe In The Early Modern Period: The Baltic World 1492-1772. New York, NY: Addison Wesley Longman.

[2]  Kirby, David. (1998). The Baltic World 1772-1993: Europe’s Northern Periphery in an Age of Change. New York, NY: Addison Wesley Longman.

[3]  Kasekamp, Andres. (2010). A History of the Baltic States. New York, NY: Palgrave Macmillan.

[4]  Plakans, Andrejs. (2011). A Concise History of the Baltic States. New York, NY: Cambridge University Press.

Aggression Assessment Papers Baltics Estonia European Union Finland Jeremiah Cushman Latvia Lithuania North Atlantic Treaty Organization Russia Trump (U.S. President) United States

Assessment of Libya-Trained Terrorists’ External Attack Capability

S. M. Carlson served as a terrorism expert with the U.S. government for more than twelve years, including with the Central Intelligence Agency and in Libya.  She can be found on Twitter @smcarls1.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Libya-Trained Terrorists’ External Attack Capability

Date Originally Written:  June 23, 2017.

Date Originally Published:  July 3, 2017.

Summary:  Libyan terrorism is not new, nor are attacks conducted outside the country by terrorists that trained in Libya. The external attack capability is evolving, however. The most recent attacks in the United Kingdom highlight the changing threat posed by Libyan terrorists, trained fighters, and their capability and intent to reach into Europe. That threat extends beyond a single group.

Text:  Libya-trained terrorists have conducted multiple deadly attacks in North Africa in recent years, but the May 2017 attack against a Manchester concert by a Briton of Libyan descent, who reportedly fought and possibly trained in Libya, was among the first major attacks with direct ties to Libya outside the region, since the 2011 intervention and death of Muammar al-Ghadafi.

Although a myriad of terrorist groups, extreme militias, and umbrella organizations operate in Libya due to the permissive environment there, the most well-known remains the Islamic State. Its fighters are capable of carrying out external attacks outside the region. The capability probably resides more with the trained fighters, rather than a single group, and likely does not require a top down structure.

Since 2011, other major external attacks specifically targeting Westerners include those in In Amenas, Algeria; Sousse, Tunisia; and Tunis, Tunisia. Terrorists reportedly staged or trained in Libya prior to all three attacks[1].

In January 2013, terrorists linked to al-Qa’ida conducted a multi-day siege, held hostages, and killed dozens in an attack against a gas plant in In Amenas, Algeria, close to the border with Libya[2]. In June 2015, gunmen opened fire on tourists at a beach resort in Sousse, Tunisia, killing and injuring dozens, which the Islamic State claimed[3]. In March 2015, gunmen opened fire at the Bardo Museum in Tunis, Tunisia, killing and injuring dozens, mostly tourists, which the Islamic State claimed[4].

The Islamic State, however, had gained a foothold in Libya prior to the attacks in Tunisia, announcing its presence there in late 2014. It quickly expanded and thrived in the lawlessness of Libya. Fighters flocked to the group. It created a stronghold in the city of Sirte.

The United Nations (UN)-backed Libyan government in late 2016 requested U.S. assistance in its fight against the group and it agreed, conducting hundreds of airstrikes against Islamic State targets in the city. The terrorists fled the city and set up training camps nearby, where the group’s external plotters were reportedly planning operations against Europe. Two U.S. Air Force B-2 stealth bombers then dropped more than 100 munitions on those camps, killing more than 80 Islamic State members in January[5].

The UN-backed government declared defeat over the Islamic State in Libya, but while the group had lost its stronghold, the remaining fighters dispersed. In the intervening months, Islamic State fighters began efforts to regroup and many warned the Islamic State in Libya was attempting to consolidate once again.

It is no longer attempting. The Islamic State branch in Libya is active once more, proving yet again that airstrikes alone cannot defeat terrorism. Strikes may be a useful tool, but they are not a long-term solution. The strikes did not entirely disrupt the group or experienced fighters that already left the country.

In May 2017, the remaining Islamic State in Libya fighters made their continued presence known and then the branch’s reach became apparent later that month on a global scale.

The Islamic State’s branch in Libya claimed an attack in Southern Libya in early May that killed two[6][7]. Islamic State fighters also executed a man and clashed with a militia in the Bani Walid area in late May[8]. These were some of the first attacks claimed by the group’s Libya branch since the airstrikes in December.

The Islamic State then claimed attacks in the United Kingdom in late May and early June 2017, both of which had Libya connections. Salman Abedi and Rachid Redouane were of Libyan descent and fought in Libya. Redouane, who helped kill and injure dozens in London in early June, reportedly fought with a militia in Tripoli that later sent jihadist fighters to Syria[9]. Abedi, who killed and injured dozens at a concert in Manchester in May, reportedly met in Libya with Islamic State members also tied to the November 2015 Paris attack[10].

Abedi also reportedly fought in Ajdabiya in 2014, was injured, and taken to Turkey for treatment using a false passport[11]. Italian investigators in April believed that an unspecified number of Islamic State fighters from Libya had entered Europe, in a similar manner to Abedi, as wounded Libyan fighters seeking medical treatment[12].

Therefore, even if the Islamic State were truly defeated in Libya today, the fatal ripple effect of its experienced fighters will likely be felt for years to come. In addition, the Islamic State reportedly has 500 fighters remaining, and possibly training, in Libya, but there are an estimated 3,000 more jihadists in the country[13].

The Islamic State is not the only terrorism problem in Libya. Only in the last three years have fighters in the country begun using the title of “Islamic State.” There were many terrorists groups in Libya before that, and many will likely come after it. The fighters flow between them.

The fighters frequently change groups and alliances based on a variety of factors at play in Libya. The groups themselves also change names, often to conceal extremist affiliation, ideology, or intent. That makes terrorist groups and fighting networks difficult to untangle.

From al-Qa’ida to Ansar al-Sharia (the group responsible for the 2012 Benghazi attacks) to the Benghazi Revolutionary Shura Council (an umbrella group) to the Benghazi Defense Brigades (a rebranding), extremist groups in Libya adapt to the ever-changing environment there[14].

Defeating the Islamic State in Libya does not solve the country’s terrorism problem, as its experienced fighters retain the intent and capability of carrying out terrorist attacks.


Endnotes:

[1] Brahimi, A. (2017, May 25). Why Libya is still a global terror threat. Retrieved June 23, 2017 from https://www.theguardian.com/commentisfree/2017/may/25/libya-global-terror-threat-manchester-attack-gaddafi

[2] (2013, January 21). Algeria hostage crisis: What we know. Retrieved June 23, 2017 from http://www.bbc.com/news/world-africa-21087732

[3] Smith-Spark, L.; Paton Walsh, N.; & Black, P. (2015, June 27). Tourists flee Tunisia after resort attack. Retrieved June 23, 2017 from http://www.cnn.com/2015/06/27/africa/tunisia-terror-attack/index.html

[4] Botelho, G. & Mullen, J. (2015, March 19). ISIS apparently claims responsibility for Tunisia museum attack; 9 arrested. Retrieved June 23, 2017 from http://www.cnn.com/2015/03/19/africa/tunisia-museum-attack/index.html

[5] Dickstein, C. & Copp, T. (2017, 19 January). US bombers flew from Missouri and killed 80 Islamic State fighters in Libya. Retrieved June 23, 2017 from https://www.stripes.com/news/us-bombers-flew-from-missouri-and-killed-80-islamic-state-fighters-in-libya-1.449647#.WU2F5caZNsM

[6] Assad, A. (2017, May 7). IS militants attack Third Force fighters, kill two. Retrieved June 23, 2017 from https://www.libyaobserver.ly/inbrief/militants-attack-third-force-fighters-kill-two

[7] (2017, May 8). Libya: ISIS makes comeback by claiming attack south of Sirte. Retrieved June 23, 2017 from http://menastream.com/libya-isis-comeback-south-sirte/

[8] Assad, A. (2017, May 31). IS terrorists execute young man in Libya’s Bani Walid. Retrieved June 23, 2017 from https://www.libyaobserver.ly/news/terrorists-execute-young-man-libyas-bani-walid

[9] Farmer, B.; Nathan, A.; & Yorke, H. (2017, June 6). London attacker Rashid Redouane refused UK asylum in 2009. Retrieved June 23, 2017 from http://www.telegraph.co.uk/news/2017/06/06/london-attacker-rachid-redouane-refused-uk-asylum-2009/

[10] Callimachi, R. & Schmitt, E. (2017, June 3). Manchester Bomber Met With ISIS Unit in Libya, Officials Say. Retrieved June 23, 2017 from https://www.nytimes.com/2017/06/03/world/middleeast/manchester-bombing-salman-abedi-islamic-state-libya.html

[11] Greenhill, S.; Malone, A.; Brown, L.; & Sears, N. (2017, May 25). How the Manchester bomber was ‘injured on the front lines in Libya while fighting with jihadis in his gap year’. Retrieved June 23, 2017 from http://www.dailymail.co.uk/news/article-4543372/Manchester-bomber-injured-Libya-fighting-jihadis.html

[12] Tondo, L.; Messina, P.; & Wintour, P. (2017, April 28) Italy fears ISIS fighters slip into Europe posing as injured Libyans. Retrieved June 23, 2017 from https://www.theguardian.com/world/2017/apr/28/islamic-state-fighters-infiltrate-europe-posing-injured-libyan-soldiers

[13] (2017, May 27). How Islamic State clings on in Libya. Retrieved June 23, 2017 from http://www.economist.com/news/middle-east-and-africa/21722630-jihadists-have-retreated-desert-where-they-are-potent-threat-how

[14] Thurston, A. (2017 May 7). Who Counts as al-Qaeda: Lessons from Libya. Retrieved June 23, 2017 from https://www.lawfareblog.com/who-counts-al-qaeda-lessons-libya

Assessment Papers Libya S. M. Carlson Violent Extremism

Announcing the Assessment Paper!

assessment-1024x819.jpg

When we started Divergent Options our main effort was our Options Paper.  Our Options Paper used a specific template and focused on assessing a national security situation, providing multiple options to address the situation, and articulating the risk and gain of each option, all in 1,000 words or less.

While we will continue our Option Paper line we are pleased to announce our Assessment Paper.  Our Assessment Paper will still have a 1,000 word limit but will focus on assessing a national security situation only.

——————————Begin Assessment Paper Format———————————–

Jane Doe has served in Organization A in Country X and Country Y.  She presently works at Organization B where she does Z.  She can be found on Twitter @address and writes for website dot com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Threat Posted by the Islamic State of Iraq and the Levant (ISIL).  Note:  Titles will always begin with “Assessment of”

Date Originally Written:  September 25, 2014.

Date Originally Published:  September 29, 2014.

Author and / or Article Point of View:  Author is a retired military member. Author believes in Responsibility to Protect. And / or the article is written from the point of view of Latvia towards Russia, Vietnam towards China, or the U.S. towards the Civil War in Syria.

Summary:  If left unchecked, ISIL will establish a safe haven in Iraq and Syria where violent extremists and emerging violent extremists from around the world can congregate, assimilate, receive training, and be dispatched globally to conduct operations targeting civilians.  Beyond the conduct of operations, ISIL operatives dispatched worldwide will also be able to establish local cells to expand their influence.  Note:  “Summary” will be five lines of text maximum.  We strongly suggest you write your entire article first and then write the summary.

Text:  United States President Barack H. Obama withdrew United States forces from Iraq in December 2011[1].  The December 2011 withdraw date was set by President George W. Bush in 2008 when he signed a Status of Forces Agreement with Iraq.  Following the departure of United States forces from Iraq, Iraqi Prime Minister Nouri al-Maliki pursued a number of policies that made the Sunni population of Iraq, formerly empowered by Iraqi President Saddam Hussein, feel marginalized, excluded, and neglected by the Maliki government[2].  The lack of a stabilizing United States presence and Sunni marginalization laid the groundwork for the rise of ISIL.  Note:  This part of the article, called “Text,” is what will be counted against the 1,000 word limit.


Endnotes:

[1]  Ryan, M. (2016, September 26). Who made the decision to withdraw U.S. troops from Iraq? Retrieved June 23, 2017, from https://www.washingtonpost.com/politics/2016/live-updates/general-election/real-time-fact-checking-and-analysis-of-the-first-presidential-debate/who-made-the-decision-to-withdraw-u-s-troops-from-iraq/?utm_term=.7694d4af3b1b  Note:  We prefer APA format for citations, which can be easily done via Citation Machine.

[2]  Something else in APA format.

——————————End Assessment Paper Format———————————–

Announcements Assessment Papers