Using Cyber Operations to Achieve Cognitive Domain Impact

Editor’s Note:  This article was written by an Artificial Intelligence based on a prompt that it received from a human.  As such, we recommend you do your own research to confirm or refute the content of this article before using it to inform your actions or inactions.  We also ask that you tolerate any deviations from our traditional  formats or writing style that are present in this article.  This article is part of an experiment of sorts that we did as for our 2024 Call for Papers Team-Up with Blogs of War: An Artificial Intelligence Wrote This Article.  For more information click here.  


Jason Atwell is an officer in the U.S. Army Reserve and currently employed at Google Public Sector. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Using Cyber Operations to Achieve Cognitive Domain Impact

Date Originally Written:  April 9, 2024.

Date Originally Published:  April 29, 2024.

Author and /  or Article Point of View:  Author is a tech employee and reserve military member who believes in balancing foreign influence mitigation with preserving individual liberties and private sector independence.

Background:  The information environment has become a contested battleground where state and non-state actors vie for control over narratives and perceptions. Disinformation, propaganda, and cyberattacks target the cognitive domain, seeking to undermine trust, sow division, and influence decision-making within nations. Foreign adversaries exploit vulnerabilities within social media platforms and emerging technologies to manipulate public opinion and disrupt democratic processes.

Significance:  The integrity of the information environment is directly linked to national security. Foreign malign influence campaigns can erode public trust in institutions, destabilize societies, and even incite violence. The impact extends beyond individuals, affecting governments, businesses, and the core ideals of free societies.

Option #1:  Proactive Collaboration and Resilience

Governments and technology companies could forge stronger partnerships prioritizing transparency and information sharing. Such collaboration would focus on:

Early detection: Sharing threat intelligence enables platforms to swiftly identify and disrupt coordinated disinformation campaigns.

Media Literacy: Joint public awareness campaigns to build societal resilience against disinformation tactics.

Adaptable Regulation: Developing flexible frameworks to address evolving threats like deepfakes without stifling innovation or free speech.

Risk:  Excessive regulation or overreliance on tech companies could raise censorship concerns and undermine trust in both government and the private sector.

Gain:  A more proactive approach mitigates foreign influence, strengthens public trust, and fosters a resilient information space without jeopardizing core freedoms.

Option #2:  Strategic Counter-Influence Operations

Governments could invest in dedicated capabilities to counter foreign influence in the information space. This involves:

Narrative Development: Crafting compelling counter-messaging to expose adversarial disinformation and promote democratic values.

Targeted Disruption: Disabling accounts and networks linked to foreign influence operations, albeit with rigorous safeguards.

International Coalitions: Building alliances with like-minded nations to amplify counter-influence efforts and establish norms for responsible state behavior.

Risk:  Overt counter-influence risks escalating tensions with adversaries and could fuel accusations of censorship or manipulation. It also demands careful ethical considerations.

Gain:  Strategic counter-influence disrupts adversarial campaigns, protects vulnerable populations from manipulation, and potentially deters future attempts.

Balancing Act

Both options carry risks and potential benefits.  A hybrid approach may be optimal, combining proactive measures to strengthen societal resilience with targeted counter-influence operations where necessary. The core challenge lies in upholding the principles of democracy and civil liberties while protecting the nation from the very real threats posed by malicious actors in the information environment.

Key considerations:

The Long Game: Countering malign influence requires sustained, strategic investment rather than knee-jerk reactions.

Ethical Frameworks: Transparency and clear guidelines are crucial to prevent abuses and maintain public trust.

Adaptability: The information landscape evolves rapidly, demanding flexibility and innovative solutions from both government and the private sector.

The security of the information environment is a complex, multifaceted challenge. It demands thoughtful collaboration between government, the tech sector, and civil society to protect the integrity of democracy while preserving the freedoms that define it.


Endnotes:

The following prompt was given to Gemini by Jason Atwell:

—–BEGIN PROMPT—–

Write a maximum 1,000 word article on national security as it relates to the information environment using the following template: “National Security Situation: Using Cyber Operations to Achieve Cognitive Domain Impact. Date Originally Written: Month, Day, Year. Date Originally Published: Month, Day, Year. Author and / or Article Point of View: Author is a tech employee and reserve military member. Author believes in balancing responsibility to mitigate foreign malign influence while also preserving individual liberties and the independence of the private sector. Background: A tightly-worded description of the national security situation and the driving forces[1]. Significance: Why does this national security situation matter? What is the impact? To whom does the national security situation matter? Option #1: Something that could be done to address one or more aspects of the national security situation[2]. Risk: What is the risk to undertaking Option #1? Note: Risks can take a variety of forms. Here are some examples: – Political (e.g. ruin a reputation or alliances or cause distrust in the international community) – People (e.g. military or civilian deaths) – Resources (e.g. spending money on an endless war) – Organizational (e.g. focusing on counterinsurgency so long that you forget how to fight a conventional war) – Balancing present and future challenges (e.g. if we do X now, we won’t be able to do Y in the future, and Y has worse ramifications in the future than X does now) Gain: What is the gain to undertaking Option #1? Option #2: Something different from Option #1 that could be done to address one or more aspects of the national security situation. Note: The focus is on being DIFFERENT from Option #1. As an example, there is much debate around whether it is best to focus on this from a reactive perspective, i.e. disrupting things like Russian troll farms and punishing platforms who fail to eliminate certain types of content, or a proactive perspective, such as focusing on positive messaging, building public trust, and working with platforms to place guardrails on speech, though this invokes concerns around censorship. Furthermore, regulations often have a hard time keeping pace with emerging threats such as those involving deepfakes and AI.

—–END PROMPT—–

Artificial Intelligence (As an Author) Blogs of War Influence Operations Jason Atwell Option Papers

Chinese Activities in Kiribati

Editor’s Note:  This article was written by an Artificial Intelligence based on a prompt that it received from a human.  As such, we recommend you do your own research to confirm or refute the content of this article before using it to inform your actions or inactions.  We also ask that you tolerate any deviations from our traditional  formats or writing style that are present in this article.  This article is part of an experiment of sorts that we did as for our 2024 Call for Papers Team-Up with Blogs of War: An Artificial Intelligence Wrote This Article.  For more information click here.  


Kyle McCarter has served in the United States Army for over 20 years. He presently works as an operations officer and planner in the Indo-Pacific area of responsibility. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Chinese Activities in Kiribati

Date Originally Written: March 17, 2024

Date Originally Published:  April 8, 2024

Author and / or Article Point of View:  The author is an active-duty U.S. Army Officer who believes in freedom of navigation, the importance of AUKUS (the trilateral security partnership between Australia, the United Kingdom, and the United States), and perceives Chinese presence in Kiribati as a threat.

Background:  The island nation of Kiribati, located in the central Pacific Ocean, has recently become a focal point of geopolitical competition. China’s increasing activities in Kiribati, including infrastructure development, economic investments, and military presence, have raised concerns among the United States and its allies. Kiribati’s strategic location makes it an essential outpost for power projection and maritime dominance in the Pacific region.

Significance:  The national security situation in Kiribati holds significant implications for regional stability and global power dynamics. As China expands its influence in Kiribati, it threatens the longstanding security architecture led by the United States in the Indo-Pacific. The establishment of Chinese military facilities in Kiribati could disrupt vital sea lanes, endangering freedom of navigation and undermining the rules-based international order. Moreover, Kiribati’s alignment with China could weaken the AUKUS alliance and exacerbate tensions between the United States and China.

Option #1:  To address the Chinese activities in Kiribati, the United States could strengthen its diplomatic and economic engagement with Kiribati. This includes offering increased development assistance, promoting sustainable infrastructure projects, and fostering closer ties through bilateral agreements. By bolstering Kiribati’s resilience and capacity to resist Chinese influence, the United States can mitigate the threat posed by China’s presence in the region.

Risk:  However, pursuing this option carries political risks, as it may strain relations with China and trigger retaliatory measures. China could respond by escalating its activities in Kiribati, deepening its economic entanglement with the island nation, and marginalizing U.S. influence. Moreover, increased U.S. involvement in Kiribati could fuel suspicions of neocolonialism and provoke domestic opposition within Kiribati, complicating efforts to counter Chinese influence effectively.

Gain:  Despite the risks, Option #1 offers several potential gains. By fortifying Kiribati’s ties with the United States and its allies, it can bolster regional security and preserve the balance of power in the Indo-Pacific. Additionally, enhanced cooperation with Kiribati can facilitate intelligence-sharing, maritime surveillance, and joint military exercises, strengthening the collective defense against common threats, including illegal fishing, transnational crime, and maritime disputes.

Option #2:  Alternatively, the United States could pursue a multilateral approach to address Chinese activities in Kiribati. This involves rallying regional partners, such as Australia, New Zealand, and Japan, to coordinate a unified response to China’s expansionism in the Pacific. Through joint diplomatic initiatives, economic incentives, and security cooperation, the United States and its allies can exert collective pressure on Kiribati to resist Chinese overtures and uphold democratic values and transparency.

Risk:  However, Option #2 carries the risk of diplomatic discord and strategic divergence among U.S. allies. Differences in geopolitical interests, economic priorities, and historical ties could undermine the effectiveness of multilateral efforts to counter Chinese influence in Kiribati. Moreover, China’s economic leverage and strategic patience may undermine the resolve of regional partners, leading to fragmentation and discord within the coalition.

Gain:  Despite the challenges, Option #2 offers the potential for greater strategic alignment and burden-sharing among U.S. allies in the Indo-Pacific. By leveraging collective resources and capabilities, the United States and its partners can enhance their capacity to shape the security environment in Kiribati and uphold shared principles of sovereignty, territorial integrity, and international law. Additionally, a united front against Chinese expansionism can send a clear signal of deterrence and resilience, dissuading other vulnerable nations in the region from succumbing to Chinese coercion.

Other Comments:  The national security situation in Kiribati underscores the complex interplay of economic, political, and strategic interests in the Indo-Pacific. As China seeks to expand its influence in the region, the United States and its allies must adapt their approaches to safeguard regional stability and uphold a free and open order. By engaging proactively with Kiribati and fostering cooperation among like-minded partners, the United States can effectively counter Chinese coercion and preserve its leadership role in the Indo-Pacific.

Recommendation:  None.


Endnotes:

The following prompt was given to ChatGPT 3.5 by Kyle McCarter:

—–BEGIN PROMPT—–

Write a maximum 1,000 word article on a pressing US national security issue specific to the island nation of Kiribati using the following template: “National Security Situation: Chinese Activities in Kiribati. 

Date Originally Written: Month, Day, Year. 

Date Originally Published: Month, Day, Year. 

Author and / or Article Point of View: Author is an active-duty U.S. Army Officer. Author believes in freedom of navigation, the importance of AUKUS, and that Chinese presence in Kiribati is a threat. And / or the article is written from the point of view of the United States towards China, Kiribati towards China, or the China towards the United States.

Background: A tightly worded description of the national security situation and the driving forces. 

Significance: Why does this national security situation matter? What is the impact? To whom does the national security situation matter? 

Option #1: Something that could be done to address one or more aspects of the national security situation. 

Risk: What is the risk to undertaking Option #1? Note: Risks can take a variety of forms. Here are some examples: – Political (e.g. ruin the AUKUS alliances or cause distrust in the international community against China) – People (e.g. military or civilian casualties) – Resources (e.g. economic collapse, protracted war, resource constraints) – Organizational (e.g. loss of focus on other regions of the globe) 

Gain: What is the gain to undertaking Option #1? 

Option #2: Something different from Option #1 that could be done to address one or more aspects of the national security situation. Note: The focus is on being DIFFERENT from Option #1. When developing options, think differences–not variations on a theme.

Risk: What is the risk to undertaking Option #2?

Gain: What is the gain to undertaking Option #2? 

Other Comments: Provide any other comments here that did not fit into the format above. If you have none type “None.” Please keep this short as the majority of the 1,000 words or less content should be above this area.

Recommendation: None.

—–END PROMPT—–

Artificial Intelligence (As an Author) Blogs of War China (People's Republic of China) Kiribati Kyle McCarter Option Papers

Options for Reintegrating Irregular Forces into Stability Operations During Large-Scale Combat Operations 

Major Benjamin Franzosa is a Military Police officer and holds an MA in Advanced Military Studies from the U.S. Army School of Advanced Military Studies and an MA in Business and Organizational Security Management from Webster University. He served as a maneuver planner for the 10th Mountain Division (Light Infantry) at the time of writing this article, and he currently serves as the executive officer for the 91st Military Police Battalion.

Major Kaman Lykins is a Civil Affairs officer and holds an MA in Military Art and Science in contemporary Chinese strategy from the U.S. Army Command and General Staff College. He served as the deputy G9 and SOF planner for the 10th Mountain Division (Light Infantry) at the time of writing this article and currently serves as the 95th Civil Affairs Brigade (Special Operations) (Airborne) current operations officer.  

Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. Army’s doctrinal links between Unconventional Warfare (UW) and conventional force-led follow-on stability operations are insufficient for Large-Scale Combat Operations (LSCO).

Date Originally Written:  March 5, 2024.

Date Originally Published:  April 1, 2024.

Author and/or Article Point of View:  The authors believe a doctrine gap exists between Special Operations Forces (SOF) UW and stability operations in a LSCO context. This article provides options for U.S. Army doctrine developers to close this gap.

Background:  How SOF UW operations support 21st-century LSCO are largely theoretical[1][2]. However, we can assume that SOF will conduct UW in conjunction with LSCO and in the proximity of conventional combat operations, rather than so deep as to be disconnected from conventional operations[3][4]. Given these two assumptions, conventional forces are likely to eventually overtake previously enemy-controlled areas where SOF has initiated, organized, and trained guerrilla forces. The presence of these guerrillas creates fundamental challenges for follow-on stability operations. Organized, armed groups operating outside of state control are anathema to restoring civil order and control. These challenges can be mitigated through a deliberate reintegration process, making guerrillas a force multiplier for stability operations[5].

Significance:  UW has the potential to create challenges for follow-on stability operations. Disaffected guerrillas, armed and trained by U.S. SOF elements, operating uncontrolled in a rear area, is a nightmare scenario for any conventional force. The factors that make guerrillas dangerous to an occupying enemy force (local knowledge, community ties, social/political cache, etc.) are the same qualities that make them valuable to friendly forces attempting to reestablish civil security/order[6]. If executed correctly, guerrilla forces can be tremendously effective both in enemy and friendly rear areas[7]. UW is a Special Forces (SF) proponent task, but its impact on stability operations requires updates to both SOF and conventional forces policy and doctrine[8].

Option #1:  SOF units control irregular forces from establishment through reintegration.

SOF units in enemy rear areas establish, organize, train, equip, and employ local guerrilla forces. As the main battle area approaches the SOF element and their partnered force, both elements go dormant, attempt to avoid detection, and allow the close fight to overtake them. The SOF element initiates a link-up with friendly conventional forces and supervises integrating their partnered guerrilla forces into stability operations. SOF units are then reinserted into the enemy rear area to continue deep shaping operations.

Risk:  If SOF units remain with their indigenous partners as conventional forces overtake them, this poses a risk to both mission and force. It is a risk to mission because the SOF element loses its utility as it suspends operations and allows the conventional fight to pass them. SOF elements and their partnered guerrilla forces are lightly armed compared to mechanized/armored units, tied to their local area, and will, by necessity, avoid direct engagement during large-scale combat operations[9]. Therefore, the SOF element can only be utilized once conventional forces arrive and will then require a risky reinsertion. This is a risk to force because the speed and lethality of LSCO make the reinsertion of SOF assets into the enemy rear area exceedingly risky[10]. In a LSCO context, these risks make remaining with indigenous partners and waiting on conventional forces unattractive.

Gain:  UW is based on trust[11]. This option maintains a chain of trust from establishing the irregular force to integration into stability operations through the embedded SOF element. The guerrillas and conventional forces both trust those SOF elements. This has several practical benefits: First, it significantly reduces the risk of fratricide or misidentification of guerrilla forces when they link up with friendly conventional forces. Second, during their rear area utilization, the SOF can mediate between the guerrillas and conventional forces. Additionally, based on the time spent with the indigenous guerrillas, the SOF element will have a greater appreciation for the specific abilities and limitations of the partnered force[12]. Finally, SOF leaders, having been embedded with the irregular force, are better postured than conventional forces to assess which guerrilla leaders do or do not have a temperament consistent with integration into a state’s security services.

Option #2:  SOF units transition control of irregular forces to conventional units.

As the main battle area approaches the SOF unit and partnered guerrillas, the SOF trains the guerrillas to go dormant and avoid detection, as well as procedures for their eventual link-up with conventional forces. The SOF element displaces deeper into the enemy rear area and continues operations. Once conventional forces overtake the hidden guerrillas, both entities conduct a link-up following an established procedure, and the guerrillas fall under the control of the division or corps conducting stability operations in their local area, oriented on reintegrating the guerrillas into post-conflict society.

Risk:  If SOF elements displace forward, there is a risk to follow-on stability operations as SOF-trained guerrilla forces are left uncontrolled on the battlefield[13]. As the SOF element displaces forward, the guerrillas lose their connection to U.S. forces, which must be reestablished once conventional units arrive. This reintegration is extremely risky for both groups. Conventional forces are rightly suspicious of organized armed groups operating in their close or rear areas; enemy-aligned guerrillas can pose as friendly-raised guerrilla forces, and even neutrally aligned guerrillas can cause problems during stability operations if their goals are not consistent with U.S. Army goals 14]. From guerrillas’ perspective, they are in the middle of a state collapse, and were disaffected by the conditions under their previous government. Having control over an armed force gave them the power to have their grievances addressed, or at least not be ignored[15]. Guerrilla leaders could be understandably reticent to give up this power, especially to an invading conventional force they have never worked with and have no reason to trust.

Gain:  This option has benefits for both conventional and SOF units. SOF units can stay deep of maneuvering units’ close fight and continue to conduct deep shaping operations with significantly less interruption. The guerrillas do not have to be repeatedly reinserted into the enemy’s rear area, avoiding multiple risky infiltrations. For conventional divisions and corps tasked with restoring civil order and civil control in their rear areas, having control of friendly-raised guerrilla forces enables unity of command for the stability operations[16]. Divisions and corps can leverage this linkage to reintegrate guerrillas into the state security apparatus long term[17].

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Long, J. E. (2019, February 8). Green Berets: Rebuilding the Guerrilla Leader Identity. Small Wars Journal. https://smallwarsjournal.com/jrnl/art/green-berets-rebuilding-guerrilla-leader-identity 

[2] Robinson, L. (November/December 2012). The Future of Special Operations: Beyond Kill and Capture. Foreign Affairs, Vol. 91 (No 6), 110–122. 

[3] Maxwell, D. (2023, May 29). An Unconventional Warfare Mindset: The Philosophy of Special Forces Must be Sustained. Small Wars Journal. https://smallwarsjournal.com/jrnl/art/unconventional-warfare-mindset-philosophy-special-forces-must-be-sustained

[4] Moir, N. L. (2023, January 1). The Overlooked Irregular Warfare Expert the Pentagon Should Study Today. Modern Warfare Institute. https://mwi.westpoint.edu/the-overlooked-irregular-warfare-expert-the-pentagon-should-study-today

[5] Headquarters, Department of the Army. (2019, March 21). Army Techniques Publication 3-18.1: Special Forces Unconventional Warfare.

[6] McDonough, D. S. (2008). From Guerrillas to Government: Post-conflict Stability in Liberia, Uganda, and Rwanda. Third World Quarterly, 29(2), 357–374. 

[7] Headquarters, Department of the Army. (2021). Army Techniques Publication 3-05.1: Unconventional Warfare at the Combined Joint Special Operations Task Force Level.

[8] Toguchi, R. M., & Krivdo, M. E. (Eds.). (2019). The Competitive Advantage: Special Operations Forces in Large-Scale Combat Operations. Army University Press. 

[9] Headquarters, Department of the Army. (2019, March 21). Army Techniques Publication 3-18.1: Special Forces Unconventional Warfare.

[10] Headquarters, Department of the Army. (2019, March 21). Army Techniques Publication 3-18.1: Special Forces Unconventional Warfare. 

[11] Long, Joseph E. (2019, February 8). Green Berets: Rebuilding the Guerrilla Leader Identity. Small Wars Journal. https://smallwarsjournal.com/jrnl/art/green-berets-rebuilding-guerrilla-leader-identity 

[12] Maxwell, David. (2023, May 29). An Unconventional Warfare Mindset: The Philosophy of Special Forces Must be Sustained. Small Wars Journal. https://smallwarsjournal.com/jrnl/art/unconventional-warfare-mindset-philosophy-special-forces-must-be-sustained 

[13] McDonough, D. S. (2008). From Guerrillas to Government: Post-conflict Stability in Liberia, Uganda, and Rwanda. Third World Quarterly, 29(2), 357–374. 

[14] Headquarters, Department of the Army. (2014, June 2). Field Manual 3-24: Insurgencies and Countering Insurgencies.

[15] United Nations Institute for Disarmament Research, Zawels, E. A., Stedman, S. J., Daniel, D. C. F., Cox, D., Boulden, J., Tanner, F., Potgieter, J., & Gamba, V., 96 Managing Arms in Peace Processes: The Issues (1996). New York, New York; United Nations.

[16] Headquarters, Department of the Army. (2014, June 2). Field Manual 3-07: Stability.          

[17] McDonough, D. S. (2008). From Guerrillas to Government: Post-conflict Stability in Liberia, Uganda, and Rwanda. Third World Quarterly, 29(2), 357–374. 

Benjamin Franzosa Irregular Forces / Irregular Warfare Kaman Lykins Large Scale Combat Operations (LSCO) Option Papers Unconventional Warfare (UW)

The Options Remaining for Israel to Defeat Hamas

Dr. Jacob Stoil is the Chair of Applied History at the Modern War Institute, Senior Fellow of the 40th ID Urban Warfare Center, and Trustee of the U.S. Commission on Military History. He has worked extensively in Israel and the Middle East including in support of Task Force Spartan. He has published multiple policy and academic articles which can be found in publication such as the International Journal of Military History, Wavell Room, and MWI. He can be followed on X as @JacobStoil. 

The views expressed in this article represent the personal views of the author and are not necessarily the views of the Department of Defense, the Department of the Army, Army University, or the U.S. Military Academy.

Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any other group.


National Security Situation:   Hamas’ October 7, 2023, attack on Israel has caused a state of war between Israel and Hamas, which is ongoing as of this writing. The war has reached an inflection point and Israel has distinct options on how to proceed.

Date Originally Written:   March 15, 2024.

Date Originally Published:  March 25, 2024.

Author and / or Article Point of View:  The author of the article is an academic with research specialties in Middle Eastern security and military history, irregular warfare, and military operations. He has an academic background in military history and experience working with multiple national militaries and government agencies. Since October 2023, he has researched the ongoing war between Israel and Hamas and taken part in discussion of tactics and operations. The author agrees with perspectives expressed by various senior U.S. Government officials that Hamas must be defeated.

Background:  Following the Hamas attacks and atrocities of October 7, 2023, Israel began an offensive into Gaza. The purpose of Israel’s campaign was threefold: gain the return of the hostages; prevent Gaza from being the launch pad for future major attacks like those of the 7th; and degrade Hamas to the point where it could neither govern Gaza in the future nor operate in a large-scale organized capacity. This last objective is most often summarized as destroying Hamas. The initial phase of the war went well for Israel, the Israel Defense Forces (IDF) destroyed two out of Hamas’s five regional brigades and began operating in Khan Yunis against the third, which they have largely defeated. Hamas has concentrated the majority of its remaining Gazan leadership, hostages, and capabilities in Rafah and an invasion of Rafah was the next phase in the IDF plan[1]. However, Egypt has closed its border to Gazan refugees[2]. As a result of the ongoing war and the closed border, the humanitarian situation in Gaza has worsened. This humanitarian situation, combined with domestic pressure, has led the U.S. to warn Israel away from major ground operations in Rafah and to tell Israel to consider other options[3].

Significance:  With concentration of civilians in Rafah, the last remaining Hamas stronghold, and growing U.S. pressure, Israel’s ability to accomplish its goals is now under question. Failure to defeat of Hamas will potentially have far reaching consequences such as emboldening Hamas and other Iranian backed actors like Hezbollah to conduct further large-scale attacks.

Option #1:  Israel invades Rafah.

The shortest way for Israel to achieve its objectives is through Rafah. To achieve this efficiently Israel will need to bring more forces back into Gaza, possibly recalling reservists. This option allows Israel to finish off Hamas’s governing organization within Gaza and fully occupy the territory. If Israel were to succeed in this operation, they would also overrun many of the areas where Hamas is holding its remaining hostages[4]. Based on Hamas’s previous behavior, a successful Israeli offensive has the potential to bring Hamas to the negotiating table and may motivate them to trade hostages in exchange for a delay to the offensive[5]. Israel’s operations to date have demonstrated the military capability to successfully conduct the incursion and such an operation has significant popular support in Israel[6].

Risk:  A major incursion into Rafah risks significant civilian harm. With the Egyptian border closed, the civilians of Gaza who fled the fighting elsewhere in the strip are concentrated in and around Rafah. While Israel may take steps to evacuate them, a significant civilian population will likely remain in harm’s way. Beyond the all too real threat of civilian casualties, U.S. President Joseph R. Biden has indicated that such an operation might be a red line for him[7]. Thus, a major incursion into Gaza could risk Israel’s relationship with its most important strategic partner. This, in and of itself, constitutes a significant risk as the U.S. provides critical supplies to Israel and protects it from potential harm, up to and including sanctions, in the United Nations (UN).

Gain:  An invasion of Rafah is the quickest way to end the war while achieving Israel’s objectives. It would allow Israel’s internally displaced persons to return to their homes in the south with a renewed feeling of safety. Paradoxically by shortening the war, this option could also minimize the suffering of the Palestinian population by allowing Gaza to transition to a post-war phase and reconstruction to begin. There are few other options that guarantee the destruction of Hamas as a robust and capable organization. Israel has previously eliminated Hamas leaders, but its organized military structure means that Hamas can replace its leadership[8]. Hamas’s capabilities reside in its formations. Destroying them is the surest path to achieving Israel’s objectives. No other option can guarantee this. A successful operation would also aid Israel in reestablishing deterrence. Dismantling Hamas in Gaza, regardless of the risk, would send a powerful message to other regional threats such as Hezbollah. This option would also change the risk calculus for any Iranian proxies interested in threatening the country.

Option #2:  Israel transitions to ‘Counterterrorism’ Operations.

This option has two variants. In the first, the IDF more or less maintains the status quo in Gaza, while creating room for some changes to improve the humanitarian situation. This keeps pressure on Hamas, provides more security to the southern Israeli communities, and gives Israel bargaining leverage. In the second variant Israel withdraws in whole or in part from part of Gaza, either unilaterally or as part of a temporary ceasefire, while maintaining a buffer zone on the Gaza border. In either case, whether without a ceasefire or following its expiration, Israel would continue to pursue dismantling Hamas through targeted strikes against its leadership, logistics, and critical operational nodes, while, at the same time, seeking the release or rescue of hostages. The IDF would do this by continuing raids throughout Gaza and limited operations in Rafah. Such operations would have a distinct benefit over larger operations in the international arena. There have been recent suggestions that the U.S. would accept the IDF conducting limited operations in Rafah to pursue high value targets and rescue hostages[9]. Eliminating Hamas leadership in Rafah alone, however, would be insufficient. Israel would have to continue to target Hamas’s critical infrastructure and command nodes, which would involve raids and airstrikes over a prolonged period of time – similar to the U.S. campaigns against Al-Qaeda and the Islamic State that have stretched over years. The population of Gaza would remain under threat as operations continued. In addition, much of the key leadership of Hamas lives abroad[10]. If Israel seeks to dismantle the organization, they will have to engage those targets as well. This option is further complicated by the fact that several Hamas leaders are resident in U.S. partners and allies such as Turkey and Qatar[11].  In past campaigns against terror organizations, Israel showed a willingness to conduct operations in such countries[12].

Risk:  The risk of failure is high in this option. Israel has removed significant numbers of Hamas senior leaders in the past and the organization has maintained itself due to its robust structure[13]. A failure in this case would allow Hamas to achieve its strategic goal of recovering and conducting further October 7th like attacks[14]. Additionally, the need to continue raids into Rafah and other areas of Gaza would effectively extend the war indefinitely. As demonstrated by the hostage rescue operation in Rafah in February 2024, these raids necessarily involve significant forces and potential for loss of life. As the war drags on, and Gazans continue to suffer, international pressure and domestic pressure in the U.S. could continue to build which could end even this reduced tempo of operations. Additionally, if the war is seen as inconclusive it could easily lose Israeli support as well. Finally, the need to expand operations to involve strikes in U.S. partners and allies conveys significant risk. Turkey, which shelters much of the Hamas leadership, is a North Atlantic Treaty Organization member. Carrying out operations in their sovereign territory could cause significant blowback.

Gain:  A ‘counterterrorism’ operation would allow Israel to continue to pursue Hamas in a manner that the U.S. has said is acceptable[15]. This option would help shore up a critical strategic partnership for Israel. In the past when Israel has successfully all but destroyed a terrorist group it has done so through this method. The example of the campaign against the Black September Organization is particularly relevant[16]. The global and indefinite nature of this option provides the most potential to completely destroy Hamas as an organization not just as the governing entity of Gaza. Knowing that hosting Hamas assets may put their countries at risk could also change the stance towards Hamas of countries like Qatar. In short, this option has the potential to achieve Israel’s objective while lowering the amount of forces Israel has to employ, lowering the human and logistical cost to Israel, and potentially sparing the Palestinian people in Gaza from the destruction and loss of life caused by a renewed ground offensive into Rafah.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Jacob Stoil and John Spencer. “The Road to Ceasefire Leads Through the Refah Offensive.” Newsweek, Mar 11, 2024 https://www.newsweek.com/road-ceasefire-leads-through-rafah-offensive-opinion-1878137 

[2] Myre, G., & Batrawy, A. (2024, February 26). Why Egypt won’t allow vulnerable Palestinians across its border. NPR. https://www.npr.org/2024/02/26/1232826942/rafah-gaza-palestinians-egypt-border 

[3] “Biden Warns Netanyahu an Assault on Rafah would Cross a Red Line.” Wall Street Journal. https://www.wsj.com/world/middle-east/biden-warns-netanyahu-an-assault-on-rafah-would-cross-red-line-c78677ba  

[4] Bob, Y. J. (n.d.). IDF finds no hostages in Khan Yunis: Where is Hamas Hiding Them?. The Jerusalem Post | JPost.com. https://www.jpost.com/israel-hamas-war/article-788164 

[5] Jacob Stoil and John Spencer. “The Road to Ceasefire Leads Through the Refah Offensive.” Newsweek, Mar 11, 2024 https://www.newsweek.com/road-ceasefire-leads-through-rafah-offensive-opinion-1878137

[6] Times of Israel. (n.d.-b). Poll: 75% of Jewish Israelis back Rafah Operation | the times of … https://www.timesofisrael.com/liveblog_entry/poll-75-of-jewish-israelis-back-rafah-operation/   

[7] “Biden Warns Netanyahu an Assault on Rafah would Cross a Red Line.” Wall Street Journal. https://www.wsj.com/world/middle-east/biden-warns-netanyahu-an-assault-on-rafah-would-cross-red-line-c78677ba  

[8] Ahmed Jabari: The Ruthless Terror Chief whose Bloody End was Only … (n.d.-a). https://www.timesofisrael.com/ahmad-jabari-1960-2012/; Bennet, J. (2004, March 22). Leader of Hamas killed by missile in Israeli strike. The New York Times. https://www.nytimes.com/2004/03/22/world/leader-of-hamas-killed-by-missile-in-israeli-strike.html; Guardian News and Media. (2004, April 18). Israeli missile attack kills new Hamas chief. The Guardian. https://www.theguardian.com/world/2004/apr/18/israel 

[9] US would support limited, pinpoint IDF op against high-value targets … (n.d.-d). https://www.timesofisrael.com/us-would-support-limited-pinpoint-idf-op-against-high-value-targets-in-rafah-report/  

[10] 8 Hamas, “Islamic Jihad” leaders leave Gaza to live abroad. Awsat. (n.d.). https://english.aawsat.com/home/article/3414056/8-hamas-islamic-jihad-leaders-leave-gaza-live-abroad  

[11] Robbins, E. (2024, January 13). While Gazans suffer, Hamas leaders live in luxury . FDD. https://www.fdd.org/analysis/2024/01/13/while-gazans-suffer-hamas-leaders-live-in-luxury/  

[12] France 24. (2022, September 2). “Wrath of God”: Israel’s Response to 1972 Munich Massacre. https://www.france24.com/en/live-news/20220902-wrath-of-god-israel-s-response-to-1972-munich-massacre  

[13] NBC Universal News Group. (n.d.). Israel has a long track record of assassinating its enemies. Will it work against Hamas?. NBCNews.com. https://www.nbcnews.com/news/world/israel-mossad-assassinates-enemies-munich-olympics-hamas-rcna132908  

[14] Middle East Media Research Institute. (2023, November 1). Hamas official Ghazi Hamad: We will repeat the October 7 attack, Time and again, until Israel is annihilated; we are victims – everything we do is justified. MEMRI. https://www.memri.org/reports/hamas-official-ghazi-hamad-we-will-repeat-october-7-attack-time-and-again-until-israel 

[15] The US privately told Israel the kind of Rafah campaign it … (n.d.-c). https://www.politico.com/news/2024/03/13/us-would-back-a-limited-military-campaign-in-rafah-00146827 

[16] France 24. (2022, September 2). “Wrath of God”: Israel’s Response to 1972 Munich Massacre. https://www.france24.com/en/live-news/20220902-wrath-of-god-israel-s-response-to-1972-munich-massacre  

Dr. Jacob Stoil Hamas Israel Option Papers Violent Extremism

Options for Japan to Strengthen its Energy Security Through Alternatives to Middle East Oil

Iku Tsujihiro is an MA candidate in the Security Studies Program (SSP) at the School of Foreign Service, Georgetown University. She focuses on the U.S.-Japan economic and energy security alliance, U.S. military operations in the Indo-Pacific, and nuclear deterrence in Northeast Asia. Currently, she is a research intern for Hudson Institutes Japan Chair Policy Center. She is selected to be on the Center for Strategic and International Studies Nuclear Scholars Initiative (NSI) Fellowship. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Japan’s energy requirements are critical dependencies which could become vulnerabilities.

Date Originally Written: February 7, 2024.

Date Originally Published:  March 18, 2024.

Author and / or Article Point of View:  The author believes that the Japanese government should act quickly to reopen Japan’s nuclear power plants to sustain energy affordability and strengthen energy security. 

Background:  On October 7, 2023, the war between Israel and Hamas broke out. Within two weeks of the war, the price of oil per barrel increased 7%[1]. If a large-scale oil disruption were to happen due to the war, or greater turmoil in the Middle East, the global oil supply could shrink to 6 to 8 million barrels per day, inflating the price up to $157 a barrel. Japan imports 80-90% of its oil from the Middle East[2]. The conflict between Israel and Hamas exposed the fragility of the Japanese energy security and oil supply chain. Without alternative oil suppliers outside of the Middle East, Japan’s energy security is at risk. 

Significance:  The conflict in the Middle East poses a great threat to the Japanese energy security due to Japan heavily importing oil from the Middle East. Japan lacks natural resources and domestic production to establish stable energy security. Prior to 2011, Japan generated 30% of its electricity from nuclear power plants[3]. However, the Fukushima nuclear power plant accidents following the major earthquakes and tsunami reversed the nuclear powerplant investment effort of the Japanese government. After Fukushima, Japan shut down many nuclear power plants, resulting in dependency on other energy sources, such as oil. In 2022, Japan consumed around 3.5 million barrels per day, which made up about 40% of the total energy supply[4].

Option #1:  Japan currently imports 30% of its oil from Asia Pacific countries including South Korea, Australia, Singapore, and others[5]. Japan can increase imports of oil from Indonesia, Malaysia, Thailand as they are the top oil producers in the region. These countries can produce about 1.75 million barrels of oil per day[6]. This is the region Japan can turn to, if interested in diversifying the supply chain of oil. 

Risk:  One of the major risks for this option is Japan not getting the oil it needs from these countries.  Due to the doubling of Southeast Asian economies since 2020, the domestic demand for oil has been increasing 3% every year[7]. For this reason, these countries could be less inclined to export domestically produced oil to other countries. 

Gain:   In addition to the benefit of mitigating the supply chain risk, Japan has interests in promoting partnerships with Southeast Asia for various reasons including infrastructure projects and deterring China’s influence in the region. Japan can further increase its presence and influence in the region by creating stronger economic relationships through oil imports, which would benefit Japan and Southeast Asian partnerships in other areas. 

Option #2:   To replace and make up for some energy produced by the oil imported from the Middle East, the Japanese government can continue to invest in nuclear energy. More than ten years passed since the nuclear power plant incident in Fukushima. The Japanese government has slowly but steadily moved towards restoring nuclear energy. After the incident, all the nuclear power plants operations were halted. Tokyo Electric Power Company applied for 27 of the power plants to pass the safety tests. 17 of them passed the tests; however, only 10 of which are now operating[8]. The Japanese government can allow the 17 power plants that passed the test to operate. Japan also recently adopted a new policy on nuclear reactors, which prolongs the nuclear reactors’ longevity to over 60 years limit[9]. This prolonging is implemented to encourage the rebooting of the remaining power plants and to buy some time while the government develops new generation reactors. 

Risk:  The downside of this option is the anti-nuclear sentiment that remains in the Japanese public. The 2011 incident implanted fear in people’s hearts about nuclear power plants accidents causing radioactive pollution. Even though good regulations can promote safe use of nuclear energy, the Japanese public is still unwilling to reopen some power plants[10]. Moreover, it would be difficult to convince some cities or towns to host additional nuclear power plants even if the government desired to construct new ones. 

Gain:  This option can achieve Japan’s carbon neutrality goal of 2050 and reduce 46% greenhouse gas emission by 2030. Additionally, as a part of the Green Growth Strategy, Japan has decided to invest $15 billion in green projects. In terms of strategic competition, the Japanese government can invest more in nuclear energy rather than the renewable energy such as wind, solar, hydropower, since renewable energy is heavily reliant on the Chinese market[11]. As Japan attempts to decouple from and decrease its reliance on Chinese economy, nuclear energy is a strategic option. Plus, domestic production of energy will reduce Japanese dependence on the global energy. Furthermore, nuclear energy will decrease the current energy price which the average households are struggling to abide by[12].

Other Comments:  Both options may also be pursued simultaneously.  Japan could secure oil from countries closer to it and more stable than the Middle East, which will provide the time Japan needs until its existing nuclear reactors can be restarted and additional nuclear reactors built.

Recommendation:  None.


Endnotes:

[1] Gill, I., & Kose, M. A. (2023b, October 31). The Middle East conflict is threatening to cripple a fragile global economy. Brookings. https://www.brookings.edu/articles/the-middle-east-conflict-is-threatening-to-cripple-a-fragile-global-economy/

[2] International Energy Agency. (2022, August 18). Japan Oil Security Policy – analysis. IEA 50. https://www.iea.org/articles/japan-oil-security-policy  

[3] World Nuclear Association. (n.d.). Nuclear Power in Japan. Nuclear Power in Japan | Japanese Nuclear Energy. https://world-nuclear.org/information-library/country-profiles/countries-g-n/japan-nuclear-power.aspx

[4] U.S. Energy Information Administration. (n.d.). Japan. U.S. Energy Information Administration – EIA – independent statistics and analysis. https://www.eia.gov/international/analysis/country/JPN

[5] Ibid. 

[6] Carpenter, J. W. (n.d.). The biggest oil producers in Asia. Investopedia. https://www.investopedia.com/articles/markets/100515/biggest-oil-producers-asia.asp

[7] International Energy Agency. (n.d.). Key findings – southeast asia energy outlook 2022 – analysis. IEA. https://www.iea.org/reports/southeast-asia-energy-outlook-2022/key-findings 

[8] Yamaguchi, M. (2022, December 22). Japan adopts plan to maximize nuclear energy, in major shift. AP News. https://apnews.com/article/russia-ukraine-business-japan-climate-and-environment-02d0b9dfecc8cdc197d217b3029c5898 

[9] Ibid.

[10] World Nuclear Association, “Nuclear Power in Japan.”

[11] Russel, C. (2024, January 11). China dominates renewable energy and coal power forecasts. Reuters. https://www.reuters.com/business/energy/china-dominates-renewable-energy-coal-power-forecasts-russell-2024-01-11/ 

[12] Obayashi, Y. (2023, May 6). Japan approves energy firms’ household power price hike | Reuters. Reuters. https://www.reuters.com/world/asia-pacific/japan-approves-energy-firms-household-power-price-hike-2023-05-16/ 

Energy Iku Tsujihiro Japan Middle East Option Papers Risk Assessment

U.S. Options for a Potential Invasion of Taiwan by the People’s Republic of China

Scott Haysom has a PhD in Political Science (International Relations) and specialises in Chinese and Russian foreign policy. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  U.S. Options for a Potential Invasion of Taiwan by the People’s Republic of China

National Security Situation:  The People’s Republic of China is organizing, training, and equipping its military to invade Taiwan.

Date Originally Written:  February 4,  2024.

Date Originally Published:  March 11, 2024.

Author and / or Article Point of View:  The author believes in responsibilities to protect and the adherence to international laws.

Background:  In 1972 the United States (U.S.) acknowledged that Chinese on either side of the Taiwan Strait maintain that there is one China, and that Taiwan is part of China. The question of who the sole representative of the Chinese people is the primary contentious issue between the People’s Republic of China (PRC) and Taiwan. The PRC views Taiwan as an integral part of the PRC. The growing concern is that the PRC will resort to the use of force to reunite Taiwan with mainland China, and their growing assertiveness in rhetoric and military actions lends credence to this concern. The driving force of this concern is that the Taiwan issue bears on China’s view of reunification and long-term development[1], linking this issue to Chinese nationalism. Both sides of the Taiwan Strait belong to a community with a shared history[2]. This shared history links the Taiwan issue to that of the primordial and ethno-symbolist concept of nationalism, complicating any resolution as the PRC views it as an internal matter.

Significance:  While a military confrontation in the Taiwan strait is neither imminent nor inevitable, the U.S. and the PRC are drifting towards a war over Taiwan[3]. This national security situation for the U.S. matters for numerous reasons. First, Taiwan is in a strategically critical area, the island sits at the crossroads of Northeast and Southeast Asia. Second, Taiwan is the 23rd largest economy in the world by Gross Domestic Product (GDP) and its industries are integrated into regional and global supply chains[4]. The Taiwan Strait is a key shipping route, with 88% of the world’s largest ships by tonnage, and almost half the global container fleet passing through it[5]. Third, if the PRC were to invade Taiwan this would lead to a heightened sense of economic and political insecurity among some ASEAN nations. Fourth, the U.S. security and economic interests in East Asia and the greater Asia-Pacific would be threatened. If China were to annex Taiwan and station its military on the island, it would be able to limit U.S. military operations in the region and hamper the U.S. ability to defend its allies[6]. Fifth, the international rules-based system that the U.S. established at the end of the Second World War and has worked so tirelessly to maintain could be undermined by an invasion of Taiwan. Finally, a PRC invasion of Taiwan would destroy global trade[7]. Taking these factors into consideration, an invasion of Taiwan would be detrimental politically and economically to the peace, security and stability of the region, weaken the U.S position in the region, and impact regional and global trade. To counter this, U.S. policy needs to evolve to contend with a more capable, assertive, and risk acceptant PRC that is increasingly dissatisfied with the status quo[8].

Option #1:  The U.S. increases its military presence in Taiwan and the Northeast and Southeast Asian region by sending more troops, deploying more naval patrol and combat vessels, and exporting more high-tech weapons.

Risk:  There are several potential risks of increasing U.S. military presence in Taiwan and the Northeast and Southeast Asian region. First, if the U.S. intensifies its efforts to support Taiwan, it risks further damaging their relationship with the PRC and hamstringing its ability to advance U.S. interests on a wider range of issues from arms control to climate change[9]. Second, increasing the U.S. military presence in Taiwan could trigger PRC responses in the form of economic warfare and military exercises that would create a headache for Taiwan[10]. Finally, an increased U.S military presence runs the risk of increased military encounters between the U.S. and the PRC which could lead to an accidental engagement, triggering a conflict between the two powers.

Gain:  The gain from considering “Option 1” is that this would send a clear message to the PRC, and the U.S allies, that the U.S is willing to support and defend its interests in the region. By sending more troops, naval vessels, and high-tech weaponry to the region the U.S. will counter the PRC’s military build-up and potentially deter them from any future aggression towards Taiwan.

Option #2:  The U.S. assists Taiwan in reducing its economic ties with the PRC.

Risk:  If the U.S decided to assist Taiwan in reducing its economic ties with the PRC, as noted above, the risk is that this could trigger the PRC to respond in the form of economic warfare and increased military exercises. The PRC could also decide to blockade Taiwan preventing the island nation from trading. As a maritime blockade is the most strategically viable action for the PRC[11], this would be a risky proposition for the U.S. as they would have to intervene militarily to break the blockade risking an all-out military confrontation with the PRC. 

Gain:  The gain from considering Option #2 is that this would reduce Taiwan’s economic ties and dependence with the PRC leaving the island less vulnerable to economic coercion by the PRC. As noted above, this also sends a clear message to the PRC, that the U.S is willing to support and defend its interests in the region both militarily and through economic means. 

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] The State Council of the People’s Republic of China (2015). China’s White Paper on China’s Military Strategy 2015. English.gov.cn. [Online]. Retrieved on 4 February 2024. https://english.www.gov.cn/archive/white_paper/2015/05/27/content/281475115610833.htm

[2] Zhong, S. (2019). U.S attempts to play off Taiwan against China will be in vain. People’s Daily. China. Article. [Online] Retrieved on 4 February 2024. https://en.people.cn/n3/2019/0712/c90000-9596665.html 

[3] Gordon, S. Mullen, M. & Sacks, D. (2023). To prevent a war over Taiwan, a bolder strategy is needed. Time. Time Ideas. Article. [Online] Retrieved on 7 February 2024. https://time.com/6290300/prevent-a-war-over-taiwan-us-neede-bolder-strategy/

[4] Chubb, A. (2023). Taiwan Contingencies and Southeast Asia: Scenarios in the Grey Zone. Fulcrum. Analysis of Southeast Asia. Article. [Online] Retrieved on 5 February 2024. https://fulcrum.sg/taiwan-contingencies-and-southeast-asia-scenarios-in-the-grey-zone/

[5] Zeng Xiaojun, K. (2022). East Asia: Impact of China and Taiwan conflict on Shipping. Risk Intelligence. Analyst Briefings. Intelligence Report. [Online] Retrieved on 5 February 2024. https://riskintelligence.eu/analyst-briefings/east-asia-impact-of-china-taiwan-conflict

[6] “See Endnote 3”.

[7] Wintour, P. (2023). If China invaded Taiwan it would destroy world trade, says James Cleverly. The Guardian Newspaper. Article. [Online]. Retrieved on 4 February 2024. https://theguardian.com/world/2023/apr/25/if-china-invaded-taiwan-it-would-destroy-world-trade-says-james-cleverly

[8] “See Endnote 3”.

[9] Larison, D. (2023). Why sending more U.S Military troops to Taiwan is so risky. Responsible Statecraft. Analysis/Asia-Pacific. Article. [Online] Retrieved on 7 February 2024. https://responsiblestatecraft.org/2023/02/28/more-overt-us-support-for-taiwan-is-fraught-with-risk

[10] Ibid.

[11] Jestrab, M. (2023). A Maritime Blockade of Taiwan by the People’s Republic of China: A Strategy to defeat fear and coercion. Atlantic Council. Report. https://atlanticcouncil.org/content-series/atlantic-council-paper-series/a-maritime-blockade-of-taiwan-by-the-peoples-republic-of-china-a-strategy-to-defeat-fear-and-coercion 

China (People's Republic of China) Option Papers Scott Haysom Taiwan United States

Advising the Next President of the United States: Options for Countering Russian Disinformation

Lewis R. Grant holds a Master of Science in Biodefense from George Mason University’s Schar School of Policy and Government. His research focused on the Russian Federation’s biosecurity and biodefense modernization activities. He was recently published in the Journal of Science Policy and Governance and has an accepted manuscript with Health Security pending publication. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Due to U.S. inaction, Russia continues to wage an informational war to erode democratic institutions, ideologies, and norms.

Date Originally Written:  February 10, 2024. 

Date Originally Published:  February 26, 2024.

Author and / or Article Point of View:  The author believes Russia’s disinformation campaigns and other malign influence operations pose a significant threat to U.S. national security. The article is written from the point of view of providing written options to the U.S. President to address Russian disinformation campaigns. 

Background:  Aktivnyye meropriyatiya – or “active measures” – have long been one of the Kremlin’s most essential, far-reaching weapons in its fight against Western democracies[1]. Disinformation is a pillar of this strategy. The Kremlin’s disinformation campaigns follow five overarching themes: 1) Russia is a victim, 2) historical revisionism, 3) western civilization will collapse imminently, 4) popular movements are U.S.-sponsored, and 5) Flooding the information space with differing narratives to confuse the facts[2].

Significance:  Russia’s active measures threaten multiple national and global security aspects. Moscow’s disinformation campaigns interfere with U.S. elections, inflame domestic and global political tensions, adversely affect U.S. efforts to increase international biosecurity, biosafety, and global health, weaken global nonproliferation norms, and undermine the authority and legitimacy of international treaties and legal bodies[3][4][5].

Option #1:  The U.S. establishes a Public Information Agency (PIA) to develop and coordinate Public-Private Partnerships to counter Russian disinformation.

Risk:  U.S. government partnerships with private media may be interpreted as an infringement on free speech. This interpretation becomes especially concerning when U.S. citizens are sharing or posting disinformation content[6]. Political controversy could embroil the PIA, adversely impacting its legitimacy, funding, and efficacy. In addition, public skepticism combined with the prevalence of misinformation and disinformation on social media may render Option #1 less effective. A new agency will also require Congressional approval and significant new and continued funding. 

Gain:  Partners of the PIA will be better able to identify, counter, and remove disinformation from their platforms. Joint educational efforts of the PIA and private partners will increase informational literacy among consumers, promoting resilience against disinformation operations[6][7]. Option #1 gives private sector partners access to regular and timely analysis and information regarding foreign malign influence operations, including disinformation. The PIA will also represent a single point of contact for private partners to engage with, increasing the efficiency of communications and ensuring that information is disseminated clearly and concisely. 

Option #2:  The U.S. reestablishes an expanded Active Measures Working Group within the Foreign Malign Influence Center (FMIC) at the Office of the Director of National Intelligence.

Risk:  The Active Measures Working Group’s (AMWG) influence and legitimacy will likely fluctuate with election cycles, depending on the political legitimacy the President awards to it and the FMIC[8]. Changes in leadership at interagency partners and their influence and legitimacy may result in inconsistent operations, compromising the efficacy of the AMWG. Agency leaders and their respective agencies could lose their reputation for objectivity and independence from partisan politics in the public eye[9]. Option #2 may also stretch resources for the newly created FMIC too thin, too quickly. This option will also require the declassification and publication approvals of information necessary to the AWMG’s efforts. This declassification and prepublication requirement could result in bottlenecks at agency partners and delay AMWG efforts to be proactive and swiftly reactive to new disinformation campaigns.

Additionally, portions of the public may interpret a U.S. government effort to identify and remove Russian disinformation as an effort to infringe on free speech and backfire[8].

Gain:  A critical element that made the AMWG effective was its narrow focus[8]. The AWMG’s reestablishment would build on the success of the 1980s AMWG, which successfully countered Russian disinformation about the origins of the HIV/AIDS epidemic. Option #2 gives the U.S. a specialized team to combat Moscow’s efforts via intelligence analysis, advance warnings, and disruption of covert and overt disinformation operations. Early exposure and communication of Russia’s disinformation operations would help disrupt its spread throughout the media. The AMWG would coordinate all interagency activities to publicly expose and refute Russian disinformation between the State Department’s Global Engagement Center, the Central Intelligence Agency (CIA), the Defense Intelligence Agency, the Federal Bureau of Investigation, and the Cybersecurity and Infrastructure Security Agency. 

Option #3:  The U.S. responds in kind to Russian disinformation activities.

Risk:  U.S. covert and overt measures to disrupt Russian malign influence operations could escalate high tensions between Moscow and Washington. The Russian government’s internet supervision service, Roskomnadzor, also presents a formidable obstacle to disseminating disinformation within Russia’s “RuNet.” Roskomnadzor closely monitors the RuNet for “anti-government” activities[10]. Roskomnadzor can surveil and reveal those behind anti-government accounts and pass the information to Russian security services[10]. This identification presents significant challenges to running covert operations and assets to support opposition movements.

Offensive cyber operations aimed at Russian cyber and intelligence agencies would likely prompt counter-cyberattacks. U.S. offensive cyber operations will likely add fuel to the “Russia is a victim” disinformation theme. Option #3 will also require a reevaluation of U.S. cyber policy – an issue policymakers have been reluctant to address – and U.S. policy towards nation-states harboring parties contributing to malign influence operations[11][12].

Gain:  Moscow’s authoritarianism and control of information make it vulnerable to U.S. information campaigns[13][14]. Most Russians receive their news from state-run media sources via television, but the share of those using social media and news sites is rapidly increasing[15]. This shift to social media presents an opportunity for the U.S. to introduce information that would otherwise be restricted from the RuNet. A CIA covert action codenamed QRHELPFUL successfully aided democratic opposition movements in Poland by creating an underground media enterprise[14]. Today’s Russian government is weaker than its Soviet predecessor, and the Russian public’s trust in their government is low, indicating similar campaigns could be highly effective[13][16]. Compelling exposition and dissemination of the Kremlin’s domestic malign practices within the RuNet could increase domestic support for opposition movements, forcing Moscow to reexamine its priorities[13].

Moscow’s use of non-state parties for deniability also presents a weakness that offensive cyber operations can exploit. Since these parties are not officially Russian government entities, using offensive operations against them comes with a lower risk of escalation. Effective cyber operations will increase U.S. cyber deterrence, discouraging future disinformation campaigns and other malign interference operations[12]. 

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Disarming Disinformation: Our Shared Responsibility. (n.d.). United States Department of State. Retrieved February 1, 2024, from https://www.state.gov/disarming-disinformation/

[2] Russia’s Top Five Persistent Disinformation Narratives. (n.d.). United States Department of State. Retrieved February 8, 2024, from https://www.state.gov/russias-top-five-persistent-disinformation-narratives/

[3] Leitenberg, M. (2022, March 10). Russian nuclear and biological disinformation undermines treaties on weapons of mass destruction. Bulletin of the Atomic Scientists. https://thebulletin.org/2022/03/russian-nuclear-and-biological-disinformation-undermines-treaties-on-weapons-of-mass-destruction/

[4] Filippa Lentzos. (2018, November 19). The Russian disinformation attack that poses a biological danger. Bulletin of the Atomic Scientists. https://thebulletin.org/2018/11/the-russian-disinformation-attack-that-poses-a-biological-danger/

[5] Stowe-Thurston, A. (2022, March 22). Russia’s non-proliferation disinformation campaign. Bulletin of the Atomic Scientists. https://thebulletin.org/2022/03/russias-non-proliferation-disinformation-campaign/

[6] McGeehan, T. (2018). Countering Russian Disinformation. The US Army War College Quarterly: Parameters, 48(1). https://doi.org/10.55540/0031-1723.2850

[7] Levis, J. M., Casi Gentzel, Adela. (2021, May 10). Toward a Whole-of-Society Framework for Countering Disinformation. Modern War Institute. https://mwi.westpoint.edu/toward-a-whole-of-society-framework-for-countering-disinformation/

[8] Dhunjishah, M. (2017, July 7). COUNTERING PROPAGANDA AND DISINFORMATION: BRING BACK THE ACTIVE MEASURES WORKING GROUP? War Room – U.S. Army War College. https://warroom.armywarcollege.edu/articles/countering-propaganda-disinformation-bring-back-active-measures-working-group/

[9] David M. Tillman. (2020). Combatting Russian Active Measures. Small Wars Journal. https://smallwarsjournal.com/jrnl/art/combatting-russian-active-measures

[10] Mozur, P., Satariano, A., Krolik, A., & Aufrichtig, A. (2022, September 22). ‘They Are Watching’: Inside Russia’s Vast Surveillance State. The New York Times. https://www.nytimes.com/interactive/2022/09/22/technology/russia-putin-surveillance-spying.html

[11] Joseph S. Nye. (2021, July 8). Will Biden’s red lines change Russia’s behaviour in cyberspace? Australian Strategic Policy Institute | The Strategist. https://www.aspistrategist.org.au/will-bidens-red-lines-change-russias-behaviour-in-cyberspace/

[12] LCDR Stephanie Pendino, MAJ Robert K. Jahn, Sr., & Kirk Pedersen. (2022, September 7). U.S. Cyber Deterrence: Bringing Offensive Capabilities into the Light. Joint Forces Staff College. https://jfsc.ndu.edu/Media/Campaigning-Journals/Academic-Journals-View/Article/3149856/us-cyber-deterrence-bringing-offensive-capabilities-into-the-light/https%3A%2F%2Fjfsc.ndu.edu%2FMedia%2FCampaigning-Journals%2FAcademic-Journals-View%2FArticle%2F3149856%2Fus-cyber-deterrence-bringing-offensive-capabilities-into-the-light%2F

[13] Jones, S. G. (2021). Three Dangerous Men: Russia, China, Iran and the Rise of Irregular Warfare. W. W. Norton & Company.

[14] Jones, S. G., Reagan, A. from A. C. A., Cia, T., & Jones,  and the C. W. S. in P. by S. G. (2018). Going on the Offensive: A U.S. Strategy to Combat Russian Information Warfare. https://www.csis.org/analysis/going-offensive-us-strategy-combat-russian-information-warfare

[15] Parsons, L. (2022, March 14). How Russians see Russia. Harvard Gazette. https://news.harvard.edu/gazette/story/2022/03/how-russians-see-russia/

[16] Рейтинги января 2024 года: Оценка положения дел в стране, одобрение институтов, доверие политикам и рейтинги партий. (2024, February 1). https://www.levada.ru/2024/02/01/rejtingi-yanvarya-2024-goda-otsenka-polozheniya-del-v-strane-odobrenie-institutov-doverie-politikam-i-rejtingi-partij/

Cyberspace Influence Operations Journalism / The Press Lewis R. Grant Option Papers Political Warfare Psychological Factors Russia Social Media Soviet Union United States

The New Memorandum of Understanding to Ensure a Qualitative Military Edge for Israel in 2028

Dr. Kobby Barda is an expert on geopolitical analysis, with a particular focus on U.S.-Israel relations. He holds a senior research fellowship at the University of Haifa and has previously served as the head of the “Gal Program” for Political Leadership in Israel.  Find him on X @kobbybarda.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  In 2028, the U.S.-Israel Memorandum of Understanding (MOU) expires.

Date Originally Written:  February 1, 2024.

Date Originally Published:  February 19, 2024.

Author and / or Article Point of View:   The author is a leading Israeli geopolitical analyst with extensive experience in American political history and U.S.-Israel relations. 

Background:  The Qualitative Military Edge (QME)  refers to a concept in U.S. foreign policy, particularly regarding the U.S.-Israel relationship[1]. This concept aims to ensure Israel maintains military superiority over its neighbors. This superiority stems from technological and tactical advancements that allow Israel to deter its numerically larger adversaries. The concept is enshrined in U.S. law and considered crucial for regional stability and peace[2].   Currently, the U.S. and Israel operate under a ten-year MOU signed in 2016 regarding military assistance[3]. This agreement, effective until 2028, furnishes substantial financial aid and enables advanced technology transfers, inherently contributing to Israel’s QME. However, the evolving Middle Eastern landscape necessitates a nuanced approach.

Significance:  The current MOU allocates approximately $3.8 billion in aid annually, reinforcing a close  relationship between Israel and the U.S. Yet, amidst the U.S. downsizing its presence in the Middle East and the growing nuclear capabilities of nations like Iran, the need for Israel to maintain the upper hand becomes imperative. To ensure QME continues, the next MOU needs to address emerging geopolitical challenges the dynamic security environment in 2028. 

Option #1:  The U.S. signs a new MOU with Israel that addresses the evolving security environment in the Middle East.

Bolstering the U.S.-Israel alliance through a new MOU isn’t just about regional security; it’s a strategic investment in America’s national interests.  This new MOU would incorporate provisions for flexible funding allocations, allowing Israel to respond swiftly to emerging threats. Additionally, this option would enhance cooperation in intelligence-sharing and cybersecurity which could bolster Israel’s capabilities in countering evolving threats, such as cyber warfare and asymmetric warfare tactics employed by non-state actors.

Moreover, given the growing nuclear capabilities of nations like Iran and the uncertainty surrounding regional stability, this new MOU could prioritize strengthening Israel’s defensive capabilities against potential ballistic missile threats and asymmetric attacks. This option may involve expanding joint research and development initiatives to develop cutting-edge defense technologies tailored to address specific regional challenges.

Risk:  The new MOU could drive an arms race and serve as a potential obstacle to various peace process. This option, and the additional capabilities it provides to Israel, could also motivate Israel’s enemies to adapt and develop countermeasures not currently envisioned.

Gain:  Israel’s QME, reinforced by the MOU, serves as a powerful deterrent against regional threats like Iran’s nuclear program or Hezbollah’s aggression, benefiting both Israel and U.S. security interests in the Middle East.  Greater intelligence sharing enhances U.S.-Israel collaboration on threats in the region.  As the new MOU will require Israel to purchase most of its aid from U.S. defense contractors, jobs creation in the U.S. will follow.

The new MOU will ensure a strong and stable Israel that promotes regional stability, fostering economic opportunities and deterring conflicts that could disrupt global energy markets and create breeding grounds for extremism. This directly advances U.S. economic and security interests.  Ensuring Israel’s QME will enable Israel to remain a beacon of democracy and shared values in a challenging region.

Option #2:  The U.S. does not sign a new MOU with Israel. 

The decision to abstain from signing a new QME agreement with Israel demands thorough evaluation, considering implications for regional stability, international relations, and U.S. interests.

Risk:  Israel’s QME serves as a crucial deterrent against regional adversaries, and not renewing the agreement could jeopardize Israel’s security and embolden its opponents[4].  A decision not to renew the agreement could strain the long-standing alliance between the U.S. and Israel, impacting intelligence sharing, military cooperation, and regional influence.  Political pressure from pro-Israel groups and concerns about the impact on the American defense industry could weigh heavily in the decision-making process.  Without the leverage associated with financial aid, the U.S. might have less ability to directly influence Israeli policies on specific issues.

Gain:  Withholding additional military support to Israel may prevent a potential arms race in the Middle East, alleviating regional tensions.  Shifting away from military-centric approaches could incentivize diplomatic resolutions, fostering enduring peace.  Directing resources towards collaborative efforts in technology, economic development, and environmental protection may nurture trust and cooperation, fostering a more balanced international landscape.  Diverting resources from an expanded QME to Israel allows the United States to prioritize pressing domestic needs. Investing in infrastructure, healthcare, education, and social programs enhances the well-being of American citizens, addressing critical issues within the nation and reinforcing its internal strength and resilience.

Other Comments:  Beyond the points initially discussed, several key elements demand deeper scrutiny when examining the potential impact of U.S. aid on Israel’s QME and regional stability:

How will sustained or reduced aid affect regional power balances and the potential for future conflicts decades in the future?

Gauging public opinion, both in the U.S. and Israel, regarding the merits and drawbacks of continued aid is crucial.

Examining public anxieties about potential misuse of funds and human rights implications requires careful consideration.

Exploring alternative approaches to regional security that go beyond solely relying on military strength is of value.

Can continued U.S. support for Israel’s QME coexist with progress towards a meaningful peace process?

Recommendation:  None


Endnotes:

[1] Sharp, Jeremy M.(2009, Dec. 4),  U.S. Foreign Aid to Israel, Congressional Research Service.  https://books.google.co.il/books?id=kyI7nn6jGPMC&newbks=1&newbks_redir=0&printsec=frontcover&dq=The+Qualitative+Military+Edge+refers+to+a+concept+in+US+foreign+policy,+particularly+regarding+the+US-Israel+relationship&hl=en&redir_esc=y#v=onepage&q&f=false

[2] Naval Vessel Transfer Act of 2008. https://www.congress.gov/112/statute/STATUTE-126/STATUTE-126-Pg1146.pdf

[3] 2016, September 14, FACT SHEET: Memorandum of Understanding Reached with Israel, The White House. https://obamawhitehouse.archives.gov/the-press-office/2016/09/14/fact-sheet-memorandum-understanding-reached-israel 

[4] 2020, December 16,  Dangerous Conditions: The Case Against Threatening Israel’s Qualitative Military Edge, jinsa.org. https://jinsa.org/jinsa_report/dangerous-conditions-the-case-against-threatening-israels-qualitative-military-edge/ 

Capacity / Capability Enhancement Dr. Kobby Barda Governing Documents and Ideas Israel Option Papers Policy and Strategy United States

Options to Address Democratic People’s Republic of Korea’s Increasingly Hostile Ballistic Missile Tests Towards Japan

Iku Tsujihiro is an MA candidate in the Security Studies Program (SSP) at the School of Foreign Service, Georgetown University. She focuses on the U.S.-Japan economic and energy security alliance, U.S. military operations in the Indo-Pacific, and nuclear deterrence in Northeast Asia. Currently, she is a research intern for Hudson Institutes Japan Chair Policy Center. She is selected to be on the Center for Strategic and International Studies Nuclear Scholars Initiative (NSI) Fellowship. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Democratic People’s Republic of Korea’s (DPRK) has grown increasingly hostile towards Japan via its ballistic missile tests.

Date Originally Written:  December 19th, 2023.

Date Originally Published:  February 12, 2024.

Author and / or Article Point of View:  The author believes that while U.S. nuclear umbrella guarantees towards Japan remain untested; however, the DPRK continued proliferation and refinement of ballistic missile and nuclear missile technology indicate that the U.S. nuclear policy in Northeast Asia may be outdated.

Background:  The DPRK has been increasingly provocative with its ballistic missile tests toward Japan’s Exclusive Economic Zone under Kim Jong-Un’s regime compared to Kim Jong Il. In 2022 only, the DPRK launched its ballistic missiles towards Japan more than 60 times[1]. Meanwhile, under Kim Jong-Il’s leadership, DPRK tested its ballistic missile capabilities only 16 times and nuclear weapons twice[2]. 

Although no DPRK missiles have struck Japanese territory yet, the Japanese public is increasingly aware and concerned over the threat.  This concern is best reflected in increased frequency in government and news alerts regarding the potential danger of DPRK missiles falling on Japanese territory. The most recent incident occurred on December 18, 2023, in which the DPRK launched an Intercontinental Ballistic Missile (ICBM) in a “lofted orbit” trajectory. The fastest speed of the ICBM was estimated to be up to 6000km/h. Deterring the DPRK’s expanding missile capabilities is Japan’s one of top priorities as it is stated in the 2023 version of Japan’s Annual White Paper[3].

Significance:  The DPRK’s missile tests toward Japan are steadily eroding the credibility of the current U.S. extended deterrence policy — U.S. nuclear umbrella over Japan — which assure U.S. retaliation against any country that attacks Japan with a nuclear weapon. The Japanese public is increasingly skeptical of the credibility of U.S. nuclear umbrella, both in terms of willingness and capability[4]. The U.S. requires new and appropriate alternatives to its current U.S. extended deterrence approach and nuclear umbrella to assure the credibility of the extended deterrence in Japan. This credibility relies heavily on public perception and trusts. 

Option 1:  The United States engages in North Atlantic Treaty Organization-style nuclear sharing with Japan.

With advancements in the DPRK’s missile program and the escalating pattern of DPRK provocation with its recent testing, the lack of action and deafening silence by the United States are growing concerns in Japan. Some senior Japanese lawmakers have been considering alternatives, such as nuclear sharing. Nuclear sharing is when the United States deploys and stations B-61 (tactical nuclear weapons) on its allies’ land while maintaining full control and custody of the weapons[5]. This perspective originated from former Japanese Prime Minister Shinzo Abe, who stated nuclear sharing is necessary for nuclear deterrence against nuclear countries like the DPRK and China after witnessing the Russian invasion of Ukraine[6]. 

Risk:  As the Republic of Korea (ROK) has been more public with its growing doubt of U.S. extended deterrence, the ROK would demand the same U.S. nuclear sharing that Japan receives under this option[7].  This demand would encourage further proliferation to non-nuclear weapon states and potentially escalate the security tension in the Indo-Pacific. The adversaries may increase their nuclear build-up in return, escalating arms race. 

Gain:  Nuclear sharing will reassure the Japanese public and politicians who are skeptical about the current U.S. extended deterrence method. Since the credibility of nuclear deterrence heavily relies on public perceptions and trusts, this option allows to bridge the gap between the Japanese and U.S. extended deterrence method. 

Option 2:  Japan and the United States establish the Washington Declaration.

In this option, the United States issues something like the U.S.-ROK Washington Declaration with Japan to display the continued trust in the alliance and defense treaties. The declaration reassures the ROK through dispelling the skepticisms of the credibility of U.S. extended deterrence and reaffirms U.S.-ROK defense commitments. Within the ROK context, this declaration also institutes a Nuclear Consultative Group, which enables the ROK to have a more powerful voice in retaliation decisions[8].

Risk:  The declaration in this option could cause negative reactions from adversaries including China, as the U.S.-ROK Washington Declaration triggered a response from the Chinese Foreign Ministry[9]. Though the declaration is less provocative than U.S. nuclear sharing to Japan, it will likely raise the tension between the U.S. allies and adversaries. Additionally, the declaration may not satisfy the crowd rooting for nuclear sharing.

Gain:  Although there are no official conversations on this option in Japan currently, the declaration can reassure Japan with its extended deterrence commitments. Moreover, the United States establishing the same declaration between the ROK and Japan could open the door for further security cooperation between the ROK and Japan, recognizing that they have a shared adversary to counter[10].

Other Comments:  In the end, public perception will play a significant role in determining the success or failure of the U.S. nuclear umbrella in the Indo-Pacific, and if the United States is not careful – its promises may fall on deaf ears. 

Recommendation:  None.


Endnotes:

[1] Fukuda, K. (2023, April 19). North Korea, a dangerous entity whose only option is nuclear weapons. Toyo Keizai. https://toyokeizai.net/articles/-/667431?display=b

[2] (2023, February). Development of Nuclear and Ballistic Missiles by North Korea. Ministry of Defense of Japan. https://www.mod.go.jp/j/surround/pdf/dprk_bm_2023.pdf 

[3] Defense of Japan 2023. Ministry of Defense. 

[4] Yoshida, S. (2019, October 20). Mixed messages on nuclear deterrence. The Japan Times. https://www.japantimes.co.jp/opinion/2019/10/20/commentary/japan-commentary/mixed-messages-nuclear-deterrence/. 

[5] (2022, February). NATO’s Nuclear Sharing Arrangements. North Atlantic Treaty Organization. 

[6] Tobita, R. (2022, March 12). Senior Japanese Lawmakers Eye “Nuclear Sharing” Option with U.S.. Nikkei Asia. https://asia.nikkei.com/Politics/Senior-Japanese-lawmakers-eye-nuclear-sharing-option-with-U.S. 

[7] Bae, M. (2019, December 19). Can South Korea and Japan Share Nuclear Weapons with the U.S.?. JoongAng Ilbo. https://japanese.joins.com/JArticle/260711?sectcode=120&servcode=100

[8] (2023, April 26). Washington Declaration. The White House. https://www.whitehouse.gov/briefing-room/statements-releases/2023/04/26/washington-declaration-2/. 

[9] Takei, T. (2024, January 19). Evaluation of the Washington Declaration and Implications for Japan. Perry World House. https://global.upenn.edu/perryworldhouse/news/evaluation-washington-declaration-and-implications-japan.

[10]  Ibid.

Iku Tsujihiro Japan North Korea (Democratic People’s Republic of Korea) Nuclear Issues Option Papers

Options for a Post-War Future for Gaza


Dr. Jacob Stoil is the Chair of Applied History at the Modern War Institute, Senior Fellow of the 40th ID Urban Warfare Center, and Trustee of the U.S. Commission on Military History. He has worked extensively in Israel and the Middle East including in support of Task Force Spartan. He has published multiple policy and academic articles which can be found in publication such as the International Journal of Military History, Wavell Room, and Modern War Institute. He can be followed on X as @JacobStoil. 

Dr. Mary Elizabeth Walters is an Assistant Professor of Military and Security Studies and Director of Military Theory at the Air Command and Staff College and Trustee for the Society for Military History. She can be found on X @mewalters101. 

Dr. Nir Arielli is an Associate Professor of International History at the University of Leeds in the United Kingdom. He is a contributor to the regional foreign policy thinktank Mitvim. His key publications can be found here: https://ahc.leeds.ac.uk/history/staff/556/dr-nir-arielli. He can also be found on X @ArielliNir. 

The views expressed in this article represent the personal views of the authors and are not necessarily the views of the Department of Defense, the Department of the Air Force, the Department of the Army, Army University, the U.S. Military Academy, or the Air University.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any other group.


National Security Situation:  Hamas’ October 7, 2023, attack on Israel has caused a state of war between Israel and Hamas, which is ongoing as of this writing.

Date Originally Written:  January 11, 2024.

Date Originally Published:  January 29, 2024. 

Author and / or Article Point of View:  The authors of the article are academics with research specialties in the transitional aspects of conflicts, Middle Eastern security, irregular warfare, and peacekeeping. They have academic backgrounds in military history and experience working with multiple national militaries and government agencies. Since October 2023, they have researched options for postwar possibilities in Gaza. The authors argue that planning and implementation for the Stabilization Phase following the fighting, known as “Phase IV” in U.S. Military Joint Doctrine, will be critical for the future security and stability of the region.

Background:  In 2005 Israel withdrew all its civilian and military personnel from Gaza. Since then, rocket and terror attacks have continued to be launched from the territory. As a result, Israel has placed significant restrictions on goods entering Gaza, while Egypt largely closed its border with Gaza. Additionally, Israel has launched several military operations into Gaza over the last 15 years. Recently, Israel pursued a policy of “quiet in return for quiet” and allowed Qatar to provide funding to Hamas, which has ruled Gaza since 2007[1]. On October 7, 2023, Hamas launched a major attack across the border, murdering Israeli civilians, taking hundreds of hostages, and engaged in systematic rape[2]. In response, Israel invaded Gaza and has fought a multi-month campaign to destroy Hamas’s capability to operate from Gaza or launch major attacks on Israel. The operation has degraded Hamas, but also destroyed significant portions of Gaza, which now faces a humanitarian crisis. As the operation changes phases, it is necessary to plan for Phase IV.

Significance:  The recent situation in Gaza has led to a cycle of violence costing thousands of lives over the last decade. The Hamas attack on October 7 and the subsequent war in Gaza have devastated both sides and have the potential to be game changing. Failing to establish a positive outcome from this war will cause a bleak future for Gaza, involving future rounds of violence between Israelis and Palestinians. The situation will likely worsen as both sides radicalize due to the escalating cycle of violence.

Option #1:  Revitalizing the Palestinian Authority.

As Israeli operations in Gaza wind down, the Palestinian Authority Security Forces (PASF) enter Gaza and begin assuming security and policing responsibility. The international community continues to help, train, and mentor the PASF. Concurrently, the Palestinian Authority (PA) undergoes reforms and begins to assume governance roles in Gaza. International aid flows through the auspices of the PA to help it build legitimacy and capability. This option involves significant challenges as the PA lacks legitimacy both domestically and internationally, has little control over its current territory in the West Bank, and struggles with corruption. Additionally, the PASF will need to increase its ability to control Gaza. Finally, the PA has indicated it is unwilling to take control of Gaza on the back of Israeli tanks. However, elements of the U.S. government, as well as some U.S. partners, advocate for this option[3].

Risk:  The main risk in Option #1 is that the PASF and PA do not prove up to the task or need more time to build capability than is available[4]. In 2007, Hamas defeated the PA and took over Gaza[5]. Another PA failure would not only potentially return Gaza to the control of terrorists or to a state of war, but perhaps be the final nail in the coffin for the PA. In the West Bank territories under PA governance, the PASF already struggles to exercise authority in its cities[6]. Following a failure in Gaza, it is unlikely there would be any trust in the PA for any future peace negotiations regarding Gaza or the West Bank. Moreover, it is possible that this instability in Gaza would spread to the West Bank, further damaging the PA’s already tenuous hold. Previously, members of the PASF have even participated in terror attacks[7]. Even if the PASF can create security, poor administration by the PA could lead to a similar result as if the PASF failed. Future terror attacks from Gaza could greatly radicalize the Israeli population and worsen future conflicts.

Gain:  If the PA and PASF can manage then this option will allow Gaza to recover under Palestinian rule and speed forward the development of Palestinian self-government. Success here could build momentum and trust in the PA that would translate to the West Bank, boosting broader diplomatic efforts. This option also requires relatively little direct commitment from the international community and would allow the PA to leverage the United Nations (UN) and Nongovernmental Organization communities directly.

Option #2:  Israeli Occupation.

Israeli forces conclude their military operations and transition to less intensive phases. They create buffer zones around key areas of the Gaza-Israel and Gaza-Egyptian border. These zones would be under Israeli military occupation and/or free fire zones. Alternatively, Israel returns to a version of the situation prior to its 2005 withdrawal, where it occupies ‘critical’ areas directly and operates militarily elsewhere in Gaza. Some residents of the towns and cities along the Gaza border that Hamas attacked on October 7 and elements within the Israeli government prefer this option[8]. The Israeli military and government have explicitly said they do not want a maximalist version of this option but would want freedom of action in Gaza and the potential for buffer zones[9].

Risk:  Occupation is contrary to the expressed wishes of the U.S. and much of the international community. As a result, this option could alienate Israel from its international partners. The maximalist version of this option would make a final status solution difficult as there would be domestic pressure to reestablish Jewish settlements in Gaza. The maximalist version would also greatly retard Gaza’s recovery and likely prolong the humanitarian crisis. This would leave the Palestinian population in Gaza vulnerable to the growth of transnational criminal organizations and violent extremist organizations who, as in other conflict zones, will exploit the gap in governance and slow pace of recovery[10]. Finally, Israel would likely face a continuing insurgency in populated areas, which would require maintaining a significant military presence. 

Gain:  This option will allow Israel to create security on its borders and prevent a repeat of the October 7 attacks. It will prevent Hamas or a successor organization from establishing control of Gaza. It freezes the situation in its current state, which may provide time for a negotiated solution or for the development of a more robust PA capability. It requires little to no direct involvement from the international community and may allow Palestinian governance in areas not under Israeli control.

Option #3:  Multinational Force Deployments.

A multinational force (MNF) conducts a gradual phased deployment to Gaza, taking responsibility for areas as Israel withdraws from them. The force needs to have three separate missions under a single coordinating authority which will provide a unified direction for the three components: security, reconstruction/humanitarian aid, and governance. This architecture would allow countries to provide contributions to the mission that best suits their capabilities. The security mission would not only be responsible for internal security in Gaza, but also for preventing transborder threats to Israel. As such, this option needs robust capabilities and rules of engagement. The reconstruction mission provides initial emergency aid and then oversees the reconstruction and development of Gaza, preventing the diversion of aid to terrorist organizations. The governance mission provides initial governance functions to prevent a governance void and then oversees the development of local governance structures. All three missions would have stakeholder-agreed, conditions-based triggers to gradually transition individual tasks to the PA as the PA’s capability increases.

Risk:  The MNF could fail before it begins if countries contribute inadequate forces with insufficiently robust capabilities and rules of engagement. This option could also fail if Israel does not perceive the countries involved as capable of guaranteeing security. The history of the region is littered with MNFs failing to uphold their mandates. Following the 2006 war, the UN force in Lebanon received a mandate to help remove Hezbollah from the Israeli-Lebanon border. So far, the force of over 10,000 personnel has failed to stop Hezbollah from launching daily attacks across the border with Israel, including from near UN positions[11]. If the MNF fails to provide security for Israel or stability for Palestinians, then regional faith in the international community will likely collapse. The PA and PASF might not reach the required level of capability to take over from the MNF, leading to open ended commitment for the international community. A complete failure of the MNF could lead to casualties among the force and resumption of hostilities in Gaza.

Gain:  A properly constructed MNF can buy the time necessary for the PA and PASF to gain competency while also helping bring Israel security. A phased entry will allow the MNF to build trust and legitimacy. This option will maximize the ability to provide humanitarian, reconstruction, and development aid to Gaza and offers the fastest way to reestablish governance. A successful MNF will build momentum towards the creation of solutions for the more challenging and sensitive territory of the West Bank, while also mitigating many of the risks inherent in alternative solutions.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Keinon, H. (2018, August 15). “quiet for quiet” arrangement emerges between Israel and Hamas in Gaza. The Jerusalem Post | JPost.com. https://www.jpost.com/israel-news/quiet-for-quiet-arrangement-emerges-between-israel-and-hamas-in-gaza-564982 and Liebermann, O., Schwartz, M., Dahman, I., & Najib, M. (2018, November 11). Suitcases of $15M in cash from Qatar Bring Relief for Gaza. CNN. https://www.cnn.com/2018/11/11/middleeast/gaza-qatar-humanitarian-intl/index.html

[2] Gettleman, J., Schwartz, A., Sella, A., & Shaar-yashuv, A. (2023, December 28). “screams without words”: How Hamas Weaponized Sexual Violence on Oct. 7. The New York Times. https://www.nytimes.com/2023/12/28/world/middleeast/oct-7-attacks-hamas-israel-sexual-violence.html

[3] Magid, J. (2023, December 15). Sullivan says Palestinian Authority must be “revamped” before it … https://www.timesofisrael.com/sullivan-says-palestinian-authority-must-be-revamped-before-it-can-govern-gaza

[4] Harris, K. D. (2023, December 3). Remarks by vice president Harris on the conflict between Israel and Hamas. The White House. https://www.whitehouse.gov/briefing-room/speeches-remarks/2023/12/02/remarks-by-vice-president-harris-on-the-conflict-between-israel-and-hamas

[5] Guardian News and Media. (2007, June 15). Hamas takes control of Gaza. The Guardian. https://www.theguardian.com/world/2007/jun/15/israel4

[6] TOI Staff. (2023, November 25). 2 men executed in West Bank for allegedly spying for Israel, as … https://www.timesofisrael.com/2-men-executed-in-west-bank-for-allegedly-spying-for-israel-as-mob-cheers

[7] Khoury, J., Cohen, G., & Efrati, I. (2016, January 31). Palestinian police officer opens fire near Israeli settlement, wounds three soldiers. Haaretz.com. https://www.haaretz.com/israel-news/2016-01-31/ty-article/three-israelis-wounded-in-west-bank-shooting/0000017f-da77-d432-a77f-df7fb2f40000

[8] Lidor, C. (2024, January 8). Sderot mayor rejects government decision to bring residents back … https://www.timesofisrael.com/sderot-mayor-rejects-government-decision-to-bring-residents-back-on-february-4

[9] Sokol, S. (2024, January 10). Netanyahu: Let me be clear — Israel has no intention of displacing … https://www.timesofisrael.com/netanyahu-let-me-be-clear-israel-has-no-intention-of-displacing-gazas-population

[10] de Boer, J., & Bosetti, L. (n.d.). Examining the interactions between conflict and organized crime. Our World. https://ourworld.unu.edu/en/examining-the-interactions-between-conflict-and-organized-crime

[11] United Nations. (n.d.). UNIFIL peacekeeping. United Nations. https://peacekeeping.un.org/en/mission/unifil

Dr. Jacob Stoil Dr. Mary Elizabeth Walters Dr. Nir Arielli Hamas Israel Option Papers

Options for the United States regarding Piratical Attacks against Commercial Shipping in the Red Sea and the Bab el-Mandeb Strait.

Peter Mitchell is a U.S. Army officer and instructor of strategy at West Point. He can be found on Twitter @peternmitchell and writes for the Modern War Institute.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Commercial shipping in the Red Sea and the Bab el-Mandeb Strait is being threatened by piratical attacks.  These attacks threaten U.S. interests.

Date Originally Written:  January 2, 2024.

Date Originally Published:  January 8, 2024.

Author and / or Article Point of View:  The author is an instructor of strategy at West Point.  This article is written from the point of view of the United States considering its maritime options in the Red Sea.

Background:  The Bab-el-Mandeb Strait links the Indian Ocean and the Mediterranean Sea via the Red Sea and the Suez Canal. Twelve percent of global trade and 30% of global container traffic traverses the Suez Canal each year.  These figures represent over $1 trillion U.S. Dollars worth of cargo. Fifty ships traverse the Suez Canal on an average day. Over one billion tons of cargo were shipped through the Suez Canal in 2019, four times the tonnage transiting the Panama Canal during the same period[1]. 

Significance:  Traffic continues to flow through the Suez Canal in spite of the imminent threat from Houthi corsairs and Somali pirates. A major successful attack however will turn off this trade route like a spigot and cause civilian merchants to seek a safer and less insurance-costly route around the Cape of Good Hope on the southern tip of Africa[2]. A container ship sailing from Guangzhou, China to Rotterdam in the Netherlands travels 10,000 nautical miles using the Suez Canal; this same voyage would be 13,500 nm around the Cape of Good Hope. Depending on the ship’s speed, this difference can mean 8 to 12 days of additional travel along the southern route[3]. American global power projection rests on maintaining free and open sea lanes. To ensure that trade is not throttled and future pirates in other vulnerable locations emboldened, these threats to shipping in the Red Sea must be addressed. Currently the U.S. Navy is building a multinational coalition to escort Suez Canal shipping under the name Operation Prosperity Guardian, but other options are available.

Option #1:  The U.S. Navy executes Operation Prosperity Guardian with Allies and Partners.  

Risk:  Operation Prosperity Guardian participants are not as enthusiastic about this operation as the U.S. due to problematic associations with the Gaza War[4]. Notably, the only Middle Eastern country to participate in this current mission is Bahrain.  The defensive scope of the operation also puts the participants in a reactive mode.  While this reactive mode may address tactical level threats, it will not solve the long-term strategic problem by robbing the Houthis of their will to attack shipping. The operation is also limited in regional scope and does not address increasing piracy in the Straits of Malacca and Southwestern Pacific[5].

Gain:  Option #1 is a safe option to execute, as it follows closely in the established multinational Horn of Africa escort mission that the United States has provided since 2009 via Operation Allied Protector and Operation Ocean Shield[6]. Low risk however, also entails low gain. In the two previously named operations, the pirates went to ground until the military escorts left for other missions, then resumed their deprecations[7].

Option #2:  The U.S., Allies, and Partners encourage civilian shipping corporations to form collective security arrangements with each other, similar to the anti-piracy measures taken by trade leagues of the late medieval period such as the Hanseatic League[8]. Merchant ships would be empowered to take private security measures, arm their ships, and sail in convoy.

Risk:  Option #2 will directly increase the cost of shipping which could be passed on to the consumer.  Corporations could engage in cartel activity by refusing to engage in security agreements with smaller competitors to force them out of the market.  The corporations also expose themselves to risk to public relations and legal suit if they kill pirates on the high seas, even in self-defense.

Gain:  Option #2 reduces need for government-provided escorts.  This option enables a quicker response to pirate threats since the merchant ships would be defending themselves.  Option #2 is a proactive and durable counterpiracy outcome as even the most motivated pirate would hesitate before attacking a commercial ship armed with heavy machine guns.

Option #3:  The U.S. and its Allies and Partners encourage China to build a bilateral escort for all merchant ships traveling from Europe to Asia. China should be motivated to do this as sixty percent of Chinese trade destined for Europe transits the Suez[9]. China is Europe’s largest trading partner, while exports to Europe make up 9% (top third) of all Chinese exports[10]. The People’s Liberation Army Navy (PLAN) is also eager to show its global projection ability.

Risk:  Option #3 would require a carefully crafted intelligence sharing program to allow for coordination without over or under sharing information.  Chinese hawks could interpret this offer as the U.S. attempting to gather intelligence about the PLAN’s capabilities and limitations.  The U.S. Navy (USN) would have limited control over how China uses force in its counter-piracy rules of engagement.  While Option #3 could garner tactical success, naval cooperation does not necessarily mean better strategic relations between the U.S. and China.  Additionally, other Western Pacific countries with significant maritime interests such as Japan might not be excited by this option and require diplomatic engagement. 

Gain:  Option #3 would be the first major bilateral cooperation between the USN and the PLAN on a significant maritime policing operation. This option could set precedent for future cooperation between the USN and the PLAN in the Strait of Malacca or elsewhere.  Bilateral arrangements are easier to make and keep up than complex multilateral agreements with over ten countries such as Operation Prosperity Guardian.  China is increasingly seen as an ‘honest broker’ in the Middle East. This bilateral operation could encourage Iran to decrease aid to the Houthis for fear of disrupting Tehran’s relationship with Beijing[11].

Option #4:  The French decisively dealt with the longstanding (over seven centuries) issue of the Barbary corsairs operating with impunity from the North African coast by taking the fight directly to the pirates. The Houthis and Somalis operate from ports and hidden coves along the coast. A unilateral or multilateral force could systematically eliminate these pirate bases of operation and destroy all unauthorized ships, docks, and havens on either side of the Red Sea all the way through the Bab el-Mandeb. Troops then would need to be stationed in a semi-permanent colonial status to ensure compliance from the locals.

Risk:  Option #4 risks ruining the livelihoods of law-abiding fishermen and merchants along with the smugglers and pirates. Despair would inevitably drive more people into piracy and terrorism.  This option does little to address the threat of anti-ship missiles and unmanned aerial vehicles launched from the Yemeni hinterland.  This option could cause extreme public relations friction as the violence it causes is posted on social media worldwide.  If undertaken by the United States, the shrinking U.S. military incurs risk to its force as it is already stretched thin by other global commitments.  

Gain:  Option #4 proves a drastic (and expensive) solution that would have significant long-lasting results.  This option provides a dramatic display of political will by the country that fields the unilateral or multilateral force that destroys the pirate basing.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Panama Canal Annual Report, 2019 https://pancanal.com/wp-content/uploads/2021/08/2019-AnnualReport-Rev02.pdf

[2] “Suez disruption: a new inflation risk on the horizon.” Reuters. Accessed January 2, 2024. https://www.reuters.com/world/middle-east/suez-disruption-new-inflation-risk-horizon-2023-12-19/.

[3] “The Importance of the Suez Canal to Global Trade,” New Zealand Foreign Affairs and Trade, April 18, 2021, https://www.mfat.govt.nz/assets/Trade/MFAT-Market-reports/The-Importance-of-the-Suez-Canal-to-Global-Trade-18-April-2021.pdf

[4] Phil Stewart, “US allies reluctant on Red Sea task force,” Reuters, accessed January 3, 2024, https://www.reuters.com/world/us-allies-reluctant-red-sea-task-force-2023-12-28/.

[5] Dean Crossley, “Malacca and Singapore Straits – Increase of Piracy,” West of England P&I, last modified March 2, 2023, https://www.westpandi.com/news-and-resources/news/march-2023/malacca-and-singapore-straits-increase-of-piracy-i/.

[6] NATO, “Operation Ocean Shield, https://web.archive.org/web/20150702050518/http://www.manw.nato.int/page_operation_ocean_shield.aspx

[7] “Live Piracy Map,” ICC Commercial Crime Services, https://www.icc-ccs.org/piracy-reporting-centre/live-piracy-map

[8] Ernst Danenell, “The Policy of the German Hanseatic League Respecting the Mercantile Marine.” The American Historical Review 15, no. 1 (1909): 47–53. https://doi.org/10.2307/1835424.

[9] “China’s Growing Maritime Presence in Egypt’s Ports and the Suez Canal.” Middle East Institute. November 3, 2023. https://www.mei.edu/publications/chinas-growing-maritime-presence-egypts-ports-and-suez-canal.

[10] “China-EU – International Trade in Goods Statistics – Statistics Explained.” European Commission. Accessed January 2, 2024. https://ec.europa.eu/eurostat/statistics-explained/index.php?title=China-EU_-_international_trade_in_goods_statistics.

[11] Nectar Gan, “China Wants to Be a Peace Broker in the Middle East. How Has It Responded to the Israel-Gaza War?,” CNN, last modified October 11, 2023, https://www.cnn.com/2023/10/11/china/china-response-israel-hamas-war-intl-hnk/index.html.

Bab el-Mandeb Strait Commercial Interests Iran Option Papers Pete Mitchell Red Sea Suez Canal Yemen

Options for the United States to Counter China’s Multi-Pronged Offensives in Taiwan

Editor’s Note:  This article is part of our 2023 Writing Contest called The Taiwan Offensive, which took place from March 1, 2023 to July 31, 2023.  More information about the contest can be found by clicking here.

Marshall McGurk is an officer in the United States Army and a graduate of the School of Advanced Military Studies, Fort Leavenworth, Kansas. He is on Twitter @MarshallMcGurk. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Options for the United States to counter China’s multi-pronged offensives in Taiwan.

Date Originally Written:  July 5, 2023.

Date Originally Published:  August 7, 2023.

Author and / or Article Point of View:  The author is an active-duty U.S. military officer who believes the U.S. policy on the Taiwan issue can move from strategic ambiguity to strategic clarity. 

Background:  The People’s Republic of China (PRC) takes a multi-pronged approach to bring Taiwan under its banner. China’s president Xi Jinping publicly states that China’s leadership will “advance peaceful national reunification[1].” Senior PRC officials state their timeline of forced armed reunification is 2027, the PRC’s 78th anniversary[2]. The divergence of these statements provide flexibility to the PRC. Peaceful reunification may be preferred, but the PRC military is preparing for armed conflict, nonetheless. China’s economic belt and road initiative reaches global, across land and maritime domains, while their diplomatic and cultural arms aggressively push the narrative of PRC dominance[3]. The U.S. does not have official diplomatic relations with Taiwan, however it enjoys a “robust unofficial relationship,” which “[serves] as the impetus for expanding U.S. engagement with Taiwan[4].” U.S. relations with Taiwan are governed by the American Institute in Taiwan[5].

Significance:  The multi-pronged approach to challenging Taiwanese sovereignty is a national security issue because it presents Communist Chinese Party (CCP) imperial, revanchist designs in Asia. Should the CCP succeed in subjugating Taiwan, the impact will be felt across alliances and partnerships seeking to maintain free trade and economic relationship. The issue of China’s imperialist designs matters not just to the United States but to its allies and partners in North Asia, Southeast Asia, Oceania, and the Indian subcontinent.

Option #1:  The United States could indirectly counter the CCP’s multi-pronged approach through increased relationships between the United States and Taiwan in all aspects of national power. What the U.S. can do is maintain the one-China policy while simultaneously increasing its partnerships with Taiwan. The current President of Taiwan is a graduate of Cornell University. The U.S. could use this point to increase exchanges of students and experts across academia, public, and private sectors. There are military training events occurring between Taiwan and the United States[6]. The U.S. could develop a recurring exercise between Taiwan’s military for conventional, joint, and special operations forces. There are significant networks between Taiwanese and United States manufacturing, transportation, and free trade. The U.S. could increase the size and remit of the American Institute of Taiwan and provide the same openness to the Taiwanese. Refining and bolstering financial ties between the U.S. and Taiwan, as well as increasing ties with regional partners such as the Philippines, South Korea, and Japan is also possible. 

Risk:  Increased U.S. investment in Taiwan, even with the bounds of the one-China policy, could be seen as duplicitous and cause an escalation between the PRC, the U.S., and Taiwan. This option may lead to political stalemate or infighting within the U.S. Additionally, increased investment in Taiwan, in accordance with the one-China policy, may be perceived as curtailing or divesting of U.S. interests in other regions of Asia, thus alarming allies and partners. 

Gain:  Option #1 provides the U.S. with clarity within the bounds of the one-China policy and the Six Assurances[7]. It is a continuation of the larger status quo, but a refinement of U.S. actions. Option #1 provides a basic for dialogue and openings for cooperation, while mitigating misunderstandings.

Option #2:  The U.S. has the option to move away from the one-China policy and support Taiwanese independence. This includes modification or cancellation of the Taiwan Relations Act and the Six Assurances.

Risk:  Disavowing the one-China policy may prompt a PRC invasion of Taiwan. This risk can be mitigated by diplomatic negotiations and talks that could occur since U.S. policy will have changed. Second, it may be seen that disavowing the one-China principles limits options for the U.S. President in addressing the Taiwan issue. This risk can be addressed by labelling the one China policy as no longer tenable given the PRC’s inflammatory rhetoric and behavior. Furthermore, U.S. recognition of Taiwan provides increased opportunity for diplomatic relations with both countries. Option #2 opens opportunities for PRC dialogue within the U.S., however the policy will require changes agreed upon by the U.S. legislative and executive branches. U.S. politicians may see Option #2 as limited the options of future presidents, and thus may not refute the one-China policy.

Gain:  There are three gains with this approach. First, this option moves the U.S. away from strategic ambiguity and towards strategic clarity. Strategic clarity provides allies and partners a touchstone of U.S. credibility and legitimacy. Second, all options can still be on the table for how the U.S. addresses PRC responses to the Taiwan issue—including cooperation—but disavowing the one-China Policy sets clear opposition to PRC revanchist schemes. Third, U.S. recognition of Taiwan may staunch the loss of its formal allies, which stands at 14 after the departure of Nicaragua in 2021[8].

Other Comments:  The U.S. government need not follow the whims of private companies or institutions who modify language, maps, or statements showing Taiwan as part of China. The PRC and the ruling-CCP have shown themselves to be bullies in the international community and appeasement of a bully provides no benefit. 

Recommendation:  None.


Endnotes:

[1] Sacks, D. (2021, July 6). What Xi Jinpings major speech means for Taiwan. Council on Foreign Relations. https://www.cfr.org/blog/what-xi-jinpings-major-speech-means-taiwan

[2] Grossman, D. (2021, November 10). Taiwan is safe until at least 2027, but with one big caveat. RAND Corporation. https://www.rand.org/blog/2021/11/taiwan-is-safe-until-at-least-2027-but-with-one-big.html 

[3] Nawrotkiewicz, J., & Martin, P. (2021, October 22). Understanding Chinese “Wolf-Warrior Diplomacy.” The National Bureau of Asian Research. other. Retrieved July 30, 2023

[4] U.S. Department of State. (2023, April 26). U.S. relations with Taiwan – united states department of state. U.S. Department of State. https://www.state.gov/u-s-relations-with-taiwan/ 

[5] U.S. Citizen Services. American Institute in Taiwan. (2023, July 20). https://www.ait.org.tw/services/

[6] Liebermann, O. (2023, February 24). US plans to expand training of Taiwanese forces | CNN politics. CNN. https://www.cnn.com/2023/02/23/politics/us-taiwan-forces-training/index.html

[7] Lawrence, Susan V. (2023, June 13). President Reagan’s Six Assurances to Taiwan (CRS Report No. IF11665) Retrieved from Congressional Research Service website: https://crsreports.congress.gov/product/pdf/IF/IF11665

[8] Al Jazeera. (2021, December 10). After Nicaragua break, who are Taiwans remaining allies? News | Al Jazeera. https://www.aljazeera.com/news/2021/12/10/who-are-taiwan-diplomatic-allies 

2023 - Contest: The Taiwan Offensive China (People's Republic of China) Marshall McGurk Offensive Operations Option Papers Taiwan United States

Options for Taiwan’s Response to a Conventional Missile Strike by the People’s Republic of China

Editor’s Note:  This article is part of our 2023 Writing Contest called The Taiwan Offensive, which took place from March 1, 2023 to July 31, 2023.  More information about the contest can be found by clicking here.

Thomas J. Shattuck is the Global Order Program Manager at the University of Pennsylvania’s Perry World House, a member of Foreign Policy for America’s NextGen Foreign Policy Initiative and the Pacific Forum’s Young Leaders Program, as well as a Non-Resident Fellow at the Global Taiwan Institute and Foreign Policy Research Institute. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The People’s Republic of China (PRC) conducts a conventional missile strike against a military air base in central Taiwan.

Date Originally Written:  May 9, 2023.

Date Originally Published:  May 22, 2023.

Author and / or Article Point of View:  The article is written from the point of view of Taiwan towards the PRC.

Background:  In response to the election of the Democratic Progressive Party’s candidate as President of the Republic of China (Taiwan) in 2032, the leadership in Beijing decides that peaceful unification is no longer possible and that steps must be taken to remind Taiwan of where they stand. The PRC’s People’s Liberation Army Rocket Force conducts a conventional missile strike on Ching Chuan Kang Air Base in Taichung, Taiwan. The attack results in the destruction of the air base and two wings of F-16 fighters, and the death of 200 military personnel and 50 civilians.

Significance:  Beijing ordered the missile strike to remind the Taiwanese public of the power of the Chinese military and the immense destruction of an all-out invasion. The PRC’s Ministry of Foreign Affairs states that the attack was conducted to thwart the “expansion of Taiwan independence separatists” and warns that progress must be made on peaceful unification or additional strikes “will once and for all quash the Taiwan independence movement and achieve the Chinese dream of national rejuvenation.” Taipei promises to retaliate to this breach of sovereignty and to defend every inch of its territory against Chinese military attacks.

The strike is viewed as the first step toward an invasion of Taiwan as it is the first time since the Cold War that PRC forces attacked Taiwan. The United States and its regional allies and partners worry that additional missile strikes will occur, causing Taipei respond to these military incursions and escalating the situation into a war. Washington sends additional carrier strike groups to the region, and Japan prepares its southern islands for war. Estimates put the global economic costs of a cross-Strait war at a figure of at least $2 trillion[1]. Conflict in the Taiwan Strait would test U.S. resolve to protect a longstanding partner, put regional allies at risk, and decimate the global economy.

Option #1:  Taipei conducts a missile strike against Shuimen Air Base in Fujian Province, PRC. 

Risk:  Ordering a retaliatory strike on a Chinese military base will escalate the already tense situation. Such a response could result in Beijing launching additional strikes throughout Taiwan. By fearing to look weak in the face of a Taiwanese challenge, Beijing may not limit its response to military bases and could consider striking cities in Taiwan as it views attacks on the “Chinese Mainland” as off limits in cross-Strait provocations. Beyond escalatory strikes throughout Taiwan, Taipei would risk the safety and freedom of Taiwanese citizens living in China. A military response aimed at mainland China would allow Beijing justify a number of responses, including a military blockade and seizure of Taiwan’s islands in the South China Sea, and paint Taiwan as the escalatory actor internationally. PRC military leaders would undoubtedly pressure the Chinese Communist Party leaders at Zhongnanhai to destroy the Taiwanese military as punishment. Beijing would not allow any retaliation by Taiwan to go unpunished as it would provide the Chinese military with further justification to diminish Taiwan’s sovereignty and destroy additional military assets and infrastructure.

Gain:  By launching a retaliatory military strike against Shuimen Air Base, Taipei demonstrates to not only Beijing but also to the rest of the international community, particularly the United States and its allies, that it is willing to respond to Chinese provocations and will not sit by idly as China attacks Taiwan’s sovereignty. Option #1 is a wake-up call for Beijing, whose leadership believed that Taipei would not respond in-kind to its initial strike. The tit-for-tat strikes point to stronger-than-expected resolve in Taiwan, especially as the people of Taiwan rally to defend their country against a stronger enemy.

Option #2:  Taipei uses its newly commissioned submarines to sink the Chinese aircraft carrier Liaoning, which is participating in a military exercise in the Western Pacific, but does not take credit for, or acknowledge its role in, the attack.

Risk:  Sinking China’s first aircraft carrier runs the risk of the People’s Liberation Army – Navy (PLAN) initiating a blockade of Taiwan to prevent further attacks against Chinese vessels. Demonstrating such a weakness in the PLAN could result in over-compensation by China in asserting control and sovereignty in the Taiwan Strait. By not taking credit for the surprise sinking of the Liaoning, Taipei risks looking weak domestically by not forcefully (and publicly) retaliating against China. Non-acknowledgment also provides space for Beijing to claim domestically that the exercise’s purpose was to simulate the destruction of an aircraft carrier and to retire the now-obsolete Liaoning.

Gain:  The submarine attack avoids the controversy and risk of attacking the mainland, which would assuredly result in significant reprisals, and provides Taiwan with plausible deniability regarding who sunk the vessel. Taipei’s strike on the Liaoning demonstrates weaknesses of the PLAN, which was not able to successfully defend one of its carriers against a perceived weaker and less sophisticated enemy, causing leadership in China to question the chances of success of a military invasion of Taiwan. Option #2 also exhibits the power and ability of Taiwan’s long-doubted indigenous military capabilities. The successful sinking of the Liaoning reinvigorates Taiwan’s military, which had been suffering from low morale for years. Due to the difficulty in accrediting the perpetrator of the attack, Taipei limits Beijing’s ability to further retaliate in Taiwan.

Other Comments:   Washington privately warns Taipei that any retaliation outside of a limited strike would result in the U.S. military not providing any assistance in the event of further escalation into full-fledged war.

Recommendation:  None.


Endnotes:

[1] Vest, C., Kratz, A., & Goujon, R. (2022, December 13). The global economic disruptions from a taiwan conflict. Rhodium Group. https://rhg.com/research/taiwan-economic-disruptions/. 

2023 - Contest: The Taiwan Offensive China (People's Republic of China) Option Papers Taiwan Thomas J. Shattuck

Options for the United States to Arm Anti-Assad Factions in Syria with Defensive Weapons

Michael D. Purzycki is an analyst, writer, and editor based in Arlington, Virginia. He has worked for the United States Navy, United States Marine Corps, and United States Army. In addition to Divergent Options, he has been published in the Center for Maritime Strategy, the Center for International Maritime Security, the Washington MonthlyMerion WestWisdom of CrowdsBraver Angels, and more. He can be found on Twitter at @MDPurzycki, on Medium at https://mdpurzycki.medium.com/, and on Substack at The Non-Progressive Democrat.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Options for the United States to Arm Anti-Assad Factions in Syria with Defensive Weapons

Date Originally Written:  February 27, 2023.

Date Originally Published:  March 6, 2023.

Author and / or Article Point of View:  The author fears that political reconciliation between Turkey and Syria, undertaken with the goal of returning refugees displaced during the Syrian Civil War from Turkey back to Syria, could precipitate massive, destabilizing refugee flows, and could vastly increase the level of violence inflicted on Syrian civilians by Syrian regime and Russian forces. The author believes the United States could consider providing defensive weapons, such as surface-to-air missiles[1], to Syrians who continue to resist the regime of Bashar al-Assad, to help them protect themselves against future attacks. 

Background:  Since the beginning of the Syrian Civil War in 2011, Turkey, led by President Recep Erdogan, has sought the ouster of Syrian President Bashar al-Assad, and has supported armed groups resisting Assad’s rule[2]. Recently, however, Erdogan and Assad have explored possible reconciliation, to the degree that their respective defense ministers met in person on December 28, 2022, for the first time since the war began[3]. Erdogan has explored this fence-mending with a view to returning Syrian refugees in Turkey to Syria, as Turkish public opinion toward the refugees is largely negative[4]. However, many refugees are unwilling to return to Syria, fearing persecution and violence from the Assad regime if they do[5]. The earthquake that struck both Syria and Turkey on February 6, 2023, has made refugees’ lives even more difficult, and their prospects more daunting[6].

In 2015, Russia intervened militarily in the Syrian Civil War on the side of the Assad regime. Since then, Syrian regime and Russian forces have repeatedly launched air and artillery strikes against civilian targets in regions of Syria controlled by opponents of the regime[7][8][9][10][11]. The 2015 refugee crisis, in which millions of people (many of them Syrian) arrived in Europe fleeing war and persecution[12], occurred in part due to the deliberate uses of force against civilians[13]. The refugees’ arrival was deeply controversial in many European countries, producing widespread political backlash[14][15][16]. Approximately 3.6 million Syrians are refugees in Turkey[17], while approximately 6.9 million are displaced within Syria[18].

Significance:  If a Turkey-Syria reconciliation precipitates another massive flow of Syrian refugees into Europe, it could weaken European solidarity in arming Ukraine against Russia’s invasion[19]. Russian President Vladimir Putin benefited politically from the difficulties Europe experienced due to refugee flows in 2015[20], and would likely experience similar benefits from a new Syrian refugee crisis. Such events could occur in tandem with massacres of Syrian civilians by Syrian regime and Russian forces on a scale larger than is currently ongoing.

Option #1: The United States removes the terrorist designation from Hayat Tahrir al-Sham (HTS) and provides them defensive weapons.

Risk:  HTS is considered a terrorist organization by the United States, a designation stemming from the group’s predecessor, Jabhat al-Nusra, being previously affiliated with al-Qaeda[21][22]. Removing that designation, let alone providing HTS with weapons of any kind, would be extremely controversial within the U.S. political context. Furthermore, HTS has been accused of extensive human rights violations in the portion of northwestern Syria it controls [23].

Gain:  Arming HTS with defensive weapons could provide at least a limited shield to civilians in Idlib province, the portion of Syria currently most frequently targeted by the Syrian military and its Russian ally[24][25]. Furthermore, HTS is a well-structured organization with approximately 10,000 fighters[26], obviating the need for the U.S. to engage in creating a fighting force from scratch.

Option #2: The United States provides defensive weapons to factions within the Syrian National Army (SNA).

Risk:  The SNA is supported by the government of Turkey[27], and many of its factions may not be amenable to aligning with U.S. interests, particularly if U.S. and Turkish interests conflict. Also, the portions of northern Syria controlled by the SNA do not include Idlib province[28], the region facing the most frequent strikes by regime and Russian forces. Furthermore, some SNA factions have been accused of various forms of brutality against civilians[29].

Gain:  Arming factions of the SNA would take advantage of the fact that well-organized, armed groups opposed to the Assad regime already exist within Syria[30], saving the U.S. the time and effort of trying to create such groups from scratch. Furthermore, if some SNA factions refuse to support Turkey-Syria political reconciliation, providing them with defensive weapons could improve their chances of surviving as an anti-Assad force in a period of renewed, expanded conflict – a force that would likely be grateful to the U.S. for helping them defend themselves. 

Option #3: The United States organizes new groups of anti-Assad Syrians and provides them with defensive weapons.

Risk:   U.S. attempts in 2014-2015 to organize new armed groups in Syria to fight the Islamic State fared poorly, yielding far fewer fighters than hoped for[31]. It is unclear whether any attempt to organize similar groups to defend against the Assad regime and Russia would be any more successful.

Gain:  Creating new groups, if successful, would allow the U.S. to defend Syrian civilians against attacks without the moral complications that might arise from arming HTS or portions of the SNA.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Purzycki, Michael D. “SAMs to Syria: Can the Marines Weaken Putin on Another Front?” Center for Maritime Strategy, October 5, 2022. https://centerformaritimestrategy.org/publications/sams-to-syria-can-the-marines-weaken-putin-on-another-front/

[2] Siccardi, Francesco. “How Syria Changed Turkey’s Foreign Policy.” Carnegie Europe, September 14, 2021. https://carnegieeurope.eu/2021/09/14/how-syria-changed-turkey-s-foreign-policy-pub-85301

[3] France 24. “Russian, Syrian, Turkish defence ministers meet in Moscow for first talks since 2011.” December 28, 2022. https://www.france24.com/en/middle-east/20221228-russian-syrian-turkish-defence-ministers-meet-in-moscow-for-first-talks-since-2011

[4] Khoury, Nabeel A. “Erdoğan’s Rapprochement with Assad Spells Trouble for Syrian Refugees.” Arab Center Washington DC, February 1, 2023. https://arabcenterdc.org/resource/erdogans-rapprochement-with-assad-spells-trouble-for-syrian-refugees/

[5] Levkowitz, Joshua. “Syrian refugees in Turkey watch uneasily as Erdogan warms to Assad.” Al-Monitor, January 15, 2023. https://www.al-monitor.com/originals/2023/01/syrian-refugees-turkey-watch-uneasily-erdogan-warms-assad

[6] Dawi, Akmal. “After Earthquake, Some Syrian War Refugees Look Beyond Turkey.” Voice of America, February 22, 2023. https://www.voanews.com/a/after-earthquake-some-syrian-war-refugees-look-beyond-turkey-/6974321.html.

[7] Hill, Evan, Christiaan Triebert, Malachy Browne, Dmitriy Khavin, Drew Jordan and Whitney Hurst. “Russia Bombed Four Syrian Hospitals. We Have Proof.” New York Times, October 13, 2019. https://www.nytimes.com/video/world/middleeast/100000005697485/russia-bombed-syrian-hospitals.html

[8] Breslow, Jason. “Russia showed its playbook in Syria. Here’s what it may mean for civilians in Ukraine.” NPR, March 1, 2022. https://www.npr.org/2022/03/01/1083686606/ukraine-russia-civilian-casualties-syria

[9] “Syria: Deadly attacks affecting IDP camps.” United Nations Office of the High Commissioner for Human Rights, November 8, 2022. https://www.ohchr.org/en/press-releases/2022/11/syria-deadly-attacks-affecting-idp-camps

[10] “Syria/Russia: 12 Civilians Dead in Idlib Artillery Attacks.” ReliefWeb, December 8, 2021. https://reliefweb.int/report/syrian-arab-republic/syriarussia-12-civilians-dead-idlib-artillery-attacks-enar

[11] “Ten Killed in Syria Regime Rocket Strikes: Monitor.” Defense Post, November 7, 2022. https://www.thedefensepost.com/2022/11/07/syria-regime-rocket-strikes/

[12] “Is this humanitarian migration crisis different?” OECD Migration Policy Debates, September 2015. https://www.oecd.org/migration/Is-this-refugee-crisis-different.pdf

[13] “Russian bombing in Syria ‘fuels refugee crisis’ says US official as airstrike kills 39.” Guardian, January 9, 2016. https://www.theguardian.com/world/2016/jan/09/imprecise-russian-bombing-syria-fuelling-refugee-crisis-us-official

[14] Garrett, Amanda. “The Refugee Crisis, Brexit, and the Reframing of Immigration in Britain.” EuropeNow, August 1, 2019. https://www.europenowjournal.org/2019/09/09/the-refugee-crisis-brexit-and-the-reframing-of-immigration-in-britain/

[15] Karnitschnig, Matthew. “Backlash grows against Merkel over refugees.” Politico, September 11, 2015. https://www.politico.eu/article/backlash-merkel-refugees-migration-germany-coalition-pressure/

[16] Cienski, Jan. “Why Poland doesn’t want refugees.” Politico, May 21, 2017. https://www.politico.eu/article/politics-nationalism-and-religion-explain-why-poland-doesnt-want-refugees/

[17] Ridgwell, Henry. “Facing Poverty and Hostility, Refugees in Turkey Mull Return to War-Torn Syria.” Voice of America, December 9, 2022. https://www.voanews.com/a/facing-poverty-and-hostility-refugees-in-turkey-mull-return-to-war-torn-syria/6869601.html

[18] “Syria Refugee Crisis Explained.” USA for UNHCR, July 8, 2022. https://www.unrefugees.org/news/syria-refugee-crisis-explained/

[19] Fix, Liana, and Jeffrey Mankoff. “Europe Has to Step Up on Ukraine to Keep the U.S. From Stepping Back.” Council on Foreign Relations, December 9, 2022. https://www.cfr.org/article/europe-has-step-ukraine-keep-us-stepping-back

[20] Ellyatt, Holly. “Putin ‘weaponizing’ migrant crisis to hurt Europe.” CNBC, March 2, 2016. https://www.cnbc.com/2016/03/02/putin-weaponizing-migrant-crisis-to-hurt-europe.html

[21] “Foreign Terrorist Organizations: Hay’at Tahrir al-Sham.” National Counterterrorism Center, October 2022. https://www.dni.gov/nctc/ftos/hts_fto.html

[22] Solomon, Christopher. “HTS: Evolution of a Jihadi Group.” Wilson Center, July 13, 2022. https://www.wilsoncenter.org/article/hts-evolution-jihadist-group

[23] “The Most Notable Hay’at Tahrir al Sham Violations Since the Establishment of Jabhat al Nusra to Date.” Syrian Network for Human Rights, January 31, 2022. https://snhr.org/blog/2022/01/31/57274/

[24] Ben Hamad, Fatma. “‘We’ve gotten used to air strikes’: A Syrian documents Russian attacks in Idlib.” France 24, August 16, 2022. https://observers.france24.com/en/middle-east/20220816-syrie-idlib-frappes-doubles-raids-russe-crimes-de-guerre

[25] Waters, Gregory. “Idlib is under siege.” Middle East Institute, February 22, 2023. https://www.mei.edu/blog/idlib-under-siege

[26] Solomon.

[27] Kasapoglu, Can. “The Syrian National Army and the Future of Turkey’s Frontier Land Force.” Jamestown Foundation, March 12, 2021. https://jamestown.org/program/the-syrian-national-army-and-the-future-of-turkeys-frontier-land-force/

[28] Balanche, Fabrice. “The Assad Regime Has Failed to Restore Full Sovereignty Over Syria.” Washington Institute for Near East Policy, February 10, 2021. https://www.washingtoninstitute.org/policy-analysis/assad-regime-has-failed-restore-full-sovereignty-over-syria

[29] Tsurkov, Elizabeth. “The Gangs of Northern Syria: Life Under Turkey’s Proxies.” December 7, 2022. https://newlinesinstitute.org/syria/the-gangs-of-northern-syria-life-under-turkeys-proxies/

[30] Özkizilcik, Ömer. “The Syrian National Army (SNA): Structure, Functions, and Three Scenarios for its Relationship with Damascus.” Geneva Centre for Security Policy, October 2020. https://dam.gcsp.ch/files/doc/sna-structure-function-damascus

[31] Ackerman, Spencer. “US has trained only ‘four or five’ Syrian fighters against Isis, top general testifies.” Guardian, September 16, 2015. https://www.theguardian.com/us-news/2015/sep/16/us-military-syrian-isis-fighters

Capacity / Capability Enhancement Civil War Michael D. Purzycki Option Papers Refugees Syria Turkey United States

Options for Ukraine to Defend Civilian Centers from Russian Strikes

Michael C. DiCianna is a consultant in the national security field, and a staff member of the Center for International Maritime Security. He can be found on Twitter @navy_tobacco.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Ukraine requires additional capabilities to defend its civilian centers from Russian strikes.

Date Originally Written:  October 25, 2022.

Date Originally Published:  October 31, 2022.

Author and / or Article Point of View:  The author believes that with Ukrainian civilian centers defended from Russian strikes, the Ukrainian armed forces will be better able to focus on locating, closing with, and destroying Russian forces occupying Ukraine.

Background:  After the bombing of the Kerch Strait Bridge that links Russia to Ukraine’s Crimea —unclaimed but likely attributed to Ukrainian sabotage, Russia responded with missile strikes on civilian targets in Kyiv. As of the time of this writing, 19 people have been killed, and hundreds wounded. Some of these strikes used Kalibr cruise missiles, launched from ships in the Black and Caspian Seas[1]. Russia’s long-range missiles and artillery continue to threaten Ukrainian lives and allow Russian President Vladimir Putin to commit what amounts to war crimes[2][3]. Putin ordering his forces to shoot upwards of 100 missiles at civilian centers instead of the military targets reaffirms his commitment to use terror tactics to cover up for Russian military losses.

Significance:  Ukraine’s autumn counteroffensive has continued to degrade the Russian military on the front line. Western allies supplying arms and training continue to assist the Ukrainian military in its liberation efforts, but the Ukrainian capital and other major civilian centers are still being struck by Russian attacks. Protecting civilian lives and enabling the Ukrainian Armed Forces to focus on the front line will be vital to repelling the invasion.

Option #1:  Western allies increase Ukraine’s anti-ship capabilities.

Risk:  Putin has made it clear that the Kremlin will view all Western support to Ukraine as an escalation. Russian officials have made nearly weekly overt or implied nuclear threats. Previously, Russia implied that it would strike Western arms shipments in Ukraine, regardless of the point of delivery or casualties to North Atlantic Treaty Organization member countries. All increases to Ukrainian offensive and defensive capabilities risk Russian escalation, though this risk must be balanced against the importance of defending Ukrainian sovereignty. The addition of increased anti-ship and anti-submarine capabilities might see reciprocal Russian assaults on Ukraine’s maritime infrastructure, or further attacks on major civilian centers. If Ukraine uses these hypothetical armaments to destroy Black Sea Fleet ships or infrastructure, Russa may feel even more cornered. Attacks against Crimea especially could increase the Kremlin’s perception of being “cornered.” Control of the Crimean Peninsula, including Sevastopol and thus a year-long naval base in the Black Sea, has been a core strategic objective of Russia since 2014.

Gain:  Destroying Russian long-range missile capabilities will be more effective at defending Ukraine’s population than relying on air defense systems.  Even the best air defense systems can be penetrated or overwhelmed. Ukrainians using Western-provided anti-ship capabilities to destroy Russian ships in the Black Sea not only removes Russian offensive capabilities, but it also damages the Russian strategic mission. Much like the loss of the illegally annexed territory of Lyman is a deep wound to the Russian agenda, a sunken Black Sea Fleet makes the Russian occupation of Crimea more and more irrelevant.

Increasing Ukrainian capability to strike Russian targets continues to degrade the Russian threat to the rest of Europe. Ukraine is fighting this war against Russia, and hopefully winning it, so that a similar war with Russia does not happen in Finland, Poland, or the Baltic States. This situation does not devalue the heroism of the Ukrainian cause, but it is a reminder to other European capitals that there is also a hard calculus behind supporting Ukraine. The Russian Army is being annihilated, and the Russian Air Force has taken serious losses. Losses to the Black Sea Fleet—already in a subpar state of upkeep—would be another drastic hit to Putin’s regime.

Option #2:  Western allies provide Ukraine limited air defense capabilities.

Risk:  Air defense systems will never be a complete shield over a city or other broad target. Even extensive air defense grids will leave gaps, and saturation strikes will overwhelm them. Providing Ukraine limited air defense capabilities will force Ukrainian military and civilian leaders to prioritize protection. Russian attacks could be targeting based on outdated maps, making it harder for Ukraine to predict which areas will be targeted[4]. Air defenses are vital to protecting civilian lives and military infrastructure, but limited Western support might not be enough in the face of further Russian bombardment. 

Gain:  An arms package containing limited air defense systems and provides Ukraine with no advanced long-range strike or antiship capabilities is likely viewed from a Western lens as a less escalatory option. Russia views all U.S. and Western arms deals for Ukraine as escalation and interference with a war it views as within its own periphery, but the Kremlin will still need to somehow maintain its own redlines[5]. Air defense systems designed to destroy Russian cruise missiles and drones are not as much of a threat to the Russian military as missiles designed to destroy Russian warships.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] The Economist Newspaper. (2022, October 10). Russia launches a wave of missiles across Ukraine. The Economist. Retrieved October 17, 2022, from https://www.economist.com/europe/2022/10/10/russia-launches-a-wave-of-missiles-across-ukraine

[2] Specia, M., Kramer, A. E., & Maria Varenikova, M. (2022, October 17). Buzzing Drones Herald Fresh Attacks on Kyiv, Killing Four. The New York Times. Retrieved October 17, 2022, from https://www.nytimes.com/live/2022/10/17/world/russia-ukraine-war-news.

[3] Rome Statute of the International Criminal Court. Article 8, paragraph 2.

[4] Knowles, D (Host). (2022, October 12). Private mercenaries, GCHQ’s nuclear response and on the ground in the Donbas. In Ukraine: The Lastest. The Telegraph. https://open.spotify.com/episode/14CJ4WAtCtuGP14e60S0q6?si=d86626ee3e334514

[5] Ellyatt, H. (2022, March 12). Western arms convoys to Ukraine are ‘legitimate targets,’ Russia warns. CNBC. Retrieved October 17, 2022, from https://www.cnbc.com/2022/03/11/ukraine-needs-more-weapons-the-west-fears-provoking-war-with-russia.html

 

Capacity / Capability Enhancement Option Papers Russia Ukraine

Options for the U.S. to Approach India as a Fellow Superpower

Michael D. Purzycki is an analyst, writer, and editor based in Arlington, Virginia. He has worked for the United States Navy, United States Marine Corps, and United States Army. In addition to Divergent Options, he has been published in the Center for International Maritime Security, the Washington MonthlyMerion WestWisdom of CrowdsCharged AffairsBraver Angels, and more. He can be found on Twitter at @MDPurzycki, on Medium at https://mdpurzycki.medium.com/, and on Substack at The Non-Progressive Democrat.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Options for the U.S. to Approach India as a Fellow Superpower

Date Originally Written:  June 12, 2022.

Date Originally Published:  June 27, 2022.

Author and / or Article Point of View:  The author believes good relations between the United States and India, including respect for India as a fellow superpower, are vital for confronting challenges to U.S. interests, especially those presented by China. The author views India as a fellow superpower to the U.S. due to its population, gross domestic product, economic expansion in recent decades, military strength, and possession of nuclear weapons.

Background:  Across the early 21st century, the U.S. has developed closer political and security relations with India. The two countries participate in the Quadrilateral Security Dialogue (“the Quad”)[1], a forum for coordinating security activities and holding joint military exercises[2], alongside U.S. allies Australia and Japan. In 2016, the U.S. designated India a Major Defense Partner (MDP), a status similar to that of Major Non-NATO Ally (MNNA)[3].

Significance:  How Washington chooses to approach India will have extremely important implications for U.S. foreign policy, particularly U.S. efforts to confront and balance China. Respecting India as a fellow superpower will help the U.S. maximize the potential for positive bilateral relations.

Option #1:  The U.S. upgrades its MDP with India to a bilateral military alliance, placing India on the level of a fellow North Atlantic Treaty Organization (NATO) member.

Risk:  A formal U.S.-India alliance would frighten and anger China, seemingly confirming the fears of Chinese officials that the U.S. is seeking to surround it militarily. China would likely seek to increase its already close military and political ties with Russia[4]. Furthermore, if China believes it is about to be completely encircled geopolitically, it may believe it has a limited window of opportunity to bring Taiwan under its control, thus encouraging an invasion of the island.

This option would also frighten and anger Pakistan, a nuclear-armed state that has been a rival of India since their mutual independence from British rule in 1947. Although Pakistan is an MNNA of the U.S.[5], it is also a long-standing partner of China, a relationship motivated in large part by their shared rivalry with India[6]. Among other things, Pakistan may respond by refusing to cooperate with the U.S. in its approach to Taliban-ruled Afghanistan.

Gain:  The prospect of two nuclear-armed states allied against China could make Beijing think twice about any aggressive move it made against the U.S. (either directly, or against a U.S. ally or partner like Japan or Taiwan) or against India (such as renewed border conflicts in the Himalayas)[7]. Option #1 would also mean that all of the U.S.’s fellow Quad members would be treaty allies[8][9], potentially turning the Quad into an Indo-Pacific equivalent of NATO. A formal alliance with the U.S. could also pull India away from Russia; the effects of India’s close relations with the Soviet Union, including in the area of arms sales, have lingered into the 21st century[10].

Option #2:  The U.S. tightens its security links to India short of a formal alliance, including efforts to build up India’s defense industrial base.

Risk:  Even without a formal alliance, any increase in U.S.-India defense cooperation will still worry China and Pakistan. Additionally, U.S. efforts to make India less dependent on foreign sources for its military equipment could irritate France, which sees increased defense exports to many countries, including India[11], as a key component of its security policy[12]. The diplomatic row in 2021 over Australia’s decision to cancel its purchase of French submarines in favor of U.S. vessels is a precedent the U.S. may want to avoid repeating[13].

Gain:  As well as deepening U.S.-India security cooperation, the U.S. building up India’s defense industry can decrease its reliance on Russia as a major provider of military equipment[14].

Option #3:  The U.S. Navy reactivates the First Fleet, and assigns a portion of the Indian Ocean as its area of responsibility.

Risk:  If the First Fleet takes waters away from the Seventh Fleet[15], it risks dividing the Indian and Pacific portions of U.S. Indo-Pacific strategy. This division could complicate any comprehensive U.S. effort to balance and counter Chinese power in the Indo-Pacific region[16].

Gain:  Devoting a numbered fleet to the Indian Ocean[17] would signal a U.S. commitment to good relations with India, indicating that a good relationship is not merely an adjunct of Washington’s approach to China.

Option #4:  The U.S. defers to India as de facto hegemon of South Asia, intentionally putting U.S. interests in South Asia second to India’s.

Risk:  If the U.S. treats part of the world as India’s sphere of influence without any prioritization of U.S. interests there, it could set a dangerous precedent. This option would give rhetorical ammunition to Russia in its attempt to forcibly incorporate Ukraine (as well as potential attempts to bring other Eastern European countries into its sphere), and to China in its desire to gain control of Taiwan and expand its control in the South China Sea.

Encouraging India to see itself as rightfully dominant in its region could also make conflict between India and China more likely in locations where both powers have security interests, such as Afghanistan[18] and Tajikistan[19][20]. Option #4 would also run the risk of making Pakistan more anxious, and of curtailing U.S. efforts to fight Islamist extremism in Afghanistan.

Gain:  Deferring to India in South Asia would free up U.S. time, attention, and resources to protect its interests elsewhere, particularly interests related to competition with China in the Western Pacific, and with Russia in Eastern Europe. 

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1] Ministry of Foreign Affairs of Japan. “Japan-Australia-India-U.S.(Quad) Leaders’ Meeting.” May 24, 2022. https://www.mofa.go.jp/fp/nsp/page1e_000402.html

[2] Rajagopalan, Rajeswari Pillai. “The Quad Conducts Malabar Naval Exercise.” The Diplomat, August 27, 2021. https://thediplomat.com/2021/08/the-quad-conducts-malabar-naval-exercise/

[3] U.S. Department of State. “U.S. Security Cooperation With India.” January 20, 2021. https://www.state.gov/u-s-security-cooperation-with-india.

[4] Kofman, Michael. “The Emperors League: Understanding Sino-Russian Defense Cooperation.” War on the Rocks, August 6, 2020. https://warontherocks.com/2020/08/the-emperors-league-understanding-sino-russian-defense-cooperation/

[5] U.S. Department of State. “Major Non-NATO Ally Status.” January 20, 2021. https://www.state.gov/major-non-nato-ally-status/

[6] Khalid, Masood. “Pakistan-China Relations in a Changing Geopolitical Environment.” Institute of South Asian Studies, November 30, 2021. https://www.isas.nus.edu.sg/papers/pakistan-china-relations-in-a-changing-geopolitical-environment/

[7] Slater, Joanna. “Soldiers injured in fresh border skirmish between India and China.” Washington Post, January 25, 2021. https://www.washingtonpost.com/world/asia_pacific/india-china-clash-sikkim/2021/01/25/7d82883c-5edb-11eb-a177-7765f29a9524_story.html

[8] U.S. Department of State. “U.S. Relations With Japan.” January 20, 2020. https://www.state.gov/u-s-relations-with-japan/

[9] U.S. Department of State. “U.S. Relations With Australia.” June 9, 2022. https://www.state.gov/u-s-relations-with-australia/

[10] Sharma, Ashok. “India to boost arms output, fearing shortfall from Russia.” Associated Press, April 7, 2022. https://abc17news.com/news/2022/04/07/india-to-boost-arms-output-fearing-shortfall-from-russia/.

[11] Shiraishi, Togo and Moyuru Baba. “France and India partner on weapons tech in blow to Russia.” Nikkei Asia, May 6, 2022. https://asia.nikkei.com/Politics/International-relations/France-and-India-partner-on-weapons-tech-in-blow-to-Russia.

[12] Mackenzie, Christina. “Here’s what’s behind France’s 72% jump in weapons exports.” Defense News, March 10, 2020. https://www.defensenews.com/global/europe/2020/03/10/heres-whats-behind-frances-72-jump-in-weapons-exports/

[13] Willsher, Kim. “France recalls ambassadors to US and Australia after Aukus pact.” Guardian, September 17, 2021. https://www.theguardian.com/world/2021/sep/17/france-recalls-ambassadors-to-us-and-australia-after-aukus-pact

[14] Banerjee, Vasabjit and Benjamin Tkach. “Helping India Replace Russia in the Value Arms Market.” War on the Rocks, May 20, 2022. https://warontherocks.com/2022/05/helping-india-replace-russia-in-the-value-arms-market/

[15] “USN Fleets (2009).” Wikimedia Commons. https://commons.wikimedia.org/wiki/File:USN_Fleets_(2009).png

[16] White House. “Indo-Pacific Strategy of the United States.” February 2022. https://www.whitehouse.gov/wp-content/uploads/2022/02/U.S.-Indo-Pacific-Strategy.pdf

[17] Eckstein, Megan. “SECNAV Braithwaite Calls for New U.S. 1st Fleet Near Indian, Pacific Oceans.” USNI News, November 17, 2020. https://news.usni.org/2020/11/17/secnav-braithwaite-calls-for-new-u-s-1st-fleet-near-indian-pacific-oceans

[18] Adlakha, Hemant. “Will the China-Pakistan-Taliban troika in Afghanistan make India irrelevant?” Hindustan Times, January 18, 2022. https://www.hindustantimes.com/ht-insight/international-affairs/will-the-china-pakistan-taliban-troika-in-afghanistan-make-india-irrelevant-101642409043057.html

[19] Dutta, Sujan. “India renews interest in running its first foreign military base in Tajikistan.” Print, October 11, 2018. https://theprint.in/defence/india-renews-interest-in-running-its-first-foreign-military-base-in-tajikistan/132454/

[20] Shih, Gerry. “In Central Asia’s forbidding highlands, a quiet newcomer: Chinese troops.” Washington Post, February 18, 2019. https://www.washingtonpost.com/world/asia_pacific/in-central-asias-forbidding-highlands-a-quiet-newcomer-chinese-troops/2019/02/18/78d4a8d0-1e62-11e9-a759-2b8541bbbe20_story.html

Great Powers & Super Powers India Michael D. Purzycki Option Papers United States

Options for Defining the Next U.S. Defense Challenge

Marco J. Lyons is a U.S. Army Lieutenant Colonel who has served in tactical and operational Army, Joint, and interagency organizations in the United States, Europe, the Middle East, Afghanistan, and in the Western Pacific. He is currently a national security fellow at Harvard Kennedy School where he is researching strategy and force planning for war in the Indo-Pacific. He may be contacted at marco_lyons@hks.harvard.edu. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. Department of Defense (DoD) has a new classified National Defense Strategy (NDS), not yet released in an unclassified version, which is an occasion to consider what the next central defense challenge should be. The central defense challenge shapes prioritization of ends, ways, means, and helps define risk for U.S. defense policy makers. 

Date Originally Written:  May 15, 2022. 

Date Originally Published:  May 23, 2022. 

Author and / or Article Point of View:  If well-articulated, the NDS-established central defense challenge can drive the defense establishment to field more relevant forces, with decisive capabilities, that are postured to bolster deterrence and assurance in ways that help the U.S. avoid great power war. The author believes the 2018 central defense challenge – revisionist power plays – should be updated based on an assessment of the emerging security environment. 

Background:  The first NDS of the Biden administration is complete. A classified NDS was submitted to Congress in late March 2022, and an unclassified version is planned for release later in May or June, according to a Defense Department fact sheet[1]. The geostrategic situation is rapidly changing and where world politics and the international system are headed is hard to predict. Foreign policy expert Zalmay Khalilzad and defense expert David Ochmanek wrote in the late 1990s that the United States had not yet settled on any fundamental principles to guide national strategy[2]. The situation doesn’t seem that different today, and American defense discussions reference various state and non-state threats as primary. Great powers, bloc-based rivalry, and the possibility of major power war seem to be on the rise. National consensus on the central defense challenge will help lay a foundation for coherent security policy. 

Significance:  The emerging U.S. national security situation is especially volatile with the potential for major war, protracted violent competition, and weakening international order. The geopolitical commentator George Friedman has highlighted Chinese and Russian vulnerabilities – economic and military – while emphasizing that the United States has the opportunity to be the greatest of the great powers and steer international system to peace and stability[3]. The United States still possesses great capabilities and opportunities, but defense analysts need to clearly see the emerging situation to successfully navigate the threats and changes. 

How U.S. defense leaders prioritize challenges affects foreign perceptions of American commitment. U.S.-driven sanctions and materiel aid in the current Russo-Ukrainian war demonstrate that American power will continue to be directed toward stability and improving European security. The truth remains that U.S. great power is preferable to the hegemony of any other great power in the world[4]. Still, it is well for the United States to guard against overreaching. American policymakers face a problem of spreading national security resources too thin by prioritizing multiple state challengers, like China, Russia, and Iran or North Korea[5]. The next central defense challenge needs to prioritize U.S. military resources, planning, and posture – the full breadth of defense activities. 

More than at any time since 1991, as some kind of multipolar great power international system emerges in the coming years, U.S. policy makers can ensure the best investment in capabilities for achieving objectives over time by properly prioritizing challenges. 

Option #1:  The Secretary of Defense identifies China’s ability to impose regional military hegemony as the central defense challenge. This option would prioritize investing in a Joint Force that demonstrates the ability to counter hard military capabilities in the Indo-Pacific. The People’s Liberation Army (PLA) has twice the U.S. number of active duty soldiers, a larger surface navy, the DF-41 intercontinental ballistic missile and DF-17 hypersonic missile, as well as increasingly capable joint commands[6]. Some researchers point to China’s recent fielding of powerful space-based capabilities to allow for real-time targeting of moving targets without ground support[7]. This option acknowledges that the geostrategic pivot for U.S. security is in Eurasia and especially the far eastern part. 

Risk:  Prioritizing the challenge from the PLA may embolden Russia, North Korea, and other capable threat actors as they assume American leaders will overfocus on one region and one great power rival. Development of capabilities for China and particularly the Western Pacific may leave the Joint Force poorly equipped for large-scale combined arms operations based on heavy, protected, mobile firepower and closer-range fires. A future force designed for maritime, air, and littoral environments might lack the ability to conduct prolonged urban combat. 

Gain:  Identifying PLA capabilities for regional hegemony as the primary defense challenge will make it easier to marshal resources and plan to employ joint forces in high-technology, protracted warfare – a more cost-intensive force development. Even a smaller-scale war with China would require prodigious amounts of long-range fires, air, surface, sub-surface, space, and cyberspace warfighting systems because of China’s potential economic and diplomatic power, and the ranges involved in reaching high-value PLA targets. 

Option #2:  The Secretary of Defense identifies the Russian Armed Forces’ ability to defeat U.S.-European security ties as the central defense challenge. This option would prioritize investing in a more capable North Atlantic Treaty Organization (NATO) through Joint Force capabilities that are substantially more combined/coalition interoperable than today. This option acknowledges the Russian Armed Forces that invaded Ukraine in February 2022, after threatening Kyiv to varying degrees since 2014, and suggests that NATO deterrence was ineffective in convincing Moscow that military aggression was a losing policy. 

Risk:  Over-focusing on building alliance capabilities to counter Russian tank and artillery formations might inhibit needed modernization in U.S. air, maritime, and space capabilities, including artificial intelligence, autonomous systems, and fully networked joint/combined command, control, communications, computers, intelligence, surveillance, and reconnaissance. 

Gain:  The Russian Armed Forces will likely continue to rely on hybrid forms of warfare, mixing conventional force employment with irregular ways, including information and psychological warfare, due to economic limitations. Focusing on building U.S. capabilities for state-based hybrid warfare will allow the future Joint Force to operate effectively along the full spectrum of conflict. 

Option #3:  The Secretary of Defense identifies transregional, non-state threats like climate change as the central defense challenge. This option acknowledges that non-state threats to U.S. interests are mixing with traditional military threats to create an especially complicated security environment[8]. Focusing on transregional, non-state threats aligns with prioritizing a stable global trade and financial system to the benefit of U.S. and partner economic interests. 

Risk:  The defense capabilities to address transregional, non-state threats do not have extensive overlap with those needed for state-based threats, conventional maneuver warfare, or great power war. The United States could reduce investment in great power war just when the chances of this form of conflict is rising. 

Gain:  Investment in addressing transregional, non-state threats could make the Joint Force more affordable in the long-term if breakthrough capabilities are developed such as new forms of energy production and transportation. 

Other Comments:  Core defense issues are always contentious as committed constituencies leverage establishment processes for the resources needed to realize their aims – this is true today about how to prioritize resources for the most capable future Joint Force. There are impassioned pleas for investing in military capabilities for competition, limited conflicts, and gray zone challenges[9]. Others argue that investing for gray zone conflict is a waste[10]. U.S. defense leaders are at a fork in the road. 

Recommendation:  None.


Endnotes:

[1] U.S. Department of Defense, “Fact Sheet: 2022 National Defense Strategy,” Defense-dot-gov, March 28, 2022, https://media.defense.gov/2022/Mar/28/2002964702/-1/-1/1/NDS-FACT-SHEET.PDF. 

[2] Zalmay M. Khalilzad and David A. Ochmanek, Strategic Appraisal 1997: Strategy and Defense Planning for the 21st Century (Santa Monica, CA: RAND Corporation, 1997), https://apps.dtic.mil/sti/pdfs/ADA325070.pdf. Since the end of the Cold War, U.S. defense leaders have opted for ambiguity in defining defense challenges primarily because the nation faced so many. The options here assume that as the United States loses its unipolar dominance, the value of stricter prioritization of challenges will become clearer. 

[3] George Friedman, “The Beginning of a New Era,” Geopolitical Futures, May 3, 2022, https://geopoliticalfutures.com/the-beginning-of-a-new-era/. 

[4] Robert Kagan, “The World After the War,” Foreign Affairs, May/June 2022, https://www.foreignaffairs.com/articles/ukraine/2022-04-06/russia-ukraine-war-price-hegemony. 

[5] Francis P. Sempa, “Our Elites Need to Recognize that America’s ‘Unipolar Moment’ is Over,” RealClearDefense, March 24, 2022, https://www.realcleardefense.com/articles/2022/03/24/our_elites_need_to_recognize_that_americas_unipolar_moment_is_over_823466.html. 

[6] Shawn Yuan, “Just How Strong is the Chinese Military?” Al Jazeera News, October 29, 2021, https://www.aljazeera.com/news/2021/10/29/just-how-strong-is-the-chinese-military. 

[7] Ashish Dangwal, “Shadowing F-22 Raptor – China Plans To Turn Its Low-Cost Satellites Into Spy Platforms That Can Even Track Fighter Jets,” Eurasian Times, April 8, 2022, https://eurasiantimes.com/china-plans-to-turn-its-satellites-into-spy-fighter-jets/. 

[8] Sean MacFarland, “Joint Force Experimentation for Great-Power Competition,” Heritage Foundation, November 17, 2020, https://www.heritage.org/military-strength-topical-essays/2021-essays/joint-force-experimentation-great-power-competition. 

[9] Justin Magula, “Rebalancing the Army for Military Competition,” Modern War Institute, April 5, 2022, https://mwi.usma.edu/rebalancing-the-army-for-military-competition/. 

[10] Lyle Goldstein, “Commentary: The New Indo-Pacific Strategy is Too Shallow,” Defense News, February 24, 2022, https://www.defensenews.com/opinion/commentary/2022/02/24/the-new-indo-pacific-strategy-is-too-shallow/. 

Governing Documents and Ideas Marco J. Lyons Option Papers United States

Options for the U.S. Army to Build More Combat Condition Resilient Soldiers

J. Caudle is a Civilian Defense Contractor and a Captain in the U.S. Army Reserves with 18 years of experience in all three U.S. Army components. He has specialties in Chemical, Biological, Radiological and Nuclear, Cavalry, and Armor operations and has a M.A. in National Security. He can be found on Twitter @MOPP_Ready. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States Army overemphasizes safety during training which has the potential to create risk adverse Soldiers and Commanders.

Date Originally Written:  April 25, 2022.

Date Originally Published: May 16, 2022.

Author and / or Article Point of View:  The author has served in the Active Army Component, the Army National Guard, and the Army Reserves as both an officer and a Non-Commissioned Officer. The author believes that soldiering is a dangerous business and that while Commanders should look out for the well-being of their Soldier, this looking out should not sacrifice combat effectiveness.

Background:  Soldiers that are treated like professional warfighters from day one and expected to embrace tough, realistic combat conditions will be less surprised by, and more resilient to, the stresses of combat. Commanders require the freedom to prioritize training Soldiers as warfighters over risk adversity.

Significance:  Commanders that are trained to be timid and driven by a fear of being relieved due to safety incidents in training may not be effective in combat. This ineffectiveness will negatively impact U.S. National Security. Soldiers led and trained by timid leaders have less potential to develop the aggressiveness and decisiveness needed to win battles. As Carl von Clausewitz said, “Given the same amount of intelligence, timidity will do a thousand times more damage in war than audacity[1].”

Option #1:  The U.S. Army increases hardships to produce tougher, more resilient warfighters.

Napoleon Bonaparte’s Maxim #58 says “The first qualification of a soldier is fortitude under fatigue and privation. Courage is only the second; hardship, poverty, and want are the best school for the soldier[2].” The ability to endure fatigue, privation, hardship, poverty and want can be trained just like any other skill. Battlefield conditions require that leaders develop resilient Soldiers. One hardship that Soldiers endure on the battlefield is constant exposure to extreme weather conditions. Leaders can increase the amount of time their Soldiers are exposed to the weather while training. To enhance focus on the tactical mission instead of administrative box checking, the Army Physical Fitness Uniform could be abandoned in favor of the duty uniform during daily fitness training and during the Army Combat Fitness Test. Increasing the amount of training conducted in using Joint Service Lightweight Integrated Suit Technology (JLIST) can also be done. Training in the JLIST increases Soldier proficiency in a simulated chemical warfare environment, adds physical stress into field problems, and trains the Soldier to focus on their mission instead of their physical discomfort in the suit. Leaders could also conduct training on a reverse cycle i.e. training at night and sleeping during the day. This reverse cycle would enable Soldiers to better know how they react to sleep deprivation so they can be effective in combat.

Risk:  Recruiting and retention would suffer as some Soldiers would not like this lifestyle. The Army will need a focused narrative on justifying this option. Army recruiting commercials would show these hardships for expectation management and also to attract a different type of recruit. There is also a safety risk as training gets harder, more mishaps are bound to occur.

Gain:  This option produces tougher, more resilient Soldiers. However, this option will only succeed if Soldiers are treated like professional warfighters. Training Soldiers in the ability to endure fatigue, privation, hardship, poverty and want not only serves their unit and ultimately the nation, but may have a lifelong impact on the resilience of the Soldier and their mental health.

Option #2:  The U.S. Army reevaluates its use of DD Form 2977, the Deliberate Risk Assessment Worksheet (DRAW).

The author has seen DRAWs up to 28 pages long that never make it down to the individual Soldiers it is designed to protect which establishes the perception that the DRAW itself is more important than actually implementing safety. In addition to the DRAW not being accessible to the Soldiers it is designed to protect, the U.S. Army’s implementation of the DRAW also ensures Commanders prioritize not being relieved due to a training mishap over conducting realistic training.

Better use of the DRAW would ensure the contents of the form are briefed to the Soldiers involved in the training. Additionally, Commanders would not let the DRAW overly restrain them in conducting realistic training. Keeping Soldiers unaware and training safely instead of realistically does not enable the U.S. Army “To deploy, fight, and win our Nation’s wars by providing ready, prompt, and sustained land dominance by Army forces across the full spectrum of conflict as part of the Joint Force[3].”

Risk:  The option will increased the probability of training accidents.

Gain:  This option will build risk tolerant leaders within the U.S. Army. It will also build more resilient Soldiers that are experienced in completing more realistic training. This realistic training will increase Soldier resiliency by exposing them to battlefield stressors.

Other Comments:  Colonel David Hackworth, U.S. Army (retired) states “Training for war must be realistic at all costs. We can’t just discontinue a curriculum when something bad happens, provided that something is not the result of misconduct on the parts of sadistic or unqualified instructors.” He later states “Training casualties, tragic as they may be, must be accepted as an occupational hazard in the tough and dangerous business of soldiering. The emphasis on safety at the expense of realism…sets up soldiers it presumably is protecting for failure by stunting their growth and inhibiting their confidence in themselves and their supporting weapons[4]”.

Recommendation:  None.


Endnotes:

[1]U.S. Army. (2019). ADP 6-0 Mission Command: Command and Control of Army Forces. Washington D.C.: Headquarters, Department of the Army

[2] Bonaparte, N. (1902). Napoleon’s Maxims of War. (G. D’Aguilar, Trans.) Philadelphia: David McKay. Retrieved from Military-Info.com.

[3] U.S. Army. (2022). Army.mil. Retrieved from https://www.army.mil/about/

[4] Hackworth, D. H., & Sherman, J. (1989). About Face: The Odyssey of an American Warrior. New York: Simon and Schuster.

 

 

Capacity / Capability Enhancement Governing Documents and Ideas J. Caudle Leadership Option Papers Readiness U.S. Army

U.S. Army Options to Regain Land Power Dominance

Marco J. Lyons is a U.S. Army Lieutenant Colonel who has served in tactical and operational Army, Joint, and interagency organizations in the United States, Europe, the Middle East, Afghanistan, and in the Western Pacific. He is currently a national security fellow at Harvard Kennedy School where he is researching strategy and force planning for war in the Indo-Pacific. He may be contacted at marco_lyons@hks.harvard.edu. Although the analysis presented here is the author’s alone, he has benefitted extensively from discussions with Dr. Ron Sega of U.S. Army Futures Command and Dr. Anthony “Tony” Tether a former Director of the Defense Advanced Research Projects Agency. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  The U.S. Army has a modernization enterprise that is second-to-none but facing the highly capable militaries of China and Russia is an unprecedented challenge. The Chinese People’s Liberation Army planned to have a Taiwan invasion capability no later than the early 2020s[1]. The Russian military will probably have substantially increased its missile-based stand-off capabilities by the mid-2020s[2]. More alarmingly, Russia has succeeded in modernizing approximately 82 percent of its nuclear forces[3]. Russian conventional and nuclear modernization have both been factors in Moscow’s recent three-pronged invasion of Ukraine. 

Date Originally Written:  April 5, 2022. 

Date Originally Published:  April 18, 2022. 

Author and / or Article Point of View:  The author has researched future operational concept development through the Army Science Board. The author believes that U.S. Army decision makers and analysts can more aggressively leverage past future force initiatives to address emerging threats from China and Russia. 

Background:  The ability to operate directly against adversary centers of gravity defines dominance. Dominant land power refers here to the ability of a land force to operate directly against the most decisive points that sustain an adversary force[4]. In land operations, a final decision requires control – through seizure, occupation, or retention – of terrain, people and resources using actual or threatened destruction or presence, or both[5]. America’s position as a global leader rests on its dominant land power[6]. 

Significance:  The character of warfare, the increasing interaction between the levels of war, and a concomitant need for higher echelon commanders to exercise military art on a broader scale and wider scope than earlier in history, all demand the U.S. Army refocus on the operational level[7]. The planning and command challenges at the operational level are more demanding than current doctrine would suggest. Moreover, the consequences of failure in major operations are difficult to overcome[8]. What has been called the theater-strategic level of war, or higher operational art, is poorly understood[9]. Three decades of post-Cold War stability and support operations, and two decades of counterinsurgency have helped the U.S. Army lose touch with the art of major operations. 

In only a few years China will have a trained, equipped, and cohesive invasion force and Russia will have a combat-capable force with recent experience in cross-domain operations. U.S. Army strategic leaders are already pressing for force transformation against these large-scale threats[10]. The Army can build on more than five years of modernization, the 2018 multi-domain operations concept, and a new global posture strategy to maintain the momentum needed to break the mold of the Brigade Combat Team-centric, Unified Land Operations-based force[11]. Importantly, U.S. Army planners can rapidly harvest important work done since the end of the Vietnam era. In competition, crisis, and armed conflict – in war – the United States needs a ready land force to deter unwanted escalation, assure allies and key partners, and compel beneficial geostrategic outcomes through force, if necessary. 

Option #1:  The U.S. Army revives and updates AirLand Battle–Future (ALBF). ALBF was meant to be a follow-on doctrine to AirLand Battle but was interrupted by the end of the Cold War and breakup of the Soviet Union. ALBF took the fundamentals of AirLand Battle and applied them to nonlinear battlefields and to advanced-technology capabilities – the same dynamics seen in the emerging operational environment. Additionally, ALBF extended operational concepts to operations short of war – like the competition short of armed conflict idea today[12]. 

Risk:  Major additions to the U.S. Army’s current doctrine development projects run the risk of delaying progress. Adding ALBF to the current Multi-Domain Operations (MDO) doctrine development may impose additional testing and validation demands. 

Gain:  An updated ALBF would provide a ready road map for the U.S. Army to move from the narrowly conceived 2018 Army in MDO concept to a published MDO doctrine which would replace Unified Land Operations. With the incorporation of a detailed view of multi-domain battle – still the heart of the MDO concept – an updated ALBF would provide the broad-based, low- to high-intensity doctrinal framework for the coming decades. 

Option #2:  The U.S. Army reinstitutes an updated Army of Excellence (AOE). The AOE was the last organization designed against a specified threat force – the Soviet Army and similarly-equipped enemy forces. The original rationale for the AOE was to reduce force “hollowness” by bringing personnel and materiel requirements within the limits of Army resources, enhance U.S. Army Corps-level capabilities to influence battle, and improve strategic mobility for immediate crisis response in regional conflicts[13]. This rationale is still relevant. Building on this rationale and using the Chinese People’s Liberation Army as a specified threat force, the Army could update the AOE (Light) Division to a “hybrid warfare” force and the AOE (Heavy) Division to a “high-technology, cross-domain maneuver” force. Echelons above division, with a reinstitution of corps-directed battle, could focus on layering advanced technology with multi-domain operations capabilities to conduct nonlinear and deep operations. 

Risk:  AOE was resource-intensive and a new AOE might also demand resources that may not materialize when needed. 

Gain:  An updated AOE organization would provide a familiar blueprint for fielding the land force for a more fully developed MDO doctrine. A new AOE would quickly restore robust and more survivable formations. 

Option #3:  The U.S. Army restarts the Army After Next (AAN). AAN locked on to technological maturation timelines that turned out to be wildly optimistic[14]. But many of the concepts, not least information dominance, precision fires, and focused logistics, were valid in the mid-1990s and remain so – the challenges are in testing, validation, and integration. Today, some of the early-envisioned AAN capabilities will soon be fielded. Various new fires systems, including Extended Range Cannon Artillery and Long-Range Precision Fire missiles, will provide the greatly extended range and higher accuracy needed to destroy enemy anti-access, area denial systems. As part of MDO, these new fires systems can be linked with forward operating F-35 multirole combat aircraft and ideally a constellation of low earth orbiting sensor platforms to achieve unprecedented responsiveness and lethality. The first battery of tactical directed energy weapons are in development, and even the combat cloud imagined by AAN planners, now called the Joint Enterprise Defense Infrastructure (or an alternative capability solution), is a near-term reality[15]. 

Risk:  AAN may not have focused enough on lethality at the operational level of war, and so in reviving the effort, it is possible this same shortcoming could hamper MDO against near-peer enemy forces. 

Gain:  What AAN provided that is missing today is a comprehensive blueprint to channel the Army’s genuine and ‘unifying’ modernization campaign under Army Futures Command[16]. 

Other Comments:  The U.S. Army’s strategy defines a land power dominant force by 2028[17]. Under the current Army Chief of Staff, beginning in 2020, the U.S. Army is trying to more closely link readiness, modernization, posture, and force structure under a broad plan for “transformation”[18]. To focus force transformation, the American Army could revive past work on nonlinear warfare, corps battle command, and technologically-enabled, globally integrated operations. 

Recommendation:  None. 


Endnotes:

[1] Franz-Stefan Gady, “Interview: Ben Lowsen on Chinese PLA Ground Forces: Assessing the future trajectory of PLA ground forces development,” The Diplomat, April 8, 2020, https://thediplomat.com/2020/04/interview-ben-lowsen-on-chinese-pla-ground-forces/. 

[2] Fredrik Westerlund and Susanne Oxenstierna, eds., Russian Military Capability in a Ten-Year Perspective – 2019 (Stockholm: Swedish Defence Research Agency, December 2019), https://www.researchgate.net/publication/337948965_Russian_Military_Capability_in_a_Ten-Year_Perspective_-_2019. 

[3] Dakota L. Wood, ed., 2021 Index of U.S. Military Strength (Washington, DC: The Heritage Foundation, 2021), https://www.heritage.org/sites/default/files/2020-11/2021_IndexOfUSMilitaryStrength_WEB_0.pdf. 

[4] Chairman of the Joint Chiefs of Staff, Joint Vision 2020: America’s Military – Preparing for Tomorrow (Washington, DC: National Defense University, Institute for National Strategic Studies, 2000), https://apps.dtic.mil/dtic/tr/fulltext/u2/a526044.pdf. 

[5] Michael A. Vane and Robert M. Toguchi, “The Enduring Relevance of Landpower: Flexibility and Adaptability for Joint Campaigns,” Association of the United States Army, October 7, 2003, https://www.ausa.org/publications/enduring-relevance-landpower-flexibility-and-adaptability-joint-campaigns. 

[6] Williamson Murray, ed., Army Transformation: A View from the U.S. Army War College (Carlisle, PA: Strategic Studies Institute, 2001), https://publications.armywarcollege.edu/pubs/1560.pdf. 

[7] David Jablonsky, “Strategy and the Operational Level of War: Part I,” Parameters 17, no. 1 (1987): 65-76, https://apps.dtic.mil/sti/pdfs/ADA516154.pdf. 

[8] Milan Vego, “On Operational Leadership,” Joint Force Quarterly 77 (2nd Quarter 2015): 60-69, https://ndupress.ndu.edu/JFQ/Joint-Force-Quarterly-77/Article/581882/on-operational-leadership/. 

[9] Michael R. Matheny, “The Fourth Level of War,” Joint Force Quarterly 80 (1st Quarter 2016): 62-66, https://ndupress.ndu.edu/JFQ/Joint-Force-Quarterly-80/Article/643103/the-fourth-level-of-war/. 

[10] James C. McConville, Army Multi-Domain Transformation: Ready to Win in Competition and Conflict, Chief of Staff Paper #1, Unclassified Version (Washington, DC: Headquarters, Department of the Army, March 16, 2021), https://api.army.mil/e2/c/downloads/2021/03/23/eeac3d01/20210319-csa-paper-1-signed-print-version.pdf. 

[11] Billy Fabian, “Back to the Future: Transforming the U.S. Army for High-Intensity Warfare in the 21st Century,” Center for a New American Security, November 19, 2020, https://www.cnas.org/publications/commentary/back-to-the-future-transforming-the-u-s-army-for-high-intensity-warfare-in-the-21st-century. One recent study concluded that Unified Land Operations does not sufficiently focus on large-scale war against an enemy force. See Alan P. Hastings, Coping with Complexity: Analyzing Unified Land Operations Through the Lens of Complex Adaptive Systems Theory (Fort Leavenworth, KS: School of Advanced Military Studies, United States Army Command and General Staff College, 2019), https://cgsc.contentdm.oclc.org/digital/api/collection/p4013coll3/id/3894/download. 

[12] Terry M. Peck, AirLand Battle Imperatives: Do They Apply to Future Contingency Operations? (Fort Leavenworth, KS: School of Advanced Military Studies, United States Army Command and General Staff College, 1990), https://apps.dtic.mil/dtic/tr/fulltext/u2/a234151.pdf. 

[13] Pat Ford, Edwin H. Burba, Jr., and Richard E. Christ, Review of Division Structure Initiatives, Research Product 95-02 (Alexandria, VA: Human Resources Research Organization, 1994), https://apps.dtic.mil/sti/citations/ADA297578. 

[14] Robert H. Scales, “Forecasting the Future of Warfare,” War on the Rocks, April 9, 2018, https://warontherocks.com/2018/04/forecasting-the-future-of-warfare/. 

[15] Dan Gouré, “Creating the Army After Next, Again,” RealClearDefense, August 16, 2019, https://www.realcleardefense.com/articles/2019/08/16/creating_the_army_after_next_again_114670.html. 

[16] U.S. Army, 2019 Army Modernization Strategy: Investing in the Future (Fort Eustis, VA: Army Futures Command, 2019), 1,  https://www.army.mil/e2/downloads/rv7/2019_army_modernization_strategy_final.pdf.

[17] The United States Army, “The Army’s Vision and Strategy,” Army.mil, no date, https://www.army.mil/about/. The Army’s “WayPoint 2028” focused on concepts and modernization. The United States Army, “Gen. Michael Garrett Visit,” U.S. Army Combined Arms Center, August 18, 2020, https://usacac.army.mil/node/2739. The Army’s “AimPoint Force” structure plan was meant to revive capable warfighting echelons above brigade. Andrew Feickert, “In Focus: The Army’s AimPoint Force Structure Initiative,” Congressional Research Service, May 8, 2020, https://fas.org/sgp/crs/natsec/IF11542.pdf. The “AimPoint Force” was about designing networked capabilities for overmatch. Devon Suits, “Futures and Concepts Center evaluates new force structure,” Army.mil, April 22, 2020, https://www.army.mil/article/234845/futures_and_concepts_center_evaluates_new_force_structure. 

[18] Association of the United States Army, “McConville Advocates for Aggressive Transformation,” Association of the United States Army, October 14, 2020, https://www.ausa.org/news/mcconville-advocates-aggressive-transformation. 

Capacity / Capability Enhancement Defense and Military Reform Governing Documents and Ideas Major Regional Contingency Marco J. Lyons Option Papers U.S. Army

Options to Modify Title 10 U.S. Code to Improve U.S. Security Force Assistance

Major James P. Micciche is a U.S. Army Strategist and Civil Affairs Officer. He holds degrees from the Fletcher School at Tufts University and Troy University and can be found on Twitter @james_micciche. The views expressed in this article are those of the author and do not necessarily reflect those of the U.S. Army, the Department of Defense, or the USG. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Without modifications to Title 10 U.S. Code (USC), Subtitle A, Part I, Chapter 16, §321 and §333, U.S. Security Force Assistance (SFA) contributions to strategic competition will not be fully realized.

Date Originally Written:  March 23, 2022.

Date Originally Published:  April 4, 2022.

Author and / or Article Point of View:  The author believes SFA can address strategic competitors’ most likely and most dangerous courses of action while also supporting competitive efforts through other instruments of national power. 

Background:  The DoD defines SFA as “activities that support the development of the capacity and capability of foreign security forces and their supporting institutions[1].”   SFA improves the ability of the Joint Force to support, enable, and enhance campaigning across all elements of the competition continuum[2].  Despite SFA’s prominent role in supporting the Integrated Deterrence concept underlying the 2022 National Defense Strategy, current statutory authorities limit SFA’s effectiveness. The 2022 National Defense Authorization Act’s (NDAA) Section 1323 (Study on Certain Security Cooperation Programs) and Section 1261 (Report on Security Cooperation Authorities and Associated Resourcing in Support of the Security Force Assistance Brigades) of the Senate’s proposed NDAA signal Congressional interest in improving SFA authorities to address strategic competition[3][4].  

Significance:  Allies and Partners are a cornerstone of U.S. policy. The first National Security Strategy identified an “area of U.S. strength and Soviet weakness is alliance relationships[5].” Current DoD leadership continues to emphasize Allies and Partners as the Assistant Secretary of Defense for Strategy, Plans, and Capabilities testified to the House Armed Service Committee “The U.S. network of alliances and partnerships is a strategic advantage our competitors cannot match[6].” That advantage enables the realization of Integrated Deterrence, the foundation of the 2022 National Defense Strategy. Integrated Deterrence synchronizes Joint Force and Interagency capabilities with those of Allies and Partners to deter or compel strategic competitors[7]. SFA builds the requisite partnerships and interoperability with Allies and Partners in key locations to generate Integrated Deterrent effects mitigating threats to U.S. interests. 

Sun Tzu prioritized negating an adversary’s strategy and then destabilizing their alliances[8]. China, America’s identified pacing threat, did this by investing in capabilities preventing the deployment of U.S. military power. China also uses diplomatic, information, and economic instruments of national power to degrade U.S. access, influence, and presence globally. From Anti-Access Area Denial technologies to coercive economic and diplomatic practices, China is denying options and increasing the costs for the U.S. military. Due to these concerted efforts, the Joint Force now faces two strategic challenges, “time and distance[9].” 

SFA provides options for combatant commanders to compete below levels of armed conflict through establishing or maintaining access, presence, and influence while improving partners’ military capability and interoperability with U.S. forces. SFA increases adversarial escalation costs and allows the Joint Force to begin conflict at a positional advantage. Despite SFA’s capabilities, the current statutory authorities do not enable the DoD to maximize its employment of purpose-built SFA formations, like the Army’s Security Force Assistance Brigades (SFABs) and the Air Force’s Mobility Support Advisory Squadrons.

Title 10 USC, Subtitle A, Part I, Chapter 16, authorizes the majority of DoD security cooperation activities, of which SFA is a subset. The current chapter 16 authorities represent the unipolar world of 1991-2003 or the Global War on Terrorism (GWOT) from 2001-2017. Within the current legislative framework §321 (Training with Friendly Countries) and §333 (Foreign Security Forces: Authority to Build Capacity) are the primary mechanisms for the DoD to conduct SFA. Each authority has limitations and strengths but neither is optimized for strategic competition. 

Option #1:  Congress changes “only with the military forces” to “security forces” within the limitation clause of §321.

§321 authorizes general-purpose forces of the United States to train only with the militaries of partners for the overall benefit of the U.S. unit[10]. §321 prevents the development of new partner capabilities and restricts materiel, construction, or contract support to training events only. While §321 is a flexible option for combatant commanders to establish access, presence, and influence it limits the development and integration to indirect benefits of training with U.S. forces. 

Risk:  Expanding the amount and type of security forces that U.S. conventional units can train without State Department concurrence risks over-militarizing aspects of U.S. foreign policy and delegitimizing whole of government efforts to develop capacity in non-defense sectors. §321 expansion risks potentially duplicating authorities within §322 (Special operations forces: training with friendly foreign forces) without an overarching program manager like U.S. Special Operations Command’s Joint Combined Exchange Training. 

Gain:  Increasing the aperture of who U.S. conventional forces can train with increases the flexibility and utility of using §321 to establish access, presence, and influence. This is especially beneficial within nations that have internally-focused security forces that are not part of a traditional military architecture. 

Option #2:  Congress creates a tenth capacity category authorizing “improved combined military interoperability” in §333.

§333 authorizes materiel, training, and operational support to foreign partner forces in developing capabilities across nine different mission types with seven of the nine being focused on GWOT-era objectives. Unlike §321 activities, §333 missions require Department of State concurrence and coordination and have specific Congressionally appropriated funding through the international security cooperation programs account. 

Risk:  Despite developing long-term partner capabilities, §333 activities take 18-24 months to approve, preventing its use in emergent and unforeseen requirements. Additionally, both conventional and special operations forces use §333 and its associated funds and adding additional mission types will increase competition for an already limited resource, especially with the loss of overseas contingency operations funding. 

Gain:  SFA works best over prolonged periods through persistent presence. §333’s ability to build partner capacity and provide materiel and operational support make it ideal for improving the effectiveness of partner forces to deter aggression and generating interoperability with U.S. Forces. Department of State concurrence and monitoring of §333 also facilitates the integration of other instruments of national power.  

Option #3:  Congress creates an SFA-specific authority and funding source. 

§321 broadly allows combatant commanders some flexibility in where they conduct SFA requiring months to approve and fund but vastly limits the long-term impact of their activities. Inversely, §333 is specific in allowing concerted efforts with a given partner that takes years to approve and its codified mission types constrain use to developing nations. Creating a responsive SFA-specific authority and funding source provides the Joint Force the ability to address strategic competition and prioritizes Partners and Allies.

Risk:  After the failures of the Afghan National Security Forces in August 2021 and the deaths of four U.S. Army Special Forces Soldiers during an ambush in 2017, there is substantial pushback on increasing the autonomy of the DoD to execute SFA. Increasing SFA’s ability to employ military members in advisory roles requires Congress to assume risk and put faith back into the DoD to execute global competition missions. 

Gain:  An SFA-specific authority and funding source highlights U.S. commitment to allies, partners, and strategic competition. This authority, with an accompanying appropriated funding source, will generate the long-term strategies needed to maximize the effects of SFA. 

Other Comments:  Combatant commanders continue to warn of legislative inaction in a world defined by competition between autocracies and democracies. In competition autocratic states enjoy an asymmetric advantage in speed, responsiveness, and reach due to no bureaucratic restrictions or adherence to international norms and laws. The Commander of U.S. Africa Command highlighted the issue of speed warning that U.S. assistance, “can sometimes take a long time to unfold, and that sometimes forces our African partners to go with the bird in hand, which is sometimes China, sometimes Russia[11].” The Commander of U.S. Southern Command outlined the need for flexibility when asking Congress to explore a “21st century flexible and responsible tool to allow us to outcompete and win by meeting our partner’s needs[12].” Inaction risks potential degradation of U.S. access, presence, and influence needed to establish integrated deterrence.

Recommendations:  None.


Endnotes:

[1] Joint Chiefs of Staff (2021), DOD Dictionary of Military and Associated Terms. page 192. Retrieved from https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf

[2] Joint Chiefs of Staff (2019) Competition Continuum (Joint Doctrine Note 1-19). Retrieved from https://www.jcs.mil/Portals/36/Documents/Doctrine/jdn_jg/jdn1_19.pdf?ver=2019-06-10-113311-233 defines three competition as having three nonlinear elements nonexclusive elements cooperation, competition below levels of armed conflict, and conflict.  

[3] United States. (2022). National Defense Authorization Act for fiscal year: Conference report. Washington, D.C: U.S. G.P.O. Retrieved from https://www.congress.gov/bill/117th-congress/senate-bill/1605/text

[4] United States. Congress. Conference Committees 2022. (2022). JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2022: Washington :U.S. Govt. Print. Off.. Retrieved from https://rules.house.gov/sites/democrats.rules.house.gov/files/17S1605-RCP117-21-JES-U1.pdf 

[5] Reagan, Ronald  (1987). National security strategy of the United States of America. Executive Office of The President Washington DC Washington United States. Retrieved from https://history.defense.gov/Portals/70/Documents/nss/nss1987.pdf

[6] C-SPAN (2022). Defense and State Officials Testify on U.S. Engagement with Allies. Retrieved from https://www.c-span.org/video/?518194-1/defense-state-officials-testify-us-engagement-allies 

[7] Garamone, Jim (2021). “Concept of Integrated Deterrence Will Be Key to National Defense Strategy, DOD Official Says.” U.S. Department of Defense – DOD News. Retrieved from https://www.defense.gov/News/News-Stories/Article/Article/2866963/concept-of-integrated-deterrence-will-be-key-to-national-defense-strategy-dod-o/ 

[8] Griffith, S. B. (1963). Sun Tzu: The art of war (Vol. 39). London: Oxford University Press.

[9] McConville, James (2021).  Army Multi-Domain Transformation: Ready to Win in Competition and Conflict, Chief of Staff Paper #1. Headquarters Department of the Army. Retrieved from https://api.army.mil/e2/c/downloads/2021/03/23/eeac3d01/20210319-csa-paper-1-signed-print-version.pdf 

[10] 10 U.S.C. § 321 (2016), accessed 5 March 2021, https://www.govinfo.gov/content/pkg/USCODE-2016-title10/html/USCODE-2016-title10-subtitleA-partI-chap16-subchapIII.htm.

[11] Senate Armed Service Committee. (2022). HEARING TO RECEIVE TESTIMONY ON THE POSTURE OF UNITED STATES CENTRAL COMMAND AND UNITED STATES AFRICA COMMAND a.” Retrieved from https://www.armed-services.senate.gov/imo/media/doc/22-12_03-15-2022.pdf 

[12] House Armed Service Committee. (2021). National Security Challenges and U.S. Military Activity in North and South America.” Retrieved from https://armedservices.house.gov/2021/4/full-committee-hearing-national-security-challenges-and-u-s-military-activity-in-north-and-south-america  

Allies & Partners Capacity / Capability Enhancement Competition James P. Micciche Option Papers U.S. Air Force U.S. Army

Options to Mitigate Cognitive Threats

John Chiment is a strategic threat intelligence analyst and has supported efforts across the Department of Defense and U.S. Intelligence Community. The views expressed herein are those of the author and do not reflect the official policy or position of the LinQuest Corporation, any of LinQuest’s subsidiaries or parents, or the U.S. Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Cognitive attacks target the defender’s ability to accurately perceive the battlespace and react appropriately. If successful, these attacks may permit an attacker to defeat better equipped or positioned defenders. Defenders who deploy defenses poorly matched against the incoming threat – either due to mischaracterizing that threat or by rushing to respond – likely will suffer greater losses. Mitigation strategies for cognitive attacks all carry risks.

Date Originally Written:  January 31, 2022.

Date Originally Published:   March 7, 2022.

Author and / or Article Point of View:  The author is an American threat intelligence analyst with time in uniform, as a U.S. government civilian, and as a DoD contractor. 

Background:  Effectively countering an attack requires the defender to detect its existence, recognize the danger posed, decide on a course of action, and implement that action before the attack completes its engagement. An attacker can improve the odds of a successful strike by increasing the difficulty in each of these steps (via stealth, speed, deception, saturation, etc.) while defenders can improve their chances through preparation, awareness, and technical capabilities. Correct detection and characterization of a threat enables decision-makers to decide which available defense is the most appropriate. 

Significance:  A defender deploying a suboptimal or otherwise inappropriate defense benefits the attacker. Attackers who target the defender’s understanding of the incoming attack and their decision-making process may prompt defenders to select inappropriate defenses. Technological superiority – long a goal of western militaries – may be insufficient against such cognitive manipulations that target human decision-making processes rather than the capabilities the defender controls.

Option #1:  Defenders increase their number of assets collecting Intelligence, Surveillance, and Reconnaissance (ISR) data in order to more rapidly detect threats.

Risk:  Increasing ISR data collection consumes industrial and financial resources and may worsen relationships with other powers and the general public. Increasing collection may also overwhelm analytic capabilities by providing too much data [1].

Gain:  Event detection begins the defender’s process and earlier detection permits the defender to develop more options in subsequent stages. By increasing the number of ISR assets that can begin the defender’s decision-making process, the defender increases their opportunities to select an appropriate defense.

Option #2:  The defender increases the number of assets capable of analyzing information in order to more rapidly identify the threat.

Risk:  Increasing the number of assets capable of accurately processing, exploiting, and disseminating (PED) information consumes intellectual and financial resources. Threat characterization decisions can also be targeted in the same ways as defense deployment decisions [2].

Gain:   A larger network of available PED analysts may better address localized spikes in attacks, more evenly distribute stress among analysts and analytic networks within supporting agencies, and lower the risk of mischaracterizing threats, likely improving decision-maker’s chances of selecting an appropriate defense.

Option #3:  The defender automates defense deployment decisions in order to rapidly respond with a defense.

Risk:  Automated systems may possess exploitable logical flaws that can be targeted in much the same way as defender’s existing decision-making process. Automated systems operate at greater speeds, limiting opportunities for the defender to detect and correct inappropriate decisions [3].

Gain:  Automated systems operate at high speed and may mitigate time lost to late detection or initial mischaracterization of threats. Automating decisions also reduces the immediate cognitive load on the defender by permitting defensive software designers to explore and plan for complex potentials without the stress of an incoming attack.

Option #4:  The defender increases the number of assets authorized to make defense deployment decisions in order to more likely select an appropriate defense.

Risk:  Increasing the available pool of authorized decision-makers consumes communication bandwidth and financial resources. Larger communication networks have larger attack surfaces and increase the risk of both data leaks and attackers maliciously influencing decisions into far-off engagements. Attacking the network segment may produce delays resulting in defenders not deploying appropriate defenses in time [4].

Gain:  A larger network of authorized decision-makers may better address localized spikes in attacks, more evenly distribute stress among decision-making personnel, and lower the risk of rushed judgements that may prompt inappropriate defense deployments.

Option #5:  The defender trains authorized decision-makers to operate at higher cognitive loads in order to more likely select an appropriate defense.

Risk:  Attackers likely can increase attacks and overwhelm even extremely well-trained decision-makers.  As such, this option is a short-term solution. Increasing the cognitive load on an already limited resource pool likely will increase burnout rates, lowering the overall supply of experienced decision-makers [5].

Gain:  Improving decision-maker training can likely be achieved with minimal new investments as it focusses on better utilization of existing resources.

Option #6:  The defender prepositions improved defenses and defense response options in order to better endure attacks regardless of decision-making timelines.

Risk:  Prepositioned defenses and response options consume logistical and financial resources. Actions made prior to conflict risk being detected and planned for by adversaries, reducing their potential value. Rarely used defenses have maintenance costs that can be difficult to justify [6].

Gain:  Prepositioned defenses may mitigate attacks not detected before impact by improving the targeted asset’s overall endurance, and attackers knowledgeable of the defender’s defensive capabilities and response options may be deterred or slowed when pursuing goals that will now have to contend with the defender’s assets.

Other Comments:  Risks to the decision-making processes cannot be fully avoided. Options #3 and #6 attempt to make decisions before any cognitive attacks target decision-makers while Options #2 and #4 attempt to mitigate cognitive attack impact by spreading the load across a larger pool of assets. Options #1 and #2 may permit decision-makers to make better decisions earlier in an active attack while Option #5 attempts to improve the decision-making abilities of existing decision-makers. 

Recommendation:  None.


Endnotes:

[1] Krohley, N. (2017, 24 October). The Intelligence Cycle is Broken. Here’s How To Fix It. Modern Warfare Institute at West Point. https://mwi.usma.edu/intelligence-cycle-broken-heres-fix/

[2] Corona, I., Giancinto, G., & Roli, F. (2013, 1 August). Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues. Information Sciences, 239, 201-225. https://doi.org/10.1016/j.ins.2013.03.022

[3] Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A. Xiao, C., Prakash, A., Kohno, T., & Song, D. (2018). Robust Physical-World Attacks on Deep Learning Visual Classification [Paper Presentation]. Conference on Computer Vision and Pattern Recognition. https://arxiv.org/abs/1707.08945v5

[4] Joint Chiefs of Staff. (2016, 21 December). Countering Threat Networks (JP 3-25). https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_25.pdf

[5] Larsen, R. P. (2001). Decision Making by Military Students Under Severe Stress. Military Psychology, 13(2), 89-98. https://doi.org/10.1207/S15327876MP1302_02

[6] Gerritz, C. (2018, 1 February). Special Report: Defense in Depth is a Flawed Cyber Strategy. Cyber Defense Magazine. https://www.cyberdefensemagazine.com/special-report-defense-in-depth-is-a-flawed-cyber-strategy/

Cyberspace Influence Operations Information and Intelligence John Chiment Option Papers

Options to Address Disinformation as a Cognitive Threat to the United States

Joe Palank is a Captain in the U.S. Army Reserve, where he leads a Psychological Operations Detachment. He has also previously served as an assistant to former Secretary of Homeland Security Jeh Johnson. He can be found on Twitter at @JoePalank. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


National Security Situation:  Disinformation as a cognitive threat poses a risk to the U.S.

Date Originally Written:  January 17, 2022.

Date Originally Published:  February 14, 2022.

Author and / or Article Point of View:  The author is a U.S. Army Reservist specializing in psychological operations and information operations. He has also worked on political campaigns and for the U.S. Department of Homeland Security. He has studied psychology, political communications, disinformation, and has Masters degrees in Political Management and in Public Policy, focusing on national security.

Background:  Disinformation as a non-lethal weapon for both state and non-state actors is nothing new.  However the rise of the internet age and social media, paired with cultural change in the U.S., has given this once fringe capability new salience. Russia, China, Iran, North Korea, and violent extremist organizations pose the most pervasive and significant risks to the United States through their increasingly weaponized use of disinformation[1]. 

Significance:  Due to the nature of disinformation, this cognitive threat poses a risk to U.S. foreign and domestic policy-making, undercuts a foundational principle of democracy, and has already caused significant disruption to the U.S. political process. Disinformation can be used tactically alongside military operations, operationally to shape the information environment within a theater of conflict, and strategically by potentially sidelining the U.S. or allies from joining international coalitions.

Option #1:  The U.S. focuses domestically. 

The U.S. could combat the threat of disinformation defensively, by looking inward, and take a two-pronged approach to prevent the effects of disinformation. First, the U.S. could adopt new laws and policies to make social media companies—the primary distributor of disinformation—more aligned with U.S. national security objectives related to disinformation. The U.S. has an asymmetric advantage in serving as the home to the largest social media companies, but thus far has treated those platforms with the same laissez faire approach other industries enjoy. In recent years, these companies have begun to fight disinformation, but they are still motivated by profits, which are in turn motivated by clicks and views, which disinformation can increase[2]. Policy options might include defining disinformation and passing a law making the deliberate spread of disinformation illegal or holding social media platforms accountable for the spread of disinformation posted by their users.

Simultaneously, the U.S. could embark on widescale media literacy training for its populace. Raising awareness of disinformation campaigns, teaching media consumers how to vet information for authenticity, and educating them on the biases within media and our own psychology is an effective line of defense against disinformation[3]. In a meta-analysis of recommendations for improving awareness of disinformation, improved media literacy training was the single most common suggestion among experts[4]. Equipping the end users to be able to identify real, versus fake, news would render most disinformation campaigns ineffective.

Risk:  Legal – the United States enjoys a nearly pure tradition of “free speech” which may prevent the passage of laws combatting disinformation.

Political – Passing laws holding individuals criminally liable for speech, even disinformation, would be assuredly unpopular. Additionally, cracking down on social media companies, who are both politically powerful and broadly popular, would be a political hurdle for lawmakers concerned with re-election. 

Feasibility –  Media literacy training would be expensive and time-consuming to implement at scale, and the same U.S. agencies that currently combat disinformation are ill-equipped to focus on domestic audiences for broad-scale educational initiatives.

Gain:  A U.S. public that is immune to disinformation would make for a healthier polity and more durable democracy, directly thwarting some of the aims of disinformation campaigns, and potentially permanently. Social media companies that are more heavily regulated would drastically reduce the dissemination of disinformation campaigns worldwide, benefiting the entire liberal economic order.

Option #2:  The U.S. focuses internationally. 

Strategically, the U.S. could choose to target foreign suppliers of disinformation. This targeting is currently being done tactically and operationally by U.S. DoD elements, the intelligence community, and the State Department. That latter agency also houses the coordinating mechanism for the country’s handling of disinformation, the Global Engagement Center, which has no actual tasking authority within the Executive Branch. A similar, but more aggressive agency, such as the proposed Malign Foreign Influence Response Center (MFIRC), could literally bring the fight to purveyors of disinformation[5]. 

The U.S. has been slow to catch up to its rivals’ disinformation capabilities, responding to disinformation campaigns only occasionally, and with a varied mix of sanctions, offensive cyber attacks, and even kinetic strikes (only against non-state actors)[6]. National security officials benefit from institutional knowledge and “playbooks” for responding to various other threats to U.S. sovereignty or the liberal economic order. These playbooks are valuable for responding quickly, in-kind, and proportionately, while also giving both sides “off-ramps” to de-escalate. An MFIRC could develop playbooks for disinformation and the institutional memory for this emerging type of warfare. Disinformation campaigns are popular among U.S. adversaries due to the relative capabilities advantage they enjoy, as well as for their low costs, both financially and diplomatically[7]. Creating a basket of response options lends itself to the national security apparatus’s current capabilities, and poses fewer legal and political hurdles than changing U.S. laws that infringe on free speech. Moreover, an MFIRC would make the U.S. a more equal adversary in this sphere and raise the costs to conduct such operations, making them less palatable options for adversaries.

Risk:  Geopolitical – Disinformation via the internet is still a new kind of warfare; responding disproportionately carries a significant risk of escalation, possibly turning a meme into an actual war.

Effectiveness – Going after the suppliers of disinformation could be akin to a whack-a-mole game, constantly chasing the next threat without addressing the underlying domestic problems.

Gain:  Adopting this approach would likely have faster and more obvious effects. A drone strike to Russia’s Internet Research Agency’s headquarters, for example, would send a very clear message about how seriously the U.S. takes disinformation. At relatively little cost and time—more a shifting of priorities and resources—the U.S. could significantly blunt its adversaries’ advantages and make disinformation prohibitively expensive to undertake at scale.

Other Comments:  There is no reason why both options could not be pursued simultaneously, save for costs or political appetite.

Recommendation:  None.


Endnotes:

[1] Nemr, C. & Gangware, W. (2019, March). Weapons of Mass Distraction: Foreign State-Sponsored Disinformation in the Digital Age. Park Advisors. Retrieved January 16, 2022 from https://2017-2021.state.gov/weapons-of-mass-distraction-foreign-state-sponsored-disinformation-in-the-digital-age/index.html 

[2] Cerini, M. (2021, December 22). Social media companies beef up promises, but still fall short on climate disinformation. Fortune.com. Retrieved January 16, 2022 from https://fortune.com/2021/12/22/climate-change-disinformation-misinformation-social-media/

[3] Kavanagh, J. & Rich, M.D. (2018) Truth Decay: An Initial Exploration of the Diminishing Role of Facts and Analysis in American Public Life. RAND Corporation. https://www.rand.org/t/RR2314

[4] Helmus, T. & Keep, M. (2021). A Compendium of Recommendations for Countering Russian and Other State-Sponsored Propaganda. Research Report. RAND Corporation. https://www.rand.org/pubs/research_reports/RRA894-1.html

[5] Press Release. (2020, February 14). Following Passage of their Provision to Establish a Center to Combat Foreign Influence Campaigns, Klobuchar, Reed Ask Director of National Intelligence for Progress Report on Establishment of the Center. Office of Senator Amy Klobuchar. https://www.klobuchar.senate.gov/public/index.cfm/2020/2/following-passage-of-their-provision-to-establish-a-center-to-combat-foreign-influence-campaigns-klobuchar-reed-ask-director-of-national-intelligence-for-progress-report-on-establishment-of-the-center

[6] Goldman, A. & Schmitt, E. (2016, November 24). One by One, ISIS Social Media Experts Are Killed as Result of F.B.I. Program. New York Times. Retrieved January 15, 2022 from https://www.nytimes.com/2016/11/24/world/middleeast/isis-recruiters-social-media.html

[7] Stricklin, K. (2020, March 29). Why Does Russia Use Disinformation? Lawfare. Retrieved January 15, 2022 from https://www.lawfareblog.com/why-does-russia-use-disinformation

Cyberspace Influence Operations Information and Intelligence Joe Palank Option Papers Social Media United States

Options to Address the Risk from Elected Officials Concurrently in the National Guard or Reserves

Marshall McGurk serves in the United States Army and has deployed to Iraq, Afghanistan, and Lebanon. He presently works at the Joint Readiness Training Center as a Special Operations Forces Observer-Coach/Trainer. He can be found on Twitter @MarshallMcGurk and writes for the Havok Journal website. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Elected Officials who concurrently serve in the National Guard or Reserves politicize the U.S. Armed Forces.

Date Originally Written:  January 13, 2022.

Date Originally Published:  January 31, 2022.

Author and / or Article Point of View:  The author is an active duty U.S. Army Officer. The author believes in the responsibilities and duties of military service.  The article is written from the point of view that boundaries must be made or enforced to prevent politicization within the Armed Forces.

Background:  Currently, there are 14 members of the 117th Congress still serving in the Armed Forces of the United States. “Six House Members and one Senator are still serving in the reserves, and seven House Members are still serving in the National Guard[1].” Veteran candidates for political office and those serving while elected find themselves under increased scrutiny.  This scrutiny comes from a public with different opinions regarding the January 6, 2021 attempted insurrection at the U.S. Capitol Building in response to the 2020 election, a nation no longer at war in Iraq or Afghanistan, and a crippling global pandemic that has threatened the U.S. economy and national security.  Due to these events, numerous retired military officers from O-5 to General Officer/Flag Officer rank have publicly expressed their concerns for or against previous or current U.S. Presidents[2][3].

None of the options outlined hereafter prohibit non-partisan elected or appointed service allowed by Department of Defense Directive (DoDD) 1344.10, “Political Activities by Members of the Armed Forces.”

Significance:  In light of the background and the increasing airing of grievances, having elected officials serving concurrently in the military is a national security concern. The use of military uniforms, rank-based trappings, and influence in the electoral process is ripe for exploitation by foreign intelligence services. This situation sows seeds of division among military members, could negatively affect the trust that civilians and military members place in their elected officials, and could create undue influence of rank upon military members when the ballot is cast.

There is also a waning of civilian trust in the U.S. military. A November 2021 Reagan Foundation survey found only 45% of those surveyed had a great deal of confidence in the military institution[4]. Civilian trust in the military institution is vital for national defense. Serving while in elected office may lead to conflicts of interest while developing response options to foreign interference in U.S. elections.

Option #1:  DoD Requires Elected Military Members to Enter the Individual Ready Reserve

The Department of Defense could create regulations that place elected military members or those appointed to partisan national positions in the Individual Ready Reserve, without pay, benefits, or activation, for the duration of their elected service. The strictures of DoDD 1344.10 remain in place, allowing the elected official to state their military affiliation, while also confirming the primacy of their elected position. 

Risk:  Elected officials maintaining military affiliation through the little-known Individual Ready Reserve may lead to confusion within the electorate about roles and responsibilities of their elected officials. This may also trigger conflict of interest concerns if language in the legislation does not prohibit activation of concurrently serving officials for overseas or Defense Support of Civil Authorities missions. 

Gain:  Option #1 would allow for a possible win-win-win for military members seeking elected office, for the Legislative Branch, and for the Department of Defense. Elected officials could maintain affiliation to a trusted and respected institution, and the Legislative Branch and electorate would not endure their Representatives and Senators deploying to dangerous missions outside of their legislative duties.

Option #2:  DoD Prohibits Military Members from Seeking Elected Office

Another option is for the Department of Defense to modify DoDD 1344.10, “Political Activities by Members of the Armed Forces[5],” so military members are prohibited from seeking elected office entirely. Those seeking state or national elected office would have to agree to an honorable discharges or retirement from military service before declaring candidacy. This option includes all services, components, military occupational specialties, and functional areas.

Risk:  Option #2 would remove a historical precedent of concurrent service in the Legislative and Executive Branches of government going back to the founding of the United States and the Continental Congress. An adjustment to this precedent would spark debate in the Department of Defense, the greater Executive Branch, the Legislative branches, as well as debate in the public sphere by those wishing to maintain the status quo.  

Gain:  Option #2 reinforces the non-partisan nature of the United States Armed Forces in accordance with the spirit and intent of DoDD 1344.10.

Option #3:  Congress Bars Members from Reserve or National Guard Membership

One option is for Congress to pass legislation barring national elected officials or those appointed to partisan national positions from serving in the Reserve or National Guard. The newly elected or appointed official must resign or retire from their military position prior to their inauguration. There is historical precedent for this option as President Dwight D. Eisenhower resigned his military commission in 1952 prior to his presidency[6].

Risk:  This change in legislation would only affect those elected to national office.  This means states would have to make their own choices about whether or not to change their legislation. Human Resource departments within the Armed Forces may not be prepared to process resignations or retirements of elected officials currently serving.

Gain: The gain from option #3 is a removal of risk, a removal of misinformation and disinformation opportunities, and a clear delineation of military and civil responsibilities.

Other Comments:  All three options would require DoDD 1344.10 to be re-written, coordinated, adjudicated, and its new version approved by the Secretary of Defense.

Recommendation:  None.


Endnotes:

[1] Congress.gov. (2022, January 3). Membership of the 117 Congress: A profile. Congressional Research Service. Retrieved January 15, 2022 from https://crsreports.congress.gov/product/pdf/R/R46705 

[2] Open letter from retired generals and admirals. Flag Officers 4 America. (2021, May). Retrieved January 15, 2022, from https://img1.wsimg.com/blobby/go/fb7c7bd8-097d-4e2f-8f12-3442d151b57d/downloads/2021%20Open%20Letter%20from%20Retired%20Generals%20and%20Adm.pdf?ver=1620643005025 

[3] Eaton, P. D., Taguba, A. M., & Anderson, S. M. (2022, January 6). Opinion | 3 retired generals: The military must prepare now for a 2024 insurrection. The Washington Post. Retrieved January 15, 2022, from https://www.washingtonpost.com/opinions/2021/12/17/eaton-taguba-anderson-generals-military/ 

[4] Beacon Research (2021, November) U.S. National Survey Of Defense Attitudes On Behalf Of The Ronald Reagan Foundation Final Topline Results Retrieved January 15, 2022 from https://s.wsj.net/public/resources/documents/Reagan%20Foundation%20-%20November%202021%20Survey%20-%20Topline%20Results.pdf 

[5] FVAP.gov  (2008, February 19) Department of Defense Directive Number 1344.10. Department of Defense. Retrieved January 15, 2022 from https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodd/134410p.pdf   

[6] U.S. Department of the Interior. (n.d.). Eisenhower Military Chronology. National Parks Service. Retrieved January 16, 2022, from https://www.nps.gov/features/eise/jrranger/chronomil1.htm 

Armed Forces Marshall McGurk Option Papers Politicization United States

Options to Counter Foreign Influence Operations Targeting Servicemember and Veterans

Marcus Laird has served in the United States Air Force. He presently works at Headquarters Air Force Reserve Command as a Strategic Plans and Programs Officer. He can be found on Twitter @USLairdForce.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  Divergent Options’ does not contain official information nor is it affiliated with the Department of Defense or the U. S. Air Force. The following opinion is of the author only, and is not official Air Force or Department of Defense policy. This publication was reviewed by AFRC/PA, and is cleared for public release and unlimited distribution.


National Security Situation:  Foreign Actors are using Social Media to influence Servicemember and Veteran communities. 

Date Originally Written:  December 2, 2021.

Date Originally Published:  January 3, 2022.

Author and / or Article Point of View:  The author is a military member who has previously researched the impact of social media on US military internal dialogue for professional military education and graduate courses. 

Background:  During the lead up to the 2016 election, members of the U.S. Army Reserve were specifically targeted by advertisements on Facebook purchased by Russia’s Internet Research Agency at least ten times[1]. In 2017, the Vietnam Veterans of America (VVA) also detected social media profiles which were sophisticated mimics of their official web pages. These web pages were created for several reasons to include identity theft, fraud, and disseminating disinformation favorable to Russia. Further investigation revealed a network of fake personas attempting to make inroads within online military and veteran communities for the purpose of bolstering persona credibility to spread disinformation. Because these mimics used VVA logos, VVA was able to have these web pages deplatformed after two months due to trademark infringement[2].  

Alternatively, military influencers, after building a substantial following, have chosen to sell their personas as a means of monetizing their social media brands. While foreign adversary networks have not incorporated this technique for building an audience, the purchase of a persona is essentially an opportunity to purchase a turnkey information operation platform. 

Significance:  Servicemembers and veterans are trusted voices within their communities on matters of national security. The special trust society places on these communities makes them a particularly lucrative target for an adversary seeking to influence public opinion and shape policy debates[3]. Social media is optimized for advertising, allowing specific demographics to be targeted with unprecedented precision. Unchecked, adversaries can use this capability to sow mistrust, degrade unit cohesion, and spread disinformation through advertisements, mimicking legitimate organizations, or purchasing a trusted persona. 

Option #1:  Closing Legislative Loopholes 

Currently, foreign entities are prohibited from directly contributing to campaigns. However, there is no legal prohibition on purchasing advertising by foreign entities for the purpose of influencing elections. Using legislative means to close this loophole would deny adversaries’ abuse of platforms’ microtargeting capabilities for the purpose of political influence[4].

Risk:  Enforcement – As evidenced during inquiries into election interference, enforcement could prove difficult. Enforcement relies on good faith efforts by platforms to conduct internal assessments of sophisticated actors’ affiliations and intentions and report them. Additionally, government agencies have neither backend system access nor adequate resources to forensically investigate every potential instance of foreign advertising.

Gain:  Such a solution would protect society as a whole, to include the military and veteran communities. Legislation would include reporting and data retention requirements for platforms, allowing for earlier detection of potential information operations. Ideally, regulation would prompt platforms to tailor their content moderation standards around political advertising to create additional barriers for foreign entities.  

Option #2:  Deplatforming on the Grounds of Trademark Infringement

Should a foreign adversary attempt to use sophisticated mimicry of official accounts to achieve a veneer of credibility, then the government may elect to request a platform remove a user or network of users on the basis of trademark infringement. This technique was successfully employed by the VVA in 2017. Military services have trademark offices, which license the use of their official logos and can serve as focal points for removing unauthorized materials[5].

Risk:  Resources – since trademark offices are self-funded and rely on royalties for operations, they may not be adequately resourced to challenge large-scale trademark infringement by foreign actors.

Personnel – personnel in trademark offices may not have adequate training to determine whether or not a U.S. person or a foreign entity is using the organization’s trademarked materials. Failure to adequately delineate between U.S. persons and foreign actors when requesting to deplatform a user potentially infringes upon civil liberties. 

Gain:  Developing agency response protocols using existing intellectual property laws ensures responses are coordinated between the government and platforms as opposed to a pickup game during an ongoing operation. Regular deplatforming can also help develop signatures for sophisticated mimicry, allowing for more rapid detection and mitigation by the platforms. 

Option #3:  Subject the Sale of Influence Networks to Review by the Committee on Foreign Investment in the United States (CFIUS) 

Inform platform owners of the intent of CFIUS to review the sale of all influence networks and credentials which specifically market to military and veteran communities. CFIUS review has been used to prevent the acquisition of applications by foreign entities. Specifically, in 2019 CFIUS retroactively reviewed the purchase of Grindr, an LGBTQ+ dating application, due to national security concerns about the potential for the Chinese firm Kunlun to pass sensitive data to the Chinese government.  Data associated with veteran and servicemember social networks could be similarly protected[6]. 

Risk:  Enforcement – Due to the large number of influencers and the lack of knowledge of the scope of the problem, enforcement may be difficult in real time. In the event a sale happens, then ex post facto CFIUS review would provide a remedy.  

Gain:  Such a notification should prompt platforms to craft governance policies around the sale and transfer of personas to allow for more transparency and reporting.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Goldsmith, K. (2020). An Investigation Into Foreign Entities Who Are Targeting Servicemembers and Veterans Online. Vietnam Veterans of America. Retrieved September 17, 2019, from https://vva.org/trollreport/, 108.

[2] Ibid, 6-7.

[3] Gallacher, J. D., Barash, V., Howard, P. N., & Kelly, J. (2018). Junk news on military affairs and national security: Social media disinformation campaigns against us military personnel and veterans. arXiv preprint arXiv:1802.03572.

[4] Wertheimer, F. (2019, May 28). Loopholes allow foreign adversaries to legally interfere in U.S. elections. Just Security. Retrieved December 10, 2021, from https://www.justsecurity.org/64324/loopholes-allow-foreign-adversaries-to-legally-interfere-in-u-s-elections/.

[5] Air Force Trademark Office. (n.d.). Retrieved December 3, 2021, from https://www.trademark.af.mil/Licensing/Applications.aspx.

[6] Kara-Pabani, K., & Sherman, J. (2021, May 11). How a Norwegian government report shows the limits of Cfius Data Reviews. Lawfare. Retrieved December 10, 2021, from https://www.lawfareblog.com/how-norwegian-government-report-shows-limits-cfius-data-reviews.

Cyberspace Influence Operations Marcus Laird Military Veterans and Military Members Option Papers Social Media United States

Options to Make COVID19 Lessons Learned Permanent at the United Kingdom’s Intermediate Command and Staff Course (Land)

Grant is a serving officer in the British Army.  This article is an individual submission as the content is not endorsed by Army Division or the Defence Academy.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  During the COVID19 pandemic, the United Kingdom’s (UK) Intermediate Command and Staff Course (Land) (ICSC(L)) was modified in several ways which, if made permanent, could improve the output leading to an overall increase in combat capability.

Date Originally Written:  July 20, 2021. 

Date Originally Published:  October 11, 2021.

Author and / or Article Point of View:  The author has a technical background, recently attended ICSC(L), and believes in contributing to a wider discussion regarding COVID19 lessons learned.

Background:  The options below present a reasonable challenge[1] on how the ICSC(L) is delivered, support the Army’s Digital Transformation[2], and avoid unintentionally stepping back to pre-COVID19 delivery and content.  These options set the conditions for enabling future Integrated Operations by improving decision making.  

Significance:  The aim of ICSC(L) “is to train and educate majors for grade 1 and 2 staff appointments, and commands as majors by developing their leadership, analytical and communication skills, productivity, professionalism and mental agility, …. to develop the intellectual edge needed for success on operations and leadership in government[3]”.   ICSC(L) is traditionally a seven month residential course, but during the past three courses a large portion was delivered online due to COVID19.  This online delivery could continue[4] with no training deficiency identified in previous courses.

Option #1:  Embrace technology.  One of the key benefits of ICSC(L), per the instructor cadre there, is developing a “professional network,” as the students are in the “people business, that requires face to face” content delivery.  Hence on April 19, 2021, during a national lockdown, the course of over 200 students formed up for face to face learning delivered in part socially distanced with everyone sitting in a lecture hall, listening to speakers briefing using the Microsoft Teams application on a large screen at the front.

By the autumn of 2021, a project called “MyMOD Laptop” expects to have delivered 150,000 laptops enabling personnel to work effectively and collaboratively across the world.  If these laptops were issued at the start of ICSC(L)[5], and best practices training on the new tools e.g. Microsoft Teams provided, students could embrace new ways of working regarding collaborative planning and management. 

Risk:  The benefits of face to face lessons are clear.  For example, it is very challenging attempting a modeling exercise on Microsoft Teams.  

Gain:  University courses[6] are delivered in part by online work.  Training as you fight using the same information technology gives students a chance to experiment and develop new styles of working and sets conditions for success as a digital army rather than using labelled up paper handbooks[7].  As U.S. Army General Stanley McCrystal said in 2011, “instead of being able to get all the key leaders for a decision together in a single room and look them in the eye ……I’ve got to use other techniques. I’ve got to use VTC, I’ve got to use chat, I’ve got to use email ….. not just for communication, but for leadership[8]”.

Option #2:  Reduce duplicative instruction.

The post-Cold War era saw UK forces based in Germany lacking the understanding and technical communications to practice a joint approach.  The Army today is much more than ‘The Armored Brigade’ and arguably ceding to ‘Jointery,’ in the information age.  On the last ICSC(L), approximately a quarter of the course’s duration was dedicated to Combat Estimate Planning at Brigade and Division Headquarters.  Students at ICSC(L) saw Combat Estimate Planning as repeating what they had already learned at Junior Officer Tactical Awareness Course (4 weeks) and Junior Command Staff Course (6 weeks).  During COVID19, elements of the Combat Estimate delivery were condensed into a 14-day modular block.  This shortened block suffices as less than a tenth of students are posted into a Division or Brigade Headquarters roles that utilize the Combat Estimate with slightly more than a tenth assigned to roles[9] that use the Tactical Estimate that is briefed just once one the course.  This option leaves four fifths of the course where any estimate is beneficial but not essential.  

Risk:  Some students may, based on their learning style or career focus, need to be refreshed and / or re-taught certain subjects.  Removing duplicative instruction may put them at risk for not learning / retaining the material. 

Gain:  Reducing the overall course duration by shortening repetitive content would reduce the demands on both students and staff.   

Option #3:  Update course content.

ICSC(L) lacked any instruction related to considerations for mitigation of COVID19 in future units nor how, from a Ministry of Defense (MoD) point of view, a pandemic could effect national security operations.  Secondly, while the 2021 Integrated Review mentions the word “Cyber” 156 times, ICSC(L) only allocated a single afternoon lesson for cyber.  Future iterations of ICSC(L) could teach students how to plan for continued operations during a pandemic, and the integration of cyber operations at all levels. This instruction would utilize local knowledge of recent planning and mitigations that the ICSC(L) staff had to implement. 

Risk:  COVID19 and the reported major cyber incident[10] experiences may be too new and too localized and curriculum developed too fast could teach students the wrong things.

Gain:  Though localized, the cyber incident vignette or war story is just as relevant to future operations as Falklands or Iraq briefs and would boost MoD resilience.  “Chatham house rules, on this day on camp we discovered, how it unfolded, what we did and with hindsight, what we wished we had done or known, ideally supported by a subject matter expert.”  Additionally, graduates of ICSC(L) are more likely to have to plan around COVID19 and cyber incidents then develop a major war plan.

Option #4:  Integrate and cohere outside the Army.

Historically, two weeks of ICSC(L) is spent on a U.S. overseas visit.  Due to COVID19 this overseas visit has not happened for the last three ICSC(L) iterations and this time was replaced with two weeks of student research.  With a quarter of each of the ICSC(L) students posted out of the Army and into UK Strategic Command, these two weeks would be better spent learning about the command.  Strategic Command leads with billions of pounds of capabilities that are key to the digital Army of the future.  However, ICSC(L) students only receive a couple of days high-level familiarization[11].  Prioritizing learning about the wider Defence Organization would benefit the students posted into Strategic Command and provide a long term improvement in capabilities provided to the Army.  

Risk:  Permanently removing the overseas trip would hinder UK/U.S. understanding, but could be mitigated by distributed collaboration. 

Gain:  In this option students would achieve a greater understanding of Strategic Command’s capability development and how to influence efforts at inception.  Students would also get to interact with other services speakers[12], former government personnel, subject matter experts, and conference speakers and learn how they think.  All of the preceding would enable Multi Domain Integration and diversify outlooks from the current Land-centric view.  

Option #5:  Modular course delivery over an extended timeframe.

COVID 19 has proven that elements of ICSC(L) can be delivered in a modular format.   The current seven month residential course is for many the last formal and externally assessed training they receive prior to promotion to Lieutenant Colonel.  This option envisions implementing modular content delivery over six years, with completion being a pre-requisite for promotion to Lieutenant Colonel. 

Risk:  The current in-person, seven month focused ICSC(L) provides the opportunity for students to develop their professional network and receive individual attention.

Gain:  This option follows Royal Air Force and Royal Navy equivalents with a condensed period of mandatory training with career managers and future employers selecting relevant additional modular elements.  This modular package exploits industry training (such as AGILE / DevSecOps,) relevant to roughly a third of the students being posed to capability and acquisition roles.  This option allows students to work around family commitments such as maternity leave.  Rather than the force losing 400 newly promoted Majors to the traditional seven month long residential ICSC(L) course, a modular option would enable students to remain in situ and, in theory, fills 50 currently gapped jobs in the army. This option would improve wider defense output, reduce the churn of postings while opening up options for attendance from the whole force[13], leading to enhanced networking and diversity of thought.  

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] “The Good Operation,” Ministry of Defense, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/674545/TheGoodOperation_WEB.PDF

[2] “Army Digitalisation: the THEIA programme,”  

[3] Overview of ICSC(L), https://www.da.mod.uk/colleges-and-schools/joint-services-command-and-staff-college/army-division/.

[4] ICSC 17 Army Division Welcome Letter.

[5] International students would need to have limited system permissions similar to how international exchange officers are given limited access to headquarters.

[6] Such as the Cyber Operations MSc offered by Cranfield University, which is available at Shrivenham, a secure military site in partnership with the Defence Academy.

[7] Quote from one of the ICSC(L) course instruction videos where success of a staff officer is judged by how well labelled up their Staff Officers HandBook is.

[8] Stanley McChrystal, TED Talk, “Listen, learn… then lead,” March 2011, https://www.ted.com/talks/stanley_mcchrystal_listen_learn_then_lead.

[9] Such as the Permanent Joint Headquarters and the North Atlantic Treaty Organization Allied Rapid Reaction Corps

[10] The Sun Newspaper, 21 Mar 21, Ministry of Defence academy hit by major cyber attack by ‘foreign power, https://www.the-sun.com/news/2555777/mod-defence-academy-cyber-attack-foreign-power/

[11] STRATCOM & DES

[12] Online attendance of the Royal United Service Institute Land Warfare Conference 

[13] It is unlikely that the National Health Service would send a student for the 7-month courses but a two-week military planning-focused event may be appealing.  

Capacity / Capability Enhancement COVID-19 Grant Option Papers Training United Kingdom

Options to Counter Russia’s Wagner Group in Africa

Benjamin Fincham-de Groot is a masters candidate at Deakin University pursuing his masters of international relations with a specialization in conflict and security. He can be found on twitter at @Finchamde. Divergent Opinions’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Russia’s Wagner Group, a Private Military Company, conducts military-like operations in Africa.  As a PMC, Wagner Group’s activities can be disavowed by the Russian government.  

Date Originally Written:  August 10, 2021.

Date Originally Published:  October 4, 2021.

Author and / or Article Point of View:  The author believes that Russia’s Wagner Group poses a threat to stability in Africa.  This article discusses options to project U.S. influence and protect American interests in the African theatre. 

Background:  Grey zone tactics are the use of civilian or non-military assets to achieve military or strategic objectives. These tactics are useful for state actors to use or project power while maintaining a plausible deniability that can minimise the chance of conflict escalation[1][2]. 

Broadly, there are two ways in which state actors work to effect change through grey zone tactics[3]. First, through grey zone tactics a state actor normalises transgressions through small violations that each create precedent to justify a greater violation[4]. Thus, whereas it would be unreasonable for one state actor to escalate to full-blown conflict over a freedom of navigation operation, or a lesser violation of airspace, each unanswered transgression creates precedent for greater transgression without repercussion.  One example is the steady escalation of Chinese military flight incursions into Taiwanese airspace[5]. Second, the fait accompli in which a state actor swiftly and suddenly achieves a strategic objective and positions near-peer rivals to choose between escalation and acceptance. This tactic can be pertinent to seizing an objective, extracting a person of interesting, or destroying an enemy asset.  

Antulio Echevarria believes that a key aspect of grey zone tactics has been ensuring that no transgression executed as a grey zone manoeuvre is so significant as to elicit a response from the North Atlantic Treaty Organization (NATO) under Article Five.  This article states that any attack on a NATO member state should be treated as an attack on all of them; and that any military attack should be responded to in kind. To stay below the Article Five threshold, grey zone tactics in Europe have primarily been used in the cyber-domain. That said, the definition of what constitutes an attack under Article Five is evolving and has grown to include transgressions in both space and cyber. 

Significance:  Africa is increasingly become a theatre for great power competition[6]. The United States has a well-established presence there, both military in nature and for peace-keeping operations. China is developing its ability to project power from Africa and within it, and has recently completed its first port capable of servicing Chinese aircraft carriers away from Chinese sovereign territory in Djibouti. 

Through 2018 and 2019, pursuant to President Omar Hassan al-Bashir being convicted by the International Criminal Court of war crimes, Sudan was isolated within the global community. It was Vladimir Putin’s Russia that came to Sudan’s aid in supporting Sudan through trade generally, but also supplying Sudan with a significant supply of weapons. Further, when pro-democracy protesters pushed for al-Bashir to step down, the Russian paramilitary contractors known as Wagner Group were unleashed on the protesters. 

While officially unaffiliated with Putin, the Russian military or any part of Russian intelligence, Wagner Group nonetheless have ties with Yevgeny Prigozhin, a Kremlin insider[7]. Thus, because of their ties with Prigorzhin and the Kremlin, the actions of Wagner group are considered to be simultaneously enacting the Kremlin’s agenda and projecting Russian power, while also operating as a private military contractor whose behaviour cannot be held against any given state. That is to say, it is a reasonable assumption that any and all actions taken by Wagner Group are on behalf of or towards the strategic goals of the Kremlin, but must be considered as being beneath the threshold of war as they are not representing a state at this time[8]. 

While primarily operating in Sudan, Wagner Group has been active throughout Africa[9]. Wagner Group uses both gray zone tactics described above, normalizing transgressions and fait accompli.  As such, America and their allies and partners allied state actors have two options available to them that would allow them to combat or minimise the impact that Wagner Group are having in the African theatre[10]. 

Option #1:  First, given that American forces are already deployed in the African theatre, it is reasonable that some troops can be repositioned.  If Wagner Group were to act on key strategic or humanitarian objectives, they would have to choose between escalating and initiating combat with American forces or abandoning those objectives[11]. As much as openly pursuing Wagner Group assets for their war crimes would be difficult to justify to the United Nations Security Council, and might be seen as the pursuit of Russian nationals; positioning assets to defend strategic objectives minimises the capacity for Wagner Group to achieve Russian strategic goals[12]. This is not to say that these repositioned American forces should patrol endlessly, but rather be positioned around key objectives such that Wagner Group assets must risk greater escalation and greater personal risk in pursuing those strategic objectives.

Risk:  This option risks an escalation of conflict between Wagner group assets and the American military. 

Gain:  This option deters of Wagner Group assets from achieving their strategic goals, and minimizing Russian power projection in Africa. 

Option #2:  The U.S. could deploy their own paramilitary contractors into the African theatre to counter Wagner Group.  These paramilitary contractors, similar to the ones the Americans deployed into Afghanistan and Iraq, could be used to provide strategic pressure, or engage in combat with Wagner Group assets in the event in efforts to maintain the security of key assets. Significantly, the deployment of paramilitary contractors in defense of American and humanitarian assets would reasonably be below any threshold for war, and be unlikely to escalate beyond that initial conflict.

Risk:  This option risks an escalation of conflict between Wagner Group and American-employed paramilitary contractors. 

Gain:  This option protectis humanitarian assets in the African theatre, minimising Russian power  projection, and demonstrating American investment in protecting Allied assets.  Through the utilization of paramilitary contractors, this also frees up the U.S. military to focus on other threats.

Other Comments:  Africa is increasingly a theatre for great power competition. With Russia and China pursuing very different avenues of projecting power onto that continent, America and its allies need to clarify what their goals and strategic aims are in that region; and to what lengths the West is willing to go to in order to pursue them. 

Recommendation:  None.


Endnotes:

[1] Mazarr, Michael J. Mastering the gray zone: understanding a changing era of conflict. US Army War College Carlisle, 2015.

[2] Banasik, Miroslaw. “Unconventional war and warfare in the gray zone. The new spectrum of modern conflicts.” Journal of Defense Resources Management (JoDRM) 7, no. 1 (2016): 37-46.

[3] Echevarria, Antulio. “Operating in the Grey Zone: An Alternative Paradigm for US Military Strategy.” Strategic Studies Institute, U.S. Army War College (2016). 

[4] Carment, David, and Dani Belo. War’s Future: The Risks and Rewards of GreyZone Conflict and Hybrid Warfare. Canadian Global Affairs Institute, 2018.

[5] Jackson, Van. “Tactics of strategic competition: Gray zones, redlines, and conflicts before war.” Naval War College Review 70, no. 3 (2017): 39-62.

[6] Port, Jason Matthew. “State or Nonstate: The Wagner Group’s Role in Contemporary Intrastate Conflicts Worldwide.” (2021).

[7] Marten, Kimberly. “Russia’s use of semi-state security forces: the case of the Wagner Group.” Post-Soviet Affairs 35, no. 3 (2019): 181-204.

[8] Rondeaux, Candace. Decoding the Wagner group: Analyzing the role of private military security contractors in Russian proxy warfare. New America., 2019.

[9] Benaso, Ryan. “Invisible Russian Armies: Wagner Group in Ukraine, Syria and the Central African Republic.” (2021).

[10] Belo, Dani. “Conflict in the absence of war: a comparative analysis of China and Russia engagement in gray zone conflicts.” Canadian Foreign Policy Journal 26, no. 1 (2020): 73-91.

[11] Gannon, J. Andrés, Erik Gartzke, Jon R. Lindsay, and Peter Schram. “The Shadow of Deterrence: Why capable actors engage in conflict short of war.” (2021).

[12] Rizzotti, Michael A. “Russian Mercenaries, State Responsibility, and Conflict in Syria: Examining the Wagner Group under International Law.” Wis. Int’l LJ 37 (2019): 569.

Africa Below Established Threshold Activities (BETA) Benjamin Fincham-de Groot Option Papers Private Military Companies (PMC etc) United States

Space, Climate, and Comprehensive Defense Options Below the Threshold of War

Joe McGiffin has served in the United States Army for seven years. He is currently pursuing a M.A. in International Relations prior to teaching Defense and Strategic Studies at the United States Military Academy at West Point. He can be found on Twitter @JoeMcGiffin. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As the space domain, climate change, and views of military purpose evolve, multiple options below the threshold of war are required.

Date Originally Written:  August 10, 2021.

Date Originally Published:  September 13, 2021. 

Author and / or Article Point of View:  The author is an active-duty service member. This article is written from the point of view of the U.S. towards the anticipated operating environment of the next thirty years.

Background:  Conflict below the threshold of war is characterized by subversive tactics and the amoral use of force[1]. Democratic states cannot justify the use of these means in the defense of their national security interests[2]. The United States requires alternative strategies to bolster the free world order and deter or defeat adversaries through legitimate, transparent methods.

Significance:  The strategic environment is a fluid expression of geopolitical changes. A state’s ability to predict, adapt to, and manipulate those variables will determine its relative influence and security over the next thirty years. To be competitive strategically, free nations will need to synergize their private and public assets into courses of action which maximize effective and efficient use of resources.

Option #1:  Diversify Space Exploitation: The Techno-National Approach

The space industry has yet to scratch the surface of the domain’s strategic potential. Navigation, communications, surveillance[3], and even transportation are the starting point[4]. The United States and its allies can invest in new space capabilities to harden their physical and economic vulnerabilities. One approach could be the use of additive manufacturing and recycling of inert satellites in orbit to produce in-demand computer components[5]. This plausible course of action would reduce materiel costs for these parts and alleviate U.S. economic dependence on China. As the industry grows, so too will the technology, expanding potential for other space-based capabilities and options.

Risk:  This option requires a long-term commitment by public and private entities and offers few short-term returns. The exact timeline to achieving the desired end state will prove unpredictable as necessary technological breakthroughs are difficult to anticipate. Additionally, this approach may trigger the weaponization of space as these strategic platforms become the targets of adversaries.

Gain:  Industrial use of space will alleviate economic interdependence with adversaries and provide enhanced economic security and physical protection of strategic supply lines. There is also the potential for alliance and partnership-building by offering interstate collaboration on required research, development, and manufacturing.

Option #2:  Green and Lean Logistics: The Climate Change Approach

Rising sea levels, the increasing frequency of extreme weather events, and the diminishing supply of oil and natural gas will impact the geopolitical environment[6]. While the first two factors will require direct action to mitigate as they continue, finding alternative fuel options has national security implications that are not widely discussed. Previous DoD tests indicate that current technologies could reduce military fuel dependency by up to 90% without impacting operations[7]. As a higher research and investment priority, more astonishing gains can be anticipated.

Risk:  As one of the leading exporters of oil and natural gas, the United States’ transition to alternative energies will face even more staunch resistance than it has previously. Making alternative fuels a priority investment may also restrict defense spending on other strategic assets.

Gain:  This approach enhances military capability and could present a new means of promoting U.S. influence and democratic values internationally. The tooth to tail ratio of the resulting force will extend operational reach exponentially while curtailing vulnerabilities and expenses through the reduction of required support personnel, platforms, and installations. Alternatively, the sustainment network could be maintained with enhanced flexibility, capable of nesting with disaster response and humanitarian aid agencies to assist with international relief operations.

Option #3:  Comprehensive Defense Force: The Demographic Change Response

The sole purpose of a professional military in a democracy is defense. This option expands the definition of defense to include protection from all threats to the nation and the promotion of its ideals, not just those posed by enemy forces. International social unrest poses a danger that is not conventionally considered as a strategic threat. For example: Megacities are projected to present a critical factor of the international environment over the next thirty years[8]. They are typically in a stagnant or declining state, offering refuge for illicit non-state actors seeking to destabilize the host nation for their own purposes. Relieving the conditions which promote instability proactively defends the United States and her allies from criminal or terrorist actions against any potential target. Using the military in conjunction with other means could help defuse these regions if done in a deliberate and unified manner.

Risk:  U.S. military and aid personnel will be targeted by militant actors as they work to improve the megactiy’s administration and infrastructure. Additionally, host nation corruption could lead to fraudulent use of humanitarian resources or sympathetic support of an embedded actor, requiring strict supervision and involvement. There is also the potential that the non-state actor is a proxy or funded by an adversary and will execute missions with the intention to discredit allied aid operations.

Gain:  Aiding states improves ties, alleviates unrest, and promotes democratic values and U.S. influence. Eliminating their power bases neutralizes illicit non-state actors, depriving adversaries of proxy forces for use in subversive tactics. The military will integrate more completely with the U.S. interagency, resulting in increased impact from unity of effort in future strategic endeavors.

Other Comments:  None.

Recommendation:  None.


Endnotes:

 

Below Established Threshold Activities (BETA) Defense and Military Reform Environmental Factors Joe McGiffin Option Papers Space

Options to Increase Diversity by Forging Pathways into the Wargaming Profession

Tom Vielott is a recent graduate from the University of Pittsburgh’s Graduate School of Public and International Affairs and the creator of the Itooran Peace Game. He can be found at tvielott.wordpress.com. Divergent Opinions’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Options to Increase Diversity by Forging Pathways into the Wargaming Profession

Date Originally Written:  June 16, 2021.

Date Originally Published:  June 28, 2021.

Author and / or Article Point of View:  The author is a longtime member of the hobby wargaming and tabletop roleplaying community and the designer of a serious game for training use in a university classroom. He is writing from his experiences in those communities and in attempting to find his place in the professional wargaming community. The author is not a member of a minority group and has not personally experienced discrimination on the basis of his gender, sexuality, or race.

Background:  It is not novel to notice that the demographic makeup of the ‘wargaming community’ – the military professionals, academics, policy researchers, and others who play, design, and facilitate serious games – is almost entirely white, male, heterosexual, able bodied, well educated, and often with a military background. One need only look around at the attendees at the average Connections Conference[1] to observe the fact of the matter: there is not much diversity in the wargaming community.

Significance:  A lack of diversity in the wargaming community leads it along a path of stagnation and, in the long term, irrelevance. As Sally Davis eloquently expresses in her Wavell Room piece[2], well made games are art, an intimate way of experiencing other perspectives and new ideas through direct experience. A wargaming community without significant participation by women; Black, Indigenous and People of Color; and Lesbian, Gay, Bisexual, and Transgender designers loses many great opportunities to expand ideas about war and international politics. The ultimate goal of diversity in the wargaming community is not only to produce a general improvement in the thoughtfulness, quality, and emotional range of games produced for serious purposes, but to also improve the lives of the marginalized within it. If this lack of diversity within the wargaming community continues, it risks relegating many wargames to exercises in bias-confirmation and self-aggrandizement rather than exploration and analysis.  

Action can be taken with an eye towards the recruitment of new gamers and designers, but the roots of this diversity problem are deeper than that. Every member of the community, from the oldest designers to the newest players, will have to adjust their attitudes and assumptions for any of these options to be successful[3].

Option #1:  Diversify Skillsets in Wargaming Roles. 

A brief look at the job market in wargames reveals two significant trends: First, most of the jobs require the applicant to already have military experience. Second, most require advanced degrees, often in specific modeling disciplines like physics or engineering or in policy analysis. These trends greatly restrict the kinds of people who are able to find paid work in serious gaming outside of academia to the dominant wargaming milieu described earlier. One might suspect that professional wargamers are seeking more people who look and think like them. It is a natural inclination, but one that the profession can fight against by revalidating and possibly relaxing those requirements and actively seeking out and training those with experience in other disciplines, particularly ones in the humanities, to be wargamers.

Risk:  Option #1 will be costly in time and resources to bring in those without intimate familiarity with the military or with analytical techniques up to speed on wargaming techniques. 

Gain:  Opening positions to skillsets outside of those traditionally held within the wargaming field will enable an increase in diversity by searching out people with different backgrounds and experiences and inviting them to join the wargaming community explicitly.

Option #2:  Make More Games Unclassified. 

Security classification is a major barrier to participation in the wargaming community. It means that a security clearance, often an existing one, is a requirement to become a part of many wargaming projects.  It also means that once created, games often languish and disappear from the consciousness of the community because they are not shared around because of the difficulty of getting approval for any kind of release. RAND’s Hedgemony[4] is an excellent example of a successful unclassified game with a public release which garnered interest both in the U.S. and abroad. More games following in Hedgemony’s footsteps could seek to be widely seen outside of the professional community. 

Risk:  Not utilizing classified information can make designing wargames harder and reduce the fidelity of highly analytical games. Ensuring games can be unclassified requires extra effort in some contexts since the content will have to undergo security review.

Gain:  Unclassified games can more easily involve people without clearances, especially if they are in a freelance or contractor position. These games can also be used in a far wider variety of contexts, especially in outreach and in the recruitment of more gamers and designers. As a further effect, the unclassified games will increase the pool of existing games from which designers can learn and expand their repertoire.

Option #3:  Expand Outreach Beyond the Traditional Wargaming Community. 

Many of the same problems in the professional community are mirrored in the hobby community[5]. There is a far greater diversity of designers and players in hobby communities outside of traditional wargaming, particularly in the independent (or ‘indie’) roleplaying community. More effort could be directed towards drawing members of these communities to wargames. Many members have experience with game jams[6] and other game design events.  Hosting similar events with a serious gaming focus with advertising in hobby spaces could draw new designers to the fold.

The Zenobia Award[7], which seeks out both underrepresented game concepts and underrepresented game designers, is an excellent example of what this could look like: challenges and collaborations that encourage people who otherwise would not be involved in serious gaming to try their hand at game design, and which offer them connections within the community, mentorship, and professional opportunities. 

Risk:  Some groups will react poorly to outreach, and serious efforts will have to be made to make them feel comfortable enough to participate and to prevent the intended audience from being crowded out.

Gain:  The option, if well executed, will provide a greater pool of diverse wargame designers, and a flowering of unusual game designs.

Other Comments:  The complexity and difficulty involved in this issue cannot be overemphasized.  Even successful execution of all of the options given above would not alone be sufficient to ‘solve’ the diversity problem. Only serious concerted effort to enact change along multiple axes, among them: hiring, institutional culture, outreach, personal behavior, and fundamental attitudes about the purpose of gaming, will address this situation.

The author would also like to thank Dr. Yuna Wong for being open to a frank conversation that deeply informed his writing on the topic.

Recommendation:  None.


Endnotes:

[1] Connections Wargaming Conference. (n.d.). Retrieved June 16, 2021, from https://connections-wargaming.com. Connections is a family of conferences around the world which focus on the professional practice of the design and facilitation of ‘serious games’ including wargames and other tabletop exercises. Its attendees are generally representative of the most active members in the field.

[2] Davis, S. (2021, January 15). Wargaming has a Diversity Problem. Wavell Room. https://wavellroom.com/2021/01/15/wargaming-has-a-diversity-problem 

[3] My year of doing terrifying things for diversity and inclusion. (2020, December 31). PAXsims. https://paxsims.wordpress.com/2020/12/31/my-year-of-doing-terrifying-things-for-diversity-and-inclusion 

[4] Linick, M. E., Yurchak, J., Spirtas, M., Dalzell, S., Wong, Y. H., & Crane, Y. K. (2020). Hedgemony: A Game of Strategic Choices. Www.rand.org. https://www.rand.org/pubs/tools/TL301.html#download 

[5] See for example: Why Don’t More Women Play Wargames? (n.d.). Www.youtube.com. Retrieved June 12, 2021, from https://www.youtube.com/watch?v=6atdeEMrLCE 

[6] Game jams. (n.d.). Itch.io. https://itch.io/jams. Itch.io, a hub of independent game activity, hosts a dizzying array of jams, most of which are for video games, but a sizable minority are for roleplaying games.

[7] Zenobia Award. (n.d.). Retrieved June 12, 2021, from https://zenobiaaward.org

Georgetown University Wargaming Society (GUWS) Option Papers Tom Vielott Wargames and Wargaming

Organizing for Large-Scale Maritime Combat Operations

Michael D. Purzycki is an analyst, writer, and editor based in Arlington, Virginia. He has worked as a communications and media analyst for the United States Marine Corps and a technical writer for the Department of the Navy. In addition to Divergent Options, he has been published in Charged Affairs (the journal of Young Professionals in Foreign Policy), Merion West, Braver Angels, the Washington Monthly, France 24, the Truman National Security Project, and Arc Digital. He can be found on Twitter at @MDPurzycki and on Medium at https://mdpurzycki.medium.com/. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  China and Russia pose threats to U.S. interests and allies. While the Biden administration seeks to deemphasize military force relative to other aspects of U.S. power, only a credible deterrence, including an appropriately sized and based maritime capability, can enable maximal use of America’s non-military strengths.

Date Originally Written:  April 16, 2021.

Date Originally Published:  May 3, 2021. 

Author and / or Article Point of View:  This article is written from the perspective of U.S. policymakers who seek to prepare the United States for the maritime aspect of large-scale combat operations with China and/or Russia. These policymakers are constrained by limited industrial and shipyard capacities, a shortage of Americans fit to serve, and probable cuts to military spending.

Background:  The U.S. defense industrial base is in decline[1]. The Navy’s public shipyards are unable to meet its repair needs[2][3]. The COVID-19 pandemic made nearly a quarter of the shipyards’ workforce “unable to come in to work due to being deemed ‘high risk[4].’” Data released by the U.S. Department of Defense in 2017 found 71% of Americans ages 17 to 24 would not qualify for military service, largely due to obesity, inadequate education, and criminal records[5]. Defense spending is likely to fall in the coming years. All these problems curtail the Navy and Marine Corps’ ability to respond quickly to emerging threats and crises. 

Greater use of unmanned vessels offers a partial solution to manning problems. However, unmanned technology is still in its early stages, and the rapid cost increases of the F-35 and the Littoral Combat Ship are warnings not to scale up any major system too quickly[6][7]. 

Significance:  While increased investment by European and Indo-Pacific allies in their own militaries would greatly help the U.S., basing more U.S. vessels in allied ports would make clear America’s commitment to its allies’ security. Meanwhile, the stated wish of Commandant of the Marine Corps General David H. Berger to reduce reliance on “legacy” systems and large numbers of personnel provides an opportunity to experiment with smaller, more mobile Marine units[8].

Option #1:  The U.S. bases more vessels at locations closer to its great power competitors, and seeks new ports to host them.

Risk:  Increasing the number of U.S. vessels close to China and/or Russia may increase the sense of insecurity both countries feel. China and/or Russia may respond by attempting to base their own vessels in the Western Hemisphere. The March 2021 case of Argentina refusing a U.S. Coast Guard cutter the right to dock in its ports illustrates China’s influence in the South Atlantic: China has made major investments in Argentina’s energy and transportation infrastructure, and a Chinese company operates Brazil’s second-largest container port[9]. The fact that Argentina and Brazil are both Major Non-North Atlantic Treaty Organization (NATO) Allies (MNNAs) of the U.S. does not mean they will not align with China on certain issues; Pakistan, also an MNNA, has long been a military partner of China due to the countries’ shared rivalry with India[10].

Increased forward basing may strain the Navy in some ways. In his award-winning 2018 essay for Proceedings, “How We Lost the Great Pacific War,” Captain Dale Rielage details how the U.S. could lose a major conflict in part by increasing forward deployment of vessels without maintaining enough vessels at home[11]. The importance of the total number of each type of vessel must not be forgotten.

Gain:  A greater number of vessels at a greater number of bases near China and Russia would give the U.S. more flexibility in responding to challenges. A 2017 study by the Center for Strategic and Budgetary Assessments suggested South Korea and the United Kingdom as possible new locations, as well as increasing the number of ships based in Guam, Japan, and Spain[12]. The announcement in 2020 that USS Hershel WoodyWilliams would be based in Souda Bay makes Greece another potential host[13].

Increased forward basing at more locations also provides a hedge against possible threats to U.S. overseas bases from criticism and discontent by locals. For example, local opposition to the Marine Corps presence in Okinawa[14] has influenced the decision to move some Marine units based there to Guam[15]. If, to take one hypothetical example, Spanish political and public opinion turned against the presence of U.S. guided missile destroyers in Rota, Spain, then Souda Bay could provide an alternative location (although this, in turn, could strain already tense U.S.-Turkish relations)[16].

Option #2:  The Marine Corps reduces the size of its Marine Expeditionary Units (MEUs).

Risk:  Depending on what sorts of conflict a MEU is deployed to, a smaller MEU may be less well suited than a larger one. Even if tanks are not necessary, it is plausible that, if a MEU’s Amphibious Ready Group (ARG) includes an LHA or LHD with fighters, it will fare better in a particular scenario than if it had come without fighters.

Gain:  With General Berger seeking to divest all the Marine Corps’ tanks and reduce its reliance on large vessels for amphibious operations[17], a smaller MEU, either in Marine Corps manpower or in the size of the ARG, is worth exploring. Fewer Marines, perhaps carried on fewer ships and aircraft, could deploy more quickly, making it easier for the U.S. to respond to crises. Scaling down the MEU so all its personnel and equipment could fit on one or two amphibious transport docks[18] could also free up amphibious assault ships, specifically the LHA/LHD, to serve as “lightning carriers,” giving the U.S. another option for sea-based airstrikes in addition to large aircraft carriers[19].

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Tadjdeh, Yasmin. “Report Finds U.S. Defense Industrial Base in Decline.” National Defense, February 5, 2020. https://www.nationaldefensemagazine.org/articles/2020/2/5/defense-industrial-base-earns-c-grade-in-new-report

[2] Hooper, Craig. “The US Needs a New Public Shipyard.” Defense One, January 16, 2019. https://www.defenseone.com/ideas/2019/01/us-needs-new-public-shipyard/154221/

[3] Weisberger, Marcus. “As Navy Pushes for More Ships, Experts Warn Repair Yards Are Crumbling.” Defense One, September 30, 2020. https://www.defenseone.com/business/2020/09/navy-pushes-more-ships-experts-warn-repair-yards-are-crumbling/168905/

[4] Werner, Ben. “Navy Calling Up 1,600 Reservists to Fill in For Shipyard Workers Out for COVID-19.” USNI News, June 11, 2020. https://news.usni.org/2020/06/11/navy-calling-up-1600-reservists-to-fill-in-for-shipyard-workers-out-for-covid-19

[5] Heritage Foundation. “The Looming National Security Crisis: Young Americans Unable to Serve in the Military.” February 13, 2018. https://www.heritage.org/defense/report/the-looming-national-security-crisis-young-americans-unable-serve-the-military

[6] Insinna, Valerie. “Inside America’s Dysfunctional Trillion-Dollar Fighter-Jet Program.” New York Times, August 21, 2019. https://www.nytimes.com/2019/08/21/magazine/f35-joint-strike-fighter-program.html

[7] Roblin, Sébastien. “The Navy spent $30B and 16 years to fight Iran with a littoral combat ship that doesn’t work.” NBC News, July 19, 2019. https://www.nbcnews.com/think/opinion/navy-spent-30b-16-years-fight-iran-littoral-combat-ship-ncna1031806

[8] “Commandant’s Planning Guidance: 38th Commandant of the Marine Corps.” https://www.hqmc.marines.mil/Portals/142/Docs/%2038th%20Commandant%27s%20Planning%20Guidance_2019.pdf?ver=2019-07-16-200152-700

[9] Espach, Ralph. “A New Great Game Finds the South Atlantic.” War on the Rocks, March 22, 2021. https://warontherocks.com/2021/03/a-new-great-game-finds-the-south-atlantic/

[10] Blank, Jonah. “Pakistan and China’s Almost Alliance.” RAND Corporation, October 16, 2015. https://www.rand.org/blog/2015/10/pakistan-and-chinas-almost-alliance.html

[11] Rielage, Captain Dale, U.S. Navy. “How We Lost the Great Pacific War.” Proceedings, May 2018. https://www.usni.org/magazines/proceedings/2018/may/how-we-lost-great-pacific-war

[12] Clark, Bryan, Peter Haynes, Jesse Sloman, Timothy A. Walton. “Restoring American Seapower: A New Fleet Architecture for the United States Navy.” Center for Strategic and Budgetary Assessments, February 9, 2017. https://csbaonline.org/research/publications/restoring-american-seapower-a-new-fleet-architecture-for-the-united-states-

[13] Becatoros, Elena (The Associated Press), and Derek Gatopoulos (Associated Press). “Pompeo says USS Hershel ‘Woody’ Williams will be based at Souda Bay.” Navy Times, September 29, 2020. https://www.navytimes.com/news/your-navy/2020/09/29/pompeo-says-uss-hershel-woody-williams-will-be-based-at-souda-bay/

[14] Congressional Research Service. “U.S. Military Presence on Okinawa and Realignment to Guam.” April 9, 2019. https://crsreports.congress.gov/product/pdf/IF/IF10672/3

[15] United States Marine Corps. “Marine Corps Activates Camp Blaz in Guam.” October 1, 2020. https://www.marines.mil/News/News-Display/Article/2367980/marine-corps-activates-camp-blaz-in-guam/

[16] Jakes, Lara. “U.S. Will Base Mammoth Ship in Greece, Near Disputed Territory.” New York Times, October 1, 2020. https://www.nytimes.com/2020/09/29/us/politics/greece-turkey-us-navy.html

[17] “Commandant’s Planning Guidance: 38th Commandant of the Marine Corps.”

[18] Waddell, Major Joshua C., U.S. Marine Corps. “Rethink the MEU for Tomorrow’s Expeditionary Operations.” Proceedings, April 2020. https://www.usni.org/magazines/proceedings/2020/april/rethink-meu-tomorrows-expeditionary-operations

[19] Eckstein, Megan. “Marines Test ‘Lightning Carrier’ Concept, Control 13 F-35Bs from Multiple Amphibs.” USNI News, October 23, 2019. https://news.usni.org/2019/10/23/marines-test-lightning-carrier-concept-control-13-f-35bs-from-multiple-amphibs

China (People's Republic of China) Deterrence Major Regional Contingency Maritime Michael D. Purzycki Option Papers Russia United States

Options for a Dedicated Stability Operations Force Supporting Large Scale Combat Operations

Kevin Maguire is a graduate student in at Columbia University’s School of International and Public Affairs and a U.S. Army Reserve Civil Affairs Officer.  He can be found on LinkedIn or at kevinpatrickmaguirejr@gmail.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As the U.S. military prepares for future large-scale combat operations (LSCO), it risks failure without a post-LSCO stabilization capability. 

Date Originally Written:  April 12, 2021.

Date Originally Published:  April 26, 2021.

Author and / or Article Point of View:  The author believes that the U.S. (and allies) require specific formations to conduct post-LSSO stability operations (hereafter referred to as stability operations).

Background:  Though the U.S. Department of Defense continues to prepare for LSCO, it will fail in its mission without the ability to consolidate gains through stabilization. A telling example is post-Islamic State (IS) Iraq.  While ultimately successful in retaking territory from IS, the counter-IS campaign dealt a devastating blow to the Iraqi people. Cities like Mosul suffered thousands of dead, with billions in damages to infrastructure and the economy[1]. Despite nearly two decades of experience learning from the challenges of stability operations in Iraq and Afghanistan, the U.S. (particularly the U.S. military) once again failed to conduct effective stability operations. Iraq remains highly volatile and unstable, and there are indications that an IS-led insurgency is growing[2].

Significance:  LSCO will see Mosul-like destruction and chaos in its immediate aftermath. Populated areas where future LSCO takes place risk the same issues as Mosul. One option for the U.S. military to mitigate stability issues is to have formations trained and capable of transitioning to stability operations. Retaining formations trained in stability operations capability will not only be helpful, but are necessary to plan for situations like Mosul on a greater scale. This option paper proposes three possible formations that could undertake post LSCO stability operations.

Option #1:  The DoD reorients its light and advisory forces to undertake stability operations.

The U.S.’ light military forces and Security Force Assistance Brigades (SFABs) are already oriented towards stability tasks. Stability operations require presence patrols and other operations best suited to light forces’ dismounted capabilities. Advisory brigades already promote skills within their formations that complement stability tasks, such as the language and cultural awareness necessary to work with partner forces. Marine and other light Army brigades, augmented with military police, civil affairs, and other units with stability functions, are also suitable as the dedicated stability operations formations. Given the light and modular character of these forces, they can rapidly assume the stability role in post-LSCO environments. 

Risk:  Light forces still have an advantage in LSCO of operating in restricted terrain, and they may be employed in this manner prior to the cessation of hostilities. Training or emphasis on stability operations tasks will strain the light formation’s ability to train for actual combat missions. The culture of some combat-oriented organizations, such as the 82nd Airborne or Marine Expeditionary Units, might also not be receptive to stability tasks. Advisory forces for their part, are small, and could require additional personnel and support to oversee large areas requiring stabilization.

Gain:  Light forces are among the most adaptable formations in the U.S. arsenal. The Army’s light forces in particular have shifted their force structure several times since inception, to include the addition of a 3rd infantry battalion, the transformation of the special troops battalion to an engineer battalion, and the addition of new equipment and capabilities[3].   Marine formations are also, by nature, scalable based off theater needs. Given the flexible nature of light forces, they are more easily adapted to stability tasks.

Option #2:  The U.S. leads the formation of a multinational stability force. 

This option would leverage the stability-building capabilities of U.S. partner forces to allow U.S. forces to focus on LSCO. Partner forces possess experience in areas where U.S. forces do not typically engage, such as peacekeeping and monitoring missions. Partner forces often use this experience to leverage close ties with development agencies which will be necessary for stability operations. Some partner forces tasked with stability or policing functions fit the stability operations role, such as the Italian Carabinieri[4]. 

Risk:  Though many partner forces are capable, reorienting a nation’s military forces could face domestic pressure. In the United Kingdom for example, proposed cuts to some military capabilities as part of a defense review garnered significant criticism from opposition lawmakers[5]. Many partners will still require LSCO-capable formations due to geographical proximity to an adversary, such as European Union states that border Russia. Restrictions on partner forces reduce flexibility for entire nations, so much so that this option will require significant cooperation between the U.S. and LSCO partners.

Gain:  This option frees U.S. military forces to focus readiness efforts on strictly LSCO. It also ensures that U.S. partners and allies with restrictive defense budgets or rules can focus the bulk of their readiness efforts on post-LSCO stability scenarios. This arrangement also pushes towards greater interoperability between the U.S. and partner forces, strengthening U.S. alliances in the long term.  

Option #3:  The U.S. orients its national guard and reserve forces to conduct post-LSCO stability operations

This option would re-task reserve and national guard forces, namely those formations oriented for combat, as the primary stability operations formations in the U.S. military. National guard and reserve forces already conduct Defense Support for Civil Activities, supporting state governors in areas such as civil unrest, natural disaster response, and medical support. 

Risk:  There will be political pushback from state governors over re-tasking the national guard. In 2018, the Army’s attempt to swap National Guard AH-64 Apaches to active duty in exchange for UH-60 Blackhawks met significant opposition, despite the utility these helicopters provided for states[6]. Similar opposition should be expected with reorienting national guard and reserve formations to a stability role. As a part time force, the reserve and national guard will be challenged in ensuring stability operations readiness efforts meet the needs of active duty formations if required.  

Gain:  This option frees combat units to focus readiness efforts related to LSCO. It also allows the reserve and national guard to focus limited resources and time on very specific stability missions and tasks, rather than prepare for a multitude of other contingency operations. Many reserve formations are already suited to these tasks, especially the U.S. Army’s Civil Affairs and Psychological Operations Command and numerous medical, military police, engineer, and other “enablers.” As a part time force, reserve and national guard personnel also bring civilian occupation skillsets that active duty personnel are not well versed in, especially those that serve in public service positions.  

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Three years after ISIS, Mosul residents still waiting to rebuild. (2020, July 10). The National. https://www.thenationalnews.com/world/mena/three-years-after-isis-mosul-residents-still-waiting-to-rebuild-1.1047089

[2] Nada, G. (2020, January 17). The U.S. and the Aftermath of ISIS. The Wilson Center. https://www.wilsoncenter.org/article/us-and-aftermath-isis

[3] Vazquez, D. (2020, April 17). Is the Infantry Brigade Combat Team Becoming Obsolete? War on the Rocks. https://warontherocks.com/2020/04/is-the-infantry-brigade-combat-team-becoming-obsolete

[4] Carabinieri. (n.d.). NATO Stability Policing Centre of Excellence. Retrieved April 12, 2021, from https://www.nspcoe.org/about-us/sponsoring-nations/italian-republic/carabinieri

[5] Sabbagh, D. (2021, March 21). UK defence cuts show gulf between ambition and action, says Labour. The Guardian. https://www.theguardian.com/politics/2021/mar/22/uk-defence-cuts-gulf-ambition-action-labour-army-troops

[6] Sabbagh, D. (2021, March 21). UK defence cuts show gulf between ambition and action, says Labour. The Guardian. https://www.theguardian.com/politics/2021/mar/22/uk-defence-cuts-gulf-ambition-action-labour-army-troops

Allies & Partners Civilian Concerns Defense and Military Reform Kevin Maguire Major Regional Contingency Non-Full-Time Military Forces (Guard, Reserve, Territorial Forces, Militias, etc) Option Papers United States

Assessing the Value of the Lariat Advance Exercise Relative to the Louisiana Maneuvers for Preparing the U.S. Army for Large-Scale Combat Operations

James Greer is retired U.S. Army Officer and an Assistant Professor at the U.S. Army School of Advanced Military Studies.  You can follow him on Twitter @jameskgreer77.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Value of the Lariat Advance Exercise Relative to the Louisiana Maneuvers for Preparing the U.S. Army for Large-Scale Combat Operations

Date Originally Written:  March 20, 2021.

Date Originally Published:  April 19, 2021.

Author and / or Article Point of View:  The author is a retired military officer who served in the Cold War and now instructs officers who will likely lead the U.S. Army and Joint Force in future competition and conflicts.

Summary:  The U.S. Army’s organization and doctrine for Large Scale Combat Operations (LSCO) are correct.  The Army lacks exercising multi-echelon command and control (C2), which was key to victories in Operation Desert Shield, Operation Desert Storm, and Operation Iraqi Freedom.  If the U.S. Army resurrects a training event, the Cold War C2-focused Lariat Advance[1], is of more value than a new version of the Louisiana Maneuvers[2], to ensure future victory in LCSO.

Text:  The Louisiana Maneuvers were one of the great achievements in Army history. With little recent combat experience, rapidly expanding toward Corps and Armies in size but only having a small cadre of professionals, and confronted by large scale, mechanized warfare, the Army entering World War II, was largely unprepared. The Louisiana Maneuvers enabled the Army to understand that huge gulf between their capabilities in 1941 and the capabilities needed to compete with Axis forces in World War II. The maneuvers were eminently successful, enabling rapid development of doctrine, organizational training, systems, and logistics needed to fight high tempo, mechanized, integrated air-ground campaigns.

For today’s Army many of the challenges facing the Army of 1941 are not a problem. Today’s Army is a professional one, whose squads, platoons and companies are well trained, manned by volunteers, led by seasoned Non-Commissioned and Officers with professional military education and combat experience. Current Army doctrine is about right for LSCO, whether the Army fights tomorrow or in five years. Army organizations are balanced combined arms teams, coupled with a task organization process that enables force tailoring at every echelon to situation and mission requirements.

The present challenge is not that of the Army of 1941 that engaged in the Louisiana Maneuvers. Instead, the challenge is that this is an Army that has all the necessary pieces and parts, but has had little opportunity to put them together, routinely and consistently, in a way that will develop the excellence in multi-echelon operations necessary for victory in LSCO.

On November 8, 1990, VII Corps, stationed in Germany, was alerted and ordered to deploy to Saudi Arabia[3]. In Saudi Arabia, VII Corps would immediately move north, assemble into a coherent corps of multiple divisions, cavalry regiments, and separate brigades and conduct operations to defeat the Iraqi Republican Guard Corps and eject the Iraqi forces from Kuwait.

Consider the challenge. VII Corps had spent the last 40 years preparing to defend in the hills, valleys, forests, and towns of Germany against an attacking Warsaw Pact foe. What they were being asked to do upon their arrival to Saudi Arabia was the exact opposite. Instead of defending, they were going to attack. Instead of rolling wooded and built-up terrain, they were going to maneuver across the flat open desert. And, they were going to do so over a distance of hundreds of kilometers when they had planned on defending Germany with a depth of a few dozen kilometers. Ultimately, there were many reasons for the U.S. overwhelming victory in Operation Desert Shield and Operation Desert Storm, most of which have been detailed elsewhere. But, one factor that is rarely written about is command and control, and, more specifically, multi-echelon C2.

Today’s Army has long had strong home station training programs that are effective in building competent and capable squads, platoons, and companies. And, for almost 4 decades now the U.S. Army has had Combat Training Centers[4] that enable effective training of battalions and brigades as combined arms teams. Finally, since 1987 the U.S. Army has had a Mission Command Training Program that trains the headquarters of Division and Corps[5].

What the Army has not had for more than three decades, since the end of the Cold War, is the means to put those three components together. Since Desert Storm, the only time the Army has fought a corps that consisted of multiple divisions and brigades was during Operation Iraqi Freedom in 2003 when V Corps attacked north into Iraq. And, since the last REFORGER in 1993[6], the Army has conducted no training with entire Corps or Divisions, exercising C2 and operations. This year’s Defender Exercise will be an initial proof of principle of large-scale formation training similar to REFORGER, but expensive and not Army-wide[7].

Ultimately, headquarters at all echelons (Corps, Division, Brigade, Battalion, and Company) exist for one reason and one reason only. These headquarters translate the vision and decisions of the senior commander into reality on the ground through execution by platoons, sections, squads, crews and teams. The reason that VII Corps was as successful as it was under unbelievably challenging conditions during Operation Desert Shield and Operation Desert Storm was because its various headquarters were able to do exactly that. And the only reason that they were able to take vision and decision and translate it into actions in orders was because they had practiced it over and over and over again.

For decades every month at a random and / or unknown time every unit in Germany would be alerted for deployment within two hours to be able to fight the Warsaw Pact and defend NATO as part of Lariat Advance. Every division, regiment, brigade, whether maneuver, fires, intelligence, protection, communications or support and every Soldier from Private to General would drop whatever they were doing and prepare to fight. And, the first thing they would do is establish communications from Corps down to the squad and every echelon in between. Then, they would execute some set of orders, whether a simple readiness inspection, or a deployment to a local dispersal area, or a 3-day field exercise. That meant every month the Corps exercised C2, commanders and staffs coordinated together, orders were given and executed, and the three components of small units, larger units, and formations were integrated together into a cohesive team. And, the lessons learned from Lariat Advance produced terrain walks, tactical exercises without troops, and command field exercises, led by commanders at all echelons, enabling the synchronization and integration necessary for victory in LSCO. While the Army’s doctrine and organization for LCSO is correct, it is out of practice in multi-echelon C2, which is why a return to Lariat Advance is more valuable than Louisiana Maneuvers for defeating a peer competitor in LSCO.


Endnotes:

[1] Wilson, W.B. (2015, June). The Fulda Gap. The Blackhorse Association. https://www.blackhorse.org/history-of-the-fulda-gap

[2] Gabel, C. (1992). The U.S. Army GHQ maneuvers of 1941. Center of Military History.

[3] Bourque, S. (2002). Jayhawk! The VII Corps in the Persian Gulf War. Center of Military History.

[4] Kitfield, J. (1995). Prodigal soldiers: How the generation of officers born of Vietnam revolutionized the american style of war. Simon and Schuster.

[5] Kahan, J., Worley, D., Holroyd, S., Pleger, L., and Stasz, C. (1989). Implementing the Battle Command Training Program. RAND.

[6] Citino, R. (2004). Blitzkrieg to Desert Storm: The evolution of operational warfare. University of Kansas.

[7] U.S. Army Europe and Africa Public Affairs (2021). Defender – Europe 21activities begin this month. U.S. Army. https://www.army.mil/article/244260/defender_europe_21_activities_begin_this_month_include_two_dozen_nations

Cold War James Greer Major Regional Contingency Option Papers Training U.S. Army United States

Options to Ensure the Best Indo-Pacific Policy in the U.S. Department of Defense

Chandler Myers is an officer in the U.S. Air Force. He holds a BS in English from the Air Force Academy and a MA in international relations with a focus in cyber diplomacy from Norwich University. Chandler contributes to WAR ROOM, the U.S. Armys online national security journal. Divergent Optionscontent does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Since the 9/11 attacks and the 2003 U.S. invasion of Iraq, the U.S. Secretary of Defense (SecDef) has focused on the Middle East at the expense of the other, greater threats. While U.S. interest in the Indo-Pacific has increased since 2009[1], there has not been a SecDef with deep professional experience in this region.  While some may look at the SecDef, as the principal member in the DoD responsible for executing defense strategy to fulfill U.S. policy goals strictly as a generalist, without a sizable length of professional experience in the Indo-Pacific region, or the right mix of Indo-Pacific experts available for consultation, risk of military failure increases.   

Date Originally Written:  March 25, 2021.

Date Originally Published:  April 12, 2021.

Author and / or Article Point of View:  The author believes that while the DoD’s increasing focus on the Indo-Pacific is the correct strategy, that bureaucratic inertia can cause too many people or not the right people to be in the room when policy decisions are made.  This inertia can contribute to failure and guarding against it is a must[2].

Background:  In an effort to realign the unbalanced focus and strategy the U.S. military executed in the Middle East from 2000-2008, President Barack Obama broke from tradition to restore engagement in and focus on Indo-Pacific regional issues that impact U.S. security, and the security of U.S. allies and partners. President Obama and SecDef Leon Panetta renewed America’s security investments in the Indo-Pacific through increased deployments and enhancing allied and partner collective and individual security capability[3]. The driving force causing President Obama’s redirection was U.S.-Sino relations. After President Obama reaffirmed U.S. national interests in the Indo-Pacific, he ordered SecDef Panetta to increase planning and troop deployments as one way to compete with China’s military modernization and assertive claims to disputed maritime territory[4]. While President Obama’s direction changed the region, SecDef Panetta had little to no experience there[5].  Indo-Pacific problems require thinking in an Indo-Pacific context. U.S. security goals in the region are contingent more on the professional experience of the SecDef, or the access he has to an experienced workforce to help him execute policy goals, not the advancement of the tools the military wields. 

Significance:  The U.S.-China security relationship is arduous in many facets.  Recommendations and options to assuage the relationship bend toward making changes in DoD force structure, but few focus on expertise within the DoD. 

Option #1:  The President nominates people with deeper professional experience in the Indo-Pacific to the position of Secretary of Defense.

Risk:  A mandate that requires professional experience in the Indo-Pacific will greatly limit who can be nominated to be SecDef.  Additionally, a SecDef with highlighted experience in the Indo-Pacific may fall into a similar strategic trap as past SecDefs who served during OPERATION ENDURING FREEDOM and OPERATION IRAQI FREEDOM; in a sense that, instead of ignoring China to focus on current operations, they will ignore other parts of the world to focus on China.

Gain:  This option will ensure the SecDef has the experience necessary to ensure the development and execution of DoD policies and strategies to support the President’s policy goals in the Indo-Pacific.  A SecDef equipped with Indo-Pacific experience atop the Pentagon will make fewer strategy errors and more wisely employ the military instrument of power in the Indo-Pacific. 

Option #2:  The SecDef establishes an Indo-Pacific Advisory Board, separate from any current advisory boards in existence, to provide him expert advice on the region that will be used to complement the advice he receives in current DoD channels.

Risk:  This option risks alienating the Indo Pacific-focused DoD workforce across both the Office of the Secretary of Defense, Joint Staff, and Defense Intelligence Components.  The employees of these organizations, once they learn that non-DoD personnel are advising the SecDef on the Indo-Pacific, may feel ignored or neglected and their work may suffer.

Gain:  Under this option, the SecDef now has an additional channel to receive specialist advice from Indo-Pacific experts.  This non-DoD channel would enable him to look at Indo-Pacific issues through a different lens.  This different lens would be a valuable complement to the information and advice provided by the DoD workforce and ensure that the SecDef is not looking at courses of action that may only serve the DoD, but contribute to U.S. interests in the Indo-Pacific more broadly. 

Other comments:  None. 

Recommendation:  None. 


Endnotes:

[1] Obama, B. November 14th 2009. Remarks by President Barack Obama at Suntory Hall. Retrieved from:  https://obamawhitehouse.archives.gov/the-press-office/remarks-president-barack-obama-suntory-hall

[2] Komer, R. January 1st 1972. Bureaucracy Does Its thing: Institutional constraints on U.S.-GVN performance in Vietnam. Retrieved from:  https://www.rand.org/pubs/reports/R967.html 

[3] Lieberthal, Kenneth. December 21st 2011. Brookings Institute. The American Pivot to Asia. Retrieved from:  https://www.brookings.edu/articles/the-american-pivot-to-asia/ 

[4] Manyin, Mark, et al. March 28th 2012. Pivot to the Pacific? The Obama Administration’s “Rebalancing” Toward Asia. Retrieved from:  https://fas.org/sgp/crs/natsec/R42448.pdf 

[5] Department of Defense Historical office. January 22nd 2021. Secretaries of Defense. Retrieved from:  https://history.defense.gov/DOD-History/Secretaries-of-Defense/ 

Chandler Myers China (People's Republic of China) Defense and Military Reform Governing Documents and Ideas Option Papers Policy and Strategy United States

Options to Build U.S. Army Headquarters Elements for Large Scale Combat Operations

Justin Magula is a U.S. Army Strategist at the U.S. Army War College. He is on Twitter @JustinMagula. The views contained in this article are the author’s alone and do not represent those of the U.S. Army War College, the Department of Defense, or the United States Government. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Of the United States Army’s four strategic roles in support of the Joint Force, prevailing in large-scale ground combat is the most important[1]. The Army cannot accomplish this strategic role without an appropriately designed operational headquarters.

Date Originally Written:  March 4, 2021.

Date Originally Published:  April 5, 2021.

Author and / or Article Point of View:  The author believes that operational and strategic headquarters play a significant role in the Army’s ability to achieve success in large-scale combat operations and that the Army underinvests in these capabilities.

Background:  In the past seven decades, the United States Army has reduced the number of operational-level headquarters it employs as part of its total force reductions[2]. The United States Army currently uses theater armies, corps, and divisions in roles that often exceed their designated functions. While this method has achieved some success in fighting irregular wars, it would likely prove less successful against a peer competitor.

Theater armies fulfill five persistent tasks in support of geographic combatant commands: set conditions in a theater for the employment of landpower, support theater security cooperation, provide support to other services, maintain administrative control of all Army forces in the theater, and provide operational control and sustainment support of any assigned or attached forces. Even though a theater army performs an impressive array of tasks, it is not designed to command and control units in combat. Alternately, U.S. Army corps serve as the Army’s highest tactical echelon in large-scale ground combat operations, overseeing combat divisions and subordinate units. Where theater armies focus across an entire theater, corps focus on designated areas of responsibility.

Significance:  The possibility of large-scale combat operations against Russia and China continues to increase[4]. A war against either country would likely require the Army to deploy a sizable land force. For such operations, the Army would require more than one corps and operational-level headquarters to oversee tactical operations. Currently, the Army does not have a headquarters designed to effectively command and control multiple corps in large-scale ground combat or serve as a land component command in a joint operational area in the event of a great power war[5].

Historically, the U.S. Army used field armies to control multiple corps and subordinate units in large-scale combat operations, like in both World Wars and the Korean War. The U.S. Army no longer has such a headquarters. Creating new field armies would give the army the ability to quickly transition to combat operations and control multiple corps if required.

This option paper proposes two possible solutions to fill this critical headquarters gap: forward-stationed field armies or expeditionary field armies.

Option #1:  The U.S. Army establishes forward-stationed field armies.

In this option, the U.S. Army would create field armies and forward station them in specific theaters. For instance, the Army could station a field army in the Indo-Pacific region as a subordinate headquarters to U.S. Army Pacific and one in Europe to support U.S. Army Europe and Africa since these are the two most likely theaters where large-scale combat operations would occur.

Risk:  Placing field armies forward in a theater would increase their vulnerability as prime targets for enemy attacks in war. These units would have difficulty transferring to support other theaters if the need arose. The cost of new facilities, equipment, and personnel would be high and would rely on host nation contract support.

Gain:  Creating forward stationed field armies allows the theater armies, as the field armies’ higher headquarters, to focus their efforts across the entire theater during competition and conflict as they are designed to do[6]. Additionally, these field armies could conduct theater-specific exercises, integrate with partner nations forces, and provide training oversight for subordinate units during competition. If the need arose to transition to combat operations quickly, these headquarters would be trained, ready, and integrated across their respective theaters.

Option #2:  The U.S. Army establishes expeditionary field armies.

The Army could create expeditionary field armies and base them in the United States. These field armies would be the same size as the forward-stationed ones. Like its current divisions and corps, the Army could use these field armies in an expeditionary manner to support American objectives abroad.

Risk: Under this option, these field armies would not have the same level of understanding of a specific theater as a forward-stationed unit might or the same level of integration with other theater forces and partners. In crisis, these field armies could deploy directly to a combat zone. In peacetime, these headquarters could risk being stretched thin by global commitments, exercises, and training oversight if placed in charge of other stateside Army units.

Gain:  This option would give the Army the greatest versatility to respond to almost any combat mission. Each expeditionary field army could be deployed in a tailored package to meet the theater commander’s needs, thus reducing the burdens of the theater army staff. The field armies could provide training oversight of other Army units in the United States, enabling better large-scale combat training for them. The field armies could also assist U.S. Army North for homeland defense and Defense Security Cooperation Agency missions. This structure would also provide the greatest employment opportunities for American civilians supporting these headquarters.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] U.S. Department of the Army, Army Doctrine Publication (ADP) 1, The Army. (Washington, DC: Government Printing Office, 2019), v.

[2] Bonin, J. and Magula, J. (2021). U.S. Army Europe and Africa Headquarters: Reforming for Future Success. War on the Rocks. Retrieved March 3,2021 from https://warontherocks.com/2021/02/u-s-army-europe-and-africa-headquarters-reforming-for-future-success/

[3] Lundy, M. (2018). “Meeting the Challenge of Large-Scale Combat Operations Today and Tomorrow.” Military Review. Retrieved March 3, 2021 from https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/September-October-2018/Lundy-LSCO/

 [4] U.S. Army Training and Doctrine Command. (2018). “U.S. Army Concept: Multi-Domain Combined Arms Operations at Echelons Above Brigade 2025-2045.” TRADOC Pamphlet 525-3-8. Retrieved March 3, 2021 from https://adminpubs.tradoc.army.mil/pamphlets/TP525-3-8.pdf

[5] U.S. Joint Chiefs of Staff, Joint Publication (JP) 3-31, Joint Land Operations.  (Washington, DC: Government Printing Office, 2019), I-11.

[6] U.S. Department of the Army, Field Manual (FM) 3-94, Theater Army, Corps, and Division Operations. (Washington, DC: Government Printing Office, 2014), 2-4.

Command and Control and Headquarters Issues Defense and Military Reform Justin Magula Major Regional Contingency Option Papers U.S. Army

Options to Apply Cold War-Like Security Institutions to the Indo-Pacific

Michael Gardiner is a graduate student in International Relations at Te Herenga Waka – Victoria University of Wellington in New Zealand. He can be found on Twitter @Mikey_Gardiner_. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As China continues to extend its influence in the Indo-Pacific region, this influence could be addressed by the development of security institutions.

Date Originally Written:  February 2, 2021.

Date Originally Published:  March 15, 2021.

Author and / or Article Point of View:  This article is written from the point of view of New Zealand’s security calculus and whether it should join the “QUAD Plus” if given the opportunity. The author believes a shift in New Zealand’s view of the Indo-Pacific can take advantage of regional changes in a “New Cold War.” 

Background:  The emergence of a New Cold War between the United States and China has catalysed significant changes to the Indo-Pacific’s security outlook. While not completely analogous to the original Cold War, there are discernible similarities between the past and the present. New security institutions have been created by both sides for the purposes of strategic competition. China has established alternative geo-economic institutions in the region such as the Asian Infrastructure Investment Bank and is interested in establishing alternative regional security institutions similar to the Shanghai Cooperation Organisation[1]. A reinvigorated Quadrilateral Security Dialogue (QUAD), which features the United States, Australia, India, and Japan, has been touted as a forthcoming “Asian North-Atlantic Treaty Organisation (NATO)” by U.S. officials, and appears to be purpose-built to contain China’s regional ambitions[2]. 

China is naturally displeased with the QUAD’s revival, criticising the institution as representing a “Cold War mentality” and labelling it a “big underlying security risk[3].”  While its institutional arrangements are still relatively shallow, high-level meetings between QUAD officials has become more frequent since 2017. The QUAD harbours greater ambitions as a nascent NATO-esque institution in the Indo-Pacific. Expansion of QUAD membership in the long-term is possible, with the QUAD Plus incorporating New Zealand, South Korea, and Vietnam during a meeting in early 2020 at the vice-ministerial level[4]. 

Significance:  The formation of a QUAD Plus is underestimated in terms of its significance to the region’s geopolitics.  While the QUAD currently lacks the institutional requirements to fulfil its role as an Asian NATO, the idea of formalising QUAD into a collective security arrangement is gaining momentum. Other states will need to decide on how they will secure themselves in a new era of “Great Power Competition,” especially if they are pressured into choosing between the United States and China. The QUAD Plus membership requirements will be scrutinised by small states such as New Zealand, who rely heavily on trade with China for economic prosperity but lean on traditional partners for security. If the QUAD Plus becomes a viable security institution modelled off NATO in the future, New Zealand will need to assess its strategic options and interrogate the price of admission.  

Option #1:  New Zealand continues with the status quo – a hedging strategy which balances its economic relationship with China and security relationship with the United States. Under this option, New Zealand does not join the QUAD Plus. 

Risk:  New Zealand’s credibility among its traditional security partners takes another hit. New Zealand has already been singled out for being the “soft underbelly” of Five Eye[5]. After New Zealand’s Trade Minister Damien O’Connor suggested Australia should show more respect to China in January 2021, an Australian newspaper referred to the country as “New Xi-Land[6].” Not joining the QUAD Plus could negatively impact New Zealand’s reputation and endanger its traditional security partnerships.

Gain:  A more flexible strategy allows New Zealand to better navigate uncertainty. New Zealand affords itself time and greater manoeuvrability if the United States retrenches to focus on domestic issues. New Zealand can continue to reap the benefits of its free trade deal with China. This option can build on the Washington Declaration by improving New Zealand’s bilateral security relationship with the United States. New Zealand also remains a member of Five Eyes, thus securing the best of both worlds.  

Option #2:  New Zealand officially recognises China as a threat to the rules-based international order by joining the QUAD Plus. 

Risk:  Risks in this option include the high likelihood of jeopardising New Zealand’s economic relationship with China. New Zealand will have paid close attention to Beijing’s coercive diplomacy towards Australia, after China imposed punitive trade sanctions on Australian goods, restricted imports, and accused Australia of dumping wine[7]. As New Zealand recovers from the economic costs of the Covid-19 pandemic, angering China by joining the QUAD Plus could hinder New Zealand’s economic recovery, should Beijing set an example of New Zealand through measures comparable to those used in the Australian case. Depending on its level of institutionalisation, the QUAD Plus could significantly restrict New Zealand’s strategic options and tie the country down to unattractive commitments.

Gain:  New Zealand improves upon its moral standing as a defender of the rules-based international order. New Zealand’s reputation abroad as a fair-minded, peaceful nation improves the legitimacy and viability of the QUAD Plus as a bona-fide alliance network, attracting other countries in the region to join the institution. Membership within the QUAD Plus offers greater opportunities to diversify supply chains and develop stronger relationships with players like India. This option signals a renewed commitment to traditional security partners, avoiding the risks of Option #1. 

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1] Parameswaran, Prashanth. October 19th 2016. The Diplomat. Can China Reshape Asia’s Security Architecture? Retrieved from: https://thediplomat.com/2016/10/can-china-shape-asias-security-architecture/

[2] Biegun, Stephen. August 31st 2020. U.S. Department of State. Deputy Secretary Biegun Remarks at the U.S.-India Strategic Partnership Forum. Retrieved from: https://2017-2021.state.gov/deputy-secretary-biegun-remarks-at-the-u-s-india-strategic-partnership-forum/index.html

[3] Jaipragas, Bhavan & Tashny Sukumaran. 13th October 2020. South China Morning Post. ‘Indo-Pacific Nato’: China’s Wang Yi slams US-led ‘Quad’ as underlying security risk at Malaysia meeting. Retrieved from: https://www.scmp.com/week-asia/politics/article/3105299/indo-pacific-nato-chinas-wang-yi-slams-us-led-quad-underlying

[4] Grossman, Derek. April 9th 2020. The RAND Blog. Don’t Get Too Excited, ‘Quad Plus’ Meetings Won’t Cover China. Retrieved from: https://www.rand.org/blog/2020/04/dont-get-too-excited-quad-plus-meetings-wont-cover.html

[5] Satherley, Dan. 31st May 2018. Newshub. NZ labelled ‘soft underbelly’ of Five Eyes spy network in Canadian report. Retrieved from: https://www.newshub.co.nz/home/politics/2018/05/nz-labelled-soft-underbelly-of-five-eyes-spy-network-in-canadian-report.html

[6] Small, Zane. 29th January 2021. Newshub. Daily Telegraph newspaper’s ‘New Xi-land’ jab as China declares New Zealand ‘an example for Australia’. Retrieved from: https://www.newshub.co.nz/home/politics/2021/01/daily-telegraph-newspaper-s-new-xi-land-jab-as-china-declares-new-zealand-an-example-for-australia.html

[7] Stitt, Ross. 2nd December 2020. Newsroom. Beware the dragon: What the Australia-China trade war means for NZ. Retrieved from: https://www.newsroom.co.nz/beware-the-dragon 

China (People's Republic of China) Cold War Governing Documents and Ideas Michael Gardiner New Zealand Option Papers Security Institutions

The Merits and Perils of Containment: Assessing the American View of the Chinese Challenge

Brandon Patterson is a graduate student of International Affairs at the School of Global Policy and Strategy at the University of California San Diego.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  The Merits and Perils of Containment: Assessing the American View of the Chinese Challenge

Date Originally Written:  December 28, 2020.

Date Originally Published:  February 15, 2021.

Author and / or Article Point of View:  Brandon Patterson is a graduate student of International Affairs at the School of Global Policy and Strategy at the University of California San Diego. Brandon believes the Cold War concept of containment, at this point in history, is not fully applicable to the Chinese challenge to international order. 

Summary:  Containment retains a strong hold on American historical memory for both its hard-headed realism and its utopian vision which came to fruition. Attempting to graft Containment onto Sino-American relations absent historical context risks running heedlessly into the abyss, turning a peacetime competitor into a clear enemy. 

Text:  By 1946, the United States finally realized the threat posed by Soviet armies bestriding central Europe. America had cast itself into upholding the global balance of power — rebuilding Europe, establishing America’s first military alliance, and parrying early Soviet expansion toward Greece. Containing the Soviet threat was the order of the day. The Containment policy which saw America through the Cold War, was tailored to the unique challenge represented by the Soviet Union. It has become conventional wisdom to treat the challenge posed by China in a Containment-like fashion, as Cold War terminology returns to the American vernacular[1]. Trying to repeat Containment’s Cold War performance today may create new dangers rather than alleviate them.

Containment was the prescription for the challenge posed by the amalgam of communist ideology and tsarist expansionism. As George Kennan warned, the objective of Soviet foreign policy was to avail itself “every nook and cranny available to it in the basin of world power…. But if it finds unassailable barriers in its path, it philosophically accepts and accommodates itself to them[2],” for Marxist theory did not submit a deadline for the end of history. The remedy, according to Kennan, was “a policy of firm containment, designed to confront the Russians with unalterable counterforce at every point where they show signs of encroaching upon the interests of a peaceful and stable world[3].”  

Kennan concluded that if the U.S. could only man the ramparts, one day the Soviet Union would collapse under the weight of its own contradictions. Containment was thus created precisely to meet the challenge of a Marxist-Leninist superpower. For if the correlation of forces was favorable, the Soviets had an historical duty to advance; if they were unfavorable, remaining within their borders was merely a tactical decision, and the struggle would continue by other means. It was a mechanical approach to foreign policy with no category of thought for restraint. Containment was the only means of constraining so ideological a menace. 

Today, Containment is not directly applicable to the challenge posed by a rising — that is to say, re-emerging — China. Contemporary China, in spite of its proclaimed communist rulers and heritage, is not a revolutionary power like the Soviet Union, but an ancient civilization which conceives of world order as a hierarchical structure based on approximation to Chinese cultural characteristics. China more often expanded by osmosis rather than conquest[4]. 

The challenge of the present is how to construct a world order based on principles agreed upon by the major components operating the international system; how to translate transformation into acceptance; to create a pattern of obligations which becomes spontaneous in its operation. When a power sees the world order or its legitimizing principle as fundamentally oppressive or in conflict with its self-image, a revolutionary situation will ensue[5].  

When Containment was theorized, a revolutionary situation was already in existence. The destruction of one revolutionary power, Germany, merely clarified the danger posed by another, the Soviet Union. The new international order being built could only be upheld by force, necessitating containment. Even “Detente”, a late-1960s beginning complement to Containment, was a means of moderating Soviet conduct by forcing a choice between national interests and ideological fervor, backed by the threat of American military power[6]. 

Given the manner in which the burgeoning Sino-American rivalry is cast in ideological terms, it is easy to forget that China does not yet represent an ideological threat in the manner of the Soviets. This nuance is critical. A consensus has emerged among American intellectuals that an alliance of democracies is needed to “confront” China[7]. Such an approach poses grave dangers. Though it is appropriate for democracies to cooperate to combat common dangers, an alliance directed at a particular country — namely China — creates the conditions for a rupture. Stability does not require an absence of unsatisfied claims, but the absence of a perceived injustice so great that the aggrieved power will seek to overturn the existing order. Talk of punishing China for subverting international norms ignores the nature of legitimacy, for China played no role in writing the rules of the current system and so does not feel justly bound by them. The question that those who seek to uphold the “rules-based” order face is whether a symmetry can be found between China’s self-image and the most cherished principles of the system, or whether China’s objectives are so incompatible with the prevailing order that the only recourse is a form of containment. Attempting to berate Beijing from one side of the dividing line into accepting the West’s worldview is a prescription for turning China into a revolutionary power while such an outcome may still be avoidable. 

This is not to say China’s present aggression is the fault of the United States, and China may yet evolve into a revolutionary challenge requiring firm containment. But it would be a tragedy to turn fears of Chinese aggression into a self-fulfilling Containment prophecy. America and its allies are correct to defend the basic principles of international order; but it is important to determine what principles are inviolable and where adjustment to contemporary realities is necessary before engaging in confrontation on every front.  If there is one point of Containment that is easily transferable to today, it is that the world will be selective about where it chooses to challenge China, just like it was when containing the Soviet Union.  

Containment, moreover, though indeed tailored to the Soviet challenge, in another sense represented nothing new in diplomacy. Sophisticated students of history like George Kennan and Dean Acheson, saw in containment a means of conveying to the American public and Congress the principles of the balance of power in terms which they would both comprehend and accept. World order requires equilibrium, and so a “containment” of a potential aggressor will always be necessary, though it may manifest in more subtle forms than in previous periods. 

The South China Sea is illustrative. In geopolitical terms, China’s objective is domination of its “marginal seas” so as to gain access to the wider Indo-Pacific, and forestall its historic fear of encirclement[8]. The United States and its allies will not permit hegemony or disruption of international waterways, as America has gone to war on several occasions to vindicate these principles. This is the space the two countries are obliged to navigate. For in a legitimate order two types of equilibrium exist: the physical, which makes domination by a single power or grouping impossible; and the moral, which defines the relations of powers to each other in terms of their particular histories[9]. This is the essence of diplomacy. 

The great Austrian statesman Klemens von Metternich was correct when he asserted that those with no past can have no future, but Austria doomed its future in seeking to petrify its past. America can avoid this trap; the means of doing so is historical context. 


Endnotes:

[1] Gladstone, R. (July 22, 2020). “How the Cold War Between the U.S. and China is Intensifying.” Retrieved December 27, from https://www.nytimes.com/2020/07/22/world/asia/us-china-cold-war.html

[2] Kennan, G.F. (July 1947). “The Sources of Soviet Conduct.” Retrieved December 27, from https://www.foreignaffairs.com/articles/russian-federation/1947-07-01/sources-soviet-conduct

[3] Ibid. 

[4] Kissinger, H. (2012). On China (pp. 18-22) New York: Penguin. 

[5] Kissinger, H. (1957). A World Restored: Castlereagh, Metternich, and the Problems of Peace (p. 2). Echopoint Books and Media.   

[6] Kissinger, H. (1979). The Whitehouse Years (pp.113-130). Simon and Schuster.  

[7] Cimmino, J. & Kroenig, M. “Global Strategy 2021: An Allied Strategy for China.” Retrieved December 18, from https://www.atlanticcouncil.org/wp-content/uploads/2020/12/Global-Strategy-2021-An-Allied-Strategy-for-China.pdf

[8] Auslin, M. (May 1, 2020). Asias New Geopolitics: Essays on reshaping the Indo-Pacific (pp.12-14). Hoover Institution Press.

[9] Kissinger, H. (1957). Ibid (p. 147). 

Brandon Patterson China (People's Republic of China) Cold War Containment Governing Documents and Ideas Option Papers Policy and Strategy United States

Options for the U.S. Towards Pakistan

Jason Criss Howk has spent his career as a soldier-diplomat, educator, and advisor focused on Afghanistan and Pakistan. He writes a column for Clearance Jobs News and is an interfaith leader and Islamic studies professor. Find him on twitter @Jason_c_howk.  Sabir Ibrahimi is a Non-resident Fellow at NYUs Center on International Cooperation and hosts the Afghan Affairs Podcast. Follow him on Twitter @saberibrahimi. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  With the U.S. Global War on Terrorism and mission in Afghanistan winding down, the U.S. requires new foreign policy towards Pakistan. 

Date Originally Written:  December, 28, 2020.

Date Originally Published:  February 8, 2020. 

Author and / or Article Point of View:  This article is written from the point of view the of the U.S. towards Pakistan. 

Background:  Since the Cold War, Pakistan-U.S. relations have been oft-based on militant support. Pakistan assisted the U.S. in removing the Soviet-backed regime in Afghanistan by aiding so-called mujahedeen Islamist militants fighting the Red Army and Afghan government. Post-Soviet-withdrawal, the U.S. abandoned Afghanistan and Pakistan; and Pakistan supported another round of militancy creating the Afghan Taliban to remove the “mujahedeen” government from Kabul. Following the attacks on September 11, 2001, the U.S. called upon Pakistan to help remove al Qaeda from the region. Pakistan joined the U.S. in the so-called war on terror but prevented another abandonment by the U.S. through a third round of militancy support[1], this time by rebuilding and supplying the Afghan Taliban remnants to weaken the newly formed Afghan government[2]. Pakistan does not trust America or Afghanistan to be helpful to Pakistan’s policies and the U.S. does not trust Pakistan[3].

Significance:  Pakistan impacts U.S. counterterrorism activities and the U.S. withdrawal from Afghanistan. Afghanistan is a key leverage-point Pakistan holds against the U.S., while the U.S. holds several forms of economic and diplomatic leverage against Pakistan[4]. Numerous terrorist groups operate in Pakistan; some of them aid the Pakistani military to destabilize India and Afghanistan, while some threaten Pakistan itself[5]. The U.S. State Department has designated Pakistan as the Country of Particular Concern (CPC). Pakistan’s economy is struggling, causing Islamabad to heavily rely on China. In 2020 a Pakistani General told an audience at U.S. Central Command conference that “China is Pakistan’s friend, despite the Uyghur treatment, because we can overlook anything right now for our economic wellbeing—our ailing economy is an existential threat[6].”  

This Options Paper looks at the possible future relationship between the U.S. and Pakistan. Where the administration of U.S. President Joseph Biden takes U.S. foreign policy towards Pakistan is unknown; but a question policy-makers will need to answer is: does being close to Pakistan help America?

Option #1:  The U.S. adopts an aggressive approach towards Pakistan.

Many U.S. objectives related to Pakistan remain unmet. A more aggressive approach could ensure Pakistan is not harboring, leading, or financially assisting terrorists; or ideologically brainwashing new recruits for terrorist/militant groups. The major U.S. goal of building peace in Afghanistan hinges on Pakistan policy.

In this option the U.S. would designate Pakistan as a state sponsor of terrorism, upgrading it from CPC and, as a consequence of this cease all development and military aid to Pakistan. The U.S. would pressure its allies and partners to freeze all assets of Pakistan military and civilian officials related to terrorists. Targeted officials would have their visa revoked, to include their families, so they cannot study, vacation, or live outside of Pakistan. The U.S. would increase its counterterrorism programs in South Asia and follow any intelligence generated into Pakistan via proxies or clandestine forces. The U.S. government would deliver more focused efforts to identify and close radical-militant-owned businesses and non-profit organizations worldwide. U.S. drone and human intelligence programs would be increased to identify and track terrorists, militants, and Pakistan government terrorism-supporters; especially when entering Afghanistan. Armed-drone operations would NOT be included in this approach because the inevitable civilian casualties will increase militant/terrorist recruiting and responses.

Risk:  This option would increase suffering among Pakistani citizens due to decreases in U.S. development funding which could lead to more violence and radicalism. Lack of U.S. aid may lead to the U.S. losing its remaining allies in the civilian and military establishment in Pakistan. Pakistan would end its support of the Afghan peace process. Pakistan fully aligns with China. Pakistan’s military will sell the news of further U.S. abandonment of Pakistan to their citizens, and enact stronger military controls over the civilian government. Lack of U.S. aid could decrease nuclear security thereby increasing the likelihood of loose nuclear material or sales of nuclear science. 

Gain:  The U.S. may push the Pakistani civilian and military officials into recalibrating their alliances with militant groups and terrorists if economic, diplomatic, military pressure is deep enough. A robust public information campaign ensuring the Pakistani people know how to restart economic assistance may lead the people to pressure their government to stop supporting violent movement networks. The U.S. will save foreign relations funding. The U.S. can improve its image with Pakistani civilians and stop being blamed for bombing deaths by ceasing all armed drone operations in Pakistan.

Option #2:  The U.S. Partners with Pakistan more closely to lift them economically.

The United States could direct its energy to address what Pakistan calls an existential threat by increasing U.S.-Pakistan economic partnerships and diplomacy. The U.S. would encourage economic cooperation between Afghanistan, Central Asia and Pakistan; and massively increase economic relations between India and Pakistan. This option would increase U.S. aid to development projects and ensure all military aid is conditions-based in exchange for counter-terrorism assistance, increasing civilian oversight of the military, and more elected leadership power in government. Publicly, the U.S. would be outspoken about human and minority rights, freedom of speech, and religious freedom. U.S. armed drone operations would cease and be replaced by quietly targeted sanctions at military officials recruiting militant groups and aiding violent missions in the region. Measures under this option would include freezing individual assets globally, and multi-nation travel restrictions. The U.S. would warn Pakistan privately of retaliations if they fail to meet U.S. security goals and give deadlines for decreases in terrorism/militant activity.

Risk:  Under this option Pakistan could continue the status quo, a double game with the U.S. whereby Pakistan extracts as much funding as possible before the U.S. stops the flow. Intelligence partnerships would remain unreliable; allowing terrorists/militants reside openly in Pakistan. Pakistan could see the U.S. funds as a way to pay their debt to China, which is not the purpose of the U.S. aid. While Pakistan could openly target extremist groups the U.S. names, it could clandestinely support other extremist groups unknown to the U.S. in order to keep the U.S. engaged and keep Afghanistan weakened. This option could set the conditions for Pakistan better hiding its terrorism support, and the U.S. inadvertently funding it meaning regional militancy continues as do Pakistan human rights violations and military rule.

Gain:  This option may improve economic and diplomatic activities. Increased economic partnerships could lead to increased military partnerships to rebuild trust between leaders. The funds Pakistan received could increase education, development, and humanitarian partnerships and improve the U.S. image in Pakistan. This option could contribute to more Pakistan support to get the Afghan Taliban to act seriously in the Afghan Peace Negotiations. The funds could also be used as leverage to improve counterterrorism partnerships across both governments and human rights. 

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Khan, S. (2018, October 28). Double Game: Why Pakistan Supports Militants and Resists U.S. Pressure to Stop. CATO. https://www.cato.org/publications/policy-analysis/double-game-why-pakistan-supports-militants-resists-us-pressure-stop

[2] Mazzetti, M. (2018, January 28). How Pakistan has Perpetuated the Afghan Conflict. The Atlantic. https://www.theatlantic.com/magazine/archive/2018/03/the-pakistan-trap/550895

[3] Tankel, S. (2011, September 1). Restoring Trust: U.S.-Pakistan Relations. Carnegie Endowment for International Peace. https://carnegieendowment.org/2011/09/01/restoring-trust-u.s.-pakistan-relations-pub-45465

[4] U.S. Relations With Pakistan. (2020, December 1). United States Department of State. https://www.state.gov/u-s-relations-with-pakistan/

[5] Country Reports on Terrorism 2019: Pakistan. (2020, December 1). United States Department of State. https://www.state.gov/reports/country-reports-on-terrorism-2019/pakistan

[6] Jason Howk was a guest speaker at the 2020 U.S. Central Command Central and South Asia Conference and led a public discussion with Inter-Services Intelligence Officers attending the event on Pakistan’s further role in the Afghan peace process.  This discussion was a heated and brutally honest moment in the conference. See readouts of the event here: https://news.clearancejobs.com/2020/02/22/a-regional-perspective-on-the-war-in-afghanistan and https://dispatchesfrompinehurst.com/2020/02/23/briefing-on-pakistans-campaigns-against-afghanistan-and-why-they-have-failed-repeatedly

Afghanistan Jason Criss Howk Option Papers Pakistan Policy and Strategy Sabir Ibrahimi United States

Can You Have it All? – Options for Readying for Both Stability and Large Scale Combat Operations

Dr. Jacob Stoil is an Assistant Professor of Military History at the U.S. Army School of Advanced Military Studies and Fellow of the West Point Modern War Institute. He received his doctorate in history from the University of Oxford. His research and publications primarily focus on indigenous force cooperation, Israeli military history, special operations in the Second World War, peripheral campaigns in global war, and the use of the subterranean environment in warfare. Dr. Stoil is a member of the International Working Group on Subterranean Warfare and the Second World War Research Group (North America).  He can be reached on Twitter at @JacobStoil.

Dr. Tal Misgav is a Chief Superintendent in MAGAV where he serves as the commander of the MAGAV Heritage and Memorial Center. Prior to assuming his post in 2002 he served as special unites and training officer in the operations branch of the Israel Police. He holds a PhD in Military History from the Constantine the Philosopher University in Nitra and MA in History from Touro College. Tal has served as an advisor to the commander of MAGAV on MAGAV’s combat history and structuring and building the future of the force. He has authored numerous articles and several books including a forthcoming work “The Legal Framework for Security Force Activity in Judea and Samaria” and “Between the Borders in a Changing Reality: Magav in the run up to and during the Six Day War.”

The views, facts, opinions, and conclusions expressed herein are those of the authors and neither necessarily represent the views of the U.S. Government, U.S. Department of Defense, U.S. Army, U.S. Army Command and General Staff College, School of Advanced Military Studies or any other U.S. government agency nor Israeli Government, Israel Police, or MAGAV. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. military shift from stability / counterinsurgency operations (COIN) to large scale combat operations (LSCO) requires challenging force structure decisions.

Date Originally Written:  January 11, 2021.

Date Originally Published:  January 20, 2021.

Author and / or Article Point of View:  The authors believe that for the U.S. military to emerge victorious in future conflicts, it must retain the knowledge and capabilities for both large scale combat operations (LSCO) and stability / counterinsurgency operations (COIN), and that this will require deliberate planning.

Background:  Over the last twenty years, the U.S. military has paid a heavy price to learn the lessons for fighting COIN campaigns and stability operations. As the U.S. military now focuses more exclusively on LSCO, it risks having the pendulum swing too far in the other direction. The doctrine for LSCO recognizes that in the future, as in the past, stability operations and COIN will play a significant role in both the consolidation zone and the phase of consolidating gains[1]. The historical record supports this. In the Second World War and American Civil War, the U.S. Military expended significant resources on stability, security, and reconstruction[2]. There is every indication that stability and security operations will continue to play a major role in operations below the threshold of LSCO. While there are several ways the U.S. may try to address this problem, other countries, such as Israel, have come up with novel solutions.

Significance:  Historically, the U.S. military has tended to swing between focusing on COIN and stability and focusing on large scale conventional operations. As Iraq and Afghanistan showed, this swing had a cost. The U.S. can find a way to retain knowledge, expertise, and readiness to engage in stability and COIN as well as, and as part of, LSCO. It cannot rely on the experience of the officers and personnel who served in Iraq and Afghanistan alone. Soon there will be officers who have no experience in COIN or stability operations. Yet despite the challenge, developing and retaining expertise in COIN and stability will be critical to the success of future LSCO as well as combating hybrid threats.

Option #1:  The Israeli Option: The U.S. military models a portion of its forces on the experience of MAGAV (Israel’s Gendarme).

Among MAGAV’s responsibilities is maintaining security in the West Bank – an operation which the U.S. military would term as a COIN or stability operation[3]. In LSCO, MAGAV fulfills the same role in the consolidation area[4]. For example, in the 1982 Lebanon War, MAGAV entered Lebanon with the responsibility for security in the costal consolidation area[5]. In order to maintain its specialty for both LSCO and regular operations, MAGAV trains its personnel for operations among the civilian populations[6]. This process begins in boot camp which focuses on this mission, including instruction in how to deal with a wide range of civilian-led demonstrations and terrorist activities—among both friendly and hostile populaces[7]. This process continues in special bases known as “greenhouses” that enable service members to practice their skills in urban and open-territory scenarios as well as targeted training in dispersing demonstrations[8]. This training gives MAGAV a specialized skill set in COIN and stability operations[9].

Risk:  While soldiers from a COIN / stability centric branch like MAGAV would have the ability to conduct basic infantry tasks, they will not be interchangeable with conventional combat focused units. This may create a problem when it comes to deployments and missions as in the current strategic environment, the more stability focused branch will likely have more frequent deployments. Bureaucratically, this also means creating another career and training pipeline in which they can advance, which itself will have a budgetary effect.

Gain:  As the case of MAGAV demonstrates, having a specialty force for stability and COIN can take the pressure off the rest of the branches. This model already exists within the U.S. Army, whose various branches recognize the different skill sets and training required to conduct different types of missions and that the total force benefits from integration of the branches. The experience of MAGAV in the 1982 Lebanon War shows that a specialist branch will solve the challenge of the allocation of forces to consolidation zones in LSCO and may help prevent some the problems that plagued the Iraq War. This option will allow the Army to retain the knowledge and skills to prevail in stability and COIN operations while allowing the bulk of the Army to focus on LSCO.

Option #2:  The Generalist Option: The U.S. military tries to balance its force structure within existing concepts and constructs.

The U.S. military seeks to end the bifurcation between COIN and stability operations on one hand and LSCO on the other. In this option, the military recognizes that COIN and stability tasks are a critical facet of LSCO.  The focus on integrating the two will be in all training and professional military education (PME). While at the most basic level, the training requirements for LSCO may apply to COIN and stability tasks, at higher echelons the tasks and mindsets diverge. To compensate for this, COIN and stability will be included in training and PME for echelons above the battalion. This option would keep within the intent authored by Lieutenant General Michael D. Lundy, former Commanding General of the United States Army Combined Arms Center and Fort Leavenworth, not to lose the lessons of COIN while pursuing LSCO[10]. However, this option differs from the tack that the U.S. military is currently taking by explicitly requiring the retention of a focus on COIN and stability operations, as well the capabilities and structures to execute them within the framework of a force preparing for LSCO.

Risk:  In a budget and time constrained environment this option can be supremely difficult to retain an integrated focus, which could leave critical aspects of COIN and LSCO uncovered. This option risks having one or the other type of operation undervalued, which will result in the continued problem of radical pendulum swings. Finally, even if it proves possible to incorporate stability and LSCO operations equally in training, education, structures, and thought, this option risks creating a force that is incapable of doing either well.

Gain:  This option will create the most agile possible force with a fungible skill set. It allows any formation to serve in either form of operation with equal efficacy, easing the job of planners and commanders. This option will create the broadest possible pool from which to draw, allowing deployments and other missions to be balanced across the force without leaving one or another formation overburdened.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Hernandez, R. (2019, July 2). Operations to Consolidate Gains. Retrieved January 13, 2021, from https://www.armyupress.army.mil/Journals/NCO-Journal/Archives/2019/July-2019/Operations-to-Consolidate-Gains

[2] See for example: Shinn, David H. and Ofcansky, Thomas P. Historical Dictionary of Ethiopia p. 309; https://history.army.mil/books/wwii/Occ-GY/index.htm; https://history.army.mil/html/books/075/75-18/cmhPub_75-18.pdf 

[3] MAGAV Heritage and Memorial Center, Organizational Command #11/12, June 2012, p. 2; MAGAV Heritage and Memorial Center, MAGAV Judea and Samaria, December 2015, p. 2

[4] According to FM 3-0 the consolidation area is the portion of an “area of operations that is designated to facilitate the security and stability tasks necessary for freedom of action in the close area and support the continuous consolidation of gains.” Dept of the Army (2017) Operations (FM 3-0). 1-158

[5] MAGAV Heritage and Memorial Center, Summary of MAGAV Action in Lebanon: 1982–1985, p. 3; 

[6] MAGAV Heritage and Memorial Center, Survey of Public Disturbance Trends, 2004, p. 9

[7] MAGAV Heritage and Memorial Center, “Border Patrol Unit Course”, March 2012, pp. 9–12; MAGAV Heritage and Memorial Center, “Rifle 05 Training Course” 2008, p. 6

[8] MAGAV Heritage and Memorial Center, “Rifle 05 Training Course” 2008, p. 6; MAGAV Heritage and Memorial Center, “Magav Commanders Course”, April 2014, p. 7

[9] MAGAV Heritage and Memorial Center, Survey of Magav—The Future Has Already Arrived, 2019, pp. 25–26

[10] Lundy, M. D. (2018, September). Meeting the Challenge of Large-Scale Combat Operations… Retrieved January 13, 2021, from https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/September-October-2018/Lundy-LSCO

Capacity / Capability Enhancement Dr. Jacob Stoil Dr. Tal Misgav Insurgency & Counteinsurgency Israel Option Papers Training U.S. Army United States

Options to Prioritize People and Improve Readiness: Decreasing OPTEMPO to Increase Learning

Josh Linvill has served in 11th Armored Cavalry Regiment as a regimental planner, rifle company commander, and headquarters and headquarters troop commander. He is assigned to the 10th Mountain Division and serves as a planner for Operation Resolute Support in Kabul, Afghanistan. He can be found on Twitter @josh_linvill. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. Army is transitioning its number one priority from readiness to people. Part of the transition is an attempt to reduce the operational tempo (OPTEMPO) so units can focus on dedicated periods for mission, training, and modernization.

Date Originally Written:  November 7, 2020.

Date Originally Published:  January 4, 2021.

Author and / or Article Point of View:  The author is a graduate of the U.S. Army’s School for Advanced Military Studies whose research focused on how the Army can learn from Rotational Training Units’ (RTU) experiences. The author believes a lower OPTEMPO by focusing the purpose of Combat Training Center (CTC) rotations or reducing the number of CTC rotations will increase learning for the Army and therefore increase readiness.

Background:  In October 2020, the U.S. Army published its Action Plan to Prioritize People and Teams. The plan describes how the focus on readiness, “resulted in an unsustainable OPTEMPO and placed significant demands on units, leaders, and Soldiers and Families and stress on the force[1].” The action plan describes two ways the Army will reduce OPTEMPO; specially designed rotations where the entire brigade will not deploy to a CTC and potentially not requiring CTC rotations for units scheduled for non-combat deployments.

Significance:  Experiential Learning Theory (ELT) provides a model, figure 1, the Army can use to increase learning while reducing OPTEMPO. Theorist David Kolb explains the dialectic nature of ELT, “learning is defined as ‘the process whereby knowledge is created through the transformation of experience.’ Knowledge results from the combination of grasping and transforming experience[2].” The ELT cycle consists of four stages: concrete experience, reflective observation, abstract conceptualization, and active experimentation. In ideal circumstances the learner grasps and transforms knowledge while progressing through each stage of the cycle. As Kolb writes, “immediate or concrete experiences are the basis for observations and reflections. Theses reflections are assimilated and distilled into abstract concepts from which new implications for action are drawn. These implications can be actively tested and serve as guides in creating new experiences[3].” Changing the current design and/or rate of CTC rotations, or concrete experiences for units, enables the Army to give primacy to the other stages of the ELT cycle. By implementing different options for CTC rotations the Army can learn more by harnessing the power of a complete ELT cycle.

Figure 1. Kolb’s Experiential Learning Theory Model. David A. Kolb, Experiential Learning: Experience as the Source of Learning and Development (Upper Saddle River, NJ: Pearson Education, 2015), 51.

Option #1:  The Army focuses CTC rotations on Army learning, not just the RTU. In this option, the Army can treat each CTC rotation as a means to an end by assessing and integrating the needs of the RTU with the overall needs of the Army. In other words, each CTC rotation can serve as a new concrete experience in the ELT cycle of the Army. The Army can use lessons learned from current conflicts or previous War Fighter Exercises and CTC rotations to tailor rotations focused on one unit or warfighting function. For example, division cavalry constructs, the use of armor in an Intelligence, Surveillance, and Reconnaisance saturated environment, or consolidation area operations.

Risk:  The primary risk to Option #1 is that the experiments fail and a fiscal risk in that rotations are extremely expensive. If there is no balance between active experimentation and training the fundamentals of warfighting and therefore readiness will suffer.

Gain:  Rather than using similar rotational constructs for each Brigade Combat Team, in this option the Army will benefit from using the ELT cycles that begin with different experiences to test (ELT active experimentation) a theory or hypothesis (ELT abstract conceptualization) developed by reflecting on pervious experiences (ELT reflective observation). In this option ELT cycles that begin outside of CTCs will directly influence CTC rotations. By linking ELT cycles at CTCs the Army can develop new ideas following a variety of experiences.

Option #2:  The U.S. Army slows down to speed up learning. A certain level of detachment from experience is required to progress through every stage of the ELT cycle. An organization consumed by events cannot effectively learn. By reducing the number of CTC rotations the Army can learn more by focusing on the other stages of the ELT cycle and exploit the knowledge of other organizations who shared the experience with the RTU. Organizations like Operations Groups and the Opposing Force (OPFOR) are just some of the key players to extending the learning process. More time between rotations would allow these organizations time to progress through their own ELT cycles and share that knowledge directly with other units[4].

Risk:  Although quality over quantity is important and in-line with the Army Action Plan, this option risks leaders in key positions not having any CTC experience at all. Fewer events mean fewer concrete experiences to initiate the learning.

Gain:  Fewer rotations means CTC Operations Groups will be able to focus more time observing and coaching units through the entire ELT cycle instead of focusing on the concrete experience of each rotation. Fewer rotations will enable members of the Operations Groups to follow up with previous RTUs and coach them through the reflection on, conceptualization, and experimentation of ideas that began during their rotation, extending the learning cycle that started at the CTC. This same process could take place for units training for upcoming CTC rotations. Members of the Operations Groups would have the time to share the reflections and observations of previous RTUs and their own observations and ideas to support commanders training their units for a CTC rotation. Fewer rotations would also enable other CTC organizations, like members of the OPFOR, to take part in the process and further enhance units’ learning cycles.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] U.S. Army, Action Plan to Prioritize People and Teams. Army.mil, October13, 2020, accessed October 25, 2020, https://www.army.mil/article/239837/action_plan_to_prioritize_people_and_teams

[2] David A. Kolb, Experiential Learning: Experience as the Source of Learning and Development (Upper Saddle River, NJ: Pearson Education, 2015), 51.

[3] Ibid.

[4] Dr. Robert Foley examines the process of horizontal learning, using the experiences of other units to learn, is his article, A Case Study in Horizontal Military Innovation: The German Army, 1916-1918. Available at https://www.tandfonline.com/doi/abs/10.1080/01402390.2012.669737

Josh Linvill Option Papers Readiness U.S. Army

Options to Improve U.S. Army Ground Combat Platform Research and Development

Mel Daniels has served in the United States military for nearly twenty years. Mel is new to writing. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group or person.


National Security Situation:  The modernization of U.S. Army ground combat platforms includes risks that are not presently mitigated.

Date Originally Written:  August, 16, 2020.

Date Originally Published:  November 23, 2020.

Author and / or Article Point of View:  The author believes that the U.S. Army’s over reliance on immature technologies are a risk to national security. Further, the author believes that the risk can be mitigated by slowing development and reducing research and development (R&D) investments while reinvesting in proven material solutions until new systems prove technologically reliable and fiscally feasible to implement.

Background:  The U.S. Army is investing in programs that remain unproven and are unlikely to provide the capabilities sought. Specifically, the Army is heavily investing in its Optionally Manned Fighting Vehicle (OMFV) and remote combat vehicles[1]. These programs are predicated on optimal battlefield conditions. Firstly, the assumption exists that enemy forces will not be able to degrade or destroy the battlefield network required to operate unmanned vehicles. Secondly, the risk of the enemy developing weapons that specifically target transmissions coming from control vehicles is a factor that needs to be taken seriously in threat assessments and in planning purposes[2].

Significance:  If the Army’s assumptions are incorrect and if these efforts fails to procure reliable and sustainable ground combat platforms for future operations, there will not be additional resources to mitigate this failure. Moreso, if the Army procures vulnerable systems that fail to deliver effects promised, the Army risks catastrophic defeat on the battlefield.

Option #1:  The U.S. Army could reduce and spread out its R&D investments to further invest in its legacy combat forces to offset the risks associated with funding unproven and unreliable technologies.

Risk:  The significant risks associated with Option #1 are that the technological investments needed for future capabilities will be delayed. The Army would lose its plan for fielding, as the Army will not fully field the OMFV until the early 2030’s, assuming there are no complications to the program of record. Additionally, Robotic Combat Vehicles (RCV) would be delayed until they can also be realistically evaluated. Lastly, investments into legacy systems could threaten the need for future platforms.

Gain:  If the Army elected Option #1, it would have the time to properly and realistically test RCV’s, OMFV and Manned-Unmanned Teaming concepts (MUM-T). This additional testing reduces the chances of investing significant resources into a programs that do not deliver as promised. It also reduces disingenuous and fraudulent claims prior to further funding requests. Simply put, the chances of ineffective systems being funded would be mitigated because proper and realistic testing from an independent entity would occur first. The Army would also gain additional capabilities for its current systems that otherwise would not be upgraded but yet will remain in service for decades.

Option #2:  The Army consolidates their modernization efforts and cancels select requirements. Currently the Army funds 4 major ground combat programs; the Mobile Protected Firepower, RCV program (Heavy, Medium and Light), OMFV, and CROWS-J/30mm. The Army could cancel the MPF program because the program is questionable due to its inability to defeat enemy near peer armored threats that will likely be encountered[3]. This cancelation would allow the Army to invest into the RCV light program, armed with the 50mm cannon and Anti-Tank Guided Missiles (ATGM). The Army would retain a viable anti fortification and direct fire support vehicle, while reducing needless expenses. Further, the Army could cancel or delay the unmanned requirement of the OMFV until the technology and network is fully secured and matured, with no limitations or risks.

Risk:  A significant risk associated with Option #2 is that the Army will not get a light tank or get RCV Medium or Heavy platforms and it will not receive the “optionally manned” portion of the OMFV until later. The risk with not obtaining these desired capabilities mean that the Army would have to accept an alternative material solution that defeats enemy fortifications and armor as opposed to the MPF.

Gain:  The Army retains its desired capabilities while maximizing resources. The Robotic Combat Vehicle-(Light), armed with a 50mm cannon and ATGM’s, is less expensive, lighter and carries more ammunition than the MPF. Further, the RCV-L is better armed to defeat enemy armored threats, as the MPF’s 105mm cannon is inadequate to defeat enemy tanks[3]. Additionally, by removing the unmanned requirement from the OMFV, the Army would gain savings and reduce reliance on unproven technologies, reducing risk of battlefield defeat[4]. This option enables the Army to retain remote controlled concepts by shifting the focus to the RCV-L and equipping the Infantry Brigade Combat Team community with it, as opposed to the Army risking its combat strength and forcing immature technologies upon the Armored Brigade Combat Team community, which is the Army’s main combat formation for near peer conflict.

Other Comments:  The Army is heavily investing in vulnerable technologies without first ensuring it has an effective network able to completely support the operational concepts it desires. Without ensuring that the required network will be immune to enemy countermeasures, these technologies will not fully support operational requirements. Further, the costs associated with these efforts are already exceeding 60 billion dollars, and do not afford the service increased lethality or survivability, even by common English definitional sense. Army R&D efforts will continue to be at risk if they refuse to allow independent agencies full access and evaluation rights prior to further funding.

Recommendation:  None.


Endnotes:

[1] Freedberg Jr, Sydney. August 6th, 2020. Breaking Defense. GAO Questions Army’s 62B Cost Estimates for Combat Vehicles. Retrieved from: https://breakingdefense.com/2020/08/gao-questions-armys-62b-cost-estimates-for-combat-vehicles

[2] Trevithick, Joseph. May 11th 2020. The War Zone: This is What Ground Forces Look like to an Electronic Warfare System and Why It’s A Big Deal. Retrieved from: https://www.thedrive.com/the-war-zone/33401/this-is-what-ground-forces-look-like-to-an-electronic-warfare-system-and-why-its-a-big-deal

[3] Central Intelligence Agency. Gorman, Paul. Major General, USA. US Intelligence and Soviet Armor. 1980. Retrieved from: https://www.cia.gov/library/readingroom/docs/DOC_0000624298.pdf

[4] Collins, Liam. Colonel, USA. July 26th 2018. Association of the United States Army: Russia Gives Lessons in Electronic Warfare. Retrieved from: https://www.ausa.org/articles/russia-gives-lessons-electronic-warfare

Budgets and Resources Emerging Technology Mel Daniels Option Papers Research and Development U.S. Army

U.S. Options for Countering the Belt and Road Initiative in Africa

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Drake Long is an analyst with RadioFreeAsia, covering the South China Sea and other maritime issues. He is also a 2020 Asia-Pacific Fellow for Young Professionals in Foreign Policy (YPFP). He can be found on Twitter @DRM_Long and has previously written for RadioFreeAsia, The Diplomat, 9DASHLINE, and the Center for International Maritime Security. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States is competing with the People’s Republic of China and its landmark Belt and Road Initiative.

Date Originally Written:  July 30, 2020.

Date Originally Published:  November 4, 2020.

Author and / or Article Point of View:  The author believes ‘great power competition’ as prescribed by the National Defense Strategy is in reality a competition for the favor of unaligned countries, most especially the economically dynamic middle powers and rising powers in Africa.

Background:  Thirty-nine African countries have signed onto China’s Belt and Road Initiative (BRI), an infrastructure and investment project that is synonymous with Chinese foreign policy[1]. More African college students attend Chinese universities over that of the U.K. and U.S., largely through programs like the China-Africa Action Plan that recruits 100,000 African civil servants and military officers annually[2]. However, African countries have also grown wary of Chinese investment, renegotiating their debt with China as a bloc this year[3].

Significance:  BRI projects are one method of co-opting African political elites, as the ‘corrosive capital’ of Chinese investment often exacerbates existing inequality and graft issues in developing countries[4]. Certain Chinese State Owned Enterprises (SOE) hold virtual monopolies on certain materials like cobalt, found only in a select few places on the African continent, to secure materials necessary for an advanced economy[5]. On top of this, China’s co-opting of local media means negative coverage of China is suppressed.

Option #1:  The U.S. facilitates local journalism in African countries at the center of China’s Belt and Road Initiative through specialized grants to local news outlets and public-private partnerships to create tertiary journalism schools.

Chinese BRI projects are often signed on opaque or parasitic terms. Exposure in the public press creates upward pressure on African elites to cancel these projects or renegotiate them, hurting Chinese soft power, influence, and economic dominance over certain sectors of the African economy[6].

A free press is ultimately good for elite accountability, and elite accountability spells doom for Chinese influence efforts. In some cases, exposing kleptocracy can lead to a change in government, removing officials previously eager to sign BRI deals for potential kickbacks[7].

If the U.S. were to use existing tools to better support local journalism in small-but-pivotal African states along the BRI, this would facilitate opposition to Chinese influence. Targeted grants to local and sub-regional news outlets is one method of achieving this, but the training of journalists in African countries is pivotal, too. As such, existing agencies could partner with experienced U.S. news organizations to create schools and training initiatives that would seed a new generation of journalists in African countries.

Risk:  Some negative coverage of U.S. investments and multinational companies operating in Africa may also occur.

Gain:  This option will create a stronger network of accountability for African elites susceptible to Chinese corrosive capital, and expose China’s BRI projects without the stigma of being the U.S. government and thus not impartial.

Option #2:  The U.S. strengthens labor unions and they more forcefully advocate labor rights in African countries.

Organized labor has played a critical role in exposing worker abuse and poor conditions at the sites of Chinese BRI investment before, most notably in Kenya, where a railway strike in 2018 brought Chinese railway projects to a halt[8].

Many of China’s business and infrastructure projects in certain African countries are facilitated by bribes to local officials. Labor movements bypass this ‘elite capture’ by exposing ties between Chinese and African oligarchs, and pressuring those same elites to cancel BRI projects or negotiate terms that are more favorable to African workers.

At the same time, organized labor in Africa faces steep challenges: labor migration is largely unregulated[9] and labor unions have long been marginalized from developing economies, holding little actual political power in the modern day[10].

If the U.S. were to give labor and trade unions targeted support similar to other civil society initiatives, it would create domestic pressures on Chinese investors in African countries. Expanding the U.S. Department of Labor’s International Labor Affairs Bureau would provide accurate data on labor movements and labor rights, and placing a Labor section on the National Security Council Staff would assist policy coordination.

Risk:  This option would potentially anger non-Chinese multinational corporations with a presence in those countries as well.

Gain:  African labor movements could shut down BRI projects entirely or put pressure on national governments to renegotiate terms with Chinese SOEs.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Risberg, P. (2019). The Give-and-Take of BRI in Africa. Retrieved July 31, 2020, from https://www.csis.org/give-and-take-bri-africa

[2] Acker, Kevin, Deborah Brautigam, and Yufan Huang. (2020). Debt Relief with Chinese Characteristics. Working Paper No. 2020/39. China Africa Research Initiative, School of Advanced International Studies, Johns Hopkins University, Washington, DC. Retrieved from http://www.sais-cari.org/publications

[3] Natalunya, Paul. (2020). China Promotes Its Party-Army Model in Africa. Retrieved July 31, 2020, from https://africacenter.org/spotlight/china-promotes-its-party-army-model-in-africa

[4] John Morrell et al. (2018). Channeling the Tide: Protecting Democracies from a Flood of Corrosive Capital. Retrieved from https://www.cipe.org/resources/channeling-the-tide-protecting-democracies-amid-a-flood-of-corrosive-capital

[5] Jack Farchy and Hayley Warren. (2018) China has a secret weapon in the race to dominate electric cars. Bloomberg News. Retrieved from https://www.bloomberg.com/graphics/2018-china-cobalt

[6] Shikongo, Arlana. (2019). ‘Chinese invasion’ claims hit cement factory. The Namibian. Retrieved from https://www.namibian.com.na/191934/archive-read/Chinese-invasion-claims-hit-cement-factory

[7] Hursh, John. (2019). A Bump in the Belt and Road: Tanzania pushes back against Chinese port project. Center for International Maritime Security. Retrieved from http://cimsec.org/a-bump-in-the-belt-and-road-tanzania-pushes-back-against-chinese-port-project/42449

[8] Kenyan workers’ strike halts Chinese railway project. (2018). GlobalConstructionReview. Retrieved from https://www.globalconstructionreview.com/news/kenyan-workers-strike-halts-chinese-railway-projec

[9] An assessment of labour migration and mobility governance in the IGAD region. (2020). International Labor Organization. Retrieved from https://www.ilo.org/wcmsp5/groups/public/—africa/—ro-abidjan/—sro-addis_ababa/documents/publication/wcms_740549.pdf

[10] Pitcher, M. (2007). What Has Happened to Organized Labor in Southern Africa? International Labor and Working-Class History, (72), 134-160. Retrieved August 1, 2020, from www.jstor.org/stable/27673096

2020 - Contest: PRC Below Threshold Writing Contest Africa China (People's Republic of China) Competition Drake Long Journalism / The Press Option Papers United States

Options to Decrease Trade Tensions Between the U.S. and China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Rukhsar Azamee is a graduate student at the school of professional studies, New York University. She can be found on Twitter @RukhsarAzamee. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. requires options to decrease trade tensions with China.

Date Originally Written:  July 2, 2020.

Date Originally Published:  October 28, 2020.

Author and / or Article Point of View:  This article is written from the U.S-China relations point of view. It elaborates on how the U.S. and China can decrease the trade tensions and how they can continue their collaboration in the future.

Background:  China’s economic growth in the last decades has started a new chapter in the international arena. After 9/11, America started the fight against terrorism in Afghanistan and Iraq[1] while China kept strengthening its economy. China became the world’s second-largest economy in 2010[2]. Currently, China is considered the world’s largest economy by the purchasing power parity (PPP). China’s Gross Domestic Product (GDP) by PPP is approximately $24.5 trillion, while America’s GDP by PPP is $20.5 trillion[3]. The 2017 U.S. National Security Strategy declared China as a competitor, and as a threat to the United States[4].

Recognizing China officially as a competitor is a policy shift for the U.S., the United States followed the “engagement” policy towards China’s rise under two assumptions in the past.  The first U.S. assumption was that a strong China would serve the interests of America, and the second assumption was that a prosperous China would share American values by fostering regime change. The United States had not considered China a threat to its future[5].

China started modernizing its military by investing in missile and other military technology. From 2005 to 2014, China increased its military spending by 9.5% per year. China invested heavily in cyber operations. The argument is that China has strengthened its military to deter America’s intervention in its neighbors and to resolve Taiwan’s status[6]. China’s president Xi Jinping, unlike his predecessors, seeks to establish China as a Great Power again[7]. The competition is between the U.S. and China, and both countries are trying to prevail.

After the 2016 election in America, professor Yang Qijing of Renmin University stated in his report, “Trump Wins, Immense Challenges for China” implying that President Trump would focus on U.S. domestic economic growth. Yang said that Trump administration would seek a protectionist approach towards China and the U.S. started a trade war with China in 2018 by imposing tariffs on the import of Chinese goods in the U.S.[8] The trade war has hurt U.S-China relations, but it has also damaged the global economy[9]. The International Monetary Fund’s officials encouraged both countries to decrease the trade tensions in its 2019 reports[10].

Furthermore, China’s top talent in artificial intelligence (A.I.) end up working in America. Fifty-four percent of Chinese A.I. students come to the U.S. for their A.I education and research and then stay to work at U.S. firms[11]. Cyberattacks, and A.I theft remain a challenge in U.S.-China relations. A report by the U.S. National Security Agency noted 600 instances of Chinese hackers stealing confidential information from U.S. companies from 2009 to 2013 and a cybersecurity firm named Mandiant presented documents of 115 attacks against the U.S. by the Chinese People’s Liberation Army (PLA) in 2013[12]. The Trump administration decided to cancel the visa of those students/researchers with ties with China’s military in 2020[13].

China is trying to form a new tributary system through the Belt and Road Initiative (BRI) project. Sri-Lanka, as an example, can demonstrate China’s expansionist ambition. In 2017, Sri-Lanka was unable to pay the loan taken from China under the BRI project. Sri-Lanka defaulted and signed a 99-years lease of its port to Chinese state-owned enterprises[14]. On the other hand, the Quadrilateral Security Dialogue among the U.S., Japan, India, and Australia was re-launched in 2017 to counterbalance China’s assertive policies in the indo-pacific region[15].

Significance:  The U.S. and China are the world’s two largest economies. The management of U.S competition with China will affect other countries’ policies towards China.

Option #1:  The U.S. embraces China as a Great Power, promote strategic economic engagement with China, and create frameworks that would regulate A.I and cyberspace for both countries.

Risk:  There are two risks. The first is that Japan, India, and Australia would work hard to stop China from becoming a Great Power[16]. The second is that China might seek global dominance after achieving regional power based on “Chinese dreams” or “great rejuvenation of the Chinese nation” strategy discussed by the Chinese president[17].

Gain:  The U.S.-China competition is different and it sets itself apart in two ways. First, China has not shown desires for global dominance, and while they have been expanding their presence in the neighboring islands in the Pacific, China has not shown an appetite for the use of military force to enhance its influence[18] (in contrast to Russia’s approach to the Balkans for example, or even the supply of weapons to Syria). Second, China is seeking regional dominance through debt diplomacy. Therefore, this option allows China to achieve its goal, and it de-escalates the tension among both countries by being strategically engaged.

Option #2:  The U.S. creates a veto power alliance against China within the Security Council of the United Nations. The veto power could block China’s foreign policies that do not meet international standards.

Risk:  There is a high likelihood that Russia would not join this alliance. Russia is more likely to side with China against the U.S. than join a three-way pact[19].

Gain:  Advanced nations with powerful economies blocking China would isolate it, putting pressure on China to change its foreign policies. Eventually, this option would ensure a peaceful international order by regulating China’s assertive actions, and it set a precedence for any rising powers to be mindful and comply with the international community in the future.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Four Scenarios for U.S.-China Relations and What They Mean for Japan
https://www.tokyoreview.net/2019/05/four-scenarios-us-china-relations

[2] China overtakes Japan as world’s second-largest economy
https://www.theguardian.com/business/2010/aug/16/china-overtakes-japan-second-largest-economy

[3] The world Bank – Open Data- “GDP, PPP (current international $) – China, United States”
https://data.worldbank.org/indicator/NY.GDP.MKTP.PP.CD?locations=CN-US

[4] 2017 U.S. National Security Strategy
https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905-2.pdf 

[5] What Went Wrong? U.S.-China Relations from Tiananmen to Trump- by James B. Steinberg
https://tnsr.org/2020/01/what-went-wrong-u-s-china-relations-from-tiananmen-to-trump

[6] The Chinese Military: Overview and Issues for Congress- Ian E. Rinehart -Analyst in Asian Affairs March 24, 2016
https://fas.org/sgp/crs/row/R44196.pdf

[7] Saving America’s Alliances- By Mira Rapp-Hooper, March/April 2020
https://www.foreignaffairs.com/articles/united-states/2020-02-10/saving-americas-alliances

[8] Towards Economic Decoupling? Mapping Chinese Discourse on the China–U.S. Trade War- by Li Wei
https://academic.oup.com/cjip/article/12/4/519/5650490

[9] US-China trade Dangerous miscalculations
https://www.economist.com/leaders/2019/08/08/dangerous-miscalculations

[10] IMF’s country reports/Article IV consultation 2019, Executive Board Assessment (China and U.S.)
https://www.imf.org/en/countries

[11] A U.S. Secret Weapon in A.I.: Chinese Talent
https://www.nytimes.com/2020/06/09/technology/china-ai-research-education.html

[12] International Law Norms, Actors, Process (Aspen Casebook Series) 5th – Jeffrey Dunoff (State Responsibility: Attributing Malicious Cyber Conduct)

[13] A U.S. Secret Weapon in A.I.: Chinese Talent
https://www.nytimes.com/2020/06/09/technology/china-ai-research-education.html

[14]H.R. McMaster, “How China Views the World,”
https://www.realclearpolitics.com/2020/04/19/how_china_sees_the_world–and_how_we_should_see_china_508340.html

[15] The US-Japan-India-Australia Quadrilateral Security Dialogue: Indo-Pacific alignment or foam in the ocean?
https://www.fiia.fi/en/publication/the-us-japan-india-australia-quadrilateral-security-dialogue

[16] The US-Japan-India-Australia Quadrilateral Security Dialogue: Indo-Pacific alignment or foam in the ocean?
https://www.fiia.fi/en/publication/the-us-japan-india-australia-quadrilateral-security-dialogue

[17] H.R. McMaster, “How China Views the World,”
https://www.realclearpolitics.com/2020/04/19/how_china_sees_the_world–and_how_we_should_see_china_508340.html

[18] Saving America’s Alliances- By Mira Rapp-Hooper, March/April 2020
https://www.foreignaffairs.com/articles/united-states/2020-02-10/saving-americas-alliances

[19] CHINA AND THE RETURN OF GREAT POWER STRATEGIC COMPETITION- by BRUCE JONES- P8
https://www.brookings.edu/wp-content/uploads/2020/02/FP_202002_china_power_competition_jones.pdf

2020 - Contest: PRC Below Threshold Writing Contest China (People's Republic of China) Option Papers Rukhsar Azamee Trade United States

Options for the U.S. to Counter China’s Disruptive Economic Activities

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Johnathan Falcone is a United States Naval officer, entrepreneur, and graduate of the Princeton School of Public and International Affairs. He can be found on Twitter @jdfalc1. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The People’s Republic of China’s (PRC) economic activities threaten the U.S.-led financial order.

Date Originally Written:  June 02, 2020.

Date Originally Published:  October 26, 2020.

Author and / or Article Point of View:  The author believes that conflict between the U.S. and China is underway, and China has fired the first salvos in the economic and financial domains. The article is from the perspective of U.S. economic strategy to maintain competition below the threshold of kinetic war.

Background:  The PRC emerged from the 2008 financial crisis with increased capability to influence markets abroad and undermine U.S. leadership. Through new institutions, such as the Asian Infrastructure Investment Bank, and new development plans, including Belt and Road Initiative (BRI), China is making strides towards bifurcating the international financial system[1].

Significance:  Beijing uses its growing economic might to erode international support for the Republic of China (ROC) (Taiwan / Taipei)– the most likely source of armed conflict – and to increase military capacity beyond its shores[2]. Coercive economic strategies like tacit regional acquiescence and strategic land acquisition threaten the non-kinetic nature of today’s competitive environment[3]. Below are economic-based options to strengthen the existing U.S.-built financial order while simultaneously limiting the PRC’s capacity to project regional influence and stage wartime assets.

Option #1:  The U.S. takes action via proxy and encourages Southeast Asian and Pacific Island countries to increase bi-lateral trade volume with the ROC.

For countries in China’s near-abroad, diplomatic recognition of Taiwan is not possible. On the other hand, increasing trade with the ROC, a World Trade Organization member, is less provocative.

Risk:  As Taiwan’s largest trading partner, China will threaten and apply economic pressure to achieve political aims on the island. If Taiwan diversified its trade activity, economic coercion may no longer prove effective. This ineffectiveness might encourage China to pivot to military pressure against Taipei and its citizens. Substantiating this concern is the fact that China has already demonstrated its willingness to aggressively protect its economic interests in the South China Sea[4].

Further, the existing One-China Policy may be endangered if an increase in bi-lateral partnerships appeared to be U.S.-orchestrated. Although ROC independence would not be explicitly recognized, encouraging action symbolically consistent with an independent international actor could increase military posturing between the U.S. and China, as seen in the 1995-96 Taiwan Straits Crisis[5]. If tensions were to heighten again, the U.S. Navy would be opposing a much more capable People’s Liberation Army-Navy force than in previous crises.

Gain:  In addition to limiting China’s ability to apply economic pressure, bi-lateral trade would tie regional interests to ROC. China’s BRI has undermined relationships between ROC and neighboring countries, reducing incentives to aid Taiwan militarily and limiting U.S. military capacity to respond if China were to act aggressively in the region[6]. Substantive partnerships with the ROC create de facto buy-in to the U.S.-led financial system, increasing the number of potential partners to assist U.S. forces in case of war.

Option #2:  The U.S. lowers barriers to trade and access to markets by joining the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) trade agreement.

The original Trans-Pacific Partnership (TPP) was developed as part of the U.S.’ “strategic pivot to Asia” during President Obama’s administration. President Trump campaigned that he would withdraw the United States from negotiations and did so in 2017.

Risk:  The new CPTPP has left the door open for the PRC to join[7]. If Beijing and Washington were members of the same trade zone, it would become easier for both to circumvent tariffs, thereby undermining each state’s ability to compete with non-military tools.

Also, when it comes to CPTPP, friction exists between U.S. grand strategy and domestic politics. TPP received harsh opposition from both the political left and right[8][9]. Although there was agreement that there would likely be overall economic growth, many feared that American middle-class workers would be negatively impacted. As such, this option may be politically untenable.

Gain:  This option encourages regional buy-in to the U.S.-led financial order. CPTPP already creates a new market bloc that will bring about economic prosperity under U.S.-influenced rules. U.S. membership in the agreement would amplify its benefits. Chinese markets will have to liberalize to remain competitive, undermining the PRC’s alternative offerings to nearby states.

Today, China bullies developing countries into economic agreements with political concessions in exchange for access to Chinese markets[10]. U.S. entrance into CPTPP would decrease both PRC coercive power and regional dependency on Chinese markets.

Option #3: The U.S. leverages international institutions and assists strategically significant holders of Chinese debt obligations to refinance through the World Bank and International Monetary Fund (IMF).

China infamously financed the Hambantota Port Project, a port in southern Sri Lanka with access to the Indian Ocean. When the project failed, China negotiated a deal with Sri Lanka and now owns the port and surrounding land, granting Beijing unchallenged access to strategic waterways[11].

Risk:  Existing tensions between Western and the five BRICS (Brazil, Russia, India, China, and South Africa) states could be exacerbated at the World Bank and IMF. BRICS nations have routinely called for fundamental reforms to the Bretton Woods system to reflect the rising economic influence of developing states[12]. This financial intervention to refinance Chinese debt through Western channels could accelerate BRICS’ efforts to develop a competing financial channel.

Gain:  Beijing touts development projects in the Maldives and Djibouti, whose outstanding debt owed to China stands at 30 percent and 80 percent of their national Gross Domestic Products, respectively[13]. Default by either state would resign strategic territory in the Indian Ocean and mouth of the Red Sea to the PRC. Refinancing would ensure China does not acquire access to these strategic staging areas and would demonstrate the liberal financial system’s willingness to protect vulnerable states from predatory practices.

Other Comments:  The PRC will continue to project influence and hold an alternative vision for the world economy. The objective is to demonstrate the value of free markets to developing states and tie regional interests to ROC’s quasi-independent status.

Recommendation:  None.


Endnotes:

[1] Hillman, J. (2020, March 13). A ‘China Model?’ Beijing’s Promotion of Alternative Global Norms and Standards. Retrieved from https://www.csis.org/analysis/china-model-beijings-promotion-alternative-global-norms-and-standards.

[2] Kynge, J. (2020, July 10). China, Hong Kong and the world: is Xi Jinping overplaying his hand? Retrieved from https://www.ft.com/content/a0eac4d1-625d-4073-9eee-dcf1bacb749e.

[3] Leung, Z. (2020, May 15). The Precarious Triangle: China, Taiwan, and United States. Retrieved from https://thediplomat.com/2020/05/the-precarious-triangle-china-taiwan-and-united-states; Kristof, N. (2019, September 4). This Is How a War With China Could Begin. Retrieved from https://www.nytimes.com/2019/09/04/opinion/china-taiwan-war.html.

[4] Stavridis, J. (2020, May 30). World cannot ignore Chinese aggression in South China Sea. Retrieved from https://asia.nikkei.com/Opinion/World-cannot-ignore-Chinese-aggression-in-South-China-Sea.

[5] Suettinger, R. (2003). Beyond Tiananmen: The Politics of U.S.-China Relations, 1989-2000. Brookings Institution Press.

[6] Meick, E., Ker, M., & Chan, H.M. (2018, June 14). China’s Engagement in the Pacific Islands:
Implications for the United States. Retrieved from https://www.uscc.gov/sites/default/files/Research/China-Pacific%20Islands%20Staff%20Report.pdf.

[7] Zhou, W., & Gao, H. (2020, June 7). China and the CPTPP: is it time to rethink Beijing’s involvement in the trans-Pacific trade pact? Retrieved from https://www.scmp.com/economy/article/3087725/china-and-cptpp-it-time-rethink-beijings-involvement-trans-pacific-trade.

[8] Stiglitz, J. (2016, March 28). Why TPP Is a Bad Deal for America and American Workers. Retrieved from https://rooseveltinstitute.org/why-tpp-bad-deal-america-and-american-workers

[9] McBride, J. & Chatzky, A. (2019, January 4). What Is the Trans-Pacific Partnership (TPP)? Retrieved from https://www.cfr.org/backgrounder/what-trans-pacific-partnership-tpp.

[10] Grossman, D., & Chase, M.S. (2019, December 9). What Does Beijing Want from the Pacific Islands? Retrieved from https://www.rand.org/blog/2019/12/what-does-beijing-want-from-the-pacific-islands.html.

[11] Abi-habib, M. (2018, June 25). How China Got Sri Lanka to Cough up a Port. Retrieved from https://www.nytimes.com/2018/06/25/world/asia/china-sri-lanka-port.html

[12] Gangopadhyay, A., & Kala, A.V. (2012, March 29). Brics Wants World Bank, IMF Reforms. Retrieved from https://www.wsj.com/articles/SB10001424052702303816504577311012331186378.

[13] The Economic Times. (2019, May 09). China Building ‘International Network of Coercion through Predatory Economics’: US. Retrieved from https://economictimes.indiatimes.com/news/international/business/china-building-international-network-of-coercion-through-predatory-economics-us/articleshow/69257396.cms.

2020 - Contest: Civil Affairs Association Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Economic Factors Johnathan Falcone Option Papers United States

U.S. Options for Subversion within China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Chris Wozniak is an independent analyst. He holds a BA in Political Economy from the University of Washington. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  China is seeking to reclaim their historical role in Asia. Under current international norms this is seen as revisionist by the United States which holds the post World War 2 system as the status quo.

Date Originally Written:  July 31, 2020.

Date Originally Published:  October 21, 2020.

Author and / or Article Point of View:  This article is written from the point of view of the United States seeking options that erode Chinese influence abroad and interfere with China’s ability to reassert historical tools of influence.

Background:  The steady rise of China’s relative power on the international stage has placed it in competition with the United States and the international system of which the U.S. is the steward and chief stakeholder. While the international system is currently Westphalian in flavor, a resurgent China sees the world in starkly different terms. Traditional Chinese political philosophy took the view that their place in the world was as the center of a system based on influence and coercion. Today, China seeks to restore this system through the Belt and Road Initiative which extracts resources, establishes leasing agreements, and enhances influence abroad with the intent to secure resources and control commercial flows.

Significance:  Expansion of Chinese influence abroad presents a challenge to the interests and values of the United States. U.S. politics and business interests have often compromised diplomatic initiatives while military options remain prohibitively costly. A third path may be found in covert actions designed to subvert the information control that the Chinese Communist Party (CCP) leadership enjoys domestically and deprive them of access to technologies that support force projection.

Option #1:  The U.S. undermines Chinese ambitions abroad by creating diversionary doubt at home. This diversionary doubt would create an environment for political dissent by targeting CCP social control mechanisms.

A U.S. cyber campaign designed to delete or corrupt data in the Social Credit System administered by the People’s Bank of China is launched to reduce the level of scrutiny the population is under. Simultaneously, the U.S. promotes awareness or access to tools that circumvent information controls to break the information monopoly of the CCP.

Risk:  Chinese citizens have an extreme aversion to foreign interference rooted in China’s historical experience with Western powers. Coupled with the intense focus the CCP has on maintaining political orthodoxy, any discovery of meddling with Chinese domestic sphere would elicit severe consequences in diplomatic relations, trade, and military postures in the region. The sophistication that a cyber operation would require to disrupt, let alone cripple the PRC Social Credit program – and undermine its credibility in the same manner as the anti-Maduro TeamHDP attack on Venezuela’s much less robust social credit system did – would implicate the United States[1]. Moreover, tools such as virtual private networks for circumventing China’s Great FireWall (GFW) as an information barrier is publicly known information that most technically unsophisticated individuals can use.

Gain:  The obsession of the CCP on assuring the pervasiveness of the party in Chinese life would mean that even an unsuccessful Option #1 would likely result in extensive efforts to preserve the status quo information environment. Any subsequent diversion of resources into domestic programs fraught with difficulties would put other ambitions abroad on hold until a level of control was re-established. Any discovery of responsibility for the cyberattacks could be explained away as analogous to the Chinese theft of Office of Personnel Management data in 2015 to mitigate blowback.

Covert action aiming to lower barriers to foreign information would further roll back controls over China’s population. Undermining the GFW by promoting circumvention as a gateway to electronic gaming, sports broadcasts, and other media in demand but blocked in China is one promising area of focus. An estimated 768 million gamers are projected for China by 2022[2]. Enabling access by a growing population that trends young presents an opportunity to influence a substantial slice of the population with narratives that run counter to those government censors allow.

Option #2:  The U.S. subverts Chinese progress towards the military-industrial base that is needed for power projection.

A prerequisite to Chinese ambition abroad is establishing the military-industrial base to sustain economic growth and project power. The rapid development of China’s industry has been facilitated by student programs, scientific exchanges, forced technology transfer, and industrial espionage. Espionage has proven particularly difficult for western counterintelligence to manage because of their scale and persistence. A covert action program to feed disinformation to Chinese collectors engaged in industrial espionage could hinder development of the military-industrial base so critical to Chinese ambitions.

Risk:  Successful implementation may prove difficult in the face of robust efforts by Chinese collectors and vetting of the information by intelligence customers. The Ministry of State Security (MSS) aggressively recruits students to spy for China before they go abroad. If even one percent of the estimated 360,000 students who study in the United States are recruited, that means there are 3,600 potential long term agents seeking sensitive information[3]. The challenge increases when control of an agent is given to the Commission of Science, Technology, and Industry for National Defense also known as COSTIND whose agents are technically educated and more likely to detect misinformation. The impact of any program designed to deceive China will be potentially limited in scope to sensitive technologies being developed in the United States in order to maintain the credibility of the deception and make vetting of information more difficult. This makes for a risky gamble when the ideal approach to managing sensitive information is to reveal nothing at all.

Gain:  Deception could prove a more cost effective approach than the predominant mindset of reactive counterintelligence predicated on scrutiny of potential foreign agents. Potential espionage by Chinese students alone already invalidates this approach due to personnel requirements. By dangling bait in the form of falsified technical information sensitive industries and facilities, the United States can reverse the benefits of large unsophisticated espionage efforts and take a preventative approach. If coordinated with Allied intelligence services of countries suffering from similar intellectual property theft the effects of a deception campaign would be magnified. The MSS would doubtless struggle to adapt if caught up in a sea of misinformation.

Other Comments:  None of these options are decisive factors in competition between the United States and China but should prove useful in preparing the battlefield prior to any confrontation.

Recommendation:  None.


Endnotes:

[1] Berwick, A. (2018, November 14). How ZTE helps Venezuela create China-style social control. Retrieved June 4, 2020, from https://www.reuters.com/investigates/special-report/venezuela-zte

[2] Takahashi, D. (2018, May 7). Niko Partners: China will surpass 768 million gamers and $42 billion in game revenue by 2022. Retrieved July 10, 2020, from https://venturebeat.com/2018/05/07/niko-partners-china-will-surpass-1-billion-gamers-and-42-billion-in-game-revenue-by-2022

[3] Trade war: How reliant are US colleges on Chinese students? (2019, June 12). Retrieved July 7, 2020, from https://www.bbc.com/news/world-asia-48542913

2020 - Contest: PRC Below Threshold Writing Contest China (People's Republic of China) Chris Wozniak Option Papers United States

Below Threshold Options for China against the U.S.

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Eli Kravinsky is an undergraduate student at Haverford College. He previously spent a year in China on a State Department-funded language scholarship. He can be found on Twitter @elikravi. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. is continuing to orient its foreign policy and defense policy towards the People’s Republic of China (PRC). Accordingly, PRC tactics that have proven successful against the U.S. thus far may begin to fail. This failure will cause the PRC to develop new tactics to use against the U.S. below the threshold of armed conflict.

Date Originally Written:  July 27, 2020.

Date Originally Published:  October 19, 2020.

Author and / or Article Point of View:  The author is an American undergraduate student interested in China and security studies. The article is written from the perspective of the PRC and Chinese Communist Party (CCP) towards the U.S.

Background:  Strategic competition between the U.S. and China has increased in recent years. China’s strategy is to carefully escalate tensions so as to enable it to create “facts on the ground”, such as de-facto Chinese control over much of the South China Sea, without allowing tensions to boil over into full-scale war, which could result in China’s gains being rolled back[1].

Significance:  The U.S. has started taking much stronger notice of China’s below-threshold tactics and is responding increasingly harshly. As such, China must innovate new, carefully calibrated below-threshold tactics.

Option #1:  The People’s Liberation Army (PLA) Navy (PLAN) can deliberately ram a U.S. Navy (USN) ship in the South China Sea.

While PLAN ships sometimes ‘brush up’ on USN ships, an actual crash – intentional or otherwise – is unprecedented. However, in the 2001 EP-3 incident a PLA fighter jet crashed into a USN reconnaissance aircraft[2]. An easy method to create plausible deniability and reduce the risk to the PRC side would be to instead use a civilian freighter operating under the Maritime Militia. In the summer of 2017, two USN Arleigh Burke-class destroyers collided with civilian ships, both suffering severe damage and casualties. Even though the two incidents both occurred close to shore, Search and Rescue vessels and aircraft did not arrive until several hours after the initial crash in both cases[3]. As such, a USN response in force would likely arrive late, especially given that a deliberate ramming attack would occur closer to Chinese shores. Accordingly, the PLAN could pre-position ships to rapidly secure the site of the incident, and the U.S. side would have to confirm the incident was deliberate and not an accident as in the 2017 incidents.

Risk:  This would constitute a significant escalation of tensions between the two militaries. There is an appreciable chance that such an incident would be treated by the U.S. as a casus belli, especially if it caused casualties on the U.S. side.

Gain:  If executed successfully, this move could deter the USN from operating within China’s claimed waters. While the USN understands the PLA can impose costs on it via access-denial weaponry in an actual conflict, this option would impose similar costs even under competition that falls short of war. Additionally, doing so could allow the PLA to board a damaged or possibly crippled USN ship under the guise of rescue operations, offering a valuable opportunity to study USN technology and damage-control procedures up close. Tellingly, in the EP-3 incident, the PLA exploited the situation to extract numerous secrets from the downed USN reconnaissance aircraft[4]. Lastly, were the USN ship to be sufficiently damaged the PLAN could effectively intern the crew under the guise of rescuing them. This would give the PRC leverage over the U.S. in the unfolding crisis, as it would effectively be holding U.S. military personnel as hostages.

Option #2:  The CCP can secretly support extremist protest movements in the U.S.

Risk:  The most appreciable risk is that the U.S. would respond in kind, and offer support to dissident groups in China, such as Hong Kong separatists. However, a convincing argument can be made that the CCP believes the U.S. is already secretly doing so[5][6], meaning the CCP may well be willing to stomach this risk. Likewise, the PRC can control the flow of information within its borders and call upon an effective domestic security apparatus to stem anti-Party civil disturbances. The risk of a harsh U.S. response would be contingent on how well the CCP could keep the funding secret or maintain plausible deniability.

Gain:  Recent events such as the anti-lockdown protests and anti-police brutality protests have shown the risk of domestic instability in the U.S.[7][8]. The CCP knows all too well from its own history how internal instability can sap a state’s ability to deal with external threats. Secretly channeling funding to extremist groups in the U.S., such as armed militias, would be an effective and cheap way to create a security headache for the U.S. government at home.

Option #3:  The PLAN could impose a maritime blockade on Taiwan. The CCP views Taiwan as an incredibly sensitive issue, to the extent that “reunifying” it with the mainland is the ultimate test of its legitimacy[9]. As such, the CCP is concerned about U.S. arms sales to Taiwan, and especially the possibility that the U.S. might relieve Taiwan were the PRC to attempt to invade Taiwan. One option to resolve both of these concerns, as well as potentially sap Taiwan’s will to resist would be to launch a maritime blockade of Taiwan[10].

Risk:  This option entails considerable risk. Although the PLAN and PLA Air Force are rapidly expanding their capabilities, this would still be a very difficult task[11][12]. Were the U.S. or its allies to attempt to relieve Taiwan, war could easily erupt from a localized incident at sea. This would also have huge knockoff effects on the shipping industry, as insurance rates would skyrocket amidst rising tensions. China’s exports sector would foot much of the bill. Lastly, doing so would likely backfire and strengthen Taiwan’s desire to protect itself from China, instead of weakening it. However, as the 1996 Taiwan Straits Incident shows, the CCP often fails to appreciate how a heavy-handed policy towards Taiwan can be against its own interests. The key to predicting this possibility isn’t a perfectly objective cost-benefit analysis, but an awareness of how constraints on the CCP could cause it to make a self-defeating choice.

Gain:  If executed successfully, this option could cripple the Taiwanese economy and make U.S. intervention in a Taiwan-PRC conflict vastly more difficult, making USN access to the Western Pacific increasingly difficult.

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  Erickson, A. S., Martinson, Martinson, R. D. (March 15, 2019) China’s Maritime Gray Zone Operations. China Maritime Studies Institute and Naval Institute Press

[2] Sanger, D. E., Rosenthal, E. (2001, April 2) U.S. Plane In China After It Collides With Chinese Jet. The New York Times. https://www.nytimes.com/2001/04/02/world/us-plane-in-china-after-it-collides-with-chinese-jet.html

[3] Department of the Navy/Office of the Chief of Naval Operations. (2017). Memorandum for Distribution:  Report on the Collision between USS FITZGERALD (DDG 62) and Motor Vessel ACX CRYSTAL, Report on the Collision between USS JOHN S MCCAIN (DDG 56) and Motor Vessel ALNIC MC. Retrieved from https://s3.amazonaws.com/CHINFO/USS+Fitzgerald+and+USS+John+S+McCain+Collision+Reports.pdf

[4] Zetter, K. Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident. The Intercept. https://theintercept.com/2017/04/10/snowden-documents-reveal-scope-of-secrets-exposed-to-china-in-2001-spy-plane-incident

[5] Buckley, C. (2013, August 19). China Takes Aim at Western Ideas. The New York Times. https://www.nytimes.com/2013/08/20/world/asia/chinas-new-leadership-takes-hard-line-in-secret-memo.html

[6] Higgins, A. (2019, August 9). China’s Theory for Hong Kong Protests: Secret American Meddling. The New York Times. https://www.nytimes.com/2019/08/08/world/asia/hong-kong-black-hand.html

[7] Picchi, A. (2020, January 6). Top Global Risk in 2020? It’s American politics, experts say. CBS News. https://www.cbsnews.com/news/the-top-risk-in-2020-its-u-s-politics-geopolitical-analysts-say

[8] Purtill, J. (2020 June 17) This Model forecast the US’s current unrest a decade ago. It now says ‘civil war’. Australian Broadcasting Corporation. https://www.abc.net.au/triplej/programs/hack/model-predicting-united-states-disorder-now-points-to-civil-war/12365280

[9] Yeung, J. T. (2019, October). Why is Taiwan so important? The manipulation of nationalism in legitimizing​ one-party rule in China. The Yale Review of International Studies. http://yris.yira.org/essays/3613

[10] Easton, I. (2017). The Chinese Invasion Threat: Taiwan’s Defense and American Strategy in Asia. Project 2049 Institute.

11] Yoshihara, T., Holmes, J. (2018). Red Star over the Pacific, Revised Edition: China’s Rise and the Challenge to US Maritime Strategy.  Naval Institution Press.

[12] Lee, J. (2019, April 3). Why a US Sale of Fighter Jets to Taiwan Matters. The Diplomat. https://thediplomat.com/2019/04/why-a-us-sale-of-fighter-jets-to-taiwan-matters

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Eli Kravinsky Option Papers United States

Options for Taiwan to Better Compete with China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Thomas J. Shattuck is a Research Associate in the Asia Program and the Managing Editor at the Foreign Policy Research Institute. Mr. Shattuck was a member of the 2019 class of scholars at the Global Taiwan Institute, receiving the Taiwan Scholarship. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Taiwan requires options to better compete with China in international organizations below the threshold of conflict.

Date Originally Written:  July 24, 2020.

Date Originally Published:  October 14, 2020.

Author and / or Article Point of View:  The author is a research associate at a non-partisan foreign policy think tank.

Background:  One of the key national security priorities of the People’s Republic of China is to force Taiwan into unification. Part of that strategy is to limit Taiwan’s ability to participate fully in the international community, specifically in international organizations in which Taiwan is not a full member[1]. Such pressure would be removed upon China-Taiwan unification.

Significance:  In light of the ongoing COVID-19 pandemic, the full participation and cooperation of the entire international community is needed to understand best practices in limiting the spread of the virus. The pandemic has shown the importance of public and global health for a country’s national security. Taiwan’s exclusion from the May 2020 United Nations (UN) World Health Assembly—after dual campaigns by major international players in support of Taiwan’s observership bid and by China to keep Taiwan out—demonstrates the danger and limitations of excluding certain states based on their geopolitical situation[2]. Taiwan is prevented from learning important information or receiving key data in a timely fashion. Also, it is more difficult for Taiwan to share its expertise in stopping the virus’ spread, something that Taipei has succeeded at doing despite its limitations[3]. The spread of viruses endangers the entire world, and political maneuvering by Beijing has damaged the global response effort.

Option #1:  Taipei works with like-minded nations, particularly the United States, to develop a new, non-UN-membership-based international entity, initially focused on health issues with a plan for expansion into other areas.

Risk:  There are two primary risks to such an endeavor. The first risk is the possibility that Beijing will pressure nations into not participating. By threatening various economic or political repercussions, leaders in China have been able to stop Taiwan from expanding its international participation. Such a campaign would likely occur in light of any effort by Taipei to work around current Beijing-imposed limitations. If such a new entity does not receive enough international buy-in, then Taipei risks getting embarrassed for failing to garner support. Second, Beijing would likely direct even greater backlash at Taipei for attempting to challenge it internationally. This could include more assertive military exercises in the Taiwan Strait.

Gain:  Successfully establishing a new international entity would demonstrate that Taipei does not have to live within Beijing-imposed boundaries. As the recent COVID-19 example has shown, Taiwan has much to contribute internationally, but international organizations and members will quickly revert to Beijing’s stance when it comes to Taiwan. It was Taipei that first sounded the alarm regarding the potential danger of COVID-19[4]. Without those confines, Taiwan would be able to showcase its COVID-19 success story and teach other nations its best public health practices. It also would be able to receive information in a timelier fashion. Taiwan’s international participation would no longer be limited by the current status of cross-Strait relations and could be further integrated into the international community. Such an effort would complement the Trump administration’s desire to form some sort of “alliance of democracies” to meet the China challenge[5].

Option #2:  Taiwan relaunches its bid for membership in the UN so that it could become a full member of all UN-affiliated international organizations and ones that require statehood for membership.

Risk:  Any attempt by Taipei to join the United Nations will be stopped by Beijing. The vote would fail in the same way that Taiwan’s bids for guest or observer status in international organizations have since 2016. Depending on the form that such a bid takes (i.e., independence referendum for establishment of the “Republic of Taiwan”), the bid could have catastrophic effects, i.e., Chinese military action against Taiwan or an invasion. If such a move is conducted similarly to past attempts, then it would cause Beijing to lash out in a ways below the threshold of war—perhaps more intense forms of aggression that have become regularized since 2016[6].

Gain:  Even though a UN membership bid would fail, it would once again place Taiwan’s confusing geopolitical status in the limelight. Taiwan’s international plight receives sympathetic news coverage in democratic nations, and forcing countries to vote for the record on where it stands on this issue could spark new conversations about a country’s relationship with Taiwan. With increasingly assertive and aggressive actions by Beijing on various fronts, launching a UN membership bid could help Taipei enhance ties with current “friends” or find new ones because how China treats Taiwan would be given even greater focus across the world. The current international spotlight on China’s behavior at home and abroad may lead to countries working to strengthen relations with Taiwan. Positive outcomes are possible even if the membership bid fails.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Dreyer, J. T. (2018, August 13). The Big Squeeze: Beijing’s Anaconda Strategy to Force Taiwan to Surrender. Foreign Policy Research Institute. https://www.fpri.org/article/2018/08/the-big-squeeze-beijings-anaconda-strategy-to-force-taiwan-to-surrender

[2] Tan, H. (2020, May 19). Taiwan ‘disappointed and angry’ about being excluded from WHO meeting, says it is developing its own coronavirus vaccine. CNBC. https://www.cnbc.com/2020/05/19/taiwan-says-it-is-disappointed-and-angry-being-excluded-from-who-meeting.html

[3] Griffiths, J. (2020, April 5). Taiwan’s coronavirus response is among the best globally. CNN. https://www.cnn.com/2020/04/04/asia/taiwan-coronavirus-response-who-intl-hnk/index.html

[4] Watt, L. (2020, May 19). Taiwan Says It Tried to Warn the World About Coronavirus. Here’s What It Really Knew and When. Time. https://time.com/5826025/taiwan-who-trump-coronavirus-covid19

[5] Pompeo, M. (2020, July 23). Communist China and the Free World’s Future. U.S. Department of State. https://www.state.gov/communist-china-and-the-free-worlds-future

[6] Taiwan says China sending planes near island almost daily. (2020, July 22). Associated Press. https://apnews.com/2126b0fbdf2b7d2e6a5a77c464aeb7b1

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Option Papers Taiwan Thomas J. Shattuck

Assessment of Sino-Russian Strategic Competition in Africa

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Rusudan Zabakhidze is an International Conference of Europeanists coordinator at Council for European Studies at Columbia University and a non-resident fellow at Middle East Institute’s Frontier Europe Initiative. She can be found on Twitter @rusozabakhidze. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Sino-Russian Strategic Competition in Africa

Date Originally Written:  July 31, 2020.

Date Originally Published:  October 12, 2020.

Author and / or Article Point of View:  The author believes that increasing Russian and Chinese influence in Africa is yet another external attempt to exploit African resources. The absence of democratic preconditions from cooperation agreements between African countries that work with Russia and China undermines U.S. democratization efforts in the region and create obstacles for international transparency and accountability.

Summary:  The Sino-Russian strategic competition in Africa is characterized by the complex interplay of mutual interests, yet divergent means and ways of achieving the strategic interests. In comparison to China, Russian economic cooperation with African countries is modest, however, deep military cooperation across the continent places Russia in an adventitious position to change the conditions for the economic development by stirring the local or regional instability, if desired.

Text:  Rapid urbanization and the economic rise of the African continent in the past decades have harnessed the potential for a redefined development path. Colonial legacy has earned the European powers a controversial status in contemporary affairs of African countries. Alternatively, China has grasped an opportunity to fill the vacuum and advance its strategic interests. The mainstream discourse around the geopolitical competition in Africa is mostly dominated by the U.S.-China rivalry, however, increasing Russian influence suggests that the current power dynamics across Africa are much more complex.

To assess the comparative advantage or disadvantage of the Russian position in Africa, it is helpful to delineate the key drivers of Russian strategic interests. As a resurgent power, Russia has been challenging the Western-centric world order globally; hence, the African continent represents yet another territory for projecting its global power status. While similar to other external actors in Africa Russia is interested in accessing natural resources[1], Russian connections with African countries are most notable in defense sector. The absence of democratic preconditions for various forms of cooperation serves the mutual interest of Russia and recipient African governments[2].

The Sino-Russian strategic competition in Africa is characterized by the interplay of similar interests, yet different means and ways towards attaining these goals. In terms of projecting the global power image, China and Russia share a common revisionist agenda based on offering an alternative to the western models of governance. Chinese and Russian discourses are built around emphasizing the superiority of their non-interference approach[3] that is based on respectful cooperation in contrast to the colonial practices of European powers. Patterns of rapid urbanization and accelerated economic growth of African countries enable China to draw comparisons to its own past in the 1990s[4]. Such parallels place China in an advantageous position to advocate for its governance model across the continent. China and Russia also try to use the cooperation with African governments as a supporting mechanism for their global power image in other parts of the world. Namely, African countries represent the largest voting bloc in the United Nations and regardless of the diversity of political positions of the national governments, both Russia and China have tried to use their influence over the voting behavior in favor of their positions within the UN system[5].

The differences between the Sino-Russian strategic competition is best visible in the economic cooperation trends. Russian economic engagement in African countries is relatively modest compared to large-scale Chinese investments. This difference is a logical amalgam of general economic trends in both countries and the retrospective of cooperative efforts. Unlike Russia, China has remained a steady interest in Africa since the decolonization period. The establishment of the Forum on China-Africa Cooperation in 2000 supported the facilitation of the cooperation efforts[6]. On the other hand, after the collapse of the Soviet Union, Russia temporarily detached itself from African politics. Belated Russian rapprochement was therefore met with a Chinese dominant presence. African markets with the fastest growing population and increased consumption needs, present an attractive venue for selling Chinese goods[7]. Almost all African countries are benefiting from diversified Chinese foreign direct investment. Oil and extractive natural resources account for a large share of investments, however, financial services, construction, transportation, and manufacturing make up half of Chinese FDI in Africa[8]. Against this backdrop, despite its own rich mineral resources, Russia has a shortage of certain raw materials, including chrome, manganese, mercury, and titanium that are essential for steel production[9]. Therefore, Russian economic interests in African countries mostly revolve around accessing these resources.

Russia’s strategic advantage over China is more visible in military cooperation with African countries. Russia has become the largest supplier of arms to Africa, accounting for 35% of arms exports, followed by China (17%), U.S. (9.6%), and France (6.9%)[10]. Besides arms trade, Russia provides military advice[11]. Reportedly, Wagner Group, a private military company with a history of fighting in Ukraine and Syria and has close ties to the Russian government has also shifted its focus towards Africa[12]. Even though Russia has a marginal advantage in military cooperation over China and western powers, Chinese actions in this direction should not be under-looked. Chinese defense strategy in Africa is based on a comprehensive approach, combining arms sales with other trade and investment deals, cultural exchanges, medical assistance, and building infrastructure. For instance, the package deal for building a Chinese military base in Djibouti covers the large non-military investment projects[13].

In support of the above-given strategic interests, Russia and China are actively using soft power tools. Confucius Institutes that promote Chinese language and culture are rapidly popping up across Africa and are now present in over 40 countries[14]. China is also becoming a popular destination for African students[15]. China also boosts its image through media cooperation. The Chinese Communist Party has organized four annual forums bringing together the representatives of Africa state-owned and private media agencies to discuss the global media environment and the state of African media[16]. These gatherings are unprecedented compared to China’s media-related efforts in other regions. On the other hand, Russia is also actively using the media as a medium for projecting its positive image. Russia Today and Sputnik – media agencies aligning with the discourses favorable to the Russian government, have expanded their reach to the African continent as well[17]. The number of the Russian World Foundation, known as Russkiy Mir, is also increasing in African countries[18]. Somewhat different from the Chinese approach is using the Russian Orthodox Church as the way to approach the Christian communities in Uganda, Kenya, Tanzania, and Ethiopia[19]. Even though current Chinese and Russian efforts to promote their image through media and cultural activities are not targeted at deterring the influence of each other, both actors have the potential to exploit the information space through controlled media platforms. Such developments can significantly undermine the social cohesion, as well as the trust and confidence in targeted actors.


Endnotes:

[1] Adlbe, J. (2019, November 14). What does Russia really want from Africa? Retrieved July 30, 2020, from https://www.brookings.edu/blog/africa-in-focus/2019/11/14/what-does-russia-really-want-from-africa

[2] Procopio, M. (2019, November 15). Why Russia is not like China in Africa. Retrieved July 30, 2020, from https://www.ispionline.it/en/pubblicazione/why-russia-not-china-africa-24409

[3] Ibid.

[4] Diop, M. (2015, January 13). Lessons for Africa from China’s growth. Retrieved July 31, 2020, from https://www.worldbank.org/en/news/speech/2015/01/13/lessons-for-africa-from-chinas-growth

[5] Spivak, V. (2019, October 25). Russia and China in Africa: Allies or Rivals? Retrieved July 30, 2020 from https://carnegie.ru/commentary/80181

[6] Nantulya, P. (2018, August 30). Grand Strategy and China’s Soft Power Push in Africa. Africa Center for Strategic Studies. Retrieved July 30, 2020, from https://africacenter.org/spotlight/grand-strategy-and-chinas-soft-power-push-in-africa

[7] Maverick, B. (2020, April). The three reasons why Chinese invest in Africa. Retrieved July 30, 2020 from https://www.investopedia.com/articles/active-trading/081315/3-reasons-why-chinese-invest-africa.asp

[8] Pigato, M. (2015). China and Africa: Expanding Economic Ties in and Evolving Global Context. The World Bank. Retrieved July 31, 2020, from https://www.worldbank.org/content/dam/Worldbank/Event/Africa/Investing%20in%20Africa%20Forum/2015/investing-in-africa-forum-china-and-africa.pdf

[9] Hedenskog, J. (2018, December). Russia is Stepping Up its Military Cooperation in Africa. FOI, retrieved July 31, 2020, from https://www.foi.se/rest-api/report/FOI%20MEMO%206604

[10] Adlbe, J. (2019, November 14). What does Russia really want from Africa? Retrieved July 30, 2020, from https://www.brookings.edu/blog/africa-in-focus/2019/11/14/what-does-russia-really-want-from-africa

[11] Russel, M & Pichon E. (2019, November). Russia in Africa. A new area for geopolitical competition. European Parliament’s Research Service, Retrieved July 30, 2020 from https://www.europarl.europa.eu/RegData/etudes/BRIE/2019/642283/EPRS_BRI(2019)642283_EN.pdf

[12] Hauer, N. (2018, August 27). Russia’s Favorite Mercenaries. The Atlantic. Retrieved July 30, 2020, from https://www.theatlantic.com/international/archive/2018/08/russian-mercenaries-wagner-africa/568435

[13] Benabdallah, L. (2018). China-Africa military ties have deepened. Here are 4 things to know. The Washington Post. Retrieved July 30, 2020, from https://www.washingtonpost.com/news/monkey-cage/wp/2018/07/06/china-africa-military-ties-have-deepened-here-are-4-things-to-know

[14] Nantulya, P. (2018, August 30). Grand Strategy and China’s Soft Power Push in Africa. Africa Center for Strategic Studies. Retrieved July 30, 2020, from https://africacenter.org/spotlight/grand-strategy-and-chinas-soft-power-push-in-africa

[15] Ibid.

[16] Ibid.

[17] Arbunies, P. (2019). Russia’s sharp power in Africa: the case of Madagascar, CAR, Sudan and South Africa, retrieved July 31, 2020, from https://www.unav.edu/web/global-affairs/detalle/-/blogs/russia-s-sharp-power-in-africa-the-case-of-madagascar-central-africa-republic-sudan-and-south-africa

[18] Ibid.

[19] Ibid.

2020 - Contest: PRC Below Threshold Writing Contest Africa Assessment Papers China (People's Republic of China) Option Papers Russia Rusudan Zabakhidze

Options for Altering Global Energy Developments to America’s Advantage and China’s Disadvantage

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Michael D. Purzycki is a researcher, analyst, writer and editor based in Arlington, Virginia. He is a former communications and media analyst for the United States Marine Corps. He writes regularly for Charged Affairs (the journal of Young Professionals in Foreign Policy) and Braver Angels, and has also been published in Merion West, Washington Monthly, the Truman National Security Project, France 24, and Arc Digital. He can be found on Twitter at @MDPurzycki and on Medium at https://medium.com/@mdpurzycki. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States devotes considerable military resources to the Persian Gulf despite significantly reduced reliance on the region’s oil, while China buys more Gulf oil than the U.S. does.

Date Originally Written:  July 27, 2020.

Date Originally Published:  October 7, 2020.

Author and / or Article Point of View:  This article is written from the perspective of U.S. policymakers who wish to indirectly increase economic and military burdens on the People’s Republic of China, in ways that benefit the United States and do not lead to armed conflict.

Background:  The United States has drastically reduced its reliance on oil from the Persian Gulf over the last decade, as the U.S. has become the world’s largest producer of crude oil[1]. China purchases significantly more oil from Saudi Arabia, the world’s second largest producer and the largest producer in the Gulf, than the U.S. does[2]. However, the U.S. still expends considerable military and financial resources in the Gulf, part of the estimated $81 billion per year it devotes to protecting global oil supplies[3]. Meanwhile, as demand for electric cars increases in response to climate change, China’s share of global electric vehicle production is double that of the U.S.[4].

Significance:  While there are multiple reasons for the U.S. presence in the Gulf region, such as deterring Iranian aggression and combatting terrorism, every ship, aircraft, vehicle and service member not protecting oil is one that can be deployed elsewhere in the world. Furthermore, despite the increase in oil prices that would likely result from more vulnerable oil supplies, an incentive to develop alternatives to petroleum would be a positive aspect, given climate change.

Option #1:  The United States ceases to deploy naval vessels to the Persian Gulf.

Risk:  A reduced military presence in the Gulf would increase the vulnerability of oil supplies to attacks by Iran, its proxies, and terrorist organizations, and will likely lead to a rise in global oil prices[5]. Saudi Arabia will fear the U.S. is abandoning it, and may begin developing nuclear weapons to guard against the possibility of a nuclear-armed Iran. Countries that rely more heavily on Gulf oil than the U.S. does – not only U.S. allies Japan and South Korea, but China’s rival India – may be harmed economically by less secure oil[6].

Gain:  Ceasing to deploy vessels to the Gulf leaves more vessels available for the U.S. to use in the Asia-Pacific. A risk of greater instability in the Gulf may lead China to expand its current naval presence in the region, leaving fewer vessels available elsewhere[7]. U.S. vessels would no longer be vulnerable to attacks by Iranian forces. Chillier U.S.-Saudi relations will loosen America’s connection to the aggressive and brutal regime of Mohammad bin Salman, improving America’s moral position[8]. Meanwhile, given petroleum’s contribution to climate change, a rise in oil prices can be embraced as an incentive to reduce reliance on oil, regardless of its source.

Option #2:  The United States prohibits oil exports to China in concert with withdrawal from the Gulf, and steers additional oil exports to major importers of Gulf oil, compensating them for Gulf oil’s increased vulnerability.

Risk:  Embargoing crude oil would likely stall or end negotiations for a U.S.-China trade deal[9]. Furthermore, the U.S. is a relatively minor source of oil for China, meaning the impact of an embargo will likely be weak[10]. China may also retaliate with new and/or higher tariffs on U.S. exports. Also, even with additional imports of U.S. oil, America’s trading partners may still endure a negative economic impact from higher oil prices during a global recession.

Gain:  If compensatory exports of U.S. oil are proportionate to a country’s purchases of Gulf oil, the largest beneficiaries would likely be Japan, South Korea and India (respectively the first, third and fifth largest purchasers of Saudi oil)[2]. The first two have deep, long-lasting economic and defense relationships with the U.S., while India is a potential counterweight to Chinese hegemonic ambitions in Asia. Thus compensatory oil supplies could link these countries close to the U.S. in a multilateral effort to tie China’s hands regarding Gulf oil.

Option #3:  The United States partners with countries importing Gulf oil to develop alternatives to petroleum products, and pointedly excludes China from the partnership. Public policies to this end can include increased investment in clean energy research and development, and initiatives to produce more electric cars at lower prices, as well as car charging stations powered by non-fossil energy.

Risk:  China might portray itself as a victim if it is excluded from international efforts to reduce fossil fuel use. This option might also portray the U.S. as not serious about climate change, arguing that if the U.S. really wanted to solve the problem it would cooperate with any country, including China.

Gain:  Participation in multinational efforts to reduce petroleum use would position the U.S. as a leader in the fight against climate change. U.S. clean energy development lags behind China’s, and during a global recession, a major stimulus of clean energy technology, including in the transportation sector, would provide economic and environmental benefits[11]. If, as with Option #2, America’s primary partners are Japan, South Korea and India, it will be collaborating with countries that are home to car manufacturers listed on the Global 500, companies well-positioned to benefit from an electric car boom[12].

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] “What countries are the top producers and consumers of oil?” U.S. Energy Information Administration, April 1, 2020.
https://www.eia.gov/tools/faqs/faq.php

[2] Stevens, Harry, Lauren Tierney, Adrian Blanco and Laris Karklis. “Who buys Saudi Arabia’s oil?” Washington Post, September 16, 2019.
https://www.washingtonpost.com/world/2019/09/16/who-buys-saudi-arabias-oil

[3] “The Military Cost of Defending the Global Oil Supply.” Securing America’s Future Energy, September 21, 2018.
http://secureenergy.org/wp-content/uploads/2020/03/Military-Cost-of-Defending-the-Global-Oil-Supply.-Sep.-18.-2018.pdf

[4] Bledsoe, Paul. “New Ideas for a Do Something Congress No. 7: Winning the Global Race on Electric Cars.” Progressive Policy Institute, April 1, 2019.
https://www.progressivepolicy.org/publication/winning-the-global-race-on-electric-cars

[5] Cordesman, Anthony H. “The Strategic Threat from Iranian Hybrid Warfare in the Gulf.” Center for Strategic and International Studies, June 13, 2019.
https://www.csis.org/analysis/strategic-threat-iranian-hybrid-warfare-gulf

[6] “Iraq continues to be India’s top oil supplier, imports from US rises 4-folds.” Economic Times, May 1, 2019.
https://economictimes.indiatimes.com/industry/energy/oil-gas/iraq-continues-to-be-indias-top-oil-supplier-imports-from-us-rises-4-folds/articleshow/69129071.cms

[7] Eckstein, Megan. “5th Fleet CO: China Laying Groundwork in Middle East to Pose Future Threats; International Coalitions Pushing Back Against Iran.” USNI News, July 23, 2020.
https://news.usni.org/2020/07/23/5th-fleet-co-china-laying-groundwork-in-middle-east-to-pose-future-threats-international-coalitions-pushing-back-against-iran

[8] Editorial Board. “One year later, our murdered friend Jamal has been proved right.” Washington Post, September 30, 2019.
https://www.washingtonpost.com/opinions/2019/09/30/one-year-later-our-murdered-friend-jamal-has-been-proved-right

[9] Swanson, Ana and Keith Bradsher. “Once a Source of U.S.-China Tension, Trade Emerges as an Area of Calm.” New York Times, July 25, 2020.
https://www.nytimes.com/2020/07/25/business/economy/us-china-trade-diplomacy.html

[10] “China’s crude oil imports surpassed 10 million barrels per day in 2019.” U.S. Energy Information Administration, March 23, 2020.
https://www.eia.gov/todayinenergy/detail.php?id=43216

[11] Bledsoe, Paul. “Jumpstarting U.S. Clean Energy Manufacturing in Economic Stimulus and Infrastructure Legislation.” Progressive Policy Institute, May 2020.
https://www.progressivepolicy.org/wp-content/uploads/2020/05/PPI_Clean-Manufacturing-Infrastructure_Embargoed.pdf

[12] “Global 500: Motor Vehicles & Parts.” Fortune, 2019.
 https://fortune.com/global500/2019/search/?sector=Motor%20Vehicles%20%26%20Parts

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Michael D. Purzycki Option Papers Resource Scarcity United States

Minerals, Minds, and Accommodation: U.S. Options Against China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Patrick M. Foran is a PhD candidate at the University of Missouri-St. Louis. He can be found on Twitter @Patrick__Foran and has a newsletter at CatalogofCurisoties.substack.com. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As China grows richer, more powerful, and more revanchist, the U.S., as the world’s current-yet-faltering hegemon, requires options to meet this rising challenger that plays to the edge of, but stays below the threshold of, armed conflict.

Date Originally Written:  July 19, 2020.

Date Originally Published:  September 30, 2020.

Author and / or Article Point of View:  The author is a PhD candidate at the University of Missouri – St. Louis with a broadly realist foreign policy point of view. The article is written from the point of view of the United States towards the People’s Republic of China (PRC).

Background:  The U.S. under President Donald Trump understands that “great power competition” has “returned,” as announced in the 2017 National Security Strategy[1]. Yet “complex interdependence” between the U.S. and the PRC has created liabilities, challenges, and an entangled relationship that is a double-edged sword for the U.S. should they uncouple without care[2].

Significance:  The significance of this interdependence cannot be overstated. The U.S.-China relationship is certainly the most important in the world, and this goes for finance, climate, trade, the future of international institutions and regime maintenance, and so much more.

Option #1:  The U.S. could attempt to carefully decouple its critical minerals relationship and defense-industrial base needs in a neo-Hamiltonian way, referring to the Secretary of State Alexander Hamilton and his belief in infant industry support and fostering research and development to build competitive industries. This option would be understood as support for re-developing and re-conceptualizing what is critical using the broad scope of powers delegated to the president under the International Emergency Economic Powers Act[3]. The U.S. would also form a Five Eyes or Democratic Club-like international agreement with fellow liberal democracies. This agreement would ensure cooperation regarding research and development, logistics, and ensure robustness and sustainability. This cooperation would look like a shared pool similar to the U.S. strategic petroleum reserve but for minerals and high-tech components with the addition of ally access to the reserve. This pool would be shared with Western and liberal allies who agree to shun China’s current dominance in the realm of rare earth minerals.


Risk:  This option risks sparking a “beggar thy neighbor” system, where zero-sum moves engaged by those inside and outside the system produce a worst world for all. In other words, it risks a new Cold War that hardens into blocs, blocs that would make future pandemics, for example, or future financial crises harder to manage. Further, this option risks more realpolitik when it comes to ocean exploration and when it comes to African state sovereignty where rare earth minerals are present.

Gain:  This option contributes to a renewed liberal international order, one that is modern, looking towards the future, and one that is concerned with sustainability and shared prosperity. Offering an “opt-in” for liberal and democratic countries is aligned with much evidence that shows that positive inducements work more than negative inducements; and also the fear of kinetic conflict with China nudges allies to take strategic materials and infrastructure seriously[4]. Moreover, much of the gains would accrue to the U.S. since it would be the leader and sustainer of this strategic mineral reserve; new U.S. companies could be created to manage such an important reserve.

Option #2:  The United States creates a sister channel to Radio Free Asia that exclusively highlights the horrors of the Chinese Communist Party (CCP). This radio station’s content would encourage the use of onion addresses and virtual proxy networks as ways to pursue internet freedom, and could feature audio essays of “Civil Disobedience,” “The Rights of Man,” and the U.S. Constitution, for example.

Risk:  This option risks escalation in this sphere. And, shouts of hypocrisy could fairly be leveraged by the CCP against the U.S. since this option could be interpreted as a violation of the United Nations Charter, Article II, Section 7 which states that “states that the United Nations has no authority to intervene in matters which are within the domestic jurisdiction of any State[5].”

Gain:  This option bolsters support for already existing information programs. It suggests that the U.S. is serious about promoting democracy and about pushing back against China’s goal of spreading its influence worldwide. And, more importantly, this option counters the spreading of the CCP’s “capitalism with Chinese characteristics” model around the world.

Option #3:  A perhaps counterintuitive option involves the U.S. could taking a long-term accommodation strategy. This strategy would be built on the assumption that China’s internal problems and international liabilities are so vast and challenging that a bearish strategy is warranted. This is still a great power strategy yet privileges a “foreign policy begins at home” concept: rebuild American schools, roads, infrastructure, and human and social capital[6].

Risk:  Without the U.S. checking its behavior, China becomes hyperaggressive and revisionist, even more so, leaving the world with worst options, which increase the likelihood of war or disorder.

Gain:  The gains are enormous. To ensure that the U.S. remains “unrivaled,” truly rebuilding American institutions that make them more democratic, more responsive, and more with institutions in mind. This rebuilding would oppose the current situation where institutions are personalistic and engage in performative displays. Through this option the U.S. can become a sustainable superpower, one that once again reminds that world that a hegemon can be liberal, democratic, and patient.

Other Comments:  The U.S. U.S.-China is a dyadic relationship, one situated in an international system. Relationships are managed—they are not problems to be solved. How the U.S.-China dyad evolves and how it shapes the world is the most important question of the next few decades and this seriousness deserves careful consideration.

Recommendation:  None.


Endnotes:

[1] Trump, Donald J. (December 2017). “National Security Strategy of the United States of America.” Retrieved July 19, 2020, from http://nssarchive.us/national-security-strategy-2017

[2] Keohane, R. O. and Joseph s. Nye. [1977] (2012) Power and Interdependence: World Politics in Transition. Boston: Longman Books.

[3] The International Emergency Economic Powers Act (1977). Title 50, §§1701–1707.

[4] Axelrod, R. (1981). The Emergence of Cooperation Among Egoists. American Political Science Review, 75 (2), 306-18. Retrieved July 26, 2020, from DOI:
10.2307/1961366 https://www.jstor.org/stable/1961366; Axelrod, R. (1984) The Evolution of Cooperation. New York: Basic Books; Drezner, D. W. (1999/2000). The Trouble with Carrots: Transaction Costs, Conflict Expectations, and Economic Inducements. Security Studies, 9 (1-2), 188-218. Retrieved July 20, 2020, from
https://www.tandfonline.com/doi/abs/10.1080/0963641990842939; Nincic, M. (2010). Getting What You Want: Positive Inducements in International Relations. International Security, 35(1), 138-183. Retrieved July 26, 2020, from http://www.jstor.org/stable/40784650

[5] UN Charter, Article II, Section 7.

[6] Haass, R. N (2013). Foreign Policy Begins At Home: The Case for Putting America’s House in Order. New York: Basic Books.

2020 - Contest: PRC Below Threshold Writing Contest China (People's Republic of China) Option Papers Patrick M. Foran Psychological Factors Resource Scarcity United States

U.S. Below War Threshold Options Against China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


James P. Micciche is a U.S. Army Strategist and Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific. He is currently a Command and General Staff Officer Course student and can be found on Twitter @james_micciche. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As China rises to become a Great Power and other nations lack the will to counter this rise via armed conflict, options below the level of armed conflict are required.

Date Originally Written:  July 20, 2020.

Date Originally Published:  September 21, 2020.

Author and / or Article Point of View:  The author believes the United States must increase its capability and efforts to compete with China below levels of armed conflict.

Background:  The 2017 National Security Strategy (NSS) specifically identifies China as a revisionist competing against the United States. The NSS describes the objectives of revisionist nations as, “contesting our geopolitical advantages and trying to change the international order in their favor[1].” Stephen Brooks and William Wohlforth identify China as the driving force of a systemic realignment, “the system has shifted from 1 superpower plus X great powers to 1+1+X, with China occupying a middle category as an emerging potential superpower[2].”

Significance:  China currently avoids directly challenging U.S. hegemony and instead utilizes two primary strategies to expand influence and advance objectives below levels of conflict.

The first strategy, “Three Warfares,” seeks “to break adversary resistance and achieve Chinese national objectives with little or no actual fighting[3].” The three “warfares” are public opinion, psychological operations, and legal warfare. The first two warfares attempt to dominate the information domain and the third warfare targets both international and national structures as a means to make them more conducive to Chinese objectives.

The second strategy uses China’s growing economic power to expand China’s political power.  This expansion is done through a combination of debt-laden investments, economic coercion, and predatory liberalism, which describes how China weaponizes market access to suppress public criticism from companies and nations alike[4].

These two strategies mutually support each other as predatory liberalism enables information dominance facilitating further coercive economic expansion enabling systemic changes to legal structures. Former National Security Advisor H.R. McMaster described this vanguard of Chinese expansion as “a delegation of bankers and party officials with duffel bags full of cash[5],” rather than the traditional military elements of national power associated with historical revisionist expansion. This paper will provide three options to degrade China’s capability and deter their will to execute the aforementioned strategies.

Option #1:  The United States resurrects previous capabilities in an effort to dominate the information environment.

China’s Three Warfares and economic programs are predicated upon dominance of the information environment which is “comprised of and aggregates numerous social, cultural, cognitive, technical, and physical attributes that act upon and impact knowledge, understanding, beliefs, world views, and, ultimately, actions of an individual, group, system, community, or organization[6].” The United States is unable to compete within this environment due to a lack of bureaucratic coherence and leadership[7]. In this option, the United States recreates an Information Age version of the United States Information Agency (USIA) empowering it not only to counter malign Chinese efforts but also potentially propagate messaging into China itself against an autocratic state that severely restricts external information access to its citizens.

Risk:  Establishing an empowered and aggressive USIA could lead to an increase in China’s use of psychological operations, sharp power, and media manipulation against the U.S. and other regional partners. There are also legal concerns regarding U.S. Government filters on speech, press, or information consumed by U.S. citizens.

Gain:  Reestablishing information dominance enhances U.S. soft power globally and fosters resiliency against Chinese manipulation both domestically and abroad. Gaining the capability to target domestic Chinese populations as a form of punitive deterrence restricts China’s aggression across the whole spectrum of competition.

Option #2:  The United States reestablishes and expands the Trans-Pacific Partnership (TPP) with nations throughout the Indo-Pacific region that excludes China.

This TPP 2.0 would specifically address intellectual property rights, Chinese foreign direct investment review processes, and provide smaller nations access to development funds through USAID, The World Bank, and similar organizations. TPP 2.0 would expand from the original 11 signatories to include India, the Philippines, and South Korea.

Risk:  By utilizing their quasi command economy and authoritarian state structure, China could attempt to take substantial economic losses to create an alternative structure to counter U.S. efforts. There might be apprehension from potential TPP 2.0 members due to the unilateral withdraw from TPP by the Trump administration in 2017 placing the United States at a disadvantage in negotiations.

Gain:  TPP 2.0 would provide preferential treatment to U.S. goods, thus increasing market access. It would improve the economies of small Indo-Pacific nations, fostering resiliency to Chinese economic coercion. TPP 2.0 would deny China access to benefits unless it discontinued intellectual property theft, predatory FDI practices, and other malign economic behaviors. Increased trade costs and potential exclusion would undercut much of the funding needed to complete Belt and Road Initiative (BRI) projects. TPP 2.0 enables the creation of alternate supply chains and offshoring options outside of China allowing U.S. firms to protect intellectual property while still reducing costs to U.S. consumers and remaining globally competitive.

Option #3:  The United States harasses and impedes China’s terrestrial expansion.

Chinese competition below levels of conflict includes land and sea-based building programs ranging from constructing artificial islands within the South China Sea to infrastructure projects associated with the BRI initiative. The United States could take overt and covert actions to drive up the costs of Chinese expansion. Overt efforts include funding local environmental and cultural heritage groups that oppose Chinese projects and foster local resistance, which increase regulatory or construction costs. Covert efforts include incentivizing maritime proxies to harass and impede the use of Chinese paramilitary maritime militia in the South China Sea.

Risk:  If direct U.S. funding of proxies becomes known, there could be irreversible damage to the United States’ reputation and advantages in soft power and the information domains. Funding or supporting proxies can lead to secondary support for nonstate actors that seek to destabilize regional partners as well as China. Any escalation in the South China Sea could lead to armed conflict.

Gain:  Increasing Chinese costs could severely restrict their capability to continue expansion and complete projects per agreements with host nations. Combining overt resistance campaigns with coordinated messaging enables the United States to degrade China’s soft and economic power. Directly confronting Chinese maritime militia with similarly designed forces presents a unique geopolitical challenge with few positive outcomes.

Other Comments:  These options are not mutually exclusive and can be utilized in conjunction with other elements of national power to support competition below levels of conflict.

Recommendation:  None.


Endnotes:

[1] Trump, Donald J., National Security Strategy of the United States of America. Executive Office of The President Washington DC Washington United States, 2017, 27

[2] Brooks, Stephen G., and William C. Wohlforth. “The rise and fall of the great powers in the twenty-first century: China’s rise and the fate of America’s global position.” International Security 40, no. 3 (2016): 7-53, 43

[3] Livermore, Doug. “China’s “Three Warfares” in theory and practice in the South China Sea.” Georgetown Security Studies Review (2018).

[4] Cha, Victor, and Andy Lim. “Flagrant Foul: China’s Predatory Liberalism and the NBA.” The Washington Quarterly 42, no. 4 (2019): 23-42.

[5] McMaster, H. R., “How China Sees the World,” The Atlantic, (2020), accessed April 22 2020, https://www.theatlantic.com/magazine/archive/2020/05/mcmaster-china-strategy/609088

[6] Joint Chiefs of Staff, Joint Concept for Operating in the Information Environment (JCOIE), Department of Defense, Washington DC (2018)

[7] Cobaugh, Paul, “Combat Ineffective: Ethical Influence, the Broken-down Rusting Vehicle of American Power” Narrative Strategies, (2020) accessed April 23 2020, https://www.narrative-strategies.com/failed-usg-influence

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) James P. Micciche Option Papers United States

Options to Manage the 2020 Election Cyber Threat Landscape

Lee Clark is a cyber intelligence specialist who has worked in the commercial, defense, and aerospace sectors in the US and Middle East. He can be found on Twitter at @InktNerd. He holds an MA in intelligence and international security from the University of Kentucky’s Patterson School. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The 2020 U.S. General Election (the election) faces a nuanced and critical cyber threat landscape that requires careful navigation.

Date Originally Written:  September 2, 2020.

Date Originally Published:  September 18, 2020.

Author and / or Article Point of View:  The author is a cyber intelligence professional and Election Officer in Virginia. This options paper will provide options for addressing cyber threats to election systems and infrastructure in the context of the 2020 election.

Background:  The cyber threat landscape of the November 2020 election in the U.S. is critical and complex. Election interference and propaganda efforts are not new on the global stage. However, the simultaneous merging of industrial-level disinformation operations, targeted cyber intrusions by state-funded organizations, and the woeful state of local cyber civil defenses in the U.S. combine to create a unique situation with challenging nuances and implications.

Cyber intrusions related to the 2016 General Election, mostly attributed to Russian-linked actors, are widely documented and analyzed in both the public and classified spheres of the national security community. The current threat landscape is more complex than in 2016, as evidenced by a public statement from the Office of the Director of National Intelligence indicating that cyber actors backed by China, Russia, and Iran are all actively attempting to influence the outcome of the election[1]. Defenses have also been bolstered in some areas, such as the Department of Defense taking an active role in the cybersecurity of the election, including deployments of cyber personnel abroad to hunt for threats to election systems[2].

The threat landscape is further complicated by public opinion, as demonstrated by the outrage connected to the publication of a false report that Russian threat actors stole and exposed voter databases from several U.S. states in August 2020. In reality, no cyber intrusion occurred and the data was publicly available. However, the public outcry over the incident indicates the potential for civic unrest in the event of a cyber attack that could be perceived to threaten the integrity of results[3].

Elections in the U.S. involve conflicting and competing stakeholders, intricate federal and local regulations, numerous technologies of varying complexity, as well as legal and ethical norms and expectations[4]. In a standard “Impact times Likelihood” threat matrix, the impact of a direct cyber attack compromising election results is high, but the likelihood is low. However, given the number of systems and interconnected networks used to coordinate elections, smaller attacks on peripheral or supporting systems are much more likely, though less impactful unless in a sufficient volume to cause widespread disruption[5].

Significance:  Election systems, including hardware and administrative organizations overseeing election operations, are classified by the Department of Homeland Security as critical national infrastructure[6]. The integrity of election results is critical to the validity and credibility of democratic governance in the U.S. A disputed election as a result of cyber aggression would be severely problematic for U.S. national security.

The geopolitical situation surrounding the election creates the potential for various adverse outcomes, including: deterioration of public faith in election processes; contested results in legislative and presidential races; civic unrest; and erosion of democratic processes. Elections are immensely complex and securing the cyber facets of elections involves national and local information and operational technology (IT and OT); registration databases; support software; and hardware used at polling places, including voting machines, ballot scanners, and devices like laptops and tablets. To manage the cyber threat landscape and mitigate potential harms resulting from threats, policymakers have three key options:

Option #1:  Launch a public education campaign focused on the logistics of managing election challenges to a) reduce the effectiveness of disinformation efforts seeking to undermine public trust in election processes and results and b) reduce public anxieties regarding the integrity of ballots.

Risk:  First, given the sociopolitical polarization among the U.S. electorate, it is likely that a significant portion of the voting public would view a public education campaign as factually incorrect or intentionally misleading. Second, this same polarization also indicates that a campaign would be unlikely to affect public opinion because the intended audience is unreceptive to information that would contradict preferred beliefs. Finally, this option is solely strategic and cultural in nature, and would not address the tangible, tactical level vulnerabilities that exist in election systems.

Gain:  If the press and social media (avenues for public information sharing) are considered supporting factors of election infrastructure, then a campaign to weaken disinformation networks could strengthen peripheral systems vulnerable to attack with a potentially high impact.

Option #2:  Provide a national fund to supplement the capabilities of national and local election administration organizations to implement best standards and practices including: current equipment, adequate staffing, standard written policy, and risk-limiting audits.

Risk:  First, efforts to provide funding to secure election systems have proven to be politically sensitive and difficult to move through Congress[7]. Second, this option would likely carry extreme financial cost to adequately address security needs The U.S. is currently experiencing a severe financial crisis as a result of the COVID-19 pandemic, compounding what would be a difficult option even in a financially sound period.

Gain:  Providing supplementary funding for organizations charged with safeguarding election systems would likely allow the organizations to directly address actionable technical and administrative vulnerabilities that expose systems to attacks. Properly resourcing these organizations could exponentially reduce the threat landscape for future elections.

Option #3:  Provide a large scale staffing support program for local cyber offices using Federal or contracted personnel with relevant expertise to augment high-risk election precincts and help harden defenses.

Risk:  First, the state of the cybersecurity and IT job markets make it unlikely that sufficient numbers of experienced and qualified staff could be retasked or hired and placed in needed areas. Second, the logistics of placing such a large workforce at nationwide locations would require a significant financial burden. Finally, travel challenges associated with the COVID-19 pandemic would further complicate the ability of support staff to be placed and to effectively integrate with localized teams.

Gain:  Supplementing cybersecurity staff at local and national offices leading up to the election could allow those organizations to better prepare for potential threats, and could offer a chance for knowledge transfer and training that would benefit future election operations.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Office of the Director of National Intelligence. Statement by NCSC Director William Evanina: Election Threat Update for the American Public. 2020. https://www.dni.gov/index.php/newsroom/press-releases/item/2139-statement-by-ncsc-director-william-evanina-election-threat-update-for-the-american-public.

[2] Shannon Vavra. “Cyber Command Deploys Abroad to Fend Off Foreign Hacking Ahead of the 2020 Election.” CyberScoop. 2020. https://www.cyberscoop.com/2020-presidential-election-cyber-command-nakasone-deployed-protect-interference-hacking.

[3] Catalin Cimpanu. “Cisa and Fbi Say They Have Not Seen Cyber-Attacks This Year on Voter Registration Databases.” ZDNet. 2020. https://www.zdnet.com/article/cisa-and-fbi-say-they-have-not-seen-cyber-attacks-this-year-on-voter-registration-databases.

[4] Lee Clark. “An Assessment of the Current State of U.S. Cyber Civil Defense.” Divergent Options. 2019. https://divergentoptions.org/2019/11/11/an-assessment-of-the-current-state-of-u-s-cyber-civil-defense.

[5] Tara Seals. “Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem.” Threatpost. 2020. https://threatpost.com/2020-election-secure-vote-tallies-problem/158533.

[6] National Academies of Sciences, Engineering, and Medicine. Securing the Vote: Protecting American Democracy. 2018. https://doi.org/10.17226/25120.

[7] Scott R. Anderson, Eugenia Lostri, Quinta Jurecic, and Margaret Taylor. “Bipartisan Agreement on Election Security—And a Partisan Fight Anyway.” Lawfare. 2019. https://www.lawfareblog.com/bipartisan-agreement-election-security-and-partisan-fight-anyway.

Election Lee Clark Option Papers United States

Alternative Future: Options to Address China’s Reaction to COVID-19 and Growing Anti-Chinese Sentiment

Sarah Lucinsky is an Officer in the Royal Australian Navy and is a postgraduate at Charles Sturt University. She sometimes tweets from @LouSeaLu and has previously edited for JUR Press and presented at Asia-Pacific Week at Australian National University. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Chinese activities in its disputed peripheries amidst the COVID-19 pandemic are increasing and anti-Chinese sentiment is growing. This increase and growth pose risk to nations on China’s periphery.

Date Originally Written:  July 15, 2020.

Date Originally Published:  September 16, 2020.

Author and / or Article Point of View:  The author believes that analysing an array of counter-factual scenarios and alternative futures through collegiate debate is valuable when tackling security issues.

Background:  China’s stated desire for ‘One China’ involves a forcible reunification of Hong Kong and Taiwan, but since the 1996 Taiwan Strait Crisis[1] this goal has been approached gradually by focussing on methods below the threshold of war. This is largely due to China’s desire to retain a level of world power credibility and consequently avoid widespread international backlash that risks dividing the Chinese Communist Party (CCP).

Recently, anti-Chinese sentiment has been rising[2] mostly due to COVID-19, but also due to growing awareness of China’s controversial territorial expansionism in the South and East China Seas (S/ECS). Simultaneously, Indo-Pacific militaries have progressively focussed on countering China’s People’s Liberation Army (PLA) in these disputed areas. These two factors risk eroding China’s fear of international backlash that has historically prevented it from executing decisive military actions.

Significance: If China continues to face the current international backlash and counter-PLA military activity in proximity to its claimed territories, two concurrent issues will arise. Firstly, China will perceive that its sovereignty is being directly threatened by foreign militaries. Secondly, China will no longer believe there is value in exercising restraint in its disputed areas in order to protect its international image, as its image has been eroded anyway[3]. This could lead to a more expansionist and offensively postured China[4]. The introduction of China’s new national security laws in Hong Kong is quite possibly an example of how international perceptions now matter less to China under the current, evolving context[5].

Option #1:  Nations on China’s periphery form paramilitaries that conduct activities below the threshold of war, separate from conventional military forces. The paramilitaries operate with the express aim of countering the PLA’s coercive tactics in disputed areas of national interest.

Risk:  As China’s own paramilitary forces operate throughout the S/ECS, other nations introducing their own paramilitaries jeopardise their legal advantage achieved through the 2016 Permanent Court of Arbitration’s ruling against China. China may then use the new paramilitary forces as a justification for bolstered militarisation of outposts and concentration of conventional forces. A greater concentration of forces in the vicinity of disputed areas increases the risk for paramilitary engagements such as freedom of manoeuvre and ramming incidents[6].

Gain:  S/ECS claimant states can more effectively address the threat of the PLA’s coercive tactics near their territories whilst also retaining a level of political deniability[7]. Asymmetric platforms and tactics can level the playing field, enabling smaller nations to more effectively defend their territory and increase their deterrence ability, similar to Iran’s success with the Iranian Revolutionary Guard Corps Navy[8]. Additional paramilitaries equal additional, stealthier threats for China to identify, track and respond to. China will not be able to démarche nations with emergent paramilitary forces without highlighting their own.

Option #2:  Indo-Pacific nations establish bilateral military exercises and political summits with China that are widely covered by local media to improve regional perceptions of China.

Risk:  China may perceive this proactive attempt to bolster relationships as appeasement or worse, agreement with their territorial claims and coercive activities in S/ECS. Moreover, there is little scope to control or influence how these bilateral exercises and summits will be framed in Chinese state media. Even if this approach succeeds from the Chinese side, pro-China publicity may not gain traction in the host country due to trending national issues such as COVID-19 and territorial disputes. In a worst-case scenario this option may be counter-productive and lead to public outrage, protests or boycott attempts of China/Chinese goods. In turn, media coverage of the public’s negative response would also be reported on in China and undermine any successes achieved there.

Gain:  Pro-China sentiment may draw China back into the soft-power game of international engagement. This could reignite China’s desire to protect their international image and thus refrain from conducting decisive military actions like forcibly reunifying Taiwan. Further, sustained bilateral engagement will improve political relationships and develop mutual understanding, reducing the likelihood of misjudgement or miscalculation at the strategic and tactical levels. A tertiary gain is Indo-Pacific nations would gain intimate exposure to PLA personnel, platforms and operational art that could provide advantages in a future conflict scenario. Sometimes one must put the rifle down to really pick the rifle up.

Option #3:  The United States deepens its ties with Russia, creating a new modus vivendi, working towards a future alliance that alienates China.

Risk:  A U.S.-Russia alliance would require the two nations to find common ground on Crimea, Iran and North Korea, all of which are incredibly unlikely without significant costs from either side[9]. A close relationship with Russia has higher risks for the U.S. as it would directly challenge much of U.S. recent history and ideology, alienate North Atlantic Treaty Organization members and breed distrust amongst the five eyes community. Further, closer ties with Russia may include additional Russian scrutiny that could result in political interference, cyber and information warfare operations as well as increased Russian avenues for intelligence collection.

Gain:  Whilst this option would carry a significant ideological cost for America, a U.S.-Russia alliance would combine the lethality of two military superpowers, a significant deterrent if both parties could agree on its use in a counter-China context[10]. Even without reaching alliance status, closer U.S.-Russia relations that incorporates military engagement would still create an effect that China would need to consider as a significant factor prior to any attempts at decisive military action.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Yves-Heng Lim, “Expanding the Dragon’s Reach: The Rise of China’s Anti-Access Naval Doctrine and Forces,” Journal of Strategic Studies 40, no. 1-2 (2017).

[2] Motoko Rich, “As Coronavirus Spreads, So Does Anti-Chinese Sentiment,” New York times 2020.

[3] Michael Swaine, “The Pla Navy’s Strategic Transformation to the “Far Seas”: How Far, How Threatening, and What’s to Be Done?,” in Going Global? The People’s Navy in a Time of Strategic Transformation (Rhode Island: Carnegie Endowment for International Peace, 2019).

[4] People’s Republic of China, “China’s Military Strategy,” (Xinhua News Agency2015).

[5] Eleanor Albert, “Which Countries Support the New Hong Kong National Security Law?,” The Diplomat 2020.

[6] Dhara Shah, “China’s Maritime Security Strategy: An Assessment of the White Paper on Asia-Pacific Security Cooperation,” Maritime Affairs: Journal of the National Maritime Foundation of India 13, no. 1 (2017).

[7] Tobias Böhmelt and Govinda Clayton, “Auxiliary Force Structure: Paramilitary Forces and Progovernment Militias,” Comparative political studies 51, no. 2 (2017).

[8] Abhijit Singh, “”Dark Chill in the Persian Gulf” – Iran’s Conventional and Unconventional Naval Forces,” Maritime Affairs: Journal of the National Maritime Foundation of India 6, no. 2 (2010).

[9] Legvold Robert, “All the Way: Crafting a U.S.-Russian Alliance,” no. 70 (2002).

[10] Ibid.

Alternative Futures / Alternative Histories / Counterfactuals Below Established Threshold Activities (BETA) China (People's Republic of China) Option Papers Sarah Lucinsky United States

Options for Ukraine to Address the Impact of the Nord Stream 2 Gas Pipeline

Madison Sargeant is a Midshipman in the U.S. Navy’s Reserve Officer Training Corps at Boston University and is currently studying International Relations and Statistical Methods. She can be found at @SargeantMadison on Twitter. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The development of the Nord Stream 2 gas pipeline running from Russia to Europe across the Baltic Sea threatens Ukrainian economic and national security.

Date Originally Written:  June 24, 2020.

Date Originally Published:  August 26, 2020.

Author and / or Article Point of View:  The article is written from the perspective of the Ukrainian government.

Background:  Energy security is an increasingly pressing issue for the European Union (EU). As indigenous natural gas production diminishes, energy demands increase, and relations with the Russian Federation become more divisive, natural gas imports have become a widely debated topic among EU member states. The annexation of Crimea and subsequent support for separatists in eastern Ukraine by the Kremlin has prompted sanctions and statements of solidarity with Ukraine by the European Union. Despite this, EU member states, notably Germany and Italy, have moved forward with pipeline projects that eliminate Ukraine as a transit state for Russian gas.

Development of the Nord Stream 2 pipeline, which bypasses traditional routes through Ukraine, Belarus, and Poland to deliver natural gas directly from Russia to Germany has divided the EU in both political and energy strategy. Another pipeline project, TurkStream, will transport Russian gas through Turkey into southern Europe upon completion. The aggregate capacity of both Nord Stream pipelines, as well as the TurkStream pipeline, rival Ukraine’s entire capacity for Russian natural gas transit[1]. These projects have caused controversy within the EU and outrage from the United States, which has attempted to slow the pipeline’s completion through sanctions. Nord Stream 2 and TurkStream have highlighted the tensions between Russia, Ukraine, and the transatlantic community more broadly.

Significance:  If Russia can bypass transit through Ukraine, it will be less constrained in its war in the Donbass region. Similarly, the European Union will be less incentivized to moderate the conflict between Kyiv and Moscow. From an economic standpoint, Ukraine receives $3 billion U.S. Dollars in Russian gas transit fees annually—revenue that would be lost if Russia no longer needs Ukraine to get gas to its final destination. Ukraine’s Gross Domestic Product in 2018 was a mere 130.8 billion; the loss in revenues would be a significant obstacle to Kyiv’s military efforts in the east, as the government allocates funding between various departments, including that of defense[2]. A weakened economy and loss of European interest in the wellbeing of the Ukrainian state, coupled with safe transport of Russian gas without Ukraine’s pipelines increases the likelihood of Russia intensifying the conflict in eastern Ukraine.

Option #1:  Diversification.

Ukraine could collaborate with the Caucasus and Central Asian states, namely Georgia, Azerbaijan, Turkmenistan, and Kazakhstan to develop energy transit routes across the Caspian and Black Seas, and through Ukraine into Europe. Introducing Central Asian energy into the European market will increase competition and reduce reliance on Russian gas by the EU. This option ensures Ukraine’s role as an energy transit state will not be squashed in the face of new pipeline projects circumventing it, while strengthening Ukraine’s relationship with regional partners.

Risk:  This option would not provide an immediate solution to Ukraine’s predicament as pipeline projects take upwards of ten years. Foreign investment in such a project may be unattractive at this time. Ukraine’s current tax laws dissuade foreign investment and are in need of reform. Europe’s plans to minimize fossil fuel use in the long term may also make this project undesirable, although investment in Nord Stream 2 and other new pipelines suggests otherwise. Most notably, this option does not eliminate the risk of Russia escalating the conflict in eastern Ukraine. Russian gas would still circumvent Ukraine.

Gain:  Central Asian energy transit through Ukraine can replace the revenue lost from the Nord Stream 2 pipeline. Pipeline already exists in Ukraine to carry out transportation, and building pipelines in the Black Sea is less complicated and costly compared to the Baltic Sea[3]. Such a move also increases Ukraine’s political standing in the region and diminishes Russian influence.

Option #2:  Maintaining the status quo.

Ukraine may seek to extend the December 2019 contract with Russia regarding gas transit through Ukraine. This option maintains the status quo between Ukraine, the EU, and Russia. The conflict in eastern Ukraine is likely to remain frozen at its current level and Russia is unlikely to work towards ending it.

Risk:  This option relies on Russian cooperation with Ukraine. When both Nord Stream 2 and TurkStream are fully online, Russia will have options regarding how it transports its natural gas to European clients. Ultimately, this option is one that only buys Ukraine time in finding a solution to the military conflict in the east.

Gain:  In the short term, Ukraine and Russia would remain dependent on one another for safe gas transit through Ukraine, which decreases the likelihood of Russia escalating the conflict. Additionally, Ukraine may not suffer greatly from loss of revenue depending on how many cubic meters of gas are redirected from Ukrainian pipelines to Nord Stream 2 and TurkStream. This option also incentives the EU member states to stay involved in the conflict resolution process in Ukraine.

Other Comments:  Both options require a reevaluation of the compatibility of the EU’s energy and Ukraine policies. The EU cannot actively support Ukraine’s territorial integrity and autonomy while engaging in economic developments that undermine Ukraine’s ability to fund its military activities against Russian aggression. With European investment in Nord Stream 2 and TurkStream, it is substantially more difficult for Ukraine to attract the European support it needs to combat the problems it faces economically, politically, and militarily. EU policies that are coherent and consequential are critical to any improved standing for Ukraine.

Recommendation:  None.


Endnotes:

[1] Sydoruk, T., Stepanets, P., & Tymeichuk, I. (2019). Nord Stream 2 as a Threat to National Interests of Poland and Ukraine. Studia Politica; Romanian Political Science Review, 19(3/4), 467-490.

[2] Ellyatt, H. (2019, December 16). Ukraine and Russia look to strike new gas deal amid US sanctions threat. https://www.cnbc.com/2019/12/16/ukraine-and-russia-look-to-strike-gas-transit-deal.html

[3] Oliker, O. (1999, December 31). Ukraine and the Caspian: An Opportunity for the United States. Retrieved June 16, 2020, from https://www.rand.org/pubs/issue_papers/IP198.html

Madison Sargeant Option Papers Resource Scarcity Russia Ukraine

Alternative History: Options Other than the Doolittle Raid to Strike Japan After Pearl Harbor

2d Lt David Alman is an officer in the U.S. Air National Guard. In his civilian career, he has worked as an aerospace engineer and management consultant. Previously, he earned a BS and MS in aerospace engineering from Georgia Tech. He tweets @david_alman. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Japanese bombed the U.S. Naval Base at Pearl Harbor, on December 7, 1941. The U.S. is preparing options to strike back at Japan.

Date Originally Written:  June 16, 2020.

Date Originally Published:  August 19, 2020.

Author and / or Article Point of View:  The author is a U.S. Air National Guard officer with an interest in military effectiveness and military history / historiography. This article’s point of view is from the United States military in late 1941.

Background:  In response to the attacks on Pearl Harbor and the ensuing series of Allied losses in the Pacific, President Roosevelt tasked his War Cabinet to develop plans for striking back at Japan. The objective was to raise the morale of the American people[1]. The Doolittle Raid accomplished this mission using two aircraft carriers to launch 16 aircraft to bomb Japan. The total explosive weight delivered was 32,000 pounds.

Significance:  While a heroic effort, it appears little thought was given to alternate options that might have accomplished the same goal without risking a significant portion of American combat power. It is the duty of military officers to judiciously accept risk in the pursuit of objectives. The study of history demands more than veneration for those who went into harm’s way. Instead, students of history must ask whether it was necessary for so many to go into harm’s way in the first place as part of the Doolittle Raid. This options paper identifies other viable options to place the risk-reward tradeoff of the Doolittle Raid in context.

Option #1:  The U.S. launches Air Corps bombers from Navy aircraft carriers. Since one aircraft carrier will be loaded with bombers, another aircraft carrier will be required to escort the task force. The planes, B-25 Mitchells, will be modified for extended range. The planes will land in China after completing their mission.

Risk:  This operation will risk two of seven American aircraft carriers and their escorts[2]. If lost in action, the American Navy will lose a significant portion of its striking power and the American public will have lower morale than before. This operation will also risk the 16 bombers and their crews.

Gain:  The operation will accomplish the objective if successful. This option will provide joint operations experience to the Navy-Air Corps team and could result in Japan pulling back forces to defend the home islands.

Option #2:  The U.S. constructs a forward air base in the Aleutian Islands and uses long-range B-24 bombers to strike Japan. The distance from Attu Island to Tokyo and on to Nanchang (the Doolittle Raiders’ landing point) is approximately 3,500 miles[3]. An un-modified B-24A had a ferry range of 4,000 miles[4]. A bombload equivalent to the B-25 would entail a 2,000 pound or 8% reduction in fuel, reducing range to approximately 3,700 miles[5]. With minor modifications, such as a smaller crew, this option would be sufficient for an Aleutians-launched B-24 force to reach the historical B-25 landing sites.

Risk:  Constructing an air base on Attu will be difficult. This operation will risk 16 B-24 bombers and their crews.

Gain:  The operation will accomplish the objective if successful. The use of an air base instead of U.S. Navy ships lessens the risk to the U.S. fleet. The air base in the Aleutians could be reused for other military purposes.

Option #3:  The U.S. uses Navy “cruiser” submarines to shell Japanese targets. The US Navy possesses three “cruiser” submarines, USS Argonaut, USS Narwhal, and USS Nautilus. Each of these submarines carries two 6-inch deck guns, each delivering a 105-pound explosive out to 13 miles. The submarines could surface at night off the coast of Japan and deliver 304 shells to equal the explosive weight of the Doolittle Raid. Given six guns and a fire rate of 6 rounds per minute, this would take approximately 10 minutes[6]. After completing their fires, preferably just after dark for survivability, the submarines would escape at high speed.

Risk:  This operation would risk three submarines and their crews.

Gain:  The operation will accomplish the objective if successful. It could result in Japan pulling anti-submarine warfare forces back to home waters.

Option #4:  The U.S. uses seaplanes, such as PBY Catalinas, to strike Japan. PBYs could stage from Midway Island and refuel from submarines or destroyers in the open ocean. Carrying 2,000 pounds of bombs would reduce fuel capacity by approximately 13%, leaving the seaplanes with a 2,000 mile range[7]. The seaplanes would likely refuel once approximately 800 miles off the coast of Japan (1,700 miles from Midway), conduct a max radius strike to rendezvous with the refueler approximately 1,200 miles off the coast of Japan (800 miles in, 1,200 miles out, 2,000 mile round trip – farther offshore to protect the retreating refueler), and then fly back to Midway (approximately 1,300 miles away). Refueling sixteen seaplanes twice would require a maximum of 384,000 pounds of fuel which is well within the capacity of a modified cruiser submarine.

Risk:  This operation would risk 16 aircraft and a submarine along with their crews.

Gain:  This operation will accomplish the objective if successful, and not risk any U.S. aircraft carriers.

Other Comments:  The Doolittle Raid was ultimately successful. The options presented here are intended to provoke reflection on alternate options that were never considered due to the Doolittle Raid idea coming first. Practitioners gain by critically examining military history to postulate if objectives could have been accomplished more effectively or with less risk to force.

Recommendation:  None.


Endnotes:

[1] December 21st, 1941. Franklin D. Roosevelt Day by Day. http://www.fdrlibrary.marist.edu/daybyday/daylog/december-21st-1941/

[2] In reality, only 6 aircraft carriers were useful given USS Ranger’s small size.

[3] This and other distances calculated using Google Maps and use great circle distance.

[4] The B-24A Liberator. The 456th Fighter Interceptor Squadron. https://www.456fis.org/B-24-A.htm and author’s math.

[5] This is an estimate based on a linear fuel burn. Two variables are responsible for the true variation from this number. One is that fuel burn throughout flight is in fact not linear. Because the airplane weighs less towards the end of its flight, the last gallons of fuel provide more range than the first gallons. The second factor is that the bombs are not carried for the whole flight because they are dropped on their target.

[6] 6”/53 (15.2 cm) Marks 12, 14, 15, and 18. NavWeaps. http://www.navweaps.com/Weapons/WNUS_6-53_mk12.php

[7] Author’s math.

Alternative Futures / Alternative Histories / Counterfactuals David Alman Japan Option Papers United States

Assessing the Dependency of U.S. Below Threshold Competition on Department of State Modernization

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Matthew F. Smith is an active duty officer in the United States Army. He can be found on Twitter @Matt_F_Smith. The views expressed in this paper represent the personal views of the author and are not necessarily the views of the Department of Defense or of the Department of the Army.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Dependency of U.S. Below Threshold Competition on Department of State Modernization

Date Originally Written:  June 12, 2020.

Date Originally Published:  August 5, 2020.

Author and / or Article Point of View:  The article is written from the point of view of the United States. The author is interested in the strengths and limitations of resourcing the U.S. Executive Branch Departments and Agencies primarily responsible for executing foreign policy strategies below the threshold of armed conflict.

Summary:   U.S. policymakers are deciding how to compete with the Peoples Republic of China (PRC) and counteract their objectives. Given fiscal realities, the opportunity exists to rebalance current militaristic policy tendencies and force institutional reforms. The U.S. Department of State, due to its largely below-threshold mandate, is a good target for modernization so it can better lead foreign policy efforts through diplomacy, advocacy, and assistance.

Text:  Over the last decade, American foreign policy has focused increasingly on competition with the People’s Republic of China (PRC). Regardless of the various administrations’ policies, the central strategic aim has been how the United States can best compete with China while remaining below the threshold of armed conflict. The PRC’s central strategic aim is to undermine current U.S. alliances and other historically U.S. lead global institutions[1]. Given the $2.5 trillion in federal spending in the wake of COVID-19 pandemic and an economic recession, a fiscally conscience U.S. government is likely to exist moving forward[2]. As a result, future foreign policy decisions will focus on the smart application of strategic tools that are gauged not merely by measures of performance but also by the financial effectiveness in achieving the desired outcome. For the U.S. to maintain the fundamental ability to compete below the threshold of armed conflict, the State Department, whose mission is to “lead America’s foreign policy through diplomacy, advocacy, and assistance”; requires equipping through bipartisan commitment of resources to compete in the current environment[3]. Understanding that near-term competition will likely remain below the threshold of large scale combat operations, and U.S. strategy aims to promote a range of acceptable options short of armed conflict, the resourcing of such efforts is a fundamental issue.

Just as the U.S. military is resourced to innovate and adapt in response to emerging military threats, undertaking the institutional reform necessary for the State Department to have the capability to lead an integrated approach to promote U.S. strategic interests is of vital importance. An environment that is competitive but not combative requires the State Department to be capable of frustrating Chinese interests in areas that cooperation is not possible while seizing fleeting moments of opportunity for mutually beneficial agreements. Without a properly resourced and organized State Department, opportunities to frustrate China will be lost altogether or be handled in such a manner that its potential benefit will be greatly diminished. The Indo-Pacific region is vital to U.S. objectives because of its continuing economic opportunities, and yet, to fully reap the benefits of those opportunities, the United States, China, and the other countries that are impacted by regional competition must work together to communally benefit whenever possible. Competing with China requires the U.S. to advance its position by smartly leveraging all instruments of national power that enable the current strategic approach.

Policymakers can ask themselves how the U.S. can be expected to compete below the threshold of armed conflict without adequately resourcing the primary agency responsible for executing the policies in that environment. The Department of Defense requested $705.4 billion for FY21; and while defense spending on military capability is an important component of a deterrence strategy, it only inadvertently promotes the U.S. capability to compete below the threshold of armed conflict[4]. The State Department requested $40.8 billion for FY21, which is an $11.7 billion, or 22-percent decrease from the 2020 enacted level[5]. In the face of reports calling for the State Department to modernize, the U.S., as is evident in the proposed budget, is prioritizing military capability for deterrence at the expense of investing in deterrence through greater diplomacy, advocacy, and assistance efforts[6]. Ignoring the reality of State Department capability will lead to U.S. policy missteps and encourage China to expand their focus beyond military development and increase investing in other strategic sectors[7]. These sectors, which include the Belt and Road Initiative and the Asian Infrastructure Investment Bank, are effective in increasing the political clout the PRC can wield in forming new alliances and dependencies while degrading the U.S. position in the region.

The current United States strategic approach to the PRC reaffirms many of the incorporative strategic approaches described in the 2017 National Security Strategy, 2018 National Defense Strategy, 2019 Department of State Strategy, and the 2019 Department of Defense Indo-Pacific Strategy Report[8]. Specifically, the current U.S. strategic documents accept China as a major power in its own right and describe many unconstrained approaches that will foster cooperation and competition wherever possible while not allowing rivalry to degrade the entire relationship. While these documents allude to a networked approach for competing with China in some areas while cooperating in others, the fiscal allocation of resources and the demonstration that when under stress, the liberal virtues championed in these strategies are easily sacrificed, make clear that execution of the supporting policies is an issue. To compete with China, policymakers can consider sufficiently budgeting the resources required for the State Department to increase its capability to promote U.S. strategic interests across the many non-military domains[9].

The State Department, as the primary agency that coordinates diplomacy, advocacy, and assistance efforts, is critical in a competitive environment that falls below the threshold of armed conflict. The United States cannot effectively or efficiently compete with China while using inflexible and un-adaptive organizational structures that are ill-equipped to deliver relevant solutions[10]. Just as the U.S. military has been equipped to conduct modernization efforts, the Department of State requires the same focus of resourcing for their modernization efforts to successfully outcompete China. Without adequate funding, the State Department will not reform into a more agile institution that can deliver the strategic objectives in a manner reflective of the current period of great power competition[11]. The undervaluing of non-military strategic tools and agencies such as the State Department, over time, will make the military option the most preferred deterrence and engagement method for shaping foreign affairs. The United States’ costly global military presence as a result of the war on terror and extended campaigns in Iraq and Afghanistan have only reinforced this militaristic reality and are an impetus for assessing foreign policy approaches to foster more competitive practices below the threshold of armed conflict.


Endnotes:

[1] Araya, D. (2019, October 20). China’s Grand Strategy. Retrieved June 12, 2020, from https://www.forbes.com/sites/danielaraya/2019/01/14/chinas-grand-strategy/#27ce4ef61f18

[2] Swagel, P. (2020, April 24). CBO’s Current Projections of Output, Employment, and Interest Rates and a Preliminary Look at Federal Deficits for 2020 and 2021. Retrieved June 12, 2020, from https://www.cbo.gov/publication/56335

[3] United States Department of State. (2019, May 13). Retrieved June 12, 2020, from https://www.state.gov/about/about-the-u-s-department-of-state

[4] Department of Defense 2021 Budget Request. 2020, Retrieved June 12, 2020, from https://www.govinfo.gov/content/pkg/BUDGET-2021-BUD/pdf/BUDGET-2021-BUD-9.pdf

[5] Department of State and Other International Programs 2021 Budget Request. 2020, Retrieved June 12, 2020, from https://www.govinfo.gov/content/pkg/BUDGET-2021-BUD/pdf/BUDGET-2021-BUD-18.pdf

[6] United States Government Accountability Office. (2019, March). Integrated Action Plan Could Enhance Efforts to Reduce Persistent Overseas Foreign Service Vacancies. Retrieved June 12, 2020, from https://www.gao.gov/assets/700/697281.pdf

[7] Ju, S. F. (2018, March 6). China’s diplomacy budget doubles under Xi Jinping. Retrieved June 12, 2020, from https://www.ft.com/content/2c750f94-2123-11e8-a895-1ba1f72c2c11

[8] United States Strategic Approach to the People’s Republic of China. (2020, May 20). Retrieved June 12, 2020, from https://www.whitehouse.gov/wp-content/uploads/2020/05/U.S.-Strategic-Approach-to-The-Peoples-Republic-of-China-Report-5.20.20.pdf

[9] Congressional Budget Justification: Department of State Diplomatic Engagement. (2020, March). Retrieved June 12, 2020, from https://www.state.gov/wp-content/uploads/2020/03/FY21-CBJ-Appendix-1-FINAL-for-GPA-Mar-26-2020.pdf

[10] Daalder, I., & Lindsay, J. (2001, March 1). How to Revitalize a Dysfunctional State Department. Retrieved June 12, 2020, from https://www.brookings.edu/wp-content/uploads/2017/09/gs_20170927_dos__usaid_listening_report_2017.pdf

[11] Office of Inspector General. (2019, November). Review of the Department of State’s Organizational Reform Effort. Retrieved June 12, 2020, from https://www.stateoig.gov/system/files/aud-mero-20-09.pdf

2020 - Contest: PRC Below Threshold Writing Contest Budgets and Resources China (People's Republic of China) Diplomacy Matthew F. Smith Option Papers United States

Options for African Nations Regarding Economic Collaboration with the U.S. and China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Ekene Lionel is the Executive Director for Military Africa.  He can be found on Twitter @LionelfrancisNG.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States and the People’s Republic of China are competing below the threshold of war for influence in Africa.

Date Originally Written:  May 19, 2020.

Date Originally Published:  July 27, 2020.

Author and / or Point of View:  The author believes that the possibility of a U.S.-Chinese economic collaboration in Africa is the only way forward, and that this collaboration will be key to competition in Africa below the threshold of war. The article is written from the point of view of Africa’s relationship between both major powers.

Background:  China is an increasingly important player in the politics, economic development, and security of Africa. China has prioritized strong diplomatic relations and political ties with African states. Beijing’s ideological aspiration, anchored on solidarity amongst the Third World countries, is appealing to African states.

Significance:  With China’s focus on Africa’s rich resources is to fuel its own domestic economic growth, this has placed it in direct competition with the United States.

Option #1:  The U.S. increases bilateral trade and investment in Africa to compete with China below the threshold of war.

Although China and the United States employ different strategies and tactics in Africa, they share very similar interests, and that their competition has been largely confined to the economic domain. Even though there is a fundamental distrust between both nations, particularly as the U.S. is cautious of China’s military entry into Africa, there is still much room for their cooperation in promoting peace and economic development on the continent.

With that said, the U.S. currently lacks a comprehensive approach to multilateral issues such as regional trade, governance, and infrastructural development that will serve Africa better than what China offers. Since trade is vital to Africa’s economic future and to improving lives and livelihoods, the U.S. can recognize that much of China’s appeal is its willingness to respond to Africa’s developmental priorities, and to project Africa as a promising hub for foreign investment. For several decades, U.S. investment is still heavily concentrated in the natural resource sector. Instead, for a long-term, sustainable economic growth, and development in Africa, America can identify and promote other sectors where U.S. businesses might have competitive advantages.

The United States can also work with African countries to take full advantage of both African Growth and Opportunity Act (AGOA) and worldwide trading opportunities and send exports to emerging markets such as Russia, China, India, and Brazil (BRIC). The AGOA, which was signed between 2002 and 2008, lowers tariff barriers for entry into the United States of African-produced textiles and other commodities[1].

Besides trade and foreign direct investment, America can leverage its relationship with Africa to encourage improvements in human rights practices and the pursuance of Western-style liberal democracy. In contrast, China has a policy of no political strings attached to its aid. Beijing maintains close relations with African governments whether they are democracies, autocracies, military regimes, or Islamists.

Risk:  Increased U.S. trade and investment in Africa angers China, who then takes steps to roll back U.S. efforts in Africa or elsewhere.

Gain:  This option will appeal to African nations on the basis of a common U.S-African interest in trade negotiations. At present, Africa has just 2 percent of all world trade, this is still low considering a large number of resources present in Africa. The U.S. will have to convince companies to invest in the region, and also opening its markets further to African exports.

Option #2:  The U.S. and China collaborate economically in Africa.

Militarily, the United States has a robust presence in Africa, and is particularly active in anti-piracy and counter-terror efforts, operating up to 29 different bases in the continent[2]. China cannot hope to match or contest U.S. military dominance in Africa. Africa is no stranger to conflict as the continent has been subjected to constant warfare for the past several decades. Africa will fiercely resist any attempt of international armed struggle for clout within the continent.

The United States and China use essentially the same political, economic, military, and cultural tools for implementing their policies in Africa. For China, the country has placed itself as the infrastructural vanguard of the new frontier, since Africa is now considered the fastest urbanizing continent globally. According to a 2017 report by the International Monetary Fund, in 2017, Africa boasted seven of the 20 fastest growing economies in the world[3].

Thus, China has position itself to capitalize and exploit this growth. Since 2005, the American Enterprise Institute (AEI) China Global Investment Tracker determined that the total value of Chinese investments and construction in Africa is nearing $2 trillion[4]. The Chinese investment is compared with the just $39 billion combined trade value for the United States according to a 2017 United States Agency for International Development report. The U.S. is it Africa’s third-largest trading partner behind China and the European Union.

To consolidate its robust economic influence, China recently launched a $1 billion Belt and Road infrastructure fund for Africa, and a $60 billion African aid package[5]. Even though China is presenting itself humbly in its interaction with Africa, it has been accused of saddling developing countries with substantial volumes of hidden debt through its Belt and Road Initiative. This humility is rapidly changing as China’s political and economic power increases. As China looks to diversify its trade and investment relationships amid the protracted trade war with the U.S, Beijing’s opaqueness in issuing loans means debt burdens for recipient countries, which can cause potential problems for the African economy.

For now, Chinese firms have been actively building ports, roads, and railways to enhance integration and trade between African nations, mainly under the African Continental Free Trade Agreement (AfCFTA). AfCFTA intends to bring together all 55 African Union member states into the world’s largest free trade area, covering over 1.2 billion people. Besides, China now has more diplomatic offices in Africa than the U.S., and in some countries, Chinese influence counts for more[6].

In contrast, being the leader of the Western world since the end of World War II, the United States is sometimes perceived in Africa as insensitive and arrogant. U.S.-Africa trade has dipped in recent years. Nearly all of the assistance provided to Africa by the United States is in the form of grants and aids to Africa has been running at about $8 billion annually.

If the U.S continues to pursue military dominance or competition with China even below the threshold of war, it risks being a step or even two behind China in Africa for a long time. U.S. interests in Africa remain shaped, to its own detriment, by a perceived competition with China. The U.S. may accomplish more by focusing on areas of current or potential collaboration and to pay less attention to the debilitating debate about U.S-China competition.

Washington can collaborate with China, smoothing the way to trade will help more entrepreneurial African states, especially those with the thriving private business sector, to grow where it would be welcomed by the new generation of dynamic African entrepreneurs.

While there are areas in Africa where China and the United States might compete as major powers, especially below the threshold of war, there are many more areas where they can cooperate. For example, both Countries have a successful agricultural sector, components of which could be combined and adapted to improve production in Africa.

At this point, America likely cannot sit idly while countries such as China become more engaged with the aspirations of Africa’s next generation of leaders. Frankly, China is not a strategic threat to the United States in Africa. However, Beijing could pose serious political and commercial challenges for influence. Nonetheless, by engaging China more on Africa-centric socio-economic, diplomatic, and infrastructural development can the U.S. meet this challenge effectively.

Risk:  Chinese and U.S. investments in Africa further entangle the two nations and cause both to hesitate to take more important actions to preserve national security.

Gain:  A coordinated and dedicated diplomatic, commercial, and security strategy can increase U.S. investment and challenge Chinese influence in Africa.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] African Growth and Opportunity Act (AGOA), https://agoa.info/about-agoa.html

[2] Nick Turse, Pentagon’s map of US bases in Africa, The Intercept, February 27, 2020, https://theintercept.com/2020/02/27/africa-us-military-bases-africom

[3] IMF Annual Report 2017, Promoting inclusive growth, 2017, https://www.imf.org/external/pubs/ft/ar/2017/eng/pdfs/IMF-AR17-English.pdf

[4] AEI, China Global Investment Tracker, 2005-2019, https://www.aei.org/wp-content/uploads/2020/01/China-Global-Investment-Tracker-2019-Fall-FINAL.xlsx

[5] Silk Road Briefing, US$ 1 Billion Belt & Road Africa Fund Launched, July 04, 2019, https://www.silkroadbriefing.com/news/2019/07/04/us-1-billion-belt-road-africa-fund-launched

[6] Ben Doherty , The Guardian, China leads world in number of diplomatic posts, leaving US in its wake, Tuesday 26 Nov 2019, https://www.theguardian.com/world/2019/nov/27/china-leads-world-in-number-of-diplomatic-posts-leaving-us-in-its-wake

2020 - Contest: PRC Below Threshold Writing Contest Africa Below Established Threshold Activities (BETA) China (People's Republic of China) Competition Ekene Lionel Option Papers United States

Options for the United States to Compete with China Below the Threshold of Armed Conflict

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Matthew Ader is a second-year undergraduate taking War Studies at King’s College London.  He tweets occasionally from @AderMatthew, and is an editor at the Wavell Room. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As China rises and the U.S. wants to avoid direct military confrontation, the U.S. requires options to compete with China below the threshold of armed conflict

Date Originally Written:  May 12, 2020.

Date Originally Published:  July 8, 2020.

Author and / or Article Point of View:  The author is a second-year undergraduate student at King’s College London with a broadly liberal foreign policy view. The article is written from the point of view of the United States towards the People’s Republic of China.

Background:  The United States has identified China as a key competitor and revanchist power seeking to undermine the U.S.-led international order.

Significance:  China is expanding its influence globally through competition below the threshold of armed conflict, to the detriment of U.S. interests. A conventional Sino-American war to counter or roll back these gains would be catastrophic. The below options enable the U.S. to compete against China short of war.

Option #1:  The United States deploys specialist surveillance and training capabilities, along with Coast Guard and Navy vessels, to enhance and expand existing multilateral efforts against maritime lawlessness – particularly illegal, unreported and unregulated (IUU) fishing – in the Indo-Pacific theatre.

Risk:  This option would put US personnel in close contact with Chinese maritime militia, coast guard, and fishing fleets on a regular basis – increasing the possibility of a geopolitical incident. It could also contribute to overstretch in the U.S. 7th Fleet. Further, while maritime lawlessness is recognised as a major problem by all countries in theatre, U.S. enforcement action could be seen as high-handed. One particular concern would be how the U.S. treats Japan – it is a key ally but is also heavy enmeshed in the IUU industry. Too heavy-handed a treatment would alienate Japan; too lenient would make the U.S. seem hypocritical. This option might also embroil the U.S. in regional disputes over maritime border claims.

Gain:  This option would strengthen the U.S. claim of being a status quo power upholding the law and rules-based international order against an aggressive and lawless China. Given that regional trust in the U.S. has sunk dramatically over the course of the Trump administration, this option could constitute a helpful corrective. Substantively, this option could also assist in pushing back on Chinese influence in the South China Sea; the current Freedom of Navigation Operations are inherently transient and can be avoided without change to broader Chinese strategy — persistent presence cannot. Lastly, it would permit U.S. forces to work alongside regional partners, gaining valuable operational expertise and local knowledge.

Option #2:  The United States increases funding for the journalists, civil rights activists, and anti-corruption campaigners in nations involved in the Chinese Belt and Road Initiative (BRI).

Risk:  This option may be seen as the U.S. meddling unduly in the affairs of foreign countries, and certainly would be portrayed as such by the Chinese state media. It is also difficult to assess the impact of such investments, which, given the kleptocratic or authoritarian nature of many BRI states, may be negligible. Moreover, this option could lead to activists and journalists being labelled as foreign agents. Further, while the material loss to U.S. interests resulting from states cracking down on individuals and organisations who receive U.S. funding is relatively small, the reputational risk is significant.

Gain:  This option allows the U.S. to contest and bog down Chinese BRI expansion in Africa and central Asia, as activists and journalists expose Chinese elite corruption and oppose predatory debt-trap diplomacy. It would involve no risk to U.S. personnel, and limited expenditure compared to more kinetic options. Moreover, this option could, with appropriate messaging, allow the U.S. to portray itself as siding with local populations against an overbearing China and its puppets – an advantage for international media coverage.

Option #3:  China is a highly aggressive and malign actor in cyberspace. The U.S. encourages and facilitates greater global regulation surrounding cyberwarfare and espionage. One specific option would be an international body, likely under United Nations authority, to identify the origin of cyberattacks.

Risk:  The U.S. is highly capable in the cyber domain, and there is a risk that by encouraging more regulation, it would be creating a purity test it cannot itself meet. This would, in turn, create substantial reputational problems for the U.S. Moreover, attributing cyberattacks is difficult, and it is possible that the U.S. might be inadvertently accused of a crime it did not commit. Lastly, while international naming and shaming can be effective, the extent to which it would matter to China is unclear; the option might therefore involve expending substantial U.S. diplomatic capital for limited returns.

Gain:  This option could lead to stronger norms against aggression in cyberspace. This may not discourage China from continuing its current aggressive policy, but it could increase the reputational costs and diplomatic consequences associated with it. Moreover, an impartial and open-source organisation for attributing cyberattacks could be a helpful resource against non-state actors and rogue states – especially given that U.S. efforts at attribution are often hampered by the need to protect sensitive intelligence sources and methods. Lastly, this option, as a recourse to multilateralism, would signal U.S. commitment to the rules-based international order, which may be important in restoring global trust in U.S. leadership.

Other Comments:  Sino-U.S. competition is and will continue to shape this century. New ways for the U.S. to compete below the threshold of armed conflict may be critical assets in assuring U.S. victory.

Recommendation:  None.


Endnotes:

[1] Larter, D. B. (2019, May 2). Here’s how the Japan-based 7th Fleet has changed since 17 sailors died in accidents 2 years ago. Retrieved April 20, 2020, from https://www.defensenews.com/digital-show-dailies/navy-league/2019/05/05/heres-how-the-japan-based-7th-fleet-has-changed-since-17-sailors-died-in-accidents-2-years-ago

[2] Mackie, J. (2019, October 18). Japan Has an Illegal Seafood Problem. Retrieved April 20, 2020, from https://www.hakaimagazine.com/news/japan-has-an-illegal-seafood-problem

[3] Rudd, K. (2020, May 6). The Coming Post-COVID Anarchy. Retrieved from https://www.foreignaffairs.com/articles/united-states/2020-05-06/coming-post-covid-anarchy

2020 - Contest: PRC Below Threshold Writing Contest Below Established Threshold Activities (BETA) China (People's Republic of China) Competition Matthew Ader Option Papers

A Wicked Cultural Problem: Options for Combating New Tribalism in 2035

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


Captain Matthew Hughes, U.S. Army, is a Western Hemisphere Foreign Area Officer. He is currently assigned to the Military Liaison Office of the U.S. Embassy in Brasilia, Brazil while he conducts in-region training. The opinions expressed in this article are his alone and do not reflect the official position of the U.S. Army, the Department of Defense, or the U.S. Government. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  It is 2035 and a new form of tribalism has taken root throughout the world. This New Tribalism is a threat to U.S. interests.

Date Originally Written:  April 23, 2020.

Date Originally Published:  July 6, 2020.

Author and / or Article Point of View:  The article is written from the point of view of the United States in 2035 towards New Tribalism adherent groups imposing dangerous cultures on others.

Background:  Culture overrides ideological, political, or economic distinctions among peoples, driving global conflict in 2035[1]. While tremors of conventional conflict occur along fault lines between civilizations, localized conflicts erupt within civilizations as ethnicities and tribes seek to impose their ways of life upon others[2]. Governments struggle to meet societies’ demands for political and economic stability, leading them to turn inward and adopt protectionist policies, which erodes international coalitions that historically managed localized conflicts through small wars[3]. Cultural conflicts and weak multilateral cooperation accelerate the transition of predominant terrorism ideologies from a religious wave (1979 – late 2020s) to a wave known as New Tribalism, characterized by terrorist groups promulgating violent cultures based on ethnic, racial, or tribal mysticism[4]. Children are the vanguard of New Tribalism; child soldiers and child brides are cultural norms[5]. Rape and ethnic cleansing are integral in establishing a new human race[6]. New Tribalism thus “disrupts traditional cultures [by violating] even the most traditional elements of a society” by imposing its apocalyptic vision of how society should function[7]. In 2035, the U.S. faces the wicked problem of combating dangerous cultures of New Tribalism adherents before they topple governments, beget genocide, prompt mass migrations, and trigger regional instability.

Significance:  Although New Tribalism movements face inward as adherents seek to purify their homelands, their harmful cultures threaten regional political and economic stability. These groups seek to unify and consolidate adherents of their cultures, often across international boundaries. The scope of effects as these violent cultures spread includes genocide, massive volumes of displaced persons, ousting national-level political figures, and geographic impacts. The U.S. response will establish a precedent on how to combat New Tribalism’s dangerous cultures in a global dynamic where isolationism has become the norm.

Option #1:  The U.S. intervenes through armed conflict.

The U.S. deploys forces to countries where New Tribalism erupts in order to defeat adherent groups and mitigate the effects of their violent cultures. The U.S. threatens sanctions against countries providing external support to these groups to degrade their operations. The United States Agency for International Development (USAID) focuses on economic development projects and refugee relief efforts. Non-Governmental Organizations (NGOs) engage in deradicalization efforts with former New Tribalism communities. Military information support operations emphasize legitimacy of friendly operations and incompatibility of New Tribalism with traditional norms.

Risk:  Numerous small wars with prolonged U.S. troop presence, significant casualties, and heavy financial costs, weaken the U.S. military’s ability to fight major regional contingencies. Weak international coalitions increase this likelihood and associated costs. U.S. Forces may receive domestic and international criticism for collateral deaths of children during kinetic military actions, given New Tribalism cultural norms of using child soldiers and holding child prisoners.

Gain:  Armed conflict with New Tribalism adherents delays the spread of their dangerous cultures; additional efforts by NGOs and soft power instruments will help to exterminate them. This option can degrade adherent groups’ capabilities, disrupt their operations, and ultimately defeat them. U.S. intervention may halt an insurgency and preserve national institutions, salvaging Defense Institution Building (DIB) efforts spanning decades. Intervention decreases the likelihood of genocide and can mitigate the extent and severity of mass migration. The protected government and populace develop greater trust in the U.S. as a partner, positively influencing future relations.

Option #2:  The U.S. assists groups battling the New Tribalists below the level of armed conflict.

U.S. regionally-aligned forces and / or special operations forces train, advise, and assist rivals of New Tribalism adherent groups (e.g., armed forces of conflict country and neighboring countries) to manage the effects of adherent groups and their dangerous cultures[8]. U.S. intelligence assets find and fix adherent group targets and share information with allies and partners to finish targets. The U.S. leverages soft power tools to enhance partner nation governance and its national security apparatus and delay the spread of New Tribalism cultures.

Risk:  This option relies on successful security assistance activities and multinational cooperation. Due to persistent political and security challenges in New Tribalism conflict areas, Leahy vetting will identify units and leaders among potential allies which committed human rights violations when quelling rebellions or amassing power for strongmen in recent decades, limiting possibilities for security assistance.

Gain:  This option enhances the capabilities of adherent groups’ rivals (i.e., tactical training; targeting efforts; equipment). Financial costs and U.S. troop loss are significantly lower than in armed conflict. This option affords the U.S. time to assess the developing situation and act prudently, escalating to armed conflict through decision points, if deemed necessary. The proximity of U.S. troops grants the U.S. flexibility to respond to dynamic security conditions and execute contingency operations.

Option #3:  The U.S. contains New Tribalism.

In this option the U.S. does not intervene directly via troops in combat. Instead, it prevents the territorial spread of dangerous cultural norms and practices by deploying forces to New Tribalism peripheries. The U.S. leads multilateral efforts to secure national borders surrounding conflict areas. USAID coordinates relief efforts for refugees and NGOs conduct deradicalization efforts with captured combatants and liberated slaves.

Risk:  This option puts the onus for intervention through armed conflict on the United Nations Security Council and neighboring countries, risking either a delayed response to genocide or no intervention if there is insufficient multinational cooperation. Hence, there is inherent risk for domestic and international criticism for U.S. inaction, catastrophic political ramifications (including sunk costs for DIB), and a regional refugee crisis. The victimized population feels abandoned by the U.S., negatively impacting relations for decades.

Gain:  By securing national borders and improving economic conditions, this option enhances the host country’s ability to defeat violent groups and exterminate their harmful cultures[9]. Containment offers a sustainable strategy with likely domestic and international support. The U.S. avoids financial costs and troop loss associated with military intervention and prolonged engagement. This option grants the U.S. flexibility to commit troops and resources to other conflicts.

Other Comments:  All options reflect the need for a whole-of-government approach to counter dangerous cultures.

Recommendation:  None.


Endnotes:

[1] Huntington, S. P. (2011). The clash of civilizations and the remaking of world order. New York: Simon & Schuster.

[2] Huntington, S. P. (2011). The clash of civilizations and the remaking of world order. New York: Simon & Schuster.

[3] National Intelligence Council. (2017). Global Trends: Paradox of Progress (p. v). Retrieved from https://www.dni.gov/files/documents/nic/GT-Full-Report.pdf.

[4] Kaplan, J. (2007). The Fifth Wave: The New Tribalism? Terrorism and Political Violence, 19, 545-570. doi: 10.1080/09546550701606564.

[5] Kaplan, J. (2007). The Fifth Wave: The New Tribalism? Terrorism and Political Violence, 19, 545-570. doi: 10.1080/09546550701606564.

[6] Kaplan, J. (2007). The Fifth Wave: The New Tribalism? Terrorism and Political Violence, 19, 545-570. doi: 10.1080/09546550701606564.

[7] Kaplan, J. (2007). The Fifth Wave: The New Tribalism? Terrorism and Political Violence, 19, 545-570. doi: 10.1080/09546550701606564.

[8] I-VEO Knowledge Matrix. (2011, June). Retrieved April 15, 2020, from http://start.foxtrotdev.com/. See hypothesis for Literary Reviews 157 and 175.

[9] I-VEO Knowledge Matrix. (2011, June). Retrieved April 15, 2020, from http://start.foxtrotdev.com/. See hypothesis for Literary Review 136.

2020 - Contest: Civil Affairs Association Writing Contest Civil Affairs Association Matthew Hughes Option Papers Sub-State Groups United States

Options for a Five Eyes Response to Below Threshold Competition with China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Alexander Craig works in the United Kingdom’s Armed Forces. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


National Security Situation:  Competition with China below the threshold of armed conflict.

Date Originally Written:  May 4, 2020.

Date Originally Published:  July 1, 2020.

Author and / or Article Point of View:  This article is written from the perspective of the ‘Five Eyes’ nations: the United States, the United Kingdom (UK), Canada, New Zealand, and Australia.

Background:  The Five Eyes nations are united not just by security cooperation, but by shared history, language, culture and a commitment to democracy, free market institutions and the rule of law. Being few in number compared to the European Union’s 27 members and the North Atlantic Treaty Organization’s 30, the Five Eyes have the potential to act with depth and agility against a common challenge on the world stage beyond that of other international affiliations.

Significance:  China is promoting its authoritarian model abroad as a superior alternative to liberal democracy and the free market[1]. In doing so China is seeking to undermine the current rules based international order; with Xi Jinping openly stating in 2014 that China should be “constructing international playgrounds” and “creating the rules”[2]. If left unchecked, this below threshold competition will undermine democratic norms, support for the free market, and subvert global institutions.

Option #1:  The UK grants full citizenship to Hong Kong’s British Overseas Nationals.
There are approximately 250,000 holders of British National (Overseas) (BN(O)) passports.[3] Holders are permanent Hong Kong residents who voluntarily registered prior to 1997. They are not afforded the protection and right that full British citizenship would bring.

Risk:  It is likely that the Chinese government would seek to portray this as an act of interference in its domestic affairs. There is a possibility that BN(O) holders would be seen by the authorities as a suspect group, and this measure could be the catalyst for the victimisation of BN(O) passport holders. Domestically, there would likely be concern in the UK about the possible impact of the instant granting of citizenship to quarter of a million people.

Gain:  By granting full citizenship, the UK demonstrates its support to these citizens of Hong Kong. This act would reassure the people of Hong Kong that international support did not just amount to words; and demonstrates that there can be effective soft power responses to China’s use of hard power against its own citizens.

Option #2:  The Five Eyes nations establish their own Free Trade Agreement.

China uses access to its markets as a tool of both influence and punishment, as seen in recent threats levelled towards Australia[4]. Several unconnected arrangements already link most of the Five Eyes nations such as free trade agreements between the United States, Australia and Canada[5][6]. The withdrawal of the United Kingdom from the European Union presents an opportunity to simplify and formalise arrangements between the five nations.

Risk:  Free trade agreements can prove controversial[7] and domestic support for free trade often fluctuates, especially in the United States[8]. Increased rhetoric regarding the need for protectionism and claims that the coronavirus has highlighted the fragility of global supply chains could combine to make the early 2020s a difficult period for advancing ambitious free trade agreements[9].

Gain: The establishment of a simple and transparent free trade area by democratic nations deeply committed to the institutions of the free market and the rule of law (and with already existing security arrangements) would provide a global market where participants need not be at the mercy of an autocratic state. This free trade area would be the largest in the world, with a combined Gross Domestic Product of 26.73 trillion dollars, almost double that of China and exceeding the European Union’s[10].

Option #3:  The Five Eye nations give Taiwan full diplomatic recognition.

Currently 15 nations recognise Taiwan, a decrease of seven since 2016. This is primarily a result of pressure placed on smaller nations by China[11].

Risk:  The recognition of Taiwan as a sovereign nation would be highly provocative and would almost certainly be met with a response from China. U.S. President Donald Trump recently signed into law the TAIPEI Act[12], which prompted the Chinese foreign ministry spokesperson to respond “We urge the United States to correct its mistakes, not implement the law, or obstruct the development of relations between other countries and China, otherwise it will inevitably encounter a resolute strike back by China[13].” This option might entail having to be prepared to face this threatened ‘strike back’.

Gain:  The Chinese government’s opposition to international recognition of a prosperous free market democracy is enforced through threats and coercion. Recognition would be a declaration that, on the world stage, aggressive rhetoric and punitive use of boycotts and market access by larger nations do not trump the rule of law, democracy, and the sovereignty of smaller nations. If China does attempt a forced reunification, previous recognition of Taiwan makes clear what crime has been committed: the invasion of a sovereign nation by another – not a conclusion to the civil war, or the reigning in of a secessionist province.

Other Comments:  Suggestions for addressing the risks posed by Chinese competition are often reactive in nature and assume China has the initiative: preventing dominance of 5G networks, preventing mass corporate theft, reducing the influence of Confucius Institutes etc. While each suggestion is valid, there is a risk that the assumption of Chinese advantage fosters a pessimistic attitude. Instead, what authoritarian regimes often see as the West’s weaknesses are often strengths, and in the words of U.S. Army Lieutenant General H.R. McMaster, “we have far more leverage than we are employing[14].”

Recommendation:  None.


Endnotes:

[1] McMaster, H. 2020. How China sees the World. The Atlantic. https://www.theatlantic.com/magazine/archive/2020/05/mcmaster-china-strategy/609088

[2] Economy, E. 2018. China’s New Revolution. Foreign Affairs. https://www.foreignaffairs.com/articles/china/2018-04-17/chinas-new-revolution

[3] UK House of Commons. 2020. British Overseas Passport Holders in Hong Kong. Hansard https://hansard.parliament.uk/Commons/2020-01-29/debates/AC02FF56-64CB-4E14-92FD-D2EF59859782/BritishOverseasPassportHoldersInHongKong

[4] McCullough, D. 2020. China threatens to stop Australian imports. Canberra Times. https://www.canberratimes.com.au/story/6736562/china-threatens-to-stop-australian-imports

[5] Office of the United States Trade Representative. 2020. Free Trade Agreements. https://ustr.gov/trade-agreements/free-trade-agreements

[6] Department of Agriculture, Water and the Environment. 2020. Free Trade Agreements. https://www.agriculture.gov.au/market-access-trade/fta

[7] Pengelly, M. 2017.Trump threatens to terminate Nafta, renews calls for Mexico to pay for wall. The Guardian. https://www.theguardian.com/us-news/2017/aug/27/donald-trump-camp-david-nafta-mexico-wall-canada

[8] Wofe, R., & Acquaviva, 2018 Where does the public sit on NAFTA? Policy Options. https://policyoptions.irpp.org/magazines/april-2018/public-sit-nafta

[9] O’Leary, L. 2020. The Modern Supply Chain is Snapping. The Atlantic. https://www.theatlantic.com/ideas/archive/2020/03/supply-chains-and-coronavirus/608329

[10] The World Bank. 2020. GDP (current US$). The World Bank. https://data.worldbank.org/indicator/NY.GDP.MKTP.CD

[11] Lyons, K. 2020. Taiwan loses second ally in a week as Kiribati switches to China. The Guardian. https://www.theguardian.com/world/2019/sep/20/taiwan-loses-second-ally-in-a-week-as-kiribati-switches-to-china

[12] Hille, K. 2020. US steps up support of Taiwan in open rebuke to China. The Financial Times. https://www.ft.com/content/161e1b6b-8b5c-44a8-a873-76687427b522

[13] Blanchard, B., & Tian, Y. U.S. increases support for Taiwan, China threatens to strike back. https://www.reuters.com/article/us-taiwan-usa/us-increases-support-for-taiwan-china-threatens-to-strike-back-idUSKBN21E0B7

[14] McMaster, H. 2020. How China sees the World. The Atlantic. https://www.theatlantic.com/magazine/archive/2020/05/mcmaster-china-strategy/609088

2020 - Contest: PRC Below Threshold Writing Contest Alexander Craig Below Established Threshold Activities (BETA) China (People's Republic of China) Competition Option Papers

U.S. Options for a Consistent Response to Cyberattacks

Thomas G. Pledger is an U.S. Army Infantry Officer currently serving at the U.S. Army National Guard Directorate in Washington, DC. Tom has deployed to multiple combat zones supporting both the Conventional and Special Operations Forces. Tom holds a Master in Public Service and Administration from the Bush School of Public Administration at Texas A&M University, a Master of Humanities in Organizational Dynamics, Group Think, and Communication from Tiffin University, and three Graduate Certificates in Advanced International Affairs from Texas A&M University in Intelligence, Counterterrorism, and Defense Policy and Military Affairs. Tom has been a guest lecturer at the Department of State’s Foreign Service Institute. He currently serves on 1st NAEF’s External Advisory Board, providing insight on approaches for countering information operations. Tom’s current academic and professional research is focused on a holistic approach to counter-facilitation/network, stability operations, and unconventional warfare. Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States Government (USG) does not have a consistent response or strategy for cyberattacks against the private sector and population. Instead, it evaluates each attack on a case by case basis. This lack of a consistent response strategy has enabled hackers to act with greater freedom of maneuver, increasing the number and types of cyberattacks.

Date Originally Written:  April 24, 2020.

Date Originally Published:  June 29, 2020.

Author and / or Article Point of View:  The author believes that a lack of a consistent response or strategy for cyberattacks against the United States private sector and population have emboldened foreign powers’ continued actions and prevented a coordinated response.

Background:  The United States private sector and population has become the target of an almost continuous barrage of cyberattacks coming from a long list of state-sponsored actors, including Russia, China, North Korea, and Iran[1]. These actors have used the low financial cost of execution and low cost of final attribution to utilize cyberattacks as a tool to stay below the threshold of armed conflict. In the United States, these attacks have primarily avoided negative impacts on critical infrastructure, as defined by the USG. Therefore, the USG has treated such attacks as a matter for the private sector and population to manage, conducting only limited response to such state-sponsored attacks.

Significance:  The number of known cyberattacks has increased at a near exponential rate since the 1990s. During this same period, these attacks have become more sophisticated and coordinated, causing increased damage to both real-world infrastructure, intellectual property, societal infrastructure, and digital communication platforms. This trend for cyberattacks will continue to rise as individuals, industry, and society’s reliance on and the number of connected devices increases.

Option #1:  The USG categorizes cyberattacks against the United States’ private sector and population as an act of cyberterrorism.

Risk:  Defining cyberattacks against the United States’ private sector and population as cyberterrorism could begin the process of turning every action conducted against the United States that falls below the threshold of armed conflict as terrorism. Patience in responding to these attacks, as attack attribution takes time, can be difficult. Overzealous domestic governments, both state and federal, could use Option #1 to suppress or persecute online social movements originating in the United States.

Gain:  Defining cyberattacks against the United States’ private sector and population as cyberterrorism will utilize an established framework that provides authorities, coordination, and tools while simultaneously pressuring the USG to respond. Including the term “digital social infrastructure” will enable a response to persistent efforts by state actors to create divisions and influence the United States population. Option #1 also creates a message to foreign actors that the continued targeting of the United States private sectors and population by cyberattacks will begin to have a real cost, both politically and financially. A stated definition creates standard precedence for the use of cyberattacks not to target the United States’ private sector and population outside of declared armed conflict, which has been applied to other weapon systems of war.

Option #2:  The USG maintains the current case by case response against cyberattacks.

Risk:  The private sector will begin to hire digital mercenaries to conduct counter-cyberattacks, subjecting these companies to possible legal actions in United States Courts, as “hack the hacker” is illegal in the United States[2]. Cyberattacks conducted by the United States private sector could drag the United States unknowingly into an armed conflict, as responses could rapidly escalate or have unknown second-order effects. Without providing a definition and known response methodology, the continued use of cyberattacks will escalate in both types and targets, combined with that U.S. adversaries not knowing what cyberattack is too far, which could lead to armed conflict.

Gain:  Option #2 allows a case by case flexible response to individual cyberattacks by the USG. Examining the target, outcome, and implication allows for a custom response towards each event. This option maintains a level of separation between the private sector operating in the United States and the USG, which may allow these organizations to operate more freely in foreign countries.

Other Comments:  Although there is no single USG definition for terrorism, all definitions broadly include the use of violence to create fear in order to affect the political process. Cyberterrorism does not include the typical act of violence against a person or property. This lack of physical violence has led some administrations to define cyberattacks as “cyber vandalism[3],” even as the cyberattack targeted the First Amendment. Cyberattacks are designed to spread doubt and fear in the systems that citizens use daily, sowing fear amongst the population, and creating doubt in the ability of the government to respond.

Recommendation:  None.


Endnotes:

[1] “Significant Cyber Incidents.” Center for Strategic and International Studies, Center for Strategic and International Studies, Apr. 2020, http://www.csis.org/programs/technology-policy-program/significant-cyber-incidents.

[2] “Hacking Laws and Punishments.” Findlaw, Thomson Reuters, 2 May 2019, criminal.findlaw.com/criminal-charges/hacking-laws-and-punishments.html.

[3] Fung, Brian. “Obama Called the Sony Hack an Act of ‘Cyber Vandalism.’ He’s Right.” The Washington Post, WP Company, 22 Dec. 2014, http://www.washingtonpost.com/news/the-switch/wp/2014/12/22/obama-called-the-sony-hack-an-act-of-cyber-vandalism-hes-right/.

Cyberspace Option Papers Policy and Strategy Thomas G. Pledger United States

Options for the Deployment of Robots on the Battlefield

Mason Smithers[1] is a student of robotics and aviation. He has taken part in building and programming robots for various purposes and is seeking a career as a pilot. 

Jason Criss Howk[2] is an adjunct professor of national security and Islamic studies and was Mason’s guest instructor during the COVID-19 quarantine.

Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The deployment of robots on the battlefield raises many questions for nations that desire to do so.

Date Originally Written:  April, 5, 2020.

Date Originally Published:  June 24, 2020.

Author and / or Article Point of View:  This paper is based on the assumption that robots will one day become the predominant actor on a battlefield, as AI and robotics technology advance. The authors believe it is the moral duty of national and international policy-makers to debate and establish the rules for this future now.

Background:  Robots on the battlefield in large quantities, where they make up the majority of the combatants making direct-contact with a nation’s enemies, will raise new concerns for national leaders and human rights scholars. Whether they are tethered to a human decision-maker or not, when robots become the primary resource that a nation puts at risk during war, there will be an avalanche of new moral and ethical questions to debate.

This shift in the “manning” of warfighting organizations could increase the chances that nations will go to war because they can afford to easily replace robots, and without a human-life cost, citizens may not be as eager to demand a war be ended or be avoided.

Significance:  While the U.S. currently uses human-operated ground and air robots (armed unmanned aircraft-AKA drones, reconnaissance robots, bomb technician’s assistants etc.), a robust debate about whether robots can be safely untethered from humans is currently underway. If the United States or other nations decide to mass produce infantry robots that can act, without a human controlling them and making critical decisions for them, what are the costs and risks associated? The answers to these questions about the future, matter now to every leader involved in warfare and peace preservation.

Option #1:  The U.S. continues to deploy robots in the future with current requirements for human decision-making (aka human in the loop) in place. In this option the humans in any military force will continue to make all decisions for robots with the capability to use deadly force.

Risk:  If other nations choose to use robots with their own non-human decision capability or in larger numbers, U.S. technology and moral limits may cause the U.S. force smaller and possibly outnumbered. Requiring a human in the loop will stretch a U.S. armed forces that is already hurting in the areas of retention and readiness. Humans in the loop, due to eventual distraction or fatigue, will be slower in making decisions when compared to robots. If other nations perfect this technology before the U.S., there may not be time to catch up in a war and regain the advantage. The U.S. alliance system may be challenged by differing views of whether or not to have a human in the loop.

Gain:  Having a human in the loop will decreases the risk of international incidents that cause wars due to greater an assumed greater discretion capacity with the human. A human can make decisions that are “most correct” and not simply the fastest or most logical. Humans stand the best chance at making choices that can create positive strategic impacts when a gray area presents itself.

Option #2:  The U.S. transitions to a military force that is predominantly robotic and delegate decision-making to the robots at the lowest, possibly individual robot, level.

Risk:  Programmers cannot account for every situation on the battlefield. When robots encounter new techniques from the enemy (human innovations) the robots may become confused and be easily defeated until they are reprogrammed. Robots may be more likely to mistake civilians for legal combatants. Robots can be hacked, and then either stopped or turned on the owner. Robots could be reprogrammed to ignore the Laws of Warfare to frame a nation for war crimes. There is an increased risk for nations when rules of warfare are broken by robots. Laws will be needed to determine who gets the blame for the war crimes (i.e. designers, owners, programmers, elected officials, senior commanders, or the closest user).  There will be a requirement to develop rights for the robots in warfare. There could be prisoner of war status issues and discussions about how shutdown and maintenance requirements work so robots are not operated until they malfunction and die.  This option can lead to the question, “if robots can make decisions, are they sentient/living beings?” Sentient status would require nations to consider minimum requirements for living standards of robots. This could create many questions about the ethics of sending robots to war.

Gain:  This option has a lower cost than human manning of military units. The ability to mass produce robots allows means the U.S. can quickly keep up with nations that produce large human or robotic militaries. Robots may be more accurate with weapons systems which may reduce civilian casualties.

Other Comments:  While this may seem like science fiction to some policy-makers, this future is coming, likely faster than many anticipate.

Recommendation:  None.


Endnotes:

[1] Mason Smithers is a 13-year-old, 7th grade Florida student. He raised this question with his guest instructor Jason Howk during an impromptu national security class. When Mason started to explain in detail all the risks and advantages of robots in future warfare, Jason asked him to write a paper about the topic. Ninety percent of this paper is from Mason’s 13-year-old mind and his view of the future. We can learn a lot from our students.

[2]  Mason’s mother has given permission for the publication of his middle school project.

Artificial Intelligence / Machine Learning / Human-Machine Teaming Jason Criss Howk Mason Smithers Option Papers

Options for the U.S. to Wage Conflict in the Cognitive Domain

Editor’s Note:  This article is part of our Civil Affairs Association and Divergent Options Writing Contest which took place from April 7, 2020 to July 7, 2020.  More information about the contest can be found by clicking here.


Todd Schmidt currently serves as an active-duty military service member.  He can be found on Twitter @Dreamseed6 and hosts his scholarly work at www.toddandrewschmidt.com.  His views are his own.  Divergent Options’ content does not contain information of an official nature, nor does the content represent the official position of any government, organization, or group.


National Security Situation:  U.S. challenges to waging conflict in the cognitive domain.

Date Originally Written:  April 20, 2020.

Date Originally Published:  June 22, 2020.

Author and / or Article Point of View:  The author’s body of scholarly work focuses primarily on the influence of military elites on national security through the lens of epistemic community theory. This article is written from the point of view of an international relations/foreign policy scholar assessing challenges in future conflict through the lens of political psychology.

Background:  Humans live in bounded reality – a reality bounded by cognitive limitations[1]. Humans see the world they want, not as it is. The complexity of the world triggers information overload in the mind. Coping with complexity, humans use mental shortcuts to filter information that informs decision-making. Mental shortcuts, known as heuristics, are influenced by personal human factors.

In political psychology, human factors include emotions, belief systems, culture, education, psychological/behavioral attributes, and experiences that filter the overwhelming information to which humans are exposed[2]. Information filters reinforce perceptions of reality that conform to values and beliefs, or “operational code[3].” Filters act as cognitive limitations in the mind and the cognitive domain, which creates vulnerabilities and permits influence.

Current operational environments witness adversaries increasingly avoiding conventional conflict and achieving their objectives through other means of influence. The consequence is a future of persistent, unending great power competition that resides in a gray zone between war and peace. Adversaries will challenge U.S. power in this gray zone to erode strategic advantage and influence action. According to military doctrine, adversaries currently deploy capabilities “in all domains – Space, Cyber, Air, Sea, and Land” to challenge U.S. power[4]. This doctrine denies the cognitive domain.

Significance:  The cognitive domain will gain prominence in future strategic environments, conflict, and multi-domain operations. The cognitive domain of war has been explored and contested for centuries. Ancient Chinese strategist Sun Tzu refers to winning war through intelligence, information, and deception; attacking enemies where they are least prepared; and subduing adversaries indirectly without fighting. To win campaigns of influence in the cognitive domain requires achieving cognitive superiority.

Current Chinese military doctrine recognizes the importance of cognitive superiority, particularly in pre-kinetic stages of war. In pre-kinetic stages, unconventional “attacks” in the cognitive domain will shape how adversarial populations think. Human capital will be targeted. Targets will include societal weaknesses, social networks, and cyber and information systems. By weakening or defeating “systems” across all domains, below the threshold of kinetic conflict, an adversary’s strategic advantages, defenses, and deterrent capabilities are compromised[5].

Cognitive superiority is achieved through education and professional development, organizational learning and adaptability, technological advantage, and leadership. Taken together, these means translate into the ability to gather, decipher, process, and understand tremendous amounts of data and information faster than the enemy. Fusing and communicating knowledge faster than a competitor ensures the ability to disrupt enemy decision-cycles; influence their perceived reality; and impose U.S. will.

Option #1:  The U.S. improves public education, which includes a reevaluation of its investment in human capital, education systems, and professional development.

Risk:  Public education and pursuance of tertiary education will continue to fall behind U.S. allies and adversaries[6]. American society will be targeted by misinformation and influence campaigns; and bombardment by opinions masquerading as fact. The public will be challenged in discerning the origination of attacks, whether they originate domestically, outside sovereign borders, or through complicity. Finally, a trend of hyper-politicization of public policy related to education will result in low prioritization, under-funding, and a society dispossessed of the cognitive complexity to question and discern truth.

Gain:  Future generations, a population of which will serve in the armed forces, will have an educational foundation that better provides for the ability to detect and discern misinformation. Those that choose to serve will be better-equipped for achieving intellectual overmatch with adversaries that the joint force requires[7].

Option #2:  The U.S. invests in organizational learning and adaptation.

Risk:  Organizations that fail to learn and adapt in a manner that creates advantage and innovation, particularly in complex, competitive environments, are challenged to maintain relevance[8].

Gain:  Organizational learning and adaption is enabled by a professional, educated, trained workforce[9]. Investment in organizational learning and adaptation builds a healthy organizational culture reinforced by professionalism, common ethos and values, and competitiveness. Such characteristics are imperative to understanding complex challenges in uncertain environments[10].

Option #3:  The U.S. invests in technological innovation and advantage.

Risk:  Adversaries will forage and steal intellectual property. They have done so for decades, unhindered and unpunished[11]. American business, venture capital, and entrepreneurs, as well as the U.S. economy as a whole, will be unnecessarily impeded in the ability to compete in a world economy, threatening U.S. national interests.

Gain:  American entrepreneurial spirit is motivated and sustained by the advantages and rewards of a market-driven economy. The profit and gain achieved through investment in and maintenance of technological innovation and advantage fosters economic productivity. Taken together, these dynamics incentivize public policy that creates and fosters healthy, competitive, and profitable business environments and practices[12].

Option #4:  The U.S. Government incentivizes ‘unity of effort’ through public-private partnerships.

Risk:  Liberal democracies and free market economies may resist a perceived ‘militarization’ of the cognitive domain. Public officials may lack the intellectual curiosity or political will to recognize, understand, and engage in the cognitive domain to protect U.S. interests. Private-sector leaders and the public may be wary of partnering with the government. Leading a synchronized ‘unity of effort’ across governmental institutions and the private-sector is an incredibly challenging and complex task.

Gain:  With safeguards to civil liberties, the synergy between public- and private-sector efforts to achieve cognitive superiority would overcome adversarial incursion, influence, and competition in the cognitive domain.

Other Comments:  In a future epoch, the current era will be considered transitional and revolutionary. In this revolutionary era, the U.S. will be required to continually assess and ensure that adversaries and the strategic environment do not outpace the intellectual capacity of leaders, government, and society to understand and harness the age in which we live.

Recommendation:  None.


Endnotes:

[1] Mintz, A. and K. DeRouen. (2010). Understanding foreign policy decision making. Cambridge: Cambridge University Press.

[2] Cottam, M., E. Mastors, T. Preston and B. Dietz. (2016). Introduction to Political Psychology, 3rd Ed. New York: Routledge.

[3] George, A. (1969). “The ‘operational code’: A neglected approach to the study of political leaders and decision-making.” International studies quarterly. 13:2. 190-222.

[4] U.S. Army Training and Doctrine Command. (2018). “The U.S. Army in Multi-Domain Operations 2028.” TRADOC Pamphlet 525-3-1. Retrieved April 20, 2020 from https://www.tradoc.army.mil/Portals/14/Documents/MDO/TP525-3-1_30Nov2018.pdf

[5] Laird, B. (2017). “War Control: Chinese Writings on the Control of Escalation in Crisis and Conflict.” Center for a New American Security. March 20. Retrieved April 20, 2020 from https://www.cnas.org/publications/reports/war-control

[6] OECD. (2019). “United States.” Education at a Glance: OECD Indicators. OECD Publishing. Retrieved April 20, 2020 from https://read.oecd-ilibrary.org/education/education-at-a-glance-2019_1e0746ed-en#page1.

[7] Joint Staff. (2019). “Developing Today’s Joint Officers for Tomorrow’s Ways of War.” The Joint Chiefs of Staff Vision and Guidance for Professional Military Education and Talent Management. Retrieved April 20, 2020 from https://www.jcs.mil/Portals/36/Documents/Doctrine/MECC2019/jcs_vision_pme_tm_draft.pdf?ver=2019-10-17-143200-470

[8] Darwin, C. (1859). The Origin of Species by Means of Natural Selection. Reprinted in 1957. New York: Random House.

[9] Schmidt, T. (2013). “Design, Mission Command, and the Network: Enabling Organizational Adaptation.” The Land Warfare Papers. No 97. August. Retrieved April 20, 2020 from https://ausa.org/files/design-mission-command-and-networkpdf

[10] Pierce, J. (2010). “Is the Organizational Culture of the U.S. Army Congruent with the Professional Development of Its Senior Level Officer Corps?” The Letort Papers. September. Retrieved April 20, 2020 from https://publications.armywarcollege.edu/pubs/2097.pdf

[11] Department of Justice. (2020). “Harvard University Professor and Two Chinese Nationals Charged in Three Separate China Related Cases.” Press Release. Retrieved April 20, 2020 from https://www.justice.gov/opa/pr/harvard-university-professor-and-two-chinese-nationals-charged-three-separate-china-related

[12] Gill, I. (2020). “Whoever leads in artificial intelligence in 2030 will rule the world until 2100.” Brookings Institute. Retrieved April 20, 2020 from https://www.brookings.edu/blog/future-development/2020/01/17/whoever-leads-in-artificial-intelligence-in-2030-will-rule-the-world-until-2100

2020 - Contest: Civil Affairs Association Writing Contest Civil Affairs Association Mindset Option Papers Todd Schmidt United States

U.S. Aircraft Basing Options in Competition and Conflict with China

Editor’s Note:  This article is part of our Below Threshold Competition: China writing contest which took place from May 1, 2020 to July 31, 2020.  More information about the contest can be found by clicking here.


Captain Walker D. Mills is a Marine infantry officer. He is currently serving as an exchange officer with the Colombian Marine Corps. He is also pursuing an MA in international relations and contemporary war from King’s College London.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


National Security Situation:  The U.S. and China are competing below the threshold of armed conflict and trying to best position themselves should conflict occur.  One area of competition focuses on Chinese rockets and missiles, and their potential use against U.S. aviation facilities.

Date Originally Written:  March 3, 2020.

Date Originally Published:  May 27, 2020.

Author and / or Article Point of View:  The author is an active-duty military member with a stake in potential future competition and conflict with China in the Pacific. The options are presented from the point of view of the United States.

Background:  In recent decades, the People’s Liberation Army within the People’s Republic of China has invested heavily in conventional cruise and ballistic missiles of several types. Today the People’s Liberation Army Rocket Force has thousands of missiles with ranges of up to 2,000 kilometers[1]. Their rocket force is among the premier in the world – U.S. and Russian militaries have not kept pace with Chinese missile development and deployment because, until recently, they were constrained by the Intermediate-Range Nuclear Forces Treaty (INF).

Chinese missiles are more than capable of targeting fixed U.S. bases and ships. A recent Center for New American Security report noted that “…a preemptive missile strike against the forward bases that underpin U.S. military power in the Western Pacific could be a real possibility” and named it “the greatest military threat” to U.S. interests in Asia[2]. Analysis of images from missile ranges in the Gobi Desert indicates that the primary targets for these missiles are U.S. aircraft carriers and fixed aviation facilities like airplane hangers and runways[3]. The missiles have repeatedly been highlighted in military parades and are the cornerstone of the PLA’s capability to defeat and deter U.S. military action in the South and East China Seas and their anti-access, area-denial network[4].

Significance:  The increasing threat from Chinese missiles will prevent U.S. forces from being able to credibly threaten the use of force in the seas around China and the First Island Chain because of the extreme risk to U.S. bases and large ships. Without the credible ability to employ force in support of foreign policy objectives in the region, the U.S. may be unable to fulfill treaty obligations to allies in the region and will cede one of its primary tools for competition and foreign policy. The capability to credibly threaten the use of force is the cornerstone of U.S. deterrence in the region.

Option #1:  The United States can embark on a multi-national, multi-agency effort to build dual-use aviation facilities across the First Island Chain. Because the most of the First Island Chain is comprised of U.S. treaty allies, the U.S. can work with allies and partners to rapidly construct a large number of runways and aviation facilities for civilian and military use by foreign partners, which would become available for U.S. military use in the event of a conflict. There are also dozens if not hundreds of derelict runways from the Second World War across the First Island Chain that could be renovated at lower cost than new construction.

Risk:  Such a building program would be expensive, and would have to significantly increase the number of available airfields to achieve the desired effect. This option is also contingent up U.S. partners and allies accepting the U.S. construction programs and the proliferation of airfields on their sovereign territory which may face local political resistance. There is also a risk that this option could spur an arms race with China or spur increased missile development.

Gain:  A significant proliferation of dual-use runways in the First Island Chain would complicate Chinese targeting and force the PLA to spread out their missiles across many more targets, limiting their effectiveness. This building plan would also serve as a type of foreign aid – is it a non-confrontational approach to competition with China and would be a gift to our partners because the airfields and support facilities would be intended for partner use and civilian use in times short of armed conflict.

Option #2:  The U.S. can invest in amphibious aircraft that do not need to operate from runways. Legacy U.S. amphibious aircraft like the PBY-Catalina, also call the ‘Flying Boat’ and the Grumman Albatross were highly effective as utility transports, search and rescue, and maritime patrol craft during the Second World War into the 1980s in the case of the Albatross. These aircraft are capable of operating from conventional runways or directly from the sea – which makes strikes on runways and traditional aviation facilities ineffective towards preventing their operation. These planes are able to operate from any coastal area or inland waterway. Other militaries in the region including the Chinese, Russian and Japanese are already modernizing and upgrading their respective fleets of amphibious aircraft.

Risk:  The risk to this option is that reinvestment in amphibious aircraft could be expensive for the U.S. military or too much of a burden for a niche capability. The risk is also that amphibious aircraft are not capable of performing the necessary roles or do not posses the necessary capabilities for operations in against a peer-adversary like China. There is also a risk that this option could spur an arms race with China or spur increased missile development.

Gain:  The advantage of this option is that it mitigates the risk to U.S. aircraft in the First Island Chain by creating a reserve of aircraft not tied to easily targeted, fixed-bases. Also, amphibious aircraft can be deployed worldwide – and are relevant beyond East Asia. This option does not depend on allies or partners and the capability to operate from the water can be employed in any theater, against any threat, not just in the Pacific.

Other Comments:  Other types of unconventional aircraft may also be considered for development and acquisition. Wing-in-Ground-Effect vehicles can function like aircraft and operate completely from the water and aircraft with vertical takeoff and landing capability can also be employed without traditional runways though struggle with logistics and maintenance in austere environments.

Recommendation:  None.


Endnotes:

[1] RAND Corporation. (2017). The U.S. – China Military Scorecard. Retrieved from https://www.rand.org/content/dam/rand/pubs/research_reports/RR300/RR392/RAND_RR392.pdf.

[2] Shugart, Thomas. (2017). First Strike: China’s Missile Threat to US Bases in Asia. Retrieved from https://www.cnas.org/publications/reports/first-strike-chinas-missile-threat-to-u-s-bases-to-asia.

[3] DeFraia, Daniel. (2013). China tests DF-21D missile on mock US aircraft carrier in Gobi Desert. Agence France-Presse. Retrived from https://www.pri.org/stories/2013-01-30/china-tests-df-21d-missile-mock-us-aircraft-carrier-gobi-desert.

[4] RT. (2015, September 3). China’s V-Day military parade in Beijing 2015 [Video File]. Retrieved from https://www.youtube.com/watch?v=YoC0Xcjko0A&sns=em.

2020 - Contest: PRC Below Threshold Writing Contest A2AD (Anti Access and Area Denial) Air Forces Artillery / Rockets/ Missiles China (People's Republic of China) Competition Option Papers United States Walker D. Mills

Options for a United States Counterterrorism Strategy in Africa

Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He can be found on Twitter @DAOlawuyi. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


National Security Situation:  United States counterterrorism operations in Africa.

Date Originally Written:  April 10, 2020.

Date Originally Published:  May 4, 2020.

Author and / or Article Point of View:  The article is written from the point of view of the United States National Security Adviser.

Background:  In a speech before the Heritage Foundation[1], former National Security Adviser, Ambassador John Bolton, outlined a new Africa policy. This policy focused on countering the rising influence of China and by extension, other strategic competitors[2]. As great power competition returns to the fore, Africa is another battlefront between East and West. With vast mineral resources and a growing market, a new scramble for Africa has emerged between dominant and emerging powers. However, as military might has decimated violent Islamist groups in the Middle East, their subsidiaries in Africa have flourished. Groups like Islamic State for West Africa, Al-Shabaab, Al-Qaeda in the Islamic Maghreb, and Ansar al-Sunna have capitalized on local government failings to entrench themselves. In recent days, they have carried out spectacular attacks on local government forces in Nigeria, Chad, Mali and Mozambique[3]. Although the involved governments and their allies have responded forcefully, it is clear that stability won’t be established in the near-term.

Significance:  The United States, United Kingdom, France, Turkey, Russia and China have deployed military assets in various parts of the African continent. The majority of these forces are focused on countering violent Islamist groups. While U.S. foreign policy concerning Africa focuses on achieving American strategic goals on the continent[4], it also takes into consideration the need to address the various local conflicts that threaten the security of investments and viability of governments. For the foreseeable future, any foreign policy towards Africa will need a robust counter terrorism component.

Option #1:  The U.S. military increases its footprint in Africa with conventional forces.

Risk:  This will widen America’s forever wars without guaranteeing success, stretching the already limited resources of the armed forces. While there is currently bipartisan support for continued engagement with Africa[5], it is doubtful that such backing will survive a prolonged intervention with significant losses. This option will also require the expansion of the United States Africa Command Staff at the operational level. Finally, moving the headquarters of the command onto the African continent despite the public opposition of prominent countries will be reexamined[6].

Gain:  The presence of significant U.S. forces embedded with combat troops has proven to improve the combat performance of local forces[7]. By providing advisers, reconnaissance assets, and heavy firepower, the U.S. will boost the morale of the fighting forces and provide them with freedom of action. The counter Islamic State campaign in Iraq and Syria can serve as a template for such operations. Such deployment will also allow U.S. assets to monitor the activities of competitors in the deployed region.

Option #2:  The U.S. expands the scale and scope of special operations units on the African continent.

Risk:  The absence of U.S. or similarly capable conventional forces on the ground to provide combined arms support limits and their effectiveness. While special operations units bring unique abilities and options, they cannot always substitute for the punching power of appropriately equipped conventional troops. The United States, sadly, has a history of insufficiently resourced missions in Africa suffering major losses from Somalia[8][9] to Niger[10].

Gain:  Special operations units are uniquely positioned to work with local forces. Historically, unconventional warfare and foreign internal defense has been the responsibility of units like the U.S. Army Special Forces[11]. Combined with units like the Army Rangers dedicated to conduct raids and enhancing operational security, it will allow the United States to put pressure on violent groups while mentoring and leading local forces to fulfill their security needs. It will also increase the number of assets available to meet emergencies.

Option #3:  The United States limits its role to advising and equipping local forces.

Risk:  Despite American support for African states, the security situation in Africa has continued to deteriorate. Decades of political instability and maladministration has created disgruntled populations will little loyalty to their countries of birth. Their militaries, regarded as blunt instruments of repression by civilians, lack the credibility needed to win hearts and mind campaigns critical to counter-insurgences. The supply of U.S. weapons to such forces may send the wrong signal about our support for prodemocracy movements on the continent.

Gain:  This option will fit with the current posture of the United Africa Command of enabling local actors mainly through indirect support[12]. The is a low cost, low risk approach for the U.S. military to build relationships in a part of the world where the armed forces continues to be major power brokers in society. This option keeps our forces away from danger for direct action.

Other Comments:  It is critical to acknowledge that any military campaign will not address the underlying problems of many African states. The biggest threats to African countries are maladministration and political instability. The United States has traditionally been a model and pillar of support for human rights activists, democratic crusaders and governance reformers. A United States push to ensure that bad actors cannot take advantage of security vacuums caused by a failure of governance while providing support for those looking to deliver society’s benefits to majority of their fellow citizens, would likely contribute to U.S. foreign policy goals.

Recommendation:  None.


Endnotes:

[1] Bolton, J. (2018, December 13). Remarks by National Security Advisor John Bolton on the Trump Administration’s New Africa Strategy. Retrieved April 11 from
https://www.whitehouse.gov/briefings-statements/remarks-national-security-advisor-ambassador-john-r-bolton-trump-administrations-new-africa-strategy

[2] Landler, M. and Wong, E. (2018, December 13). Bolton Outlines a Strategy for Africa That’s Really About Countering China. Retrieved April 11 from
https://www.nytimes.com/2018/12/13/us/politics/john-bolton-africa-china.html

[3] Jalloh, A. (2020, April 9). Increased terror attacks in Africa amid coronavirus pandemic. Retrieved April 10 from
https://www.msn.com/en-us/news/world/increased-terror-attacks-in-africa-amid-coronavirus-pandemic/ar-BB12mZWm

[4] Wilkins, S. (2020, April 2). Does America need an African Strategy? Retrieved April 10 from
https://warontherocks.com/2020/04/does-america-need-an-africa-strategy

[5] Gramer, R. (2020, March 4). U.S. Congress Moves to Restrain Pentagon over Africa Drawdown Plans. Retrieved April 11 from
https://foreignpolicy.com/2020/03/04/africa-military-trump-esper-pentagon-congress-africom-counterterrorism-sahel-great-power-competition

[6] (2008, February 18). U.S. Shifts on African base plans. Retrieved April 12 from
http://news.bbc.co.uk/2/hi/africa/7251648.stm

[7] Tilghman, A. (2016, October 24). U.S. troops, embedded with Iraqi brigades and battalions, push towards Mosul’s city center. Retrieved April 10 from
https://www.militarytimes.com/news/your-military/2016/10/24/u-s-troops-embedded-with-iraqi-brigades-and-battalions-push-toward-mosuls-city-center

[8] Lee, M. (2017, September 16). 8 Things We Learnt from Colonel Khairul Anuar, A Malaysian Black Hawk Down Hero. Retrieved April 11 from
https://rojakdaily.com/lifestyle/article/3374/8-things-we-learned-from-colonel-khairul-anuar-a-malaysian-black-hawk-down-hero

[9] Fox, C. (2018, September 24). ‘Black Hawk Down: The Untold Story’ recalls the soldiers the movie overlooked. Retrieved April 11 from
https://taskandpurpose.com/entertainment/black-hawk-down-untold-story-documentary

[10] Norman, G. (2018, March 15). U.S. forces ambushed in Niger again, military says. Retrieved April 11 from
https://www.foxnews.com/us/us-forces-ambushed-in-niger-again-military-says

[11] Balestrieri, S. (2017, August 17). Differences between Foreign Internal Defense (FID) and Counter Intelligence (COIN). Retrieved April 11 from
https://sofrep.com/news/differences-foreign-internal-defense-fid-counter-insurgency-coin

[12] Townsend, S. (2020, January 30). 2020 Posture Statement to Congress. Retrieved April 11 from
https://www.africom.mil/about-the-command/2020-posture-statement-to-congress

Africa Damimola Olawuyi Option Papers Violent Extremism

U.S. Army Options for Professional Military Education Amidst COVID-19

Matt Sardo has served in the U.S. Army Infantry and Special Forces Branches. He is currently separating from Active Duty to attend Berkeley Law School and will remain in the U.S. Army Reserve as a Reserve Officer Training Corps instructor with the Golden Bears Battalion. He can be found on Twitter @MattSardowski. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. Army Permanent Change of Station freeze amidst COVID-19 will challenge the Professional Military Education model.

Date Originally Written:  April 6, 2020.

Date Originally Published:  April 20, 2020.

Author and / or Article Point of View:  The author is an Army Special Forces Branch O3(Promotable) preparing to start a Juris Doctorate at UC Berkeley. The author believes repairing the U.S. civilian-military divide is mission critical to U.S. dominance in a multidomain operating environment.

Background:  The U.S. Army freeze of Permanent Change of Station (PCS) orders presents both challenges and opportunities. The cohort of officers preparing to move their families for Intermediate Level Education (ILE) face an uncertain summer due to the global impact of COVID-19. Competitive officers, most of whom have made the decision to pursue the profession as a career, are funneled to the Army flagship institution at Fort Leavenworth’s Command and General Staff College (CGSC). This situation presents a challenge to the education model the Army has relied upon since George Marshall was a Lieutenant in 1906[1].

A model distributed between U.S. academic institutions and the Army Department of Distance Education (DDE) could both meet Army educational needs and ensure COVID-19 safety precautions are executed. The Army DDE provides Common Core and Advanced Operations Courses remotely. American academic institutions have rapidly developed the digital infrastructure to provide online certificate and degree programs in high-demand technology fields. Both Army remote education infrastructure and civilian institutions provide opportunities to modernize Army education.

Significance:  The civilian-military divide in America has long been studied and analyzed by leading scholars from across society; however, the gap in trust between these two groups is widening[2]. The current challenge faced by the Army Officer Corps presents an opportunity to immerse officers in civilian academic institutions. If operating within Centers for Disease Control and Prevention (CDC) guidance, the Army cannot send it’s cohort of committed career officers to CGSC this summer.

It is difficult to say what the indicator for an all-clear will be during the COVID-19 pandemic outside of an effective vaccination program. Immediate decisions on essential manning, mission priorities, and geopolitical investments will occupy Army senior leaders for the coming weeks and months. The CDC will have a vote on the big decisions and Army leaders are beginning to understand their span of control during this period. Approving PCS orders for officers and their families will violate CDC guidance, and the decision space to identify an effective ILE alternative is rapidly shrinking.

The Army has come to the conclusion that its next challenge will be presented by a highly sophisticated, merciless nation-state adversary who will understand Army vulnerabilities better than the Army understands their own. Multi-domain operations (MDO), cyber support to kinetic strikes, and social influence are strong buzz words for modernizing training guidance; however, they do not answer the question of how the Army and the nation’s tech-savvy youth synchronize for those envisioned fictional battlefield effects. Integrating Army officer education with the American network of universities will provide both the needed education as well as interaction between two already socially distanced segments of American society.

Option #1:  Integrate the Army ILE curriculum with innovative universities in order to leverage sought after skills in the officer corps and build relationships with academic institutions. Either leverage local university graduate and certificate options as best as possible within CDC constraints or enroll in online courses with tech-centric institutions. A Fort Hood stationed armor officer attending the DDE Common Core this summer and completing UT Austin’s 33-week Cyber Academy will be prepared to make future resource decisions to integrate fires and effects with social-media based targeting[3]. A group of paratroopers and special operations soldiers from Fort Bragg will grasp the information landscape and agility of private sector procurement through a Duke Digital Media and Marketing Certificate or a University of North Carolina Masters in Business Administration concentration in strategy and consulting[4/5]. These are some of the skills and some of the options available through an integrated approach.

Risk:  The anti-agility voices throughout the Army will identify gaps in various equities from an integrated, localized, and remote ILE option. If university integration is proven valuable during our current time of crisis, the CGSC model may lose some prestige. There will also be risk associated in which universities are sought after for partnership with the DoD, and which universities deny a partnership based on the current civil-military misunderstandings. The risk of inaction may defer a year-group of officers needed in critical leadership positions in the near future.

Gain:  University integration will bring a human dimension of the Army into the civilian classroom. Option #1 will give opportunities for young minds to challenge the perspective of echo-chamber educated combat arms officers. It will provide an option for a current problem that addresses the institutional challenges of MDO from fires and effects, information operations, logistics, and command perspectives. Finally, this option will build a bridge between the Army and academia, and most importantly, it will solve the current PCS problem for summer movers.

Option #2:  Expand the bandwidth of the Army online ILE infrastructure already in place. The CGSC DDE model is an accredited ILE source which can be completed remotely while officers are observing social distancing. It will require a significant investment in digital infrastructure from the DDE; however, the overall cost-savings from CGSC PCS moves will allow investment in course modernization.

Risk:  The Army DDE portal and online interface are outdated, vulnerable to breach, and not equivalent to civilian online learning systems. Reliance on the DDE for the majority of officer ILE will present the system as a cyber target. Additionally, officers will not directly interact with their peers or mentors during a critical phase of professional development that can be achieved if the Army defers admittance for a semester.

Gain:  Investment in modernization of the premier PME institution will force the Army to learn how to develop better online learning systems. The lessons gained can be applied throughout other Army officer and NCO PME curriculums. Trusted relationships can be built with software developers among the tech sector as the traditional defense sector has proven less effective.

Other Comments:  Integrating Army ILE with university curriculums will not solve the civilian-military divide, but U.S. adversaries are watching closely. U.S. adversaries are most concerned by two aspects of American power. The first is the military’s tenacity and the second is the unrestrained innovation potential of American universities. Desegregation of the Army from academia increases the likelihood of future battlefield dominance.

Recommendation:  None.


Endnotes:

[1] Kalic, S. N. (2008). Honoring the Marshall Legacy. Command and General Staff Foundation News, Spring 2008.
https://www.marshallfoundation.org/marshall/wp-content/uploads/sites/22/2014/04/HonoringtheMarshallLegacy_000.pdf

[2] Schake, K. N., & Mattis, J. N. (2016). Warriors and citizens: American views of our military. Stanford, Calif: Hoover Institution Press.

[3] Cyber Academy Certificate Program. (2020, March 17). Retrieved April 6, 2020, from https://professionaled.utexas.edu/cyber-academy-certificate-program

[4] Digital Media & Marketing. (n.d.). Retrieved April 6, 2020, from https://learnmore.duke.edu/certificates/digital_marketing

[5] MBA Concentrations. (n.d.). Retrieved April 6, 2020, from https://onlinemba.unc.edu/academics/concentrations

 

Defense and Military Reform Education Matt Sardo Option Papers

Options to Penetrate Adversary Anti Access / Area Denial (A2/AD) Systems

Major Jeffrey Day is a Royal Canadian Engineer officer currently attending the United States Army School of Advanced Military Studies. He can be found on Twitter @JeffDay27. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  U.S. military Multi Domain Operations (MDO) to Penetrate adversary Anti Access / Area Denial (A2/AD) Systems.

Date Originally Written:  February 27, 2020.

Date Originally Published:  March 20, 2020.

Author and / or Article Point of View:  This article is written from the point of view of the United States military.

Background:  U.S. Army Field Manual 3-0, Operations warns of the potential for near-peer or great power conflict against adversaries who can compete and oppose the United States in all domains and achieve relative advantage either regionally or worldwide[1].  On the other hand, TRADOC Pamphlet 525-3-1 The United States Army in Multi-Domain Operations 2028 implies that if competition and deterrence fail, the Joint Force quickly penetrates and disintegrates (A2/AD) systems and exploits the resulting freedom in order to win[2]. The MDO concept at this time does not include a shaping phase. Field Manual 3-0 describes how “Global Operations to Shape” continue through the joint phases of conflict, but the tasks listed are passive[3].

Significance:  There is a contradiction between these two U.S. Army concepts. If an enemy can compete and oppose the United States across all domains, quickly penetrating and disintegrating the enemy’s A2/AD would be at best extremely costly in resources, effort, and lives, and at worst impossible. The U.S. military relies on having a position of relative advantage in an area which it can exploit to create the conditions to be able to penetrate and disintegrate enemy A2/AD. Achieving that position is essential to the successful application of the MDO concept, but the enemy A2/AD systems can post a threat to U.S. forces and maneuver hundreds of miles from their borders.

Option #1:  The U.S. military conducts shaping operations in the peripheries, exploiting the enemy’s vulnerabilities throughout the global maneuver space, to indirectly weaken A2/AD systems.

The Second World War has several examples of the belligerents exercising this option. Prior to D-Day, the Allies limited German access to weather information through the Greenland campaign. Weather intelligence from Greenland was extremely useful to accurately predict European weather[4]. Rear-Admiral E.H. Smith of the United States Coast Guard organized the Northeast Greenland Sledge Patrol in the fall of 1941. It consisted of Danish and Norwegian trappers and Inuit hired to regularly patrol the East coast of Greenland and report any signs of enemy activity[5]. Through their operations, and other missions, Germany access to quality weather information, and thus their ability to forecast European weather was greatly reduced. U.S. President Eisenhower highlighted the importance of the weather data secured by the Allies and denied to the Axis many years after the war. When President Kennedy asked President Eisenhower why the invasion of Normandy had been successful, Eisenhower’s response was, “Because we had better meteorologists than the Germans![6]” What Eisenhower really meant was that the Allies had better weather data than the Germans, a position of relative advantage which largely came from shaping operations prior to attempting to defeat the Atlantic Wall, which is an historic example of an early A2/AD system. Throughout the history of global war there are campaigns in the peripheries with similar objectives. Examples include Germany attempts to deny British access to middle eastern oil in the Second World War, and the British campaign to secure eastern Indian Ocean sea lines of communication by capturing Madagascar during the Second World War.

Risk:  It took the Allies until 1944 before they set the conditions to attack into northern mainland Europe. U.S. shaping efforts today will also take time, during which the enemy will be able to further prepare their defense or also exploit opportunities in the global maneuver space. Due to their lack of mass, the smaller U.S. forces committed to the peripheries will be vulnerable to an enemy set on retaining their position of advantage.

Gain:  Shaping operations in the peripheries can be useful by:

  • Securing, seizing, or denying access to critical resources
  • Securing, seizing, or denying access to intelligence
  • Defending access to or denying enemy access to strategic lines of communication

By retaining critical capabilities and degrading the enemy’s critical requirements, the United States may be able to force the enemy to rely solely on resources, information, and lines of communication within the enemy’s area of control. If this area of control is continually diminished through the continued execution of peripheral campaigns, the United States will be able to attack in the primary theaters at a time of their choosing and from a position of relative advantage or perhaps even absolute advantage. By weakening the enemy’s A2/AD systems peripherally over a longer period of time, there will be better assessments of their residual capabilities and duration of the weaknesses.

Option #2:  The U.S. military commits resources to ensure technological dominance within specific aspects of domains to permit the Joint Force to quickly penetrates and disintegrates A2/AD.

Through extensive scientific and technical research and development, as well as reliance on technical intelligence to understand the enemies’ capabilities, the United States can ensure that it maintains a position of relative advantage along critical segments of all domains. Option #2 will enable the exploitation of vulnerabilities in enemy A2/AD systems, permitting disruption at key times and locations. Secrecy and operational security will be essential to ensure the enemy is not aware of the U.S. overmatch until it is too late to react.

Risk:  If the enemy is able to counter and minimize the calculated U.S. overmatch through intelligence, superior science, or luck, joint force entry and MDO will fail. It also will be more difficult to assess the impact of actions made to degrade enemy A2/AD systems or the enemy may repair systems before the joint force is able to permanently disintegrate them.

Gain:  This option exploits and does not cede the current technological advantage the United States holds over its competitors. Additionally, it permits the United States to conduct short and decisive operations. Potential enemies will waste resources developing resilient A2/AD systems, with expensive defensive measures protecting all perceived vulnerabilities. To counter these measures, the United States military only has to develop specific specialized capabilities, to penetrate A2/AD at points of their choosing, therefore retaining the initiative.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] U.S. Department of the Army, Army Doctrine Reference Publication (ADRP) 3-0, Operations. (Washington, DC: Government Printing Office, 2017), 13.

[2] TRADOC Pamphlet 525-3-1 – The United States Army in Multi-Domain Operations 2028, December 6, 2018.

[3] The tasks listed in Field Manual 3-0 are: Promoting and protecting U.S. national interests and influence, building partner capacity and partnerships, recognizing and countering adversary attempts to gain positions of relative advantage, and setting the conditions to win future conflicts

[4] C.L Godske and Bjerknes, V, Dynamic Meteorology and Weather Forecasting (Boston: American Meteorological Society, 1957), 536

[5] David Howarth, The Sledge Patrol (New York, NY: The MacMillan Company, 1960), 13.

[6] “Forecasting D-Day,” NASA Earth Observatory, last modified June 5, 2019, accessed October 27, 2019, https://earthobservatory.nasa.gov/images/145143/forecasting-d-day.

A2AD (Anti Access and Area Denial) Jeffrey Day Option Papers United States

Options for a Consistent U.S. Approach to Humanitarian Intervention

Michael D. Purzycki is a researcher, analyst and writer based in Arlington, Virginia.  He is a former communications and media analyst for the United States Marine Corps.  He writes regularly for Charged Affairs (the journal of Young Professionals in Foreign Policy) and Better Angels, and has also been published in Merion West, the Washington Monthly, the Truman National Security Project, and France 24.  He can be found on Twitter at @MDPurzycki and on Medium at https://medium.com/@mdpurzycki.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Genocide, ethnic cleansing, and other forms of mass violence lead to destabilizing refugee flows and constitute humanitarian catastrophes.

Date Originally Written:  February 15, 2020.

Date Originally Published:  February 24, 2020.

Author and / or Article Point of View:  This article is written from the point of view of the United States government.

Background:  The United States’ responses to episodes of mass killing in recent decades have been inconsistent. The U.S. has intervened militarily in Bosnia, Kosovo and Libya. It has declined to intervene in Rwanda, Darfur and Syria (prior to the conflict against the Islamic State). This inconsistency calls into question American moral and geopolitical leadership, and creates an opening for rivals, especially China and Russia, to fill. America’s decision not to respond with military force when Syrian President Bashar al-Assad used chemical weapons against his own people arguably emboldened Assad’s ally Russia.  Following this U.S. non-response Russia sent forces to Syria in 2015 that have committed multiple atrocities, including intentional bombing of hospitals[1]. Meanwhile, massive flows of refugees from Syria, as well as from other Middle Eastern and African countries, have destabilized Europe politically, empowering demagogues and weakening European cohesion. Climate change is likely to exacerbate existing conflicts, and make massacres and refugee flows more common[2].

Significance:  From a strategic perspective, sudden massive inflows of refugees destabilize allies and weaken host country populations’ confidence in international institutions. From a moral perspective, the refusal of the U.S. to stop mass killing when it is capable of doing so threatens American moral credibility, and afflicts the consciences of those who could have intervened but did not, as in Rwanda[3]. From a perspective that is both strategic and moral, non-intervention in cases where U.S. and allied force can plausibly halt massacres, as in Bosnia before August 1995, makes the U.S. and its allies look weak, undermining the credibility of the North Atlantic Treaty Organization and other security institutions[4].

Option #1:  The U.S. adopts a policy of humanitarian intervention during mass violence.

The U.S. government could adopt a de facto policy of intervening in humanitarian crises when it is capable of doing so, and when intervention can plausibly halt mass violence. The policy need not be formalized, stated or written down, but need only be inferred from the actions of the U.S. The U.S. could adopt the following criteria for intervention:

“1. The actual or anticipated loss of life substantially exceeds the lives lost to violence in the United States.
2. The military operation to stop the massive loss of life would not put at risk anything close to the number of lives it would save.
3. The United States is able to secure the participation of other countries in the military intervention[5].”

Risk:  Even with military units prepared for and devoted to humanitarian intervention, it is possible a successful intervention will require a larger force than the U.S. is able to commit, thus possibly weakening the credibility of U.S. power in humanitarian crises. Commitment of too many units to intervention could harm America’s ability to defend allies or project power elsewhere in the world. An unsuccessful intervention, especially one with a large number of American casualties, could easily sour the American public on intervention, and produce a backlash against foreign commitments in general.

Gain:  Intervention can halt or reduce destabilizing refugee flows by ending mass killing. It can also help guarantee American moral leadership on the world stage, as the great power that cares about humanity especially if contrasted with such atrocities as Chinese abuse of Uighurs or Russian bombing of Syrian hospitals. The saving of lives in a humanitarian intervention adds a moral benefit to the strategic benefits of action.

Option #2:  The U.S. adopts a policy of non-intervention during mass violence.

The U.S. could refuse to intervene to halt atrocities, even in cases where intervention is widely believed to be able to stop mass violence. Rather than intervening in some cases but not others, as has been the case in the last three decades, or intervening whenever possible, the U.S. could be consistent in its refusal to use force to halt genocide, ethnic cleansing, or other atrocities. Absent a formal declaration of atrocity prevention as a vital national security interest, it would not intervene in such conflicts.

Risk:  A policy of non-intervention risks bringing moral condemnation upon the United States, from the international community and from portions of the U.S. population. The U.S. risks surrendering its moral position as the world’s most powerful defender of liberal values and human rights. Furthermore, refugee flows from ongoing conflicts threaten to further destabilize societies and reduce populations’ trust in liberal democracy and international institutions.

Gain:  Non-intervention lowers the risk of U.S. military power being weakened before a potential conflict with China, Russia, Iran or North Korea. This option helps the U.S. avoid charges of inconsistency that result from intervention in some humanitarian crises but not others. The U.S. could choose to ignore the world’s condemnation, and concern itself purely with its own interests. Finally, non-intervention allows other countries to bear the burden of global stability in an increasingly multi-polar age, an age in which U.S. power is in relative decline.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Hill, Evan and Christiaan Triebert. “12 Hours. 4 Syrian Hospitals Bombed. One Culprit: Russia.” New York Times, October 13, 2019. https://www.nytimes.com/2019/10/13/world/middleeast/russia-bombing-syrian-hospitals.html

[2] “Climate Change Could Force Over 140 Million to Migrate Within Countries by 2050: World Bank Report.” World Bank, March 19, 2018. https://www.worldbank.org/en/news/press-release/2018/03/19/climate-change-could-force-over-140-million-to-migrate-within-countries-by-2050-world-bank-report

[3] Power, Samantha. “Bystanders to Genocide.” Atlantic, September 2001. https://www.theatlantic.com/magazine/archive/2001/09/bystanders-to-genocide/304571

[4] Daalder, Ivo H. “Decision to Intervene: How the War in Bosnia Ended.” Brookings Institution, December 1, 1998. https://www.brookings.edu/articles/decision-to-intervene-how-the-war-in-bosnia-ended

[5] Solarz, Stephen J. “When to Go in.” Blueprint Magazine, January 1, 2000. https://web.archive.org/web/20070311054019/http://www.dlc.org/ndol_ci.cfm?contentid=1126&kaid=124&subid=158

Mass Killings Michael D. Purzycki Option Papers United States

U.S. Options to Combat Chinese Technological Hegemony

Ilyar Dulat, Kayla Ibrahim, Morgan Rose, Madison Sargeant, and Tyler Wilkins are Interns at the College of Information and Cyberspace at the National Defense UniversityDivergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  China’s technological rise threatens U.S. interests both on and off the battlefield.

Date Originally Written:  July 22, 2019.

Date Originally Published:  February 10, 2020.

Author and / or Article Point of View:  This article is written from the point of view of the United States Government.

Background:  Xi Jinping, the Chairman of China’s Central Military Commission. affirmed in 2012 that China is acting to redefine the international world order through revisionist policies[1]. These policies foster an environment open to authoritarianism thus undermining Western liberal values. The Chinese Communist Party (CCP) utilizes emerging technologies to restrict individual freedoms of Chinese citizens, in and out of cyberspace. Subsequently, Chinese companies have exported this freedom-restricting technology to other countries, such as Ethiopia and Iran, for little cost. These technologies, which include Artificial Intelligence-based surveillance systems and nationalized Internet services, allow authoritarian governments to effectively suppress political dissent and discourse within their states. Essentially monopolizing the tech industry through low prices, China hopes to gain the loyalty of these states to obtain the political clout necessary to overcome the United States as the global hegemon.

Significance:  Among the technologies China is pursuing, 5G is of particular interest to the U.S.  If China becomes the leader of 5G network technologies and artificial intelligence, this will allow for opportunities to disrupt the confidentiality, integrity, and availability of data. China has been able to aid regimes and fragmented democracies in repressing freedom of speech and restricting human rights using “digital tools of surveillance and control[2].” Furthermore, China’s National Security Law of 2015 requires all Chinese tech companies’ compliance with the CCP. These Chinese tech companies are legally bound to share data and information housed on Chinese technology, both in-state and abroad. They are also required to remain silent about their disclosure of private data to the CCP. As such, information about private citizens and governments around the world is provided to the Chinese government without transparency. By deploying hardware and software for countries seeking to expand their networks, the CCP could use its authority over domestic tech companies to gain access to information transferred over Chinese built networks, posing a significant threat to the national security interests of the U.S. and its Allies and Partners. With China leading 5G, the military forces of the U.S. and its Allies and Partners would be restricted in their ability to rely on indigenous telecoms abroad, which could cripple operations critical to U.S. interests [3]. This risk becomes even greater with the threat of U.S. Allies and Partners adopting Chinese 5G infrastructure, despite the harm this move would do to information sharing with the United States.

If China continues its current trajectory, the U.S. and its advocacy for personal freedoms will grow increasingly marginal in the discussion of human rights in the digital age. In light of the increasing importance of the cyber domain, the United States cannot afford to assume that its global leadership will seamlessly transfer to, and maintain itself within, cyberspace. The United States’ position as a leader in cyber technology is under threat unless it vigilantly pursues leadership in advancing and regulating the exchange of digital information.

Option #1:  Domestic Investment.

The U.S. government could facilitate a favorable environment for the development of 5G infrastructure through domestic telecom providers. Thus far, Chinese companies Huawei and ZTE have been able to outbid major European companies for 5G contracts. American companies that are developing 5G infrastructure are not large enough to compete at this time. By investing in 5G development domestically, the U.S. and its Allies and Partners would have 5G options other than Huawei and ZTE available to them. This option provides American companies with a playing field equal to their Chinese counterparts.

Risk:  Congressional approval to fund 5G infrastructure development will prove to be a major obstacle. Funding a development project can quickly become a bipartisan issue. Fiscal conservatives might argue that markets should drive development, while those who believe in strong government oversight might argue that the government should spearhead 5G development. Additionally, government subsidized projects have previously failed. As such, there is no guarantee 5G will be different.

Gain:  By investing in domestic telecommunication companies, the United States can remain independent from Chinese infrastructure by mitigating further Chinese expansion. With the U.S. investing domestically and giving subsidies to companies such as Qualcomm and Verizon, American companies can develop their technology faster in an attempt to compete with Huawei and ZTE.

Option #2:  Foreign Subsidization.

The U.S. supports European competitors Nokia and Ericsson, through loans and subsidies, against Huawei and ZTE. In doing so, the United States could offer a conduit for these companies to produce 5G technology at a more competitive price. By providing loans and subsidies to these European companies, the United States delivers a means for these companies to offer more competitive prices and possibly outbid Huawei and ZTE.

Risk:  The American people may be hostile towards a policy that provides U.S. tax dollars to foreign entities. While the U.S. can provide stipulations that come with the funding provided, the U.S. ultimately sacrifices much of the control over the development and implementation of 5G infrastructure.

Gain:  Supporting European tech companies such as Nokia and Ericsson would help deter allied nations from investing in Chinese 5G infrastructure. This option would reinforce the U.S.’s commitment to its European allies, and serve as a reminder that the United States maintains its position as the leader of the liberal international order. Most importantly, this option makes friendlier telecommunications companies more competitive in international markets.

Other Comments:  Both options above would also include the U.S. defining regulations and enforcement mechanisms to promote the fair usage of cyberspace. This fair use would be a significant deviation from a history of loosely defined principles. In pursuit of this fair use, the United States could join the Cyber Operations Resilience Alliance, and encourage legislation within the alliance that invests in democratic states’ cyber capabilities and administers clearly defined principles of digital freedom and the cyber domain.

Recommendation:  None.


Endnotes:

[1] Economy, Elizabeth C. “China’s New Revolution.” Foreign Affairs. June 10, 2019. Accessed July 31, 2019. https://www.foreignaffairs.com/articles/china/2018-04-17/chinas-new-revolution.

[2] Chhabra, Tarun. “The China Challenge, Democracy, and U.S. Grand Strategy.” Democracy & Disorder, February 2019. https://www.brookings.edu/research/the-china-challenge-democracy-and-u-s-grand-strategy/.

[3] “The Overlooked Military Implications of the 5G Debate.” Council on Foreign Relations. Accessed August 01, 2019. https://www.cfr.org/blog/overlooked-military-implications-5g-debate.

Artificial Intelligence / Machine Learning / Human-Machine Teaming China (People's Republic of China) Cyberspace Emerging Technology Ilyar Dulat Kayla Ibrahim Madison Sargeant Morgan Rose Option Papers Tyler Wilkins United States

Options for a Joint Support Service

Lieutenant Colonel Jason Hughes has served in roles from Platoon Leader to the Joint Staff with multiple combat deployments to Iraq and operational deployments to Africa and Haiti.  He is presently the Commander of 10th Field Hospital, a 148 bed deployable hospital.  He can be found on Twitter @medical_leader, manages the Medical Service Corps Leader Development Facebook page, and writes for The Medical Leader.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  “The Department of Defense will reform its business practices to gain the full benefit of every dollar spent, and to gain and hold the trust of the American people. We must be good stewards of the tax dollars allocated to us. Results and accountability matter[1].” – Former Secretary of Defense James N. Mattis

Date Originally Written:  December 24, 2019.

Date Originally Published:  February 3, 2020.

Author and / or Article Point of View:  The author believes that without dynamic modernization solutions the DoD will be unable to sharpen the American Military’s competitive edge and realize the National Defense Strategy’s vision of a more lethal, resilient, and rapidly innovating Joint Force. While DoD’s strategic guidance has evolved, its force structure has not.

Background:  Common support roles across the military create redundant overhead, separate doctrines, equipment and force designs, development and acquisition processes, and education and recruiting programs. Resources are scarce, yet organizations within DoD compete against each other developing three of everything when the DoD only requires one joint capability to support the operational requirement.

The Department’s sloth-like system and redundant capabilities across services create an opportunity for change. Reform and efficiencies realized in manpower, resources, and overhead cost directly support Lines of Effort One and Three of the National Defense Strategy[2]. Consolidation efforts could realize a 20-40% overhead[3], training, and equipment savings while providing the Joint Force access to low density, high demand capabilities.  Each Armed Service recruits, trains, and educates; develops policy, doctrine, and equipment; and manages careers separately for similar requirements. A review of similar capabilities across the services illustrates 16 commodities that could possibly be consolidated:

  • Human Resources
  • Logistics
  • Engineering
  • Communications
  • Intelligence
  • Medical
  • Cyber
  • Public Affairs
  • Religious
  • Finance
  • Contracting
  • Legal
  • Military Police / Criminal Investigation Forces
  • Chemical, Biological, Radiological, Nuclear
  • Operations Research/Systems Analysis
  • Modeling and Simulations

Significance:  Similar reform efforts – health care transition from the services to the Defense Health Agency – have or will produce significant savings and efficiencies. Dollars saved focus scarce resources on combat readiness and lethality at the tip of the spear.

Option #1:  The DoD establishes a separate Armed Service focused on Joint Support.

The commodities listed above are consolidated into a separate Joint Support Service with Title 10 authorities commensurate with line requirements. The line (other Services) provides the requirement and “buys” what they need. This system is similar to the United States Marine Corps (USMC) relationship with the U.S. Navy (USN) regarding medical support. In this relationship the USMC defines their requirement and “buys” the commodity from the USN.

Risk:  Armed Service requirements documents are esoteric and do not allow the Joint Support Service to plan for force structure and requirements to meet those concepts.

Gain:  Option #1 ensures commonality and interoperability for the Joint Force (e.g., one scalable Damage Control Surgery set versus 8-10 service sets; fuel distribution systems that can support all forces; management of low density, high demand assets (Trauma Surgeons, Chaplains etc)).

Option #2:  The DoD pursues “Pockets of Excellence.”

The commodities listed above are centralized into a single existing Armed Service. The Secretary of Defense would redesign or select an Armed Service to manage a commodity, removing it from the other Armed Services. The lead Armed Service for a specific commodity then produces capacity that meets other Armed Service’s operational demands while building capability, doctrine, equipment, education and recruiting center of excellence for that commodity.

Risk:  The Armed Services, with resident expertise in specific commodities may impose their doctrine on other services instead of building a true joint capability that supports line operations across multiple Armed Services.

Gain:  The Armed Services are more likely to support this effort if they receive the manpower and appropriations increasing their bottom line.

Option #3:  Hybrid.

Each Armed Service develops commodity talent at the junior officer / Non-Commissioned Officer level much like today. This talent transfers into the Joint Support Service, providing support at “Echelons above Brigade,” later in their career.

Risk:  This option increases overhead in the Department by building a Joint Support Force without eliminating existing Armed Service requirements.

Gain:  This option would create a Joint Support Force that brings understanding of Armed Service systems, culture, and requirements.

Other Comments:  Lethality requires a support force organized for innovation that delivers performance at the speed of relevance, commensurate with line operational requirements, using a global operating model. The Armed Services hurt themselves by competing within the DoD. This competing leaves the overall DoD unable to produce a streamlined force using rapid, iterative approaches from development to fielding, that directly supporting the defeat of U.S. enemies, while protecting the American people and their vital interests at a sustainable cost to the taxpayer.

Recommendation:  None.


Endnotes:

[1] Mattis, J. N. (2018, January 19). Remarks by Secretary Mattis on the National Defense Strategy. Retrieved from https://www.defense.gov/Newsroom/Transcripts/Transcript/Article/1420042/remarks-by-secretary-mattis-on-the-national-defense-strategy/

[2] LOE 1: Rebuilding Military Readiness as we build a more lethal Joint Force; LOE 2: Reform the Department’s business practices for greater performance and affordability.

[3] German military reform forecasted a reduced total force by 18% while tripling the readiness force availability to support crisis management deployments. Larger cost savings should be expected in a force that is much larger than the German military. https://www.nytimes.com/2010/12/30/opinion/30thu2.html

 

 

Budgets and Resources Capacity / Capability Enhancement Defense and Military Reform Jason Hughes Option Papers United States

Options for Deterrence Below Armed Conflict

James P. Micciche is an Active Component U.S. Army Civil Affairs Officer with deployment and service experience in the Middle East, Africa, Afghanistan, Europe, and Indo-Pacific. He is currently a Master’s candidate at the Fletcher School of Law and Diplomacy at Tufts University.  He can be found on Twitter @james_miccicheDivergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As military competition below armed conflict once again becomes the norm, the U.S. requires deterrence options.

Date Originally Written:  November 17, 2019.

Date Originally Published:  December 23, 2019.

Author and / or Article Point of View:  The author believes that traditional nuclear deterrence will not suffice in the current national security paradigm as it is focused on mainly deterring nuclear war or major conflict, which are the least-likely situations to occur.

Background:  In June 2019, the United States Military’s Joint Staff published Joint Doctrine Note (JDN) 1-19 “The Competition Continuum.”  The JDN further developed and refined the non-linear/non-binary continuum that defines the perpetual state of competition that exists between nations .  This perpetual state of competition was originally proposed in the “Joint Concept for Integrated Campaigning (JCIC)[1].” Within the JDN continuum the Joint Force, in conjunction with other elements of national power (diplomacy, economic, information, etc.), simultaneously campaigns through a combination of cooperation, competition below armed conflict, and armed conflict to achieve desired strategic objectives including deterring actions and goals of rival states. The continuum represents a shift in U.S. military doctrine from a counterterrorism-centric security strategy to one focused on competing with a spectrum of international agents and actors.

Significance:  While not an authoritative document, JDNs generate and facilitate the creation and revision of joint and service specific doctrine. Therefore, the continuum proposed by the JDN will be integrated and operationalized by planners and doctrine writers across the Department of Defense (DoD). Within the JDN’s continuum, competition below armed conflict is not only the aspect that most regularly occurs, but also the most challenging for the DoD to operationalize. The JDN further refines the JCIC language by describing campaigning through competition below armed conflict as a protracted, constrained, often imbalanced, and diverse construct predicated upon a deep understanding of the operating environment where the joint force seeks to execute three newly codified tactical tasks: Enhance, Manage, and Delay.  Despite clarifying the language of competition below armed conflict, the JDN fails to provide concrete examples of the concepts implementation to include the Joint Force’s role in deterrence which is vaguely described “Deterrence in competition below armed conflict is similarly nuanced [to deterrence by armed conflict} and perhaps harder to judge[2].”  This paper will provide three options for planners and doctrine writers to employ deterring rivals through competition below armed conflict per the guidance outlined in the JDN and JCIC.

Option #1:  Persistent Presence.

The United States, at the behest of partner nations, overtly deploys conventional ground forces to key strategic regions / locations to prevent aggressive incursions from rival states in fear of causing U.S. casualties and invoking a potential kinetic response. This same principle is applied to the regular exercise of freedom of navigation though global commons that are considered vital to U.S. interests.

Risk:  Conventional U.S. force presence adjacent to competitor nations potentially escalates tensions and greatly increases the risk of armed conflict where U.S. personnel forward potentially face overwhelming force from a near peer competitor. The logistical and personnel requirements to deploy conventional forces forward are high and can lead partner nations to become overly dependent on U.S. forces thus creating enduring U.S. expenditures. The presence of a large U.S. footprint can facilitate competitor information operations focusing on delegitimizing the efficacy of host nation government / military possibly creating domestic instability, and prompting anti-U.S. sentiment amongst the population.

Gain:  There have been successful historic and contemporary applications of deterrence by presence from a proportionally smaller U.S. force compared to rivals. Examples include U.S. / North Atlantic Treaty Organization forward presence in Europe during the Cold War as part of a successful deterrence strategy against larger Eastern bloc forces and the recent expansion of Turkish, Syrian, and Russian forces into Northern Syria upon the departure of a small footprint of U.S. forces in October of 2019. Presence can also facilitate collaboration and interoperability between U.S. and regional partners supporting the two other elements of the competition continuum cooperation and armed conflict.

Option #2:  Civil Resiliency and Civil Engagement.

Many of the United States’ principal competitors attempt to advance their interests and achieve their objectives through various forms of population-centric warfare that seeks to instigate and capitalize on domestic instability. To deny access to, and mitigate the ability to influence populations needed to advance such a strategy, the Joint Force utilizes Civil Affairs and Psychological Operations capabilities to identify populations tied to key terrain and in conjunction with other elements of national power fosters civil resiliency to malign influence.

Risk:  Fostering civil resiliency in populations vulnerable to or targeted by malign influence operations is a long-term undertaking requiring enduring programming funds and command support to be effective. Assessments of population-centric operations are difficult to quantify making the establishment of measures of performance and effectiveness exceptionally difficult and impeding the understanding of effects of enemy, friendly, and partner actions within the complex system of the human domain.

Gain:  A population-centric engagement strategy facilitates interagency coordination enabling the utilization of multiple elements of national power to counter malign efforts by adversaries and simultaneously propagates U.S. soft power. Civil Affairs and Psychological Operations elements have exceptionally small personnel footprints and low logistical costs and can promote cooperation with host nation counterparts. Military-civil engagement programs and projects often permit personnel to operate in regions and nations where competitors have an established advantage.

Option #3:  Proxies and Regime Fragility.

Today, the United States’ chief competitors and their allies are regimes that are authoritarian in nature[3] and therefore all share the primacy of maintaining regime power as their supreme interest. The Joint Force can exploit this distinctive feature of authoritarianism and utilize clandestinely-supported proxies and / or focused information operations to threaten the domestic stability of autocrats taking actions against U.S. interests.

Risk:  Creating instability comes with many unknown variables and has the potential to produce unwanted secondary effects including expanding conflicts beyond a single nation and engulfing an entire region in war. There remains a long history of the United States equipping and training proxies that later become adversaries. If direct U.S involvement in a proxy conflict becomes publicly known, there could be irreversible damage to the United States’ international reputation degrading comparative advantages in soft power and the information domain.

Gain:  Operating through either a proxy or the information domain provides managed attribution to the Joint Force and increases freedom of maneuver within a normally constrained competition environment to threaten rival leadership in their most vulnerable areas. Working with proxies provides both an easy exit strategy with very few formal commitments and leads to little risk to U.S. personnel.

Other Comments:  The above listed options are not mutually exclusive and can be utilized in conjunction not only with each other but also together with other elements of the competition continuum to achieve an objective of deterring unwanted competitor actions while concurrently promoting U.S interests. The U.S. cannot compete in an omnipresent manner and ts planners would do well to pragmatically choose where and how to compete based on national interests, competitor action/inaction, available resources, and conditions within a competitive environment.

Recommendation:  None.


Endnotes:

[1] Joint Chiefs of Staff (2018) Joint Concept for Integrated Campaigning. Retrieved from https://www.jcs.mil/Portals/36/Documents/Doctrine/concepts/joint_concept_integrated_campaign.pdf?ver=2018-03-28-102833-257

[2] Joint Chiefs of Staff (2019) Competition Continuum (Joint Doctrine Note 1-19). Retrieved from https://www.jcs.mil/Portals/36/Documents/Doctrine/jdn_jg/jdn1_19.pdf?ver=2019-06-10-113311-233

[3] The Economist Intelligence Unit (2018). 2018 Democracy Index, The Economist Intelligence Unit. Retrieved from https://www.eiu.com/topic/democracy-index

 

 

 

Below Established Threshold Activities (BETA) Deterrence James P. Micciche Option Papers

Union of Soviet Socialist Republics’ Options to Counter the 1941 German Invasion

Timothy Heck is a free-lance editor focusing on military history and national security topics.  An artillery officer by trade, he is working on several projects related to the Red Army during and after the Great Patriotic War.  He can be found on Twitter @tgheck1 Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  On June 22, 1941 Germany invaded the Union of Soviet Socialist Republics (USSR).

Date Originally Written:  August 13, 2019.

Date Originally Published:  October 24, 2019.

Author and / or Article Point of View:  This article is written from the point of view of the Soviet High Command’s (Stavka) options for handling the German invasion of the USSR which began on June 22, 1941.

Background:  On June 22, 1941 German troops in significant strength (at least Army-sized) attacked the border of the Soviet Union in all military districts.  The attacks came as a surprise to the Soviets, in spite of the presence of several operational indicators[1].  At the strategic level, intelligence failed to detect obvious signals of an imminent invasion[2].  Despite intelligence shortcomings, the Soviet Red Army repelled these attacks and defended the Motherland at heavy cost.

On June 23 positional fighting continued with Soviet defenses holding firm in most sectors and making small gains in others.  Today, the Germans are expected to continue attacks in local settings in division-level or below strength.  The Red Army has several options to respond.  Options 1a and 1b are manpower-based decisions while Options 2a and 2b involve combat deployment.  

Significance:  Massed German forces pose an existential threat to the Soviet Union’s security.  German military capability and capacity remain high.  While the German campaign model is of short, aggressive thrusts, a long war would likely involve the destruction of recent Soviet significant economic and social progress made during recent five-year plans. Conversely, failure to destroy the Hitlerites presents a threat to the long-term stability of the USSR.

Option #1a:  The USSR initiates a full military mobilization. 

While reservists in the Kiev and the Western Special Military Districts remain mobilized until autumn 1941, complete mobilization is required for full war.  Mobilization Plan 41 (MP-41) would activate approximately 8.7 million men and women, arrayed in over 300 divisions, which outweighs estimated German strength of approximately 200 available divisions[3].  

Risk: 

Economic:  Full mobilization would result in significant disruption to the Soviet economic base. First, mobilized manpower would be removed from the labor pool, tightening all sectors’ resources. Second, the necessary industrial retooling from peacetime to war material is a long-term detriment of the Soviet economy.  Third, mobilized manpower would be unavailable for the upcoming harvest.  Fourth, as the majority of Soviet economic assets travel via rail lines, their use for mobilized forces will impact delivery of necessary civilian goods, including agricultural products and raw materials.  

Equipment:  Current industrial capacity and military stores are unable to fully equip the mobilized force in the near term.  Furthermore, a full-scale mobilization risks adding excessive use to all items not specifically needed to address the German threat, requiring accelerated replacement and procurement plans. 

Gain: 

Strategic flexibility:  A fully mobilized Red Army provides flexibility without concerns about manpower restrictions should further combat operations become necessary.  MP-41 gives commanders strategic and operational reserves needed for mobile warfare, regardless of whether Option 2a or 2b is selected.

Readiness:  A full-scale mobilization brings all reserve formations to table of organization and equipment strength, allowing commanders to improve individual and collective training levels, and improving combat readiness.

Option #1b:  The USSR initiates a partial military mobilization.

A limited mobilization could be used to replenish losses in forward units, recall specialists to duty, and / or reinforce against potential Japanese aggression in the East.  A limited mobilization would focus on current operational and strategic needs. 

Risk: 

Excessive scope/scale:  Any level of mobilization creates excess manpower to train, administer, and equip.  Given current Red Army shortages, excess personnel risk being underused.  Furthermore, an excessive mobilization shortens service life for items used by excess personnel.  

Inadequate scope/scale:  Inadequate mobilization fails to give the Red Army the manpower needed for either Option 2a or 2b.  Likely, subsequent mobilizations would be required, increasing the complexity of operational-level planning by adding phasing requirements.

Gain:

Planned preparedness:  Recalling selected personnel / units tailors the mobilization to meet current or anticipated needs without creating waste.

Minimized disruption:  The impact on the Soviet economy would be reduced, allowing for continued progress on the Third Five Year Plan and its focus on consumer goods.  Excessive disruption would adversely impact the Soviet citizens’ quality of life.

Option #2a:  The Red Army counterattacks against the German forces.

With the forces currently or soon to be available, launch an immediate counterattack along the East Prussia-Berlin or Prague-Vienna axes[4].  

Risk: 

Material readiness:  While the Red Army possesses approximately 13,000 tanks along the German-Soviet border, many units have limited mobility needed for offensive operations[5].  Many airfields are overcrowded and squadrons displaced as a result of recent re-alignment in the Red Air Force[6].

Japanese involvement:  Given the Japanese-German-Italian alliance, the possibility exists that Japan will declare war against the USSR.  This would necessitate dividing forces to deal with both enemies, a risk compounded if forces are relocated from Siberian and Manchurian districts.

Gain: 

Operational initiative:  Choosing when and where to attack gives the Red Army the operational initiative in support of strategic objectives.

Potential alliance with Western Allies:  An immediate counterattack would align with Western interests and possibly set the conditions for an alliance.  Such an alliance would gain access to Western technologies, intelligence, and equipment while further dividing German attention and strength.  While capitalist states cannot fully be trusted, there exist mutually aligned interests in countering Germany that could be exploited.

Option #2b:  The Red Army maintains current defensive posture along the western border.  

Risk:

Continuing threat:  Without internal political collapse in Germany, the German military threat cannot be removed by a defensive Red Army.  In any war, the most one can hope for when playing defense is a tie.

Unprepared defenses:  Soviet defenses, especially in recently liberated territories, remain vulnerable.  Assuming continued German aggression and nationalist remnants, these territories are at risk of capture by German forces.

Gain:

Flexibility:  Remaining on the strategic defense now does not preclude going onto the offensive at a later date.  Furthermore, the Red Army can rebuild on its chosen timeline and to its desired end state (Option 1a or 1b).  

International support:  By remaining on the defensive rather than waging war on the German forces, including their civilians, the Soviet Union retains moral superiority, furthering the cause of Socialism worldwide.  Given recent Capitalist propaganda during and after the Finnish War, appealing to the League of Nations would advance Soviet interests in the long-term by showing a respect for the organization and giving the appeal a perceived moral grounding.  

Other Comments:  None.

Recommendation:  None. 


Endnotes:

[1] Alexander Hill, The Red Army and the Second World War.  Cambridge: Cambridge University Press, 2019, p. 206.  For more on available indications and warnings, see David M. Glantz and Jonathan M. House, When Titans Clashed: How the Red Army Stopped Hitler. Revised and Expanded Edition. (Lawrence, Kansas: University of Kansas Press, 2015), pp. 48-51.  See also Amnon Sella, “‘Barbarossa’: Surprise Attack and Communication.’” Journal of Contemporary History 13, No. 3 (July, 1978).

[2] Viktor Suvorov, Icebreaker: Who Started World War II? (London: Hamish Hamilton, 1990), pp. 320-321.

 [3] Hill, 198 and 192-3.

 [4] Hill, 196.

 [5] Hill, 199.

[6] See Mikhail Timin and Kevin Bridge, trans. Air Battles Over the Baltic: The Air War on 22 June 1941—The Battle for Stalin’s Baltic Region. Solihull, UK: Helion, 2018.

Germany Option Papers Timothy Heck Union of Soviet Socialist Republics (USSR)

U.S. Options to Respond to North Vietnam’s 1973 Violations of the Paris Peace Accords

Timothy Heck is a free-lance editor focusing on military history and national security topics.  An artillery officer by trade, he lived and worked in Southeast Asia for four years.  He can be found on Twitter @tgheck1.  Josh Taylor is a U.S. Navy Foreign Area Officer and a 2018 Federal Executive Fellow at the Center for Strategic & International Studies.  He is presently Head of International Plans & Policy at Headquarters, U.S. Pacific Fleet at Pearl Harbor, HI.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  In 1973 North Vietnam violated the Paris Peace Accords.

Date Originally Written:  August 12, 2019. 

Date Originally Published:  October 21, 2019.

Article and / or Article Point of View:  This article summarizes some of the options presented by U.S. Secretary of State and National Security Advisor Henry Kissinger, and his Washington Special Actions Group (WSAG), to U.S. President Richard Nixon to address North Vietnamese violations of the Paris Peace Accords in the spring of 1973.  These options are based on realities as they existed on April 18, 1973, the day before the U.S. agreed to another round of talks with North Vietnam in Paris and U.S. Congress Representative Elizabeth Holtzman sued Secretary of Defense Schlesinger to stop the “secret” bombing of Cambodia. Nixon addressed the nation on Watergate on April 30, 1973, effectively closing the door on military options to coerce North Vietnamese compliance.  Included in this article are several errors in judgment common in WSAG or with Kissinger at the time.

Background:  On January 28, 1973, the ceasefire in Vietnam began in accordance with the Agreement on Ending the War and Restoring Peace in Vietnam, also known as the Paris Peace Accords.  Since the ceasefire began, repeated violations of the Accords, specifically Articles 7 and 20, have occurred as a result of North Vietnamese action[1].  At the recent WSAG meetings on April 16-17, 1973, National Security Advisor Dr. Henry Kissinger asked for options on how to address North Vietnamese violations. The WSAG presents the below two options to meet Dr. Kissinger’s desired end state of securing North Vietnamese compliance with the Accords.  

Significance:  The collapsing security in Southeast Asia presents several concerns for American national security.  First, failure to forcefully respond to gross North Vietnamese violations of the Accords makes the U.S. seem impotent, undermines U.S. credibility, and endangers the President’s Peace with Honor goal. Second, unimpeded infiltration of men and equipment into South Vietnam place it at risk in the event of another North Vietnamese general offensive. Third, given the weak governments in Laos and Cambodia, further violations by North Vietnam risk destabilizing those nations with spillover effects on South Vietnam and Thailand. Fourth, any recalcitrance on behalf of North Vietnam risks damaging ongoing U.S. negotiations with the People’s Republic of China (PRC), long known to be their primary patron. 

Option #1:  The U.S. conducts airstrikes against the Ho Chi Minh Trail (HCMT).

Recent North Vietnamese resupply efforts to their forces in South Vietnam offer numerous targets for the resumption of a massive aerial campaign lasting between three to seven days.  These airstrikes would be conducted by the Thailand-based U.S. Support Activities Group/7th Air Force against targets in Laos, Cambodia, and South Vietnam.  Targets along the HCMT in Laos will require strikes against surface-to-air missile sites located near Khe Sanh.

Risk: 

New U.S. Prisoners of War (POW):  With the repatriation of the last American POWs on March 29, 1973, the creation of new POWs resulting from military action would cause a domestic uproar. Such an uproar risks reinvigorating the Administration’s political enemies, jeopardizing other initiatives.

Domestic criticism:  Continued military actions in Indochina fuel growing concerns over continued involvement in Indochina post-Accord.  It is reported that Representative Holtzman (D-NY) will be filing a federal lawsuit over bombing in Cambodia in an effort to stop the President’s efforts there. 

International reprobation:  The Agreement did not specify how violations would be addressed. Though the North Vietnamese bear little political cost for blatant disregard of the Accords, it will damage U.S. international credibility if we do not scrupulously adhere to its articles as we would be seen as violating the ceasefire despite our efforts to enforce it.

United States Air Force (USAF) limitations:  Previous losses during the similar OPERATION LINEBACKER II were significant and wing metal fatigue limits the availability of B-52D bombers. Converting nuclear-capable B-52Gs to conventional B-52Ds is time prohibitive and would reduce strategic readiness[2]. Additionally, the USAF possesses limited stocks of the precision stand-off weapons needed to strike targets on the HCMT (40-55 nautical mile range).

Ceasefires in Laos and Cambodia:  Currently, bombing operations are being conducted in the vicinity of Tha Viang, Laos against a Pathet Lao assault.  While in violation of the ceasefire treaty, the measure is being taken to dissuade further Pathet Lao violations.  Larger bombing operations, however, risk the fragile ceasefires in place or being sought in Laos and Cambodia. 

Gain: 

Signals to North Vietnam:  As Dr. Kissinger stated in his meetings, North Vietnam only respects brutality.  Thus, massive bombing will increase their likelihood of compliance with the Accords.

Demonstrates American power and resolve:  By demonstrating the U.S. is willing to back up its words with force, we reinforce messaging of enduring support to our Allies and Partners.  Importantly in Indochina, bombing demonstrates U.S. commitment to our allies, Nguyen Van Thieu of South Vietnam, Souvanna Phouma of Laos, and Lon Nol of Cambodia, that the U.S. is not cutting off their support after the Accords.  

Attrition of North Vietnamese Supplies & Equipment:  Bombing the HCMT significantly reduces North Vietnamese capacity to launch a general offensive in the short term.  Given the significant disruption the 1972 Easter Offensive created in South Vietnam, diminishing the North Vietnamese capacity for a repeat offensive is crucial to South Vietnamese survival.

Encourages PRC involvement:  The PRC only supports the U.S. when they feel we are unrestrained.  Any escalation of our actions will induce them to compel the North Vietnamese to comply with the terms of the Accords[3].

Option #2:  The U.S. continues negotiations with North Vietnam.

An insolent cable from North Vietnamese foreign minister Le Duc Tho to Dr. Kissinger offered to open another round of talks in Paris on May 15, 1973[4].  Any discussions about ceasefire violations should include all members of the Four Parties (U.S., Republic of Vietnam (South Vietnam), Democratic Republic of Vietnam (North Vietnam), and the Provisional Revolutionary Government (Viet Cong)) so that the diplomatic process is respected.  Significant headway was made during previous negotiations.

Risk:

North Vietnam stalling for time:  Given the recent surge in resupply, this meeting could begin too late given recent Central Intelligence Agency warnings of an imminent North Vietnamese offensive[5]. 

South Vietnamese intransigence:  While the U.S. remains South Vietnamese President Thieu’s staunchest ally and largest benefactor, Thieu may resist returning to negotiations as a means of holding out for additional financial and military aid and support. As he demonstrated in the fall of 1972, he has no qualms about scuttling negotiations that he feels are not in the best interest of his country. South Vietnam must participate if the negotiations are to have any credibility or effect.

Highlights diplomatic weakness:  There is no indication that North Vietnam will adhere to any new agreements any more than it has the original

Gain: 

Supports Peace with Honor:  The U.S. maintains international and domestic support by scrupulously adhering to the Agreement and avoiding additional bloodshed.

Preserves domestic political capital:  This option safeguards Congressional and public support for financial reconstruction assistance to South Vietnam and potentially North Vietnam as part of the Accords.

Military options remain open:  Option #2 discussions do not preclude a future employment of military options and allows time for the reconstitution of the USAF’s conventional bomber fleet.

Other Comments:  President Nixon is slated to address the nation on April 30, 1973 regarding recent developments in the Watergate incident[6].  

Recommendation:  None. 


Endnotes:

[1] Article 7: [T]he two South Vietnamese parties shall not accept the introduction of troops, military advisers, and military personnel including technical military personnel, armaments, munitions, and war material into South Vietnam.  Article 20: The parties participating in the Paris Conference on Vietnam undertake to refrain from using the territory of Cambodia and the territory of Laos to encroach on the sovereignty and security of one another and of other countries. (b) Foreign countries shall put an end to all military activities in Cambodia and Laos, totally withdraw from and refrain from reintroducing into these two countries troops, military advisers and military personnel, armaments, munitions and war material. Agreement on Ending the War and Restoring Peace in Vietnam (Paris, 27 January 1973) https://www.cvce.eu/content/publication/2001/10/12/656ccc0d-31ef-42a6-a3e9-ce5ee7d4fc80/publishable_en.pdf

[2] “Memorandum from the President’s Deputy Assistant for National Security Affairs (Scowcroft) to the President’s Assistant for National Security Affairs (Kissinger),” Washington, April 11, 1973 in FRUS: X, VN, 1973, 188.

[3] “Minutes of Washington Special Actions Group Meeting,” Washington, April 16, 1973, 10:03–11:45 a.m. in FRUS: X, VN, 1973, 196.

[4] “Transcript of Telephone Conversation between President Nixon and the President’s Assistant for National Security Affairs (Kissinger),” Washington, April 21, 1973, 11:40 a.m. in FRUS: X, VN, 1973, 206-207.

[5] “Memorandum from the President’s Deputy Assistant for National Security Affairs (Scowcroft) to the President’s Assistant for National Security Affairs (Kissinger),” Washington, April 11, 1973 in FRUS: X, VN, 1973, 188.

[6] “Address to the Nation about the Watergate Investigations, April 30, 1973” in Public papers of the Presidents of the United States: Richard Nixon, containing the public messages, speeches, and statements of the President by United States and Richard M. Nixon. 1975. Washington: U.S. Govt. Print. Office, 328-333.

Josh Taylor Option Papers Timothy Heck United States Vietnam

Germany’s Options in the First Moroccan Crisis

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which ran from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Rafael Loss is a California-based defense analyst. He can be found on Twitter @_RafaelLoss. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The German Empire was a latecomer to the “Scramble for Africa.” Looking for “a place under the sun,” the first Moroccan crisis in 1905-06 presented an opportunity for Germany to further its colonial ambitions and improve its position among Europe’s great powers.

Date Originally Written:  May 31, 2019.

Date Originally Published:  September 19, 2019.

Author and / or Article Point of View:  The article is written from the point of view of the German Empire under Kaiser Wilhelm II[1]. While representative of the competing views within the German government, the two options presented are somewhat stylized to draw a starker contrast.

Background:  Following the Franco-Prussian war and its unification in 1871, the German Empire was a latecomer to the “Scramble for Africa.” Only in 1890 did it adopt Weltpolitik, seeking possessions abroad and equal status among the European imperial powers. On a visit to Tangier in March 1905, Kaiser Wilhelm II provoked a diplomatic spat by challenging France’s dominance in Morocco. As the crisis escalated, Germany called up reserve units and France moved troops to the German border. In early 1906, a conference in the southern Spanish town of Algeciras sought to resolve the dispute[2].

Significance:  The Entente Cordiale of 1904, a series of agreements between Great Britain and France which saw a significant improvement in their relations, marked a major setback for German efforts, perfected during the Bismarckian period, to manipulate the European balance of power in Berlin’s favor[3]. The Entente not only threatened Germany’s colonial ambitions, but also its predominant position on the European continent—a vital national security interest. The Algeciras conference presented an opportunity to fracture the Franco-British rapprochement. In hindsight, it arguably also offered the best off-ramp for Europe’s diplomats to avert locking in the alignment patterns that contributed to the unraveling of the European order only eight years later.

Option #1:  Germany weakens the Entente by seeking closer relations with France (and Britain). This option required a constructive and conciliatory stance of Germany at Algeciras. (This option is associated with Hugo von Radolin, Germany’s Ambassador to France.)

Risk:  Rebuffing French bilateral overtures, Germany had insisted that a conference settle the Moroccan issue from the beginning of the crisis. Appearing too compromising at Algeciras risked undermining German credibility and status as a great power determined to pursue legitimate colonial interests. Alignment with France (and Britain) also jeopardized Germany’s relations with the Russian and Austro-Hungarian monarchies and could further increase domestic pressure for democratic reform.

Gain:  A successful pursuit of this option promised to alleviate Germany’s security dilemma, located between France to the west and Russia to the east, with the British navy threatening its sea lines of communication. This option would also reduce dependence on Austria-Hungary and Italy, who were seen by some as rather unreliable allies, and could eventually facilitate the emergence of a continental block—with France and Russia—against Britain’s maritime primacy. Moreover, this option could improve relations with the United States, a rising great power and increasingly important player in colonial affairs.

Option #2:  Germany weakens the Entente by pressuring France. This required a bellicose negotiating stance and raising the specter of war to deter Britain from coming to France’s aid. (This option is associated with Friedrich von Holstein, the Political Secretary of the German Foreign Office.)

Risk:  While consistent with Germany’s heretofore assertive opposition to France’s dominance in Morocco, leaning on France too hard at Algeciras risked escalating a peripheral diplomatic dispute to major war in Europe, for which public support was less than certain. It could also precipitate an arms race and alienate the other delegations, especially since Germany had already secured concessions from France, including the dismissal of a disliked foreign minister and the conference itself. Furthermore, it was uncertain whether even a total diplomatic victory for Germany at Algeciras could weaken the Franco-British rapprochement, as the status of the Entente itself was not part of the negotiations, or even strengthen their resolve in the face of German adversity.

Gain:  Successfully pressuring France promised not only greater influence in colonial affairs in North Africa but also exposure of the hollowness of the Entente Cordiale. Without British support for either France or Russia—Britain had sided with Japan during the Russo-Japanese war—Germany’s position on the European continent would improve considerably, particularly since Russia and Germany had discussed a defense treaty the prior year. Separately dealing with the challenges at land and at sea would also make it easier for Germany to contest Britain’s maritime primacy at a convenient time, perhaps even with French support as the end of the Entente might reignite Franco-British competition. Domestically, humiliating France yet again could be expected to increase popular support for the Kaiser and the conservative elites.

Other Comments:  Kaiser Wilhelm II and Chancellor Bernhard von Bülow ultimately instructed their representatives at the conference to pursue Option #2.

With Britain, Italy, Russia, Spain, and the United States siding with France, however, Germany was largely isolated and, at last, had to accept an unsatisfying settlement. Germany’s actions in 1905 and its combative posturing at the conference failed to fracture the Entente[4]. To the contrary, rival blocks began to consolidate which severely limited the room for diplomatic maneuver in subsequent crises. Worsening tensions between Germany, Austria-Hungary, and Italy (Triple Alliance) on the one side and Britain, France, and Russia (Triple Entente) on the other, ultimately led to the outbreak of general war in August 1914.

Recommendation:  None.


Endnotes:

[1] Lepsius, J., Mendelssohn Bartholdy, A., & Thimme, F. (1927). Die grosse Politik der europäischen Kabinette, 1871-1914. Sammlung der diplomatischen Akten des Auswärtigen Amtes: Vols. 20.1 & 20.2. Entente cordiale und erste Marokkokrise, 1904-1905. Berlin, Germany: Deutsche Verlagsgesellschaft für Politik und Geschichte.

[2] Anderson, E. N. (1930). The first Moroccan crisis, 1904-1906. Chicago, IL: University of Chicago Press.

[3] Sontag, R. J. (1928). German foreign policy, 1904-1906. The American Historical Review, 33(2), 278-301.

[4] Jones, H. (2009). Algeciras revisited: European crisis and conference diplomacy, 16 January-7 April 1906 (EUI Working Paper MWP 2009/01). San Domenico di Fiesole, Italy: European University Institute.

2019 - Contest: Small Wars Journal Germany Morocco Option Papers Rafael Loss

Assessment of Nationalism in Bosnia and its Ramifications for Foreign Intervention

Editor’s Note: This article is the result of a partnership between Divergent Options and a course on nationalism at the George Washington University.


Chanson Benjamin recently enlisted in the U.S. Army Reserve as a Psychological Operations Specialist.  He is currently an undergraduate student at The George Washington University.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Nationalism in Bosnia and its Ramifications for Foreign Intervention

Date Originally Written:  August 10, 2019.

Date Originally Published:  September 12, 2019.

Author and / or Article Point of View:  The author recently enlisted in the U.S. Army Reserve. This article is written from the point of view of America towards the Balkans while taking into account other nation building campaigns. 

Summary:  Nationalism is a relevant political force, especially in the Balkans. Under President Josip Broz Tito, Yugoslavia was one nation. Since Tito’s death, ethnic differences, exacerbated by the U.S.-facilitated Dayton Accords, have split the country. These ethnic divisions suggest that nationalist sentiment cannot be replaced immediately with liberal democratic structures but that said structures need to be built up in tandem with economic support. 

Text:  Nationalism is relevant. There is no consensus on what exactly it is, but it is a force that influences, intentionally or otherwise, political discourse and action. It affects the nation, an equally vague term defining some subset of humanity with characteristics made salient by their presence or lack thereof in non-nationals. Nationalism provides a motivator for people to act in a way that subsumes personal identity and interests to those of the collective nation. Nationalism provides an opportunity for collective action by defining an associated identity that the actors can emotionally invest in. This collective action can be harnessed by different groups, but it is first and foremost an opportunity to build up effective, stable states[1]. 

In the Balkans, especially Bosnia-Herzegovina, nationalism is especially relevant because of the current political situation and the history that preceded it. The country is split into two political entities: the Republika Srpska and the Federation of Bosnia and Herzegovina. The former consists mainly of ethnic Serbs while the latter is mostly Croats and Bosniaks. All are Bosnians, reflecting their status as citizens, but many Serbian and Croatian Bosnians feel an ethnic identity linked to the neighboring countries of Serbia and Croatia. The internal political situation is split along these lines, both in terms of parties and in official state structures; for example, the presidency has three members[2].

For much of the Cold War, the country was ruled as part of Yugoslavia by Josip Broz Tito, a Communist strongman. He built up a Yugoslavian national identity based on past glories and a cult of personality. Self-liberation in World War 2 and rejection of Soviet influence in favor of his nationally-oriented socialism were things Yugoslavians could be proud of and invest in simply by having the national identity of Yugoslavia. Tito did not appeal to any of the shared cultural traditions of Bosniaks, Serbs, and Croats because he was more interested in securing his own power than intentionally developing the nation, but by forcibly removing any opposition he ended up unintentionally doing exactly that[3][4].

Tito’s nationalism benefited the people of Yugoslavia by bringing them together as one nation without ethnic violence, and many former citizens still cherish the memory of Tito because of this[5]. Nationalism, by relying on identity markers common across ethnic groups, could bridge the literal Balkanization of the region to create one nation, stable under Tito. This nationalism was dependent on Tito as the face and guarantor of Yugoslavian national identity, so it died with him. However, when he was alive the genuine nationalism he unintentionally cultivated provided a basis for unified collective action and stability. 

After Yugoslavia broke up, the Balkans fell into ethno-nationalist conflict. To stop the violence, American diplomats took leaders from all three sides to Dayton, Ohio where they produced the Dayton Accords: a peace treaty that would define the political structure of modern Bosnia-Herzegovina. By defining the nations as reflective of ethnic identities, the agreement implicitly says nationalism as a motivating force will only act upon ethnic identity rather than one Bosnian identity. There is no Bosnian nationalism under Dayton, because there is no Bosnian nation[6].

The intention was to give ethnicity a role in society somewhere between Titoist repression and the violence that followed it and allow for the controlled venting of ethnic tensions. However, the result of the Dayton Accords is that the three most popular political parties are ethnically defined[7]. Furthermore, the history of the Bosnian War means venting will always have a subtext of real violence. The Bosnian society produced by Dayton is almost too fragmented to function, and nationalism only creates opportunities for dividing the country and promoting instability based on existing ethnic divides. 

Comparing Yugoslavia and Bosnia-Herzegovina, it is apparent that if nationalism is to grant opportunities for stability, a constitutive story must be implemented that unifies all citizens behind a controlled and abstract concept of nationhood. This means there must be some myth, real or imagined, which becomes an important identity marker for nationals. The treatment of ethnicity in the Dayton Accords precludes these identity markers. Nation-building means offering a set of identity markers that have emotional value. Dictators like Tito offer these by definition. Support of the military conjures up imagery of success on the battlefield, incentivizing citizens to buy into the idea of the nation in order to view themselves as winners. Authoritarian rule is perpetuated through a form of selection bias: those who do not buy into the nation are less likely to remain alive. Finally, the dictator serves as a symbol of the nation, seen as a tangible embodiment of all people who are nationals. Lacking this cultivated nationalism, people in an area will fall victim to ethnic or other differences as they did in Yugoslavia and Bosnia after Tito died.

Building a nation in the vacuum left by the fall of an authoritarian dictator demands actively fulfilling national identity markers while effectively promoting economic success. Otherwise, the people of a country will fall into Balkanized nationalist divides based on previously suppressed identity markers, like ethnicity after Tito died. A toppled dictator cannot be replaced by democratic institutions meant to determine who will rule the nation without the cultivation of the nation itself, as an entity congruent with the state and superseding other sub-national cleavages. A dictator can only be replaced by a new and wholeheartedly national identity and the improvement of economic conditions, from which liberal democracy can then arise. 

A nation needs some seed from which its identity grows. World War 2 provided an excellent opportunity for Tito to build up his own myth along with that of Yugoslavia; the Bosnian War and the Dayton Accords both built up national myths of three nations in Bosnia. Once this myth has been identified or manufactured, nationalism provides an opportunity for stability through collective action and through an emotional awareness that a citizen has a national identity shared with all nationals, congruent with a state, and separate from all non-nationals.


Endnotes:

[1] Hechter, M. (2010). Containing Nationalism. Oxford: Oxford University Press.

[2] Hajdari, U., & Colborne, M. (2018, October 12). Why Ethnic Nationalism Still Rules Bosnia, and Why It Could Get Worse. Retrieved August 10, 2019 from https://www.thenation.com/article/why-ethnic-nationalism-still-rules-bosnia-and-why-it-could-get-worse/

[3] Djilas, Aleksa. (1995, July/August). Tito’s Last Secret: How Did He Keep the Yugoslavs Together? Retrieved August 10, 2019 from https://www.foreignaffairs.com/reviews/review-essay/1995-07-01/titos-last-secret 

[4] Gellner, Ernst. (2006). Nations and Nationalism. Cornell: Cornell University Press.

[5] Synovitz, Ron. (2010, May 4). Thirty Years After Tito’s Death, Yugoslav Nostalgia Abounds. Retrieved August 10, 2019 from https://www.rferl.org/a/Thirty_Years_After_Titos_Death_Yugoslav_Nostalgia_Abounds_/2031874.html 

[6] Hajdari, U., & Colborne, M. (2018, October 12). Why Ethnic Nationalism Still Rules Bosnia, and Why It Could Get Worse. Retrieved August 10, 2019 from https://www.thenation.com/article/why-ethnic-nationalism-still-rules-bosnia-and-why-it-could-get-worse/

[7] (2018, September 4). Key political parties. Retrieved August 10, 2019 from https://balkaninsight.com/2018/09/24/key-political-parties-09-21-2018/ 

Bosnia Chanson Benjamin Nationalism Option Papers

Options for New Zealand’s National Security Posture

Dr Simon Ewing-Jarvie is a business consultant, Defence commentator and military fiction writer.  He served 25 years in the New Zealand Defence Force, including two operational deployments, retiring as a Lieutenant Colonel (Infantry).  He works at TorquePoint.co.nz where he designs business war games and provides Red Team services.  He was Senior Lecturer in Command Studies at Massey University (NZ) and Senior Advisor to the NZ Associate Defence Minister.  He writes on NZ National Security at unclas.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Options for New Zealand’s national security posture.

Date Originally Written:  May 27, 2019.

Date Originally Published:  September 2, 2019.

Author and / or Article Point of View:  Author is a critic of New Zealand’s lack of a national security strategy.

Background:  As a former colony of the United Kingdom (UK), New Zealand (NZ) has traditionally been politically and militarily aligned with the West, more specifically, the UK. This alignment shifted from being UK to the United States (U.S.) during the Vietnam War as did NZ’s major military platforms. The alignment was breached in deed when NZ declared itself nuclear free, effectively ending its part in the 1951 Australia, New Zealand, U.S. Security (ANZUS) Treaty [1]. However, while the potential for great power conflict and regional insecurity grows, NZ seems unwilling to invest significant resources into national security capability, instead opting for the ‘umbrella’ protection of its traditional allies in the Five Eyes (Australia, Canada, New Zealand, the United Kingdom and U.S.) intelligence sharing arrangement [2].

Significance:  Current friction between the U.S. and China has significant economic implications for NZ. China is the country’s largest trading partner, accounting for nearly 25% of NZ’s total exports [3]. There has been controversy over Huawei’s involvement in NZ’s 5G network [4] and NZ has been openly critical of China’s growing regional influence [5]. China is pursuing its ‘belt and road’ economic policy in the South Pacific [6]. NZ’s claim to having an independent foreign policy will be tested over these and other developments in its region.

Option #1:  NZ maintains a posture of armed alignment with current allies and partners.

Risk:  NZ will continue to be drawn into any conflict involving traditional allies. Apart from the military cost of operations, it makes NZ, its people and assets a target internationally. NZ will continue to be reliant on protection from allies. The economic harm would be significant if China was a belligerent. It would take decades to rebuild trust and levels of trade following an East/West conflict.

Gain:  This is the least expensive option for NZ. Capabilities and systems are largely aligned and existing allies remain patient regarding NZ’s lack of investment in defence. Regarding NZ’s trade, 42% is currently with countries that would likely fall behind a U.S.-led coalition [7].

Option #2:  NZ actively seeks new treaties and allies/partners more closely aligned to the protection of its economic interests e.g. Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP)[8].

Risk:  The loss of current intelligence sharing arrangements (Five Eyes) would be immediate. Logistics and support for currently held military platforms and capabilities that are manufactured in the U.S., Europe, Canada and Australia would be constrained or unavailable. Trade with traditional Five Eye countries would be negatively impacted.

Gain:  New allies might be more motivated to re-equip NZ’s defence capabilities at little or no cost. Trade barriers in these countries could be lowered.

Option #3:  NZ adopts a strategy of armed non-alignment.

Risk:  This option could be seen as a lack of commitment to ‘coalitions of the willing’ and therefore have trade and other political and military implications. Interoperability with other military forces would degrade over time and a drift toward peace support operations capability would be likely.

Gain:  This option enables NZ to only pursue armed interventions that fit with its foreign policy rather than being drawn into all conflicts involving allies. This option aligns well with NZ’s usual position of only committing armed forces in support of United Nations Security Council resolutions [9].

Option #4:  NZ adopts a strategy of armed neutrality.

Risk:  No longer being a member of any treaties or alliances would make NZ vulnerable to attack and occupation. The most likely motivation for an attack on NZ is assessed as access to Antarctica. This would be the most expensive option and would require international arms supply arrangements or a significantly enhanced NZ defence industry. A transition period of up to ten years would be required to develop the enhanced capability required.

Gain:  This option would return NZ to full combat capability through dramatically increasing its funding to defence and other national security capabilities. This option could open pathways for NZ to be a broker between states in conflict in the region in a similar fashion to Switzerland.

Other Comments:  The Closer Defence Relationship with Australia [10] is a harmonisation agreement not a mutual defence treaty. The Five Power Defence Arrangement [11] is focussed largely on security events involving Singapore and Malaysia. The lack of discussion toward a national security strategy for New Zealand is an impediment to a whole-of-government approach to these options.

Recommendation:  None.


Endnotes:

[1] New Zealand History. New Zealand Becomes Nuclear-Free. (June 8, 1987). Retrieved from https://nzhistory.govt.nz/new-zealand-becomes-nuclear-free.

[2]  Tossini, J.V. (November 14, 2017). Retrieved from https://ukdefencejournal.org.uk/the-five-eyes-the-intelligence-alliance-of-the-anglosphere/.

[3] Workman, D. (February 4, 2019). Retrieved from  http://www.worldstopexports.com/new-zealands-top-trade-partners/.

[4] Griffin, P. (March 12, 2019). Retrieved from https://www.noted.co.nz/tech/huawei-5g-what-controversy-is-all-about/.

[5] New Zealand Government. Strategic Defence Policy Statement 2018. (July 6, 2018). Retrieved from https://www.beehive.govt.nz/release/strategic-defence-policy-statement-2018-launched.

[6] Devonshire-Ellis, C. (May 23, 2019). China’s Belt and Road Initiative in the Pacific Islands. Retrieved from https://www.silkroadbriefing.com/news/2019/05/23/chinas-belt-road-initiative-pacific-islands/.

[7] Workman, D. (February 4, 2019). Retrieved from http://www.worldstopexports.com/new-zealands-top-trade-partners/.

[8] Goodman, M. (March 8, 2018). From TPP to CPTPP. Retrieved from  https://www.csis.org/analysis/tpp-cptpp.

[9] Purser, P. (November 24, 2014). Troop Deployments Abroad: Parliamentary Consent. Retrieved from https://www.parliament.nz/en/pb/research-papers/document/00PLLawRP2014051/troop-deployments-abroad.

[10] Australian Government. Australia-New Zealand Joint Statement on Closer Defence Relations. (March 9, 2018). Retrieved from https://www.minister.defence.gov.au/minister/marise-payne/statements/australia-new-zealand-joint-statement-closer-defence-relations.

[11] Huxley, T. (November 8, 2012). The Future of the Five power Defence Arrangements. Retrieved from https://www.aspistrategist.org.au/the-future-of-the-five-power-defence-arrangements/.

Dr Simon Ewing-Jarvie New Zealand Option Papers Policy and Strategy

Options for the Nigerian Air Force to go on the Offensive in the Counterinsurgency War

Ekene Lionel presently writes for African Military Blog as a defense technology analyst.  His current research focuses on how technology intersects national defense.  He holds a Bachelor’s Degree from Michael Okpara University.  He can be found on Twitter @lionelfrancisNG.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The counter-insurgency war in Nigeria has prevailed for seven years; causing untold hardship to the citizens of the region, devouring a great number of financial resources as well as precious unrecoverable lives[1]. The much sought-after victory has continued to elude the Nigerian Military despite its determined efforts to triumph over the terrorists. In the conflict, the Nigerian Air Force (NAF) has been criticized severally for being absent in the war efforts due to unavailable capable weapons platforms[2].

Date Originally Written:  May 15, 2019. 

Date Originally Published:  July 22, 2019.

Author and / or Article Point of View:  The author writes from the perspective of a seasoned regional defense technology analyst focusing on Africa. The article is written from the point of view of the Nigerian Air Force decision-makers considering using modern technologies to sustain the counter-insurgency war, as well as offering options on the building of aerial capabilities in order to degrade the terrorist elements.

Background:  Since the 1970s, the NAF has largely lost its capability to conduct full-scale conventional warfare against near-peer adversaries. This loss has directly affected its ability to wage a successful counter-insurgency (COIN) efforts against Boko Haram and the Islamic State[3].

The Nigerian Air Force’s emphasis on utilizing cost-effective aerial platforms such as trainers aircrafts pressed into service in the frontlines has left the force with fewer capable platforms to properly prosecute the COIN war. However, with the insurgents’ ever-changing combat and survival tactics coupled with the increasing regional security uncertainties, the NAF began examining new approaches in meeting its constitutional mandates, even with its shrinking budget[4][5].

Significance:  When the Nigerian Air Force cannot undertake its mandates due to limited aerial capability, the counter-insurgency efforts cannot be sustained. The military echelon will find it difficult to perform optimally, for instance, the NAF’s various Intelligence, Surveillance, and Reconnaissance (ISR) platforms are critical in providing valuable information on the enemy’s disposition, troops strength and composition. Also, the NAF’s strike and attack aerial apparatus are seen as the Nigerian Military’s de facto ‘far-reach’ capability; first to see the enemy, first to strike the enemy and first to report the enemy’s position. The Nigerian Air Force is simply the fulcrum that ties all the components involved in fighting the war, its role cannot be over-emphasized[6].

Option #1:  The NAF distributes its platforms and combines them with an integrated observation system.

The NAF disperses rather than concentrates its forces, relying on new weapons, sensors, training, and tactics to defeat the aggressors. Distributed lethality is becoming the newest paradigm shift in offensive combat, aimed at ensuring joint force contribution[7].

This option would ensure the NAF controls the battlefield; which enables deterrence of aggression, power projection, as well as providing theatre security. This concept relies largely on resilient networks to coordinate the activities of all in-theatre airplanes spread over vast areas of landmass as seen in Nigeria’s northeast region. Every aircraft (offensive and otherwise), unmanned aerial vehicles and helicopters are a potential sensor and shooter in the shared effort, but the ability of the enemy to detect, track and adapt is greatly complicated.

While West African based terror organizations lack a credible anti-air / aerial-denial capability, when NAF campaigns are organized around using just light attack aircraft, Unmanned Combat Aerial Systems (UCAS) and attack helicopters, it doesn’t take a lot of thought for the enemies to figure out what to target. But when an offensive campaign is waged by diverse aircraft (fighters, trainers, transport, helicopters, UCAS, etc) scattered over many miles, the enemy is challenged in determining where to focus its response.

This strategy could contribute to regional deterrence, enhance the survivability of the force in wartime, and get more value out of each warfighting asset.

Risk:  As with all new changes especially in the defense sector, misusing money is always an issue. However, a staggered approach to implementation could be proposed. Instead of procuring new platforms, little bits of technology could be added to each platform. Such an approach would glue together the aerial platforms, sensors, and weapons, and these incremental improvements would be a step in the right direction. Furthermore, the NAF engineers have shown countless times that they are quite adept at rejigging non-offensive platforms into highly potent warfighting machines.

Additionally, adapting the NAF for distributed lethality requires it to restructure its tactics, training and warfighting tools to a new way of waging war.  This new way of war’s most important items are weapons, networking, and sensors with increased offensive reach, integrated precision munition, improved battlespace awareness, and high-mobility training.

Gain:  This option would increase battlefield coherence, tactical units synergy, and also the possibility of integrating more features like a battlefield ‘friendly force tracker’ in the future. The overall picture is one of a force that will likely gain reconnaissance assets with wider operational range; communications links that better support timely targeting of threats; procedures to optimally pair weapons with targets in a distributed environment; precision munitions with greater over-the-horizon capability. 

Option #2:  The NAF focuses on persistent ISR, real-time target data sharing and rapid reaction engagement.

Another option is to dedicate the Nigerian Air Force’s ISR assets in a persistent deployment mode whereby multiple ISR platforms are deployed to the forward edge of the battlespace for a longer period of time. These ISR platforms will be tied to a theatre-wide real-time target data sharing network (or data link similar to South Africa’s Link ZA or the United States’ Link 16) to instantaneously transmit the target’s data (location and imagery) to standby rapid reaction assets deployed in Forward Operating Bases[8][9]. 

Risk:  With the ever-shrinking defense budget, deploying multiple aircraft for a long period of time drastically increases the operational cost. The amount of money needed to keep military aircraft airborne or in constant high-alert mode is considerable. Moreover, an increase in deployment or sortie rate results in aircraft downtime and the maintenance time required.  With the NAF currently being deployed in multiple fronts, Option #2 could result in security lapses in some areas in the country. However, UCAS could be especially useful in closing some of the gaps identified.

Gain:  Option #2 offers the benefits of a quicker engagement time since the time required from target detection to engagement is significantly reduced. With this in mind, surprising attacks from terrorists are lessened. Furthermore, the decision-making process in target engagement is also reduced because the burden would be passed on the field commanders, thereby lessening the strain on the command and control process. 

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Gillian, L. ( 2018, January 24), The impact of the Boko Haram insurgency in Northeast Nigeria on childhood wasting: a double-difference study. Retrieved May 16, 2019, from https://conflictandhealth.biomedcentral.com/articles/10.1186/s13031-018-0136-2

[2] Leadership Newspaper. ( 2017, June 29), Distractions On The Path To Glory: The Nigerian Air Force Experience. Retrieved May 16, 2019, from https://leadership.ng/2017/06/29/distractions-path-glory-nigerian-air-force-experience/

[3] Ekene, L. (2018, June 28), AIR SUPREMACY: Has the Nigerian Air Force lost its teeth? Retrieved May 16, 2019, from https://www.africanmilitaryblog.com/2018/06/air-supremacy-has-the-nigerian-air-force-lost-its-teeth

[4] Vanguard Newspaper. (2017, November 16) War on Terror: Airforce converts L-39ZA Albatross jets to fighter aircraft. Retrieved May 16, 2019, from  https://www.vanguardngr.com/2017/11/war-terror-airforce-converts-l-39za-albatross-jets-fighter-aircraft/

[5] Sadique Abubakar. (2018, December), Air Power And National Security Imperatives. Retrieved May 16, 2019, from https://leadership.ng/2018/11/20/air-power-and-national-security-imperatives/

[6] Chris Agbambu. (2017, May 28), Nigerian Air Force Has Played Significant Role In Tackling Insecurity. Retrieved May 16, 2019, from https://www.tribuneonlineng.com/94666/

[7] U.S. Naval War College. (2015, October 10), ‘Distributed Lethality’ concept gains focus at NWC. Retrieved May 16, 2019, from https://usnwc.edu/News-and-Events/News/Distributed-Lethality-concept-gains-focus-at-NWC

[8] Reutech Communications. Link ZA. Retrieved May 16, 2019, from http://www.reutechcomms.com/linkza/

[9] Defense Web. (2010, January 18) Link ZA: Fact File. Retrieved May 16, 2019, from https://www.defenceweb.co.za/resources/fact-files/fact-file-link-za/?catid=79%3Afact-files&Itemid=159

Air Forces Ekene Lionel Nigeria Option Papers

Options for U.S. Use of Private Military and Security Companies

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Christophe Bellens is a policy advisor at the European Parliament. He completed two MS degrees from the University of Antwerp in History (2017) and International Relations (2018).  His thesis focused on the use of Private Military and Security Contractors in Iraq and Afghanistan. He can be found on LinkedIn https://www.linkedin.com/in/christophe-bellens/ and on Twitter @ChristosBellens.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The use of Private Military and Security Companies (PMSC) by the United States in Iraq and Afghanistan and its consequences on military effectiveness in a counterinsurgency.

Date Originally Written:  May 6, 2019. 

Date Originally Published:  July 15, 2019.

Author and / or Article Point of View:  This article considers from the perspective of the United States government what options are on the table in the use private military forces. Decision makers have three possibilities, explained by their effectiveness in Iraq or Afghanistan, for a future PMSC-strategy.

Background:  Since the start of the ‘Global War on Terror’, U.S. government organizations such as the Department of Defense (DoD), the United States Agency for International Development (USAID) and the Department of State (DoS) have contracted PMSCs to manage security risks. The employees of these corporations perform duties that until recently were fulfilled by military members, such as the protection of key personnel, convoys and sites. Due to a reduction in troop numbers and an environment where privatization was heavily favored, PMSCs became a vital component of counterinsurgency. Despite their importance, planners often overlook the role of these contractors. The two cases of Iraq and Afghanistan offer three pathways to reach the envisioned political, tactical, operational and strategic objectives during counterinsurgency. 

Significance:  Private security contractors are part of contemporary small wars. In 2010, around 30,479 contractors worked for the DoD in Iraq and Afghanistan. In addition, the DoS and USAID employed around 1850 and 3770 security contractors respectively in Afghanistan alone. Hence, per 1 security contractor 3.7 U.S. military members were deployed in Afghanistan in 2010[1]. As a vital component of the security environment, they strongly influenced the outcome of the counterinsurgency. 

Option #1:  The US employs mainly security contractors from outside the host state as in Iraq. Between Q3 2008 and Q4 2013, 90% of the private security contractors were non-Iraqi citizens[2]. 

Risk:  Major potential drawbacks of employing non-native contractors exist in the political and strategic dimensions. PMSCs are there to protect their clients, not to win the hearts and minds of the population. This client protection focus led to a ‘shoot first, ask questions later’-policy vis-à-vis potential threats. During the ‘Nisour Square’-shooting seventeen Iraqi civilians were killed. The worldwide public outcry that followed, worsened relations between the Iraqi government and the U.S. Insurgents gladly used this outcry against the lawless look-alike U.S. military members. Insurgents later released a video named ‘bloody contracts’ bemoaning the abuse, aggression and indiscriminate killing by U.S. contractors[3].

Foreign nationality (especially British or U.S. citizens) make contractors a valuable target for insurgents[4]. During the 2004 Fallujah incident the non-American truck drivers were able to escape as the insurgents focused on what they imagined were agents of the Central Intelligence Agency. In fact, the convoy was rushed and understaffed by the PMSC to show how quick they could perform contract obligations. After a video of their bodies being paraded through the streets hit the news, U.S. President George W. Bush favored immediate military retaliation. The First Battle of Fallujah ended in an operational failure and shifted the focus away from the strategic goal of strengthening the Iraqi government. 

Gain:  These PMSCs were often well equipped. Their arsenal existed of a variety of small arms, machine guns and shotguns in addition with grenades, body armor and encrypted radio communication. Their vehicles ranged from local undercover secondhand cars to military-style high mobility multi-wheeled vehicles. Blackwater even had eight Boeing Little Bird helicopters in Baghdad. The personnel operating this equipment often had a law enforcement or military background. In addition, contractors for the DoS had to undergo 164 hours of training in protective detail[5]. Hence, experienced foreigners are likely to demonstrate the necessary skills to ensure the successful completion of the assigned tasks.

Option #2:  The U.S. employs mainly local contractors as in Afghanistan. Ninety percent of the private security contractors between Q3 2008 and Q4 2013 were Afghan citizens.

Risk:  Eighty percent of the Afghan contractors were former militiamen or part of an existing armed group[6]. While this often provided valuable combat experience, it was a potential security hazard. Consequently, foreigners protected high-profile targets. Afghan President Hamid Karzai’s use of the PMSC Dyncorp security detail reinforced the image for many Afghans that he was a U.S. pawn. The former militiamen often lacked the ability to read or write, let alone speak a foreign language. This only reinforced the lack of integration with allied forces. 

While problems with equipment did exist as the contractor normally was obliged to bring their own aging gun (AK47, AMD-65, PKM and RPK), studies show that a PMSC had 3.47 firearms per contractor[7]. The problem here is the lack of disarmament and demobilization by legitimizing existing armed groups. Consequently, the Afghan state couldn’t create a monopoly on violence. 

Gain:  A major gain, among giving locals an instant job and income, is the use of local knowledge and connections. The downside, however, is the potential to insert oneself into local rivalries and even fuel conflict by starting competition over a contract[8]. 

Option #3:  The U.S. helps to create a public company in the host state that offers protection services. An example being the creation of the Afghan Public Protection Force (APPF) in 2010.

Risk:  In the beginning, the APPF lacked equipment and had to be trained by PMSCs. Customers lamented the slow reaction of the APPF[9]. The force was mainly based in Kabul where they offered their services. If they managed to offer their services in the periphery, the gain of using local contractors, such as their local knowledge and connections was lost.

Secondly, the creation of a public company gives a -potentially corrupt- host leadership indirectly incentives to let some level of threat exist in its territory. The public company -and hence the state- would lose income if the security environment improves.  

Gain:  Compared to giving contracts to local warlords, the APPF-system reduces the risk of financing and legitimizing local organized crime and insurgent groups. 

Moreover, such a force can greatly improve the integration in the overall force due to centralization. In addition, in a state of emergency, the public enterprise can be used for the public good. 

Other Comments:  None. 

Recommendation:  None.


 

Endnotes: 

[1] Bellens, Christophe, Antwerp. (2018). “De impact van de uitbesteding aan Private Military and Security Companies op de militaire doeltreffendheid van de COIN-campagnes in Irak en Afghanistan”, 18 & 60-62.

[2] Ibid.

[3] S.N. (2008), “IAI Documentary Exposes Blackwater’s Crimes in Iraq”, CBSnews. Retrieved from https://www.cbsnews.com/news/iai-documentary-exposes-blackwaters-crimes-in-iraq/

[4] S.N. (2007), “Blackwater says guards were betrayed by Iraqi forces on 2004 mission”, Newsweek. Retrieved from https://www.newsweek.com/blackwater-says-guards-were-betrayed-iraqi-forces-2004-mission-103555

[5] Isenberg, David (2008) “Shadow Force: Private Security Contractors in Iraq”, Praeger Security International, 31.

[6] Joras, Ulrike, and Adrian Schuster, editors. (2008). “Private Security Companies and Local Populations: An Exploratory Study of Afghanistan and Angola”, Swisspeace, 13, 33-34.

[7] Small Arms Survey, Geneva. (2011). Small Arms Survey 2011: States of Security (Small Arms Survey). Cambridge: Cambridge University Press, 15.

[8] See the case of Shindand airbase in: McCain, John. (2010). “Inquiry into the Role and Oversight of Private Security Contractors in Afghanistan”: Congressional Report: DIANE Publishing.

[9] Bellens, Christophe. (2018). “De impact van de uitbesteding aan Private Military and Security Companies op de militaire doeltreffendheid van de COIN-campagnes in Irak en Afghanistan”, 23 & 33-34.

2019 - Contest: Small Wars Journal Afghanistan Christophe Bellens Iraq Option Papers Private Military Companies (PMC etc) United States

Options for the U.S. Department of Defense to Balance Peer Competition with Military Operations Other Than War

Greg Olsen is a cyber security professional and postgraduate researcher at University of Leicester doing his PhD on peacekeeping and civil wars. He can be found on Twitter at @gtotango. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. Department of Defense faces a significant challenge trying to balance preparations for peer competition while maintaining the capability of executing military operations other than war (MOOTW).

Date Originally Written:  May 9, 2019.

Date Originally Published:  July 1, 2019.

Author and / or Article Point of View:  The author is a cyber security professional currently researching the determinants for successful peacekeeping in civil wars for a PhD at University of Leicester.

Background:  With the release of the 2017 National Security Strategy, the United States is executing a policy pivot towards preparing for peer competition and away from nearly two decades of counterinsurgency. Yet, the most likely future military conflicts will continue to be small wars[1] and MOOTW—such as security force assistance, counter terrorism missions, evacuating U.S. nationals from conflict zones, and robust peacekeeping.

Significance:  The post-Cold War period of unipolarity has ended with a return to great power competition. Revisionist great powers are asserting themselves militarily in their near abroad and challenging Western hegemony. Consequently, the United States’ national security priorities have shifted to counter the threat. However, small wars and MOOTW are likely to be the dominant form of actual military conflict for foreseeable future. The challenge for the U.S. military is preparing for peer competition and continental conflict while maintaining the ability to execute MOOTW. For example, the U.S. Army has shifted from Brigade Combat Teams designed for counter insurgency warfare to warfare against peers[2]. What follows are three options for addressing the continuing need for conducting MOOTW.

Option #1:  The U.S. primarily employs Special Operations Forces (SOF) to address small wars and MOOTW. Currently, much of the U.S. counter terrorism mission is executed by SOF. Within SOF, the U.S. Army Special Forces were created to assist host governments in developing the capabilities to execute counter insurgency and counter terrorism missions. Other SOF are trained and deployed for direct action missions against high value targets. In many ways SOF is ideal forces for executing certain missions with a low footprint.

Risk:  The principal risk to this option is that special operations forces are not large enough nor equipped and trained to execute certain types of MOOTW, for example, evacuation of nationals during conflict, humanitarian disaster response, nor peacekeeping/peace enforcement missions.

Another risk is the inability to train and deploy enough SOF to the myriad conflict zones around the world. There is currently an arc of ethnic and sectarian conflict from Mali in western Africa through central Africa to the Horn of Africa[3]. Libya, Somalia and South Sudan are already failed states[4]. Transnational terrorist networks are active in the Sahel, the Middle East, and South Asia, and Southeast Asia[5]. Three Latin American states are in crisis: Guatemala, Honduras, and Venezuela[6]. These forces are part but not the whole solution to the MOOTW challenges across the globe.

Gain: SOF are ideal for executing hostage rescue, counter terrorism missions, and for training partner forces in counter insurgency missions.  SOF taking the lead for MOOTW frees up conventional forces to focus on their conventional mission.

Option #2:  The U.S. primarily employee military reserve units to address small wars and MOOTW.

Military reserve units provide capabilities that are useful for various types of MOOTW. The military reserves have been the bank upon which the active duty draws specialized capability from in surge scenarios, such as logistics, communications, intelligence, medicine, construction, and military policing.

Risk:  The principal risk to a strategy based on mobilizing reserve forces is political. If reserves were mobilized for a mission with low stakes, such as six months of peacekeeping in South Sudan, then public opposition to the policy is likely to be high. Furthermore, significant casualties would increase opposition and limit policy options.  An additional risk is the time it takes to mobilize these forces.  Certain crises require a rapid reaction and these forces take time to prepare for overseas deployment to a conflict zone.

Gain: These military reserve capabilities would be valuable to missions such as humanitarian disaster relief, occupation, security sector reform and partner training missions, and peacekeeping.

Option #3:  The U.S. primarily employee the Marine Corps, in a role it has historically held, to address small wars and MOOTW.

The United States Marine Corps (USMC), with its embarked Marine Expeditionary Concept, is ideal for rapid response to humanitarian disasters, evacuation of nationals from conflict zones, robust peacekeeping, and military assistance to host governments facing an insurgency. During the nineteenth and twentieth centuries, Marines were landed for America’s “small wars”. Indeed, the deployments to Haiti (1915-1934) and Nicaragua (1926-1933) were precursors to modern twenty-first century robust peacekeeping operations[7]. Marines landed to restore order, evacuate nationals and/or secure multinational corporation property, organize and supervise elections, train police and military forces, and conduct counter insurgency operations. This “halls of Montezuma” and “shores of Tripoli” heritage is part of the strategic culture of the USMC.

Risk:  The principal risk is that it will divert the USMC from operating concepts needed for peer competition, but this risk can be overstated. Presence is key to the deterrence mission. In the European theater, this is the principal role of the USMC: deter by presence as both a trip wire and force for countering adversary hybrid warfare strategies[8]. In the Pacific theater, two operating concepts define the USMC role in great power conflict: (1) Littoral operations in a contested environment and (2) expeditionary advanced base operations[9]. The viability of both concepts has been brought into question based on analogies from World War II. The opposed amphibious landing may be an obsolete operating concept due to the political price paid for the high casualties that result if facing a peer enemy. The expeditionary advanced base operations (EABO) concept is innovative but may not be viable. EABO proposes to use land-based resources to augment the Navy’s surface fleet for sea control, logistics, and ISR. The fundamental flaw is the vulnerability of forces ashore. A ship on an ocean is a difficult target to find and fix, but an atoll is a stationary target. Like the defenders at Wake Island in World War II, they are exceedingly vulnerable. The primary benefit of deployment to islands in the Pacific is as a tripwire deterrent, not as a viable fighting force when the shooting starts.

An additional risk is the damage that may be done to esprit de corps, if Marines begin to think that they are not contributing to the primary strategic challenge of peer competition. The USMC must guard against the impression that MOOTW amounts to “scallywag soldiering” like that of the period of British high empire. The USMC has a unique warrior ethos that must be maintained. In addition to the primary mission of small wars, the USMC must continue to be able to deter aggression and blunt the military adventures of a peer adversary as the “first to fight.”

Gain:  The United States Marine Corps (USMC), with its embarked Marine Expeditionary Concept, is ideal for rapid response to humanitarian disasters, evacuation of nationals from conflict zones, robust peacekeeping, and military assistance to host governments facing an insurgency. Rapid reaction and a flexible mix of capabilities makes this an ideal tool, especially in non-permissive environments. A battalion of Marines is the wrong tool for counter terrorism missions, it is the best tool when coercive presence is required.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Mary Kaldor, New and Old Wars: Organized Violence in a Global Era, Stanford: Stanford University, 2012.

[2] Todd South, “New in 2019: From tanks to Strykers, major brigade combat team conversions are coming this year,” Army Times, 2 January 2019. Retrieved from https://www.armytimes.com/news/your-army/2019/01/02/new-in-2019-from-tanks-to-strykers-major-brigade-combat-team-conversions-are-coming-this-year/

[3] SIPRI Yearbook 2018, Stockholm: Stockholm International Peace Research Institute, 2018.

[4] Fragile State Index Annual Report 2019, Washington, D.C.: The Fund for Peace, 2019.

[5] Country Reports on Terrorism 2017. Washington, D.C.: United States Department of State, 2018.

[6] SIPRI op cit.

[7] Max Boot, The Savage Wars of Peace: Small Wars and the Rise of American Power. New York: Basic Books, 2002.

[8] Shawn Snow, “No more Marine rotations to the Black Sea. The Corps is focusing here instead,” Marine Corps Times, 29 November 2019. Retrieved from https://www.marinecorpstimes.com/news/your-marine-corps/2018/11/29/no-more-marine-rotations-to-the-black-sea-the-corps-is-focusing-on-the-arctic-instead/

[9] Sam LaGrone, “Lt. Gen. David Berger Nominated as Next Marine Corps Commandant,“ USNI News, 27 March 2019. Retrieved from https://news.usni.org/2019/03/27/lt-gen-david-berger-nominated-next-marine-corps-commandant#more-42200

Greg Olsen Insurgency & Counteinsurgency Major Regional Contingency Option Papers United States

Options for Maintaining Counterinsurgency Capabilities in the Great Power Era

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Harrison Manlove is a Cadet in the U.S. Army’s Reserve Officer Training Corps at the at the University of Kansas and is currently studying History and Peace and Conflict Studies. Harrison has also written for The Strategy Bridge, where he examined Russia’s strategy in Syria and the Middle East. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. Department of Defense’s (DoD) struggle with retaining an enclave of counterinsurgency (COIN) capabilities alongside a renewed focus on training and equipping for great power competition.

Date Originally Written:  May 6, 2019.

Date Originally Published:  June 27, 2019.

Author and / or Article Point of View:  Harrison Manlove is a Cadet with the U.S. Army’s Reserve Officer Training Corps at the University of Kansas where he studies History and Peace and Conflict Studies.

Background:  The 2017 US National Security Strategy (NSS) identifies the return of great power competition as a strategic threat to U.S. interests across a variety of domains. Challenges to U.S. military and economic power are meant to “change the international order…” that the U.S. has overseen since the end of the Cold War. The NSS acknowledges the ability of near peer competitors to operate “below the threshold of open military conflict…”. In addition, the NSS identifies the need to “sustain our competence in irregular warfare…” in a long-term capacity[1]. This “competence” most certainly includes COIN, or the employment of various means of national power by a government to counter an insurgency “and address its roots causes[2].” DoD’s 2018 National Defense Strategy identifies “Long term strategic competition with China and Russia” as “the principal priorities for the Department…[3]” Both of the above mentioned documents indicate how non-state threats have slowly moved down the priority list.

Significance:  Recent decisions by U.S. President Donald Trump and the DoD to drawdown forces in a variety of conflict areas seem to reflect a desire to realign U.S. force posture to counter near-peer competitors in both Europe and Asia, and bolster conventional military capabilities. In December 2018, President Trump directed U.S. forces in Syria to withdraw, while simultaneously halving U.S. forces deployed to Afghanistan over several months as peace talks continue[4]. U.S. Special Operations Forces (SOF) and General Purpose Forces (GPF) U.S. forces have spent almost two decades advising and training foreign forces as a function of COIN efforts in Afghanistan, Iraq, Syria and others. Last fall, U.S. Africa Command (USAFRICOM) was directed to drawdown SOF missions on the continent over a period of three years[5]. SOF in Africa suffered a highly-publicized loss of troops in the 2017 Tongo Tongo ambush in Niger, while SOF personnel were also killed and wounded during an attack on their outpost in Somalia last year[6].

Option #1:  U.S. SOF addresses COIN threats through Direct Action.

Risk:  SOF conduct countless direct action missions, or “Short-duration strikes…”, against insurgent and terror groups in multiple countries across theaters like USAFRICOM and U.S. Central Command (USCENTCOM)[7]. American deaths during these operations has proven damaging for domestic opinion on global U.S. operations, exemplified by the 2017 deaths of four American Special Forces soldiers in Niger. An uninformed public, a largely opaque DoD concerning SOF missions and their specific purpose, and U.S. military roles within those missions, has created a wider civil-military gap. This lack of clarity has brought some American lawmakers to call the Niger scenario “an endless war” where “We don’t know exactly where we’re at in the world militarily and what we’re doing[8].” These lawmaker opinions underscores concerns about the scale and cost of worldwide U.S. military involvement and its impact on SOF personnel. In addition, raids often do not solve the political or economic challenges within COIN and can become a whack-a-mole strategy for targeting an insurgency’s network.

Gain:  The GPF often take the brunt of the task involved in conducting major COIN operations. Recent moves by the U.S. Army to retool brigade combat teams from infantry roles to Stryker and armored roles is one of the clearest examples of the “pivot back to the near-peer fight[9].” SOF addressing COIN threats through direct action drastically reduces the overall need for GPF on the frontlines in COIN and frees them up to focus on the near-peer fight.  Additionally, while direct action does not address the factors driving the insurgency, it does succeed in disrupting insurgent formations and presents metrics to Washington D.C. that are more easily understood than the more esoteric quantification of “winning of hearts and minds.”  Funding for U.S. Special Operations Command was given a massive hike to cover personnel increases to maintain a reliance on SOF[10]. SOF in Africa often operate under the Section 127e authority that allows SOF to accompany partner forces on missions, staying behind at the “last position of cover and concealment.” This has been touted by USAFRICOM Commander U.S. Marine Corps General Gen. Thomas Waldhauser, as “high payoff with low risk to US forces[11].” Direct action is relatively low-cost and, under 127e, also provides SOF the ability to directly control partner forces during operations to achieve US objectives.

Option #2:  Specially trained non-SOF units address COIN threats through Security Force Assistance.

Risk:  Global military engagement may be spreading U.S. forces too thinly if a near-pear conflict were to breakout. Since the 9/11 attacks, a focus on COIN and counterterrorism has resulted in U.S. deployments to 40% of the world’s countries[12]. The U.S. Army’s 1st Security Force Assistance Brigade (SFAB) deployed to Afghanistan in early 2018 to train and advise Afghan forces. Insider attacks by Afghan Taliban insurgents posing as members of the Afghan military have taken a toll on that deployment and highlight the potential dangers of a continued U.S. military presence there[13]. In mid-2018, the 2nd SFAB was established and is also slated for deployment to Afghanistan in 2019. SFABs could pull troops and resources from DoD’s ability to train and prepare for near-peer threats. DoD personnel involved in arms transfer, security assistance, and short-term military-to-military engagement programs are meager within the context of broader defense spending, but might offer an area for DoD to repurpose personnel and funding to critical capability gaps like artificial intelligence (AI) and cyber warfare.

Gain:  While military force is often the preferred method in COIN, an emphasis on non-kinetic means for DoD could provide better results at a much lower cost. The defense budget for fiscal year (FY) 2017 brought major reforms to security assistance authorities and organizations, a problem that had previously plagued those initiatives. Security assistance programs allow small teams of DoD personnel to train partner forces in basic military tactics and provide weapons training[14]. DoD spending as part of the foreign assistance budget totaled out to $6.4 billion spent worldwide in FY 2018, which includes these programs. Total spending for the foreign assistance budget in FY 2018 was $17.6 billion[15]. In comparison, the war in Afghanistan alone cost $45 billion in 2018, a little under half the $100 billion spent every year during the war’s height between 2010-2012[16]. DoD training with partner militaries is relatively inexpensive when compared with other DoD programs and deployments, and “builds relationships with friendly foreign forces, improves interoperability with and indirectly contributes to building the capability of key allies through exposure to United States tactics, techniques, and procedures…[17]” Capacity-building conducted by specially trained units could better enhance opportunities for partner forces to provide security in COIN conflict environments. The Army’s SFAB model appears to be a comprehensive training force, standing in contrast to the ad hoc approach used throughout Operations Enduring Freedom and Iraqi Freedom. This option could alleviate pressure on SOF to manage similar missions on a global scale that would continue to strain overworked equipment and personnel.

Other Comments:  None.

Recommendations:  None.


Endnotes:

1. “National Security Strategy of the United States of America.” The White House. December 2017. Accessed May 2, 2019. https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.

2. United States. Joint Chiefs of Staff. Department of Defense Dictionary of Military and Associated Terms. Washington, D.C.: Joint Chiefs of Staff, April 2019. 54.

3. “Summary of the 2018 National Defense Strategy.” January 19, 2018. May 2, 2019. https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf.

4. Gibbons-Neff, Thomas, and Mujib Mashal. “U.S. to Withdraw About 7,000 Troops From Afghanistan, Officials Say.” The New York Times. December 21, 2018. Accessed May 2, 2019. https://www.nytimes.com/2018/12/20/us/politics/afghanistan-troop-withdrawal.html.

5. Browne, Ryan. “US to Reduce Number of Troops in Africa.” CNN. November 15, 2018. Accessed May 2, 2019. https://www.cnn.com/2018/11/15/politics/us-reduce-troops-africa/index.html.

6. Sonne, Paul. “U.S. Service Member Killed, Four Others Wounded in Somalia Attack.” The Washington Post. June 08, 2018. Accessed May 2, 2019. https://www.washingtonpost.com/world/national-security/us-special-operations-soldier-killed-four-service-members-wounded-in-somalia-attack/2018/06/08/39265cda-6b5f-11e8-bbc5-dc9f3634fa0a_story.html

7. . United States. Joint Chiefs of Staff. Department of Defense Dictionary of Military and Associated Terms. Washington, D.C.: Joint Chiefs of Staff, April 2019. 66.

8. Callimachi, Rukmini, Helene Cooper, Alan Blinder, and Thomas Gibbons-Neff. “‘An Endless War’: Why 4 U.S. Soldiers Died in a Remote …” The New York Times. February 20, 2018. Accessed May 2, 2019. https://www.nytimes.com/interactive/2018/02/17/world/africa/niger-ambush-american-soldiers.html.

9. South, Todd. “New in 2019: From Tanks to Strykers, Major Brigade Combat Team Conversions Are Coming This Year.” Army Times. January 02, 2019. Accessed May 2, 2019. https://www.armytimes.com/news/your-army/2019/01/02/new-in-2019-from-tanks-to-strykers-major-brigade-combat-team-conversions-are-coming-this-year/.

10. South, Todd. “Special Operations Command Asks for More Troops, Biggest Budget Yet.” Military Times. February 27, 2018. Accessed May 2, 2019. https://www.militarytimes.com/news/your-army/2018/02/23/special-operations-command-asks-for-more-troops-biggest-budget-yet/.

11. Morgan, Wesley. “Behind the Secret U.S. War in Africa.” POLITICO. July 02, 2018. Accessed May 2, 2019. https://www.politico.com/story/2018/07/02/secret-war-africa-pentagon-664005.

12.   Savall, Stephanie, “This Map Shows Where in the World the U.S. Military Is Combatting Terrorism.” Smithsonian.com. January 01, 2019. Accessed May 2, 2019. https://www.smithsonianmag.com/history/map-shows-places-world-where-us-military-operates-180970997/.

13.   LaPorta, James. “U.S. Soldier Killed in Afghanistan Was Highest Enlisted Soldier Supporting Army’s New Adviser Brigade.” Newsweek. October 04, 2018. Accessed May 3, 2019. https://www.newsweek.com/afghanistan-soldier-killed-attack-us-1104697.

14.  Elliot, Adriane. “U.S. Security Assistance Soldiers, Nigerian Army Partner to Combat Terrorism.” Army Values. December 13, 2017. Accessed May 3, 2019. https://www.army.mil/article/198066/us_security_assistance_soldiers_nigerian_army_partner_to_combat_terrorism.

15.   “ForeignAssistance.gov.” Foreignassistance.gov. May 3, 2019. https://foreignassistance.gov/explore.

16.   Pennington, Matthew. “Pentagon Says War in Afghanistan Costs Taxpayers $45 Billion per Year.” PBS. February 06, 2018. Accessed May 3, 2019. https://www.pbs.org/newshour/politics/pentagon-says-afghan-war-costs-taxpayers-45-billion-per-year

17.  “Fiscal Year (FY) 2019 President’s Budget Security Cooperation Consolidated Budget Display.” Office of the Undersecretary of Defense (Comptroller). February 16, 2018. Accessed May 3, 2019. https://comptroller.defense.gov/Portals/45/Documents/defbudget/fy2019/Security_Cooperation_Budget_Display_OUSDC.pdf.

2019 - Contest: Small Wars Journal Great Powers & Super Powers Harrison Manlove Option Papers Policy and Strategy United States

Options for Europe to Address Climate Refugee Migration

Matthew Ader is a first-year undergraduate taking War Studies at King’s College London. He tweets inexpertly from @AderMatthew. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Climate refugees are people who, due to factors related to climate change, are driven from their country.  Climate refugee movement has the potential to cause instability.

Date Originally Written:  April 11, 2019. 

Date Originally Published:  May 27, 2019.

Author and / or Article Point of View:  The author is a first-year undergraduate student at King’s College London with a broadly liberal foreign policy view. The article is written from the point of view of the European Union (EU) towards African and Middle Eastern countries, particularly those on the Mediterranean basin. 

Background:  Climate change is expected to displace an estimated 200 million people by 2050[1]. Many of these individuals will originate from sub-Saharan Africa and the Middle East.  

Significance:  Extrapolating from current trends, it is likely that most of these refugees will attempt to flee to Europe[2]. Such a mass movement would have serious impacts on European political and economic stability. Combined with other impacts of climate change, such a mass migration is likely to destabilise many nations in the Middle East or North Africa. The movement of climate refugees is a significant concern for policy makers both in Europe and its near abroad. 

Option #1:  Pan-European countries increase their border defences to keep climate refugees out, by force if necessary. 

Risk:  This option would lead to the deaths of a relatively large number of climate refugees. It would also demand a significant commitment of resources and expertise, potentially distracting European nations from near-peer threats. Further, turning away refugees would impact the European reputation on the global stage, and breed resentment and instability among nations on the Mediterranean rim who would be left having to accommodate the refugee influx with limited support. Some climate refugees would also be resentful, and many others desperate, providing opportunities for non-state armed actors – as has already taken place, for example in the Dadaab refugee camp[3]. 

Gain:  This option would push the risk off-shore from Europe, avoiding significant domestic political challenges and instability. It would also protect economic opportunities for low-income workers, particularly in Mediterranean basin countries. 

Option #2:  Pan-European countries take in and integrate significant numbers –in the low double-digit millions – of climate refugees. 

Risk:  This option would lead to significant political instability in Europe, as there is already dissatisfaction with current rates of immigration in broad swathes of European society[4]. Current immigration rates – substantially lower than under this option – have already caused the greatest rise in far-right political parties in Europe since the 1930s. Moreover, this option would stress the structure of the EU, as Mediterranean basin countries would be unwilling to take all the refugees, leading to a quota system forcing all EU nations to take in a certain number of refugees. Quota systems have historically caused resentment and would likely do so again. Lastly, it is unclear whether EU nations could avoid unintentionally ghettoising and marginalising refugees, to negative political and economic effect.  

Gain:  This option would avoid destabilising fragile states in the Middle East and North Africa, denying potential staging grounds to terrorist groups and soaking up EU resources on heavy border protection. Further, it would enhance EU standing abroad, as the German policy of compassion – taking in over 1 million migrants in 2014 – previously did. 

Option #3:  Heavy investment in Middle Eastern and North African countries to increase their capabilities to deal with the climate challenges that cause climate refugees. 

Risk:  It is unclear whether such investment would be effective[5]. Many of these nations have fragile security situations and high rates of endemic corruption. Development assistance in this environment has previously given a low return on investment and expecting different could result in the expenditure of billions of euros for limited impact. Secondly, even if success could be guaranteed, the amount of money and time required would be substantial. At a time when the popularity of foreign aid budgets is low, and the pressure on the EU’s eastern flank from Russia is high, convincing nations to contribute substantial assets could prove very difficult. A discontinuity of investment from different nations would further north-south recriminations in the EU. 

Gain:  This option could forestall a climate refugee crisis entirely by increasing the internal capabilities of Middle East and North African states to deal with the impacts of climate change. In the event that climate refugee movements still take place, the EU would be shielded by capable partners who could take the brunt of the negative impact without destabilization to the extent of seriously damaging EU interests. 

Other Comments:  The climate refugee challenge is not immediately pressing and therefore can be dismissed by European nations embroiled with other priorities. Climate refugees will be a definitional security challenge to the EU in the mid and late 21st century. Unless serious thought is applied to this problem now, unpreparedness is likely in the future. 

Recommendation:  None.  


Endnotes: 

[1] Kamal, Baher. “Climate Migrants Might Reach One Billion by 2050.” Inter Press Service News Agency, August 21, 2017. Retrieved From: http://www.ipsnews.net/2017/08/climate-migrants-might-reach-one-billion-by-2050/ 

[2] No Author Stated, “Refugee crisis in Europe.” European Civil Protection and Humanitarian Aid Operations, June 20, 2016. Retrieved From: https://ec.europa.eu/echo/refugee-crisis 

[3] McSweeney, Damien. “Conflict and deteriorating security in Dadaab.” Humanitarian Practice Network, March 2012. Retrieved From: https://odihpn.org/magazine/conflict-and-deteriorating-security-in-dadaab/ 

[4] Silver, Laura. “Immigration concerns fall in Western Europe, but most see need for newcomers to integrate into society.” Pew Research Centre, October 22, 2018. Retrieved From: https://www.pewresearch.org/fact-tank/2018/10/22/immigration-concerns-fall-in-western-europe-but-most-see-need-for-newcomers-to-integrate-into-society/ 

[5] Dearden, Lizzie. “Emmanuel Macron claims Africa held back by ‘civilisational’ problems and women having ‘seven or eight children’.” The Independent, July 11, 2017. Retrieved From: https://www.independent.co.uk/news/world/europe/emmanuel-macron-africa-development-civilisation-problems-women-seven-eight-children-colonialism-a7835586.html 

Environmental Factors Matthew Ader Migrants Option Papers

Assessment of the Operational Implications of 21st Century Subterranean Conflict

Major Haley Mercer was commissioned in 2006 as an Engineer Officer from the United States Military Academy at West Point and is completing the U.S. Army School of Advanced Military Studies (SAMS). Prior to SAMS, Haley completed the Command and General Staff College (USCGSC) and two MS degrees from the University of Missouri S&T (2010) and Georgia Tech (2015). She served as Deputy Detachment Commander of the 521st Explosive Hazards Coordination Cell. Haley also has two operational deployments in support of Operation Enduring Freedom, Afghanistan, Consolidation II (2007-2009) and Transition I (2012-2013). She can be found on Twitter @SappersW.    Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


 Title:  Assessment of the Operational Implications of 21st Century Subterranean Conflict

Date Originally Written:  April 30, 2019. 

Date Originally Published:  May 8, 2019. 

Author and / or Article Point of View:  The article is written from the point of view of the U.S. Army and future large-scale ground combat operations. 

Summary:  At the operational level, the United States Army’s mental model does not work against the deep fight against an enemy whose subterranean networks make them impervious to lethal, deep-fires effects. The answer to the subterranean threat is not in the next tactical solution, rather it is in the operational artist’s creative and critical thinking and ability to reframe the problem, apply systematic processes, and provide better solutions to the commander. 

Text:  The subterranean battlefield poses unique challenges, and the U.S. Army lacks the requisite skills to operate within that complex environment. Success against a subterranean threat begins at the operational level of war. While tactical implications must be addressed, they do not solve the larger problem of effectively designing, planning, and executing operations against an enemy that leverages the subterranean domain. A lack of preparedness at the operational level results in the U.S. Army reaching its culminating point short of achieving its strategic aims.

Similar to quantum mechanics, no one can ever project with certainty when, where, how, and with whom the next great conflict will occur.  However, with historical trends and patterns, a keen operational planner can embrace the reality of complexity and make predictions that focus future combat preparations[1].

Today, the United States is more observable, predictable, and understandable than ever before.  While still a critical part of the equation, superior military strength and might is no longer a guaranteed formula for victory.  The 21st century battlefield is more complex than ever, and it requires new ways of thinking. Today’s operational artists must display coup d’ oeil, seeking answers beyond simplistic assessments perpetuated by past experiences, heuristics, and expertise in order to shape the deep fight against an enemy whose subterranean networks make them impervious to traditional, lethal, deep-fires effects.

Shaping the deep fight against a subterranean threat in large scale conflict requires a distinctly different approach. Figure 3 below depicts the systematic approach for effective deep area shaping against a subterranean enemy. Step 1, cognitive design.  Cognitive design is the operational planners’ ability to leverage creative and critical thinking to reframe and develop a plan that address the underlying problem rather than the symptoms. The design process requires a non-traditional systems approach involving a holistic understanding of the relationships and connections between all actors in the system. There must be a deep understanding of what reinforces the enemy’s actions and behaviors through a relational understanding of their values, desires, morals, worldview, beliefs, and language. One cannot defeat what one does not understand. All of this cannot be accomplished without cognitive patience and the ability to communicate understanding to others resulting in action.

The U.S. Army’s current mental framework focuses on combating an adversary’s use of the subterranean domain, but this domain also offers opportunities. In January 2019, the Defense Advanced Research Project Agency announced the initiative to expand the combined arms maneuver space to include a vertical dimension, to exploit both natural and man-made subterranean environments[2]. The United States can benefit from the same subterranean opportunities that are afforded to our adversaries. A friendly subterranean infrastructure could supply secure basing and extend operational reach within an area of conflict while minimizing exposure to the enemy. Furthermore, it can mitigate the logistical challenges posed by the Anti-Access and Area Denial (A2AD) threat and decrease vulnerability to enemy fires.  

Step 2, virtual effects. According to current U.S. Army doctrine, FM 3-0, Operations, Joint force commanders gain and maintain the initiative by projecting fires, employing forces, and conducting information operations[3]. Capabilities within the virtual domain are viewed as a supporting role to projecting fires and employing forces. Against a subterranean threat, virtual effects will likely serve a primary role with traditional physical effects in support. Shaping the deep fight through virtual effects includes all capabilities inherent within electronic warfare, artificial intelligence, and both offensive and defensive cyber actions. With nested and synchronized objectives, all of these assets provide the friendly forces with deception opportunities and narrative control to shape the deep fight prior to arrival of any physical effects. A formulated narrative can promote proactive thinking, gain public support, and deliver false information in support of a deception plan[4].  

Step 3, physical effects. Against a subterranean threat, physical effects are most effective subsequent to cognitive design and virtual effects. Some common physical effects include lethal fires, A2AD, counter weapons of mass destruction, boots on ground, intelligence, surveillance, reconnaissance, and humanitarian support. The physical effects include the combined arms tasks that lead to enemy destruction, exploiting opportunities, minimizing risk, and ultimately shaping the deep fight for the lower echelon elements. Countering a subterranean threat is manpower intensive thus, the solution lies in the partnerships and relationships with the joint, interagency, and multi-national forces. The subterranean threat is not just a U.S. Army problem, rather it’s a defense problem requiring combined resources and assets at all echelons. However, physical effects are most effective when they are preceded by deliberate cognitive design and virtual shaping effects.   

Mercer_Graphic

Figure 3. Shaping The Deep Fight, A Systems Approach. Source: MAJ Haley E. Mercer

Surprise is a primary principle of joint operations and creates the conditions for success at the tactical, operation, and strategic level of war. Surprise is non-negotiable and necessary for gaining and maintaining contact with the enemy.  Surprise affords the attacker the ability to disrupt rival defensive plans by achieving rapid results and minimizing enemy reaction time[5].   According to Carl von Clausewitz, “surprise lies at the root of all operations without exception, though in widely varying degrees depending on the nature and circumstance of the operation.”  Deception operations are essential to achieving surprise[6]. Deception operations do well to integrate electronic warfare capabilities and signature residue manipulation. Electronic signatures are everywhere on the modern battlefield making it difficult to hide from the enemy. From Fitbits, to Apple watches, to RFID tags, to global positioning systems, surprise is difficult to achieve unless operational planners can creatively alter virtual fingerprints to effect enemy actions.  

While still an important facet, the answer to the subterranean threat is not in the next technological advancement or tactical solution, rather it is in the operational artist’s creative and critical thinking and ability to reframe the problem, apply systematic thinking, and provide better options to the commander. Success against a subterranean threat lies at the operational level of war.


Endnotes:

[1] Everett C Dolman, Pure Strategy: Power and Principle in the Space and Information Age (London; New York: Frank Cass, 2005), 100.

[2] “The U.S. Military’s Next Super Weapon: Tactical Tunnels, The National Interest,” accessed March 27, 2019, https://nationalinterest.org/blog/buzz/us-militarys-next-super-weapon-tactical-tunnels-46027.

[3] US Army, FM 3-0 (2017), 5-1.

[4] H. Porter Abbott, The Cambridge Introduction to Narrative, 2nd ed., Cambridge introductions to literature (Cambridge ; New York: Cambridge University Press, 2008), 12.

[5] US Army, ADRP 3-90 (2012), 3-2.

[6] Clausewitz, Howard, and Paret, On War, 198.

Assessment Papers Haley Mercer Option Papers Subterranean / Underground

Options to Bridge the U.S. Department of Defense – Silicon Valley Gap with Cyber Foreign Area Officers

Kat Cassedy is a qualitative analyst with 20 years of work in hard problem solving, alternative analysis, and red teaming.  She currently works as an independent consultant/contractor, with experience in the public, private, and academic sectors.  She can be found on Twitter @Katnip95352013, tweeting on modern #politicalwarfare, #proxywarfare, #NatSec issues, #grayzoneconflict, and a smattering of random nonsense.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The cultural gap between the U.S. Department of Defense and Silicon Valley is significant.  Bridging this gap likely requires more than military members learning tech speak as their primary duties allow.

Date Originally Written:  April 15, 2019. 

Date Originally Published:  April 15, 2019. 

Author and / or Article Point of View:  The author’s point of view is that the cyber-sector may be more akin to a foreign culture than a business segment, and that bridging the growing gulf between the Pentagon and Silicon Valley may require sociocultural capabilities as much or more so than technical or acquisition skills. 

Background:  As the end of the third decade of the digital revolution nears an end, and close to a year after the U.S. Cyber Command was elevated to a Unified Combatant Command, the gap between the private sector’s most advanced technology talents, intellectual property (IP), services, and products and that of the DoD is strained and increasing. Although the Pentagon needs and wants Silicon Valley’s IP and capabilities, the technorati are rejecting DoD’s overtures[1] in favor of enormous new markets such as those available in China. In the Information Age, DoD assesses that it needs Silicon Valley’s technology much the way it needed the Middle East’s fossil fuels over the last half century, to maintain U.S. global battlespace dominance. And Silicon Valley’s techno giants, with their respective market caps rivaling or exceeding the Gross Domestic Product of the globe’s most thriving economies, have global agency and autonomy such that they should arguably be viewed as geo-political power players, not simply businesses.  In that context, perhaps it is time to consider 21st century alternatives to the DoD way of thinking of Silicon Valley and its subcomponents as conventional Defense Industrial Base vendors to be managed like routine government contractors. 

Significance:  Many leaders and action officers in the DoD community are concerned that Silicon Valley’s emphasis on revenue share and shareholder value is leading it to prioritize relationships with America’s near-peer competitors – mostly particularly but not limited to China[2] – over working with the U.S. DoD and national security community. “In the policy world, 30 years of experience usually makes you powerful. In the technical world, 30 years of experience usually makes you obsolete[3].” Given the DoD’s extreme reliance on and investment in highly networked and interdependent information systems to dominate the modern global operating environment, the possibility that U.S. companies are choosing foreign adversaries as clients and partners over the U.S. government is highly concerning. If this technology shifts away from U.S. national security concerns continues, 1)  U.S. companies may soon be providing adversaries with advanced capabilities that run counter to U.S. national interests[4]; and 2) even where these companies continue to provide products and services to the U.S., there is an increased concern about counter-intelligence vulnerabilities in U.S. Government (USG) systems and platforms due to technology supply chain vulnerabilities[5]; and 3) key U.S. tech startup and emerging technology companies are accepting venture capital, seed, and private equity investment from investors who’s ultimate beneficial owners trace back to foreign sovereign and private wealth sources that are of concern to the national security community[6].

Option #1:  To bridge the cultural gap between Silicon Valley and the Pentagon, the U.S. Military Departments will train, certify, and deploy “Cyber Foreign Area Officers” or CFAOs.  These CFAOs would align with DoD Directive 1315.17, “Military Department Foreign Area Officer (FAO) Programs[7]” and, within the cyber and Silicon Valley context, do the same as a traditional FAO and “provide expertise in planning and executing operations, to provide liaison with foreign militaries operating in coalitions with U.S. forces, to conduct political-military activities, and to execute military-diplomatic missions.”

Risk:  DoD treating multinational corporations like nation states risks further decreasing or eroding the recognition of nation states as bearing ultimate authority.  Additionally, there is risk that the checks and balances specifically within the U.S. between the public and private sectors will tip irrevocably towards the tech sector and set the sector up as a rival for the USG in foreign and domestic relationships. Lastly, success in this approach may lead to other business sectors/industries pushing to be treated on par.

Gain:  Having DoD establish a CFAO program would serve to put DoD-centric cyber/techno skills in a socio-cultural context, to aid in Silicon Valley sense-making, narrative development/dissemination, and to establish mutual trusted agency. In effect, CFAOs would act as translators and relationship builders between Silicon Valley and DoD, with the interests of all the branches of service fully represented. Given the routine real world and fictional depictions of Silicon Valley and DoD being from figurative different worlds, using a FAO construct to break through this recognized barrier may be a case of USG policy retroactively catching up with present reality. Further, considering the national security threats that loom from the DoD losing its technological superiority, perhaps the potential gains of this option outweigh its risks.

Option #2:  Maintain the status quo, where DoD alternates between first treating Silicon Valley as a necessary but sometimes errant supplier, and second seeking to emulate Silicon Valley’s successes and culture within existing DoD constructs.  

Risk:  Possibly the greatest risk in continuing the path of the current DoD approach to the tech world is the loss of the advantage of technical superiority through speed of innovation, due to mutual lack of understanding of priorities, mission drivers, objectives, and organizational design.  Although a number of DoD acquisition reform initiatives are gaining some traction, conventional thinking is that DoD must acquire technology and services through a lengthy competitive bid process, which once awarded, locks both the DoD and the winner into a multi-year relationship. In Silicon Valley, speed-to-market is valued, and concepts pitched one month may be expected to be deployable within a few quarters, before the technology evolves yet again. Continual experimentation, improvisation, adaptation, and innovation are at the heart of Silicon Valley. DoD wants advanced technology, but they want it scalable, repeatable, controllable, and inexpensive. These are not compatible cultural outlooks.

Gain:  Continuing the current course of action has the advantage of familiarity, where the rules and pathways are well-understood by DoD and where risk can be managed. Although arguably slow to evolve, DoD acquisition mechanisms are on solid legal ground regarding use of taxpayer dollars, and program managers and decision makers alike are quite comfortable in navigating the use of conventional DoD acquisition tools. This approach represents good fiscal stewardship of DoD budgets.

Other Comments:  None. 

Recommendation:  None.  


Endnotes:

[1] Malcomson, S. Why Silicon Valley Shouldn’t Work With the Pentagon. New York Times. 19APR2018. Retrieved 15APR2019, from https://www.nytimes.com/2018/04/19/opinion/silicon-valley-military-contract.html.

[2] Hsu, J. Pentagon Warns Silicon Valley About Aiding Chinese Military. IEEE Spectrum. 28MAR2019. Retrieved 15APR2019, from https://spectrum.ieee.org/tech-talk/aerospace/military/pentagon-warns-silicon-valley-about-aiding-chinese-military.

[3] Zegart, A and Childs, K. The Growing Gulf Between Silicon Valley and Washington. The Atlantic. 13DEC2018. Retrieved 15APR2019, from https://www.theatlantic.com/ideas/archive/2018/12/growing-gulf-between-silicon-valley-and-washington/577963/.

[4] Copestake, J. Google China: Has search firm put Project Dragonfly on hold? BBC News. 18DEC2018. Retrieved 15APR2019, from https://www.bbc.com/news/technology-46604085.

[5] Mozur, P. The Week in Tech: Fears of the Supply Chain in China. New York Times. 12OCT2018. Retrieved 15APR2019, from https://www.nytimes.com/2018/10/12/technology/the-week-in-tech-fears-of-the-supply-chain-in-china.html.

[6] Northam, J. China Makes A Big Play In Silicon Valley. National Public Radio. 07OCT2018. Retrieved 15APR2019, from https://www.npr.org/2018/10/07/654339389/china-makes-a-big-play-in-silicon-valley.

[7] Department of Defense Directive 1315.17, “Military Department Foreign Area Officer (FAO) Programs,” April 28, 2005.  Retrieved 15APR2019, from https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodd/131517p.pdf.

 

Cyberspace Emerging Technology Information Systems Kat Cassedy Option Papers Public-Private Partnerships and Intersections United States

An Assessment of the Threat Posed by Increased Nationalist Movements in Europe

Major Jeremy Lawhorn is an active duty U.S. Army Psychological Operations Officer with over a decade in Special Operations.  He has served in the United States Army for over 19 years in a variety of leadership and staff officer positions, both domestically and internationally.  His academic interest is primarily in military strategy, specifically the competition phase. His current research focuses on understanding resistance movements. He currently holds a Master’s Degree from Norwich University, Duke University, and the U.S. Army Command and General Staff College.  He is currently working on his Doctorate at Vanderbilt University.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group.  The opinions and conclusions expressed herein are those of the individual author and do not necessarily represent the views of the United States Army or any other government agency.


Title:  An Assessment of the Threat Posed by Increased Nationalist Movements in Europe

Date Originally Written:  March 18, 2019.

Date Originally Published:  April 15, 2019.

Summary:  If left unchecked, the current nationalist movements on the rise throughout Europe threaten the integrity of the European Union (EU), the future of the North Atlantic Treaty Organization (NATO) Alliance, and the overall security of Europe. Leveraging nationalist sentiments, Russia is waging a hybrid warfare campaign to support nationalist opposition parties and far-right extremist groups to  create disengagement among EU and NATO members.

Text:  In recent years there has been a groundswell of nationalism and far-right extremism across Europe, allowing far-right political parties to gain power in several countries as well as representation in the European Parliament. Today there are more than 59 nationalist parties, 15 regionalist parties, more than 60 active nationalist-separatist movements, and a growing radical right-wing extremist movements throughout the EU. Collectively, far-right nationalist groups occupy 153 of 751 seats in the European Parliament representing 21 of the 28 EU member states. This rise in nationalist sentiment is the result of growing Euroscepticism that has been driven in part by the Eurozone debt crisis, increased opposition to mass immigration, fear of cultural liberalization, and the perceived surrender of national sovereignty to external organizations. These nationalist movements threaten the integrity of the EU, the future of the NATO Alliance, and the overall security and stability of Europe. Leveraging nationalist sentiments, Russia is waging a hybrid warfare campaign to achieve their own political objectives by supporting nationalist opposition parties and far-right extremist groups to increase Euroscepticism and ultimately create disengagement among EU and NATO members.

Today’s nationalist movements are gaining strength in part because they are creating large networks of support across Europe. These movements have created transnational alliances to support each other to oppose the EU. The Europe of Nations and Freedom (ENF), Europe of Freedom and Direct Democracy (EFDD or EFD2), and the European Conservatives and Reformists (ECR) are nationalist Eurosceptic groups made up of members from several EU members states that collectively have significant representation in the European parliament. These group’s stated purpose is to work for freedom and co-operation among peoples of different States to return power back to the people of sovereign states, to focus on respect for Europe’s history, traditions and cultural values with the belief that peoples and Nations of Europe have the right to protect their borders and strengthen their own historical, traditional, religious and cultural values[1]. These groups are also committed to sovereignty, democracy, freedom and ending mass immigration so that members may advance their own interests at the domestic level[2]. The collective strength of these groups empower local nationalist movements, enabling them to gain influence and power that might not otherwise be possible. As each individual nationalist movement gains power, the larger alliance gains power to support other movements.

The rise of nationalist sentiments is also emboldening right-wing extremism groups. While not all nationalist parties are affiliated with right-wing extremism, the similarity in ideologies creates sympathetic leanings that are destructive for society. In recent years, right-wing political movements have brought together coalitions of Neo-Nazis with mainstream free-market conservatives, normalizing political ideologies[3]. These relationships can be used to serve mutually supportive positions while leaving room for plausible deniability. These violent far-right groups have not only embraced similar populist language of the nationalist political movements, they also espouse openly racist epithets and employ violence to pursue their goals of reestablishing ethnically homogenous states[4]. Not unlike the Nazi party of the past and consistent with nationalist rhetoric, these groups portray immigrants and ethnic minorities as the cause for economic troubles and demonize as threats to the broader national identity[5]. In essence, nationalist parties benefit from national fervor generated by these right-wing extremist without having to openly support their violent activities.

European nationalist parties are not the only ones benefitting from the growth in nationalist sentiments. Russia is also a key beneficiary and benefactor of European nationalist movements. Russia generally views the West with contempt as they see the expansion of NATO and the influence of the EU as an encroachment on their sphere of influence. Anything that challenges the cohesion of NATO and the EU is seen as a benefit for Russia. While Russia may not be responsible for creating these movements, they have supported a variety of nationalist opposition and far-right extremist groups throughout Europe to achieve their own political aims. Russia is playing a vital role to empower these groups with offers of cooperation, loans, political cover and propaganda. The Kremlin is cultivating relationships with these far-right parties, by establishing ‘‘cooperation agreements’’ between the dominant United Russia party and parties like Austria’s Freedom Party, Hungary’s Jobbik, Italy’s Northern League, France’s National Front, and Germany’s AfD (Alternative for Germany)[6]. Kremlin-linked banks are also providing financial support for nationalist parties like France’s National Front party to support their anti-EU platform. Kremlin-linked oligarchs are also supporting European extremist groups like Germany’s neo-Nazi NPD party, Bulgaria’s far-right Ataka party, Greece’s KKK party, and the pro-Kremlin Latvian Russian Union party[7].

Russian propaganda is also playing a major role in destabilizing the EU and fueling the growth of nationalist and anti-EU sentiment. According to a resolution adopted by the European Parliament in November 2016, Russian strategic communication is part of a larger subversive campaign to weaken EU cooperation and the sovereignty, political independence and territorial integrity of the Union and its Member States. Russia’s goal is to distort truths, provoke doubt, divide EU Member states, and ultimately undermine the European narrative[8]. In one example, Russian attempted to create division by manipulating the Brexit referendum. Researchers at Swansea University in Wales and the University of California at Berkeley found that more than 150,000 Russian-sponsored Twitter accounts that tweeted about Brexit in order to sow discord. In the 48 hours leading up to referendum, Russian-sponsored accounts posted more than 45,000 divisive messages meant to influence the outcomes[9]. Another example of Russian interference was during the Catalan crisis in 2017. Pro-Kremlin Twitter accounts amplified the Catalan crisis by 2,000% in an effort to support the Catalan Independence Referendum and cause further friction within Europe[10]. On October 1, 2017, 92 percent of the population voted in favor of independence and on October 27 the Parliament of Catalan declared independence from Spain sparking unrest in Spain.

This rise in nationalism presents a challenge not only to the future integrity of the EU, but also the security and stability of the region. Continuing to capitalize on the growing nationalist sentiments, Russia is achieving its interests by supporting nationalist political parties and far-right extremist groups that are increasing fractures within and between European states. These actions present an existential threat to European security and the future viability of the EU and NATO.


Endnotes:

[1] Janice, A. (n.d.). About Europe of Nations and Freedom. Retrieved February 15, 2019, from http://www.janiceatkinson.co.uk/enf/

[2] Europe of Freedom and Direct Democracy. (n.d.). Retrieved February 15, 2019, from http://www.europarl.europa.eu/elections-2014/en/political-groups/europe-of-freedom-and-direct-democracy/

[3] Holleran, M. (2018, February 16). The Opportunistic Rise of Europe’s Far Right. Retrieved February 15, 2019, from https://newrepublic.com/article/147102/opportunistic-rise-europes-far-right

[4] Frankel, B., Zablocki, M., ChanqizVafai, J., Lally, G., Kashanian, A., Lawson, J., Major, D., Nicaj, A., Lopez, R., Britt, J., Have, J.,&  Hussain, A., (Eds.). (2019, March 06). European ethno-nationalist and white supremacist movements thrive. Homeland Security Newswire. Retrieved March 10, 2019, from http://www.homelandsecuritynewswire.com/dr20190306-european-ethnonationalist-and-white-supremacist-movements-thrive

[5] Ibid., 2019

[6] Smale, A. (2016, December 19). Austria’s Far Right Signs a Cooperation Pact With Putin’s Party. The New York Times. Retrieved February 15, 2019, from https://www.nytimes.com/2016/12/19/world/europe/austrias-far-right-signs-a-cooperation-pact-with-putins-party.html

[7] Rettman, A, (2017, April 21) Illicit Russian Money Poses Threat to EU Democracy, EUobserver, Retrieved February 20, 2019, from https://euobserver.com/foreign/137631

[8] European Parliament Resolution of (2016, November 23) EU Strategic Communication to Counteract Propaganda against it by Third Parties, 2016/2030(INI), Nov. 23, 2016. . Retrieved February 15, 2019, from https://oeil.secure.europarl.europa.eu/oeil/popups/printficheglobal.pdf

[9] Mostrous, A., Gibbons, K., & Bridge, M. (2017, November 15). Russia used Twitter bots and trolls ‘to disrupt’ Brexit vote. The Times. Retrieved February 15, 2019, from https://www.thetimes.co.uk/article/russia-used-web-posts-to-disrupt-brexit-vote-h9nv5zg6c

[10] Alandete, D. (2017, October 01). Pro-Russian networks see 2,000% increase in activity in favor of Catalan referendum. El Pais. Retrieved February 19, 2019, from https://elpais.com/elpais/2017/10/01/inenglish/1506854868_900501.html

 

Assessment Papers Europe Jeremy Lawhorn Nationalism Option Papers

Options to Address U.S. Federal Government Budget Process Dysfunction

Thomas is a Sailor in the United States Navy.  He can be found on Twitter @CTNope.  The views expressed in this article are the author’s alone and do not represent the official position of the United States Navy, the Department of Defense, or the United States Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The current arrangements of tasks related to funding the U.S. Government enables government shutdowns to occur.  These shutdowns cause massive disruptions on many levels.

Date Originally Written:  January 30th, 2019.

Date Originally Published: 
 April 8, 2019.

Author and / or Article Point of View:  The author is a U.S. Navy sailor and undergraduate student, interested in the U.S. Government, foreign policy, and national security matters.

Background:  The United States Government is funded every year through an appropriations bill or through a continuing resolution of a previous bill. This bill, like all others, begins in the House of Representatives, is sent to the Senate, and signed by the President. Since 1976, when the current budget and appropriations process was adopted, there have been over 20 gaps in budget funding, commonly referred to as shutdowns. These shutdowns have lasted as little as 1 day to the recent 34 day shutdown of the Trump Administration. During a shutdown, federal agencies are unable to complete their missions, as their levels of funding degrade or run out entirely[1].

Significance: When the Federal Government runs out of funding, consequences arise at
all levels of society. Constituents, businesses, and institutions find it difficult to or are unable to execute tasks, such as filing tax returns, receiving permits for operations, or litigating judicial cases. Lapses in funding often lead to unforeseen, third-order of effect consequences[2]. It is challenging enough to strategically plan for the myriad of problems the United States faces, it is even more difficult to plan on a previous budget’s continuing resolution. But when the government runs out of funding, and agencies close, planning becomes all but impossible. While government shutdowns often end quickly, lapses in funding raise criticism on the stability of the United States and the ability of
elected officials to govern.

Option #1:  The budget process is changed from an annual to a biennial budget process. Congress would adopt a budget and all appropriation bills during the first year of a session, authorizing two years of funding, ensuing the budgets are only passed in non-election years. In addition, a review of tax expenditures would be mandated by a new law. This review would be conducted by creating a baseline projection of tax expenditures, drafted by the Congressional Budget Office (CBO), and an automatic review of all tax expenditures when baseline projections are exceeded.

Risk:  The changes outlined in Option 1 might not be effective in combating the symptoms of the dysfunction inside of the budget process. While extending the timeline of the budget cycle could mitigate the potential for a shutdown, it is still possible for shutdowns to occur, as the Congress and President must still come to a compromise. The creation of a tax review could give policymakers a non-partisan foundation to make policy changes, yet policymakers already have similar resources, stemming from think tanks, academia, or the CBO[3].

Gain:  While not perfect, enacting Option 1 would be challenging but not impossible in the current political climate. According to Gallup[4], changes to the budget cycle are widely supported and bipartisan. Option 1 allows Congress to better fulfill their appropriation responsibilities. In addition, in not having to work on an annual budget, Congress will have more time for oversight and reauthorizations of programs, better utilizing limited resources. Furthermore, the review of tax expenditures will allow Congress to ensure that it is meeting its mission of sustainable funding the Government.

Option #2:  Take budget approval power away from the President. This option entails creating a joint standing committee, specifically called the Semi-Annual Budget Committee, with 8 members of the Senate and 16 members of the House. The Speaker and the Minority Leader of the House Representatives would each appoint 8 members. The Majority and Minority Leader of the Senate would each appoint 4 members. The President would no longer sign the budget into law, rather, the responsibility would rest completely with the Congress. The President would submit budget requests, but those would be requests only – as the executive would cease to sign the budget. Lastly, this option has precedent. From the adoption of the Constitution until 1921, with the signing of the Budget and Accounting Act during the Harding Administration, the legislature had the majority of the “power of the purse”, the power to raise taxes and appropriate resources[5].

Risk:  While the Government would no longer shut down due to conflicts between the executive and legislature, this radical restructuring of responsibilities could have significant consequences. Specifically, partisanship, so common inside the beltway, could threaten the productivity of the Committee. If another hypothetical ‘Tea Party’ or equally populist leftist movement were to materialize, it is not difficult to foresee the Semi-Annual Budget Committee bogging down in a partisan slugging match.

Gain:  This option would ensure a degree of budget stability for the future by preventing the President from vetoing budget bills.

Other Comments:  Regardless of the chosen course of action, the current political landscape holds unique opportunities. According to Gallup data, a significant percentage of Americans support reforms to the current budget process[6]. With this board public approval, lawmakers could institute various reforms that previously were politically impractical. Furthermore, reform doesn’t have to be radical. It can take the form of incremental change over multiple Congressional sessions.

Recommendation:  None.


Endnotes:

[1] Cooper, Ryan. “Make Government Shutdowns Impossible Again.” The Week, January 23, 2019. Retrieved From: https://theweek.com/articles/819015/make-government-shutdowns-impossible-again.

[2] Walshe, Shushannah (October 17, 2013). “The Costs of the Government Shutdown”. ABC News. Archived from the original on September 12, 2017. Retrieved September 18, 2015. 

[3] United States Government Congressional Budget Office. “Processes.” Congressional Budget Office. (n.d.). Retrieved From:  https://www.cbo.gov/about/processes#baseline

[4] Gallup Pollsters. “Federal Budget Deficit.” Gallup. March 2018. Retrieved From: https://news.gallup.com/poll/147626/federal-budget-deficit.aspx.

[5] Constitution of the United States, Article I, 

[6] Gallup Pollsters. “Federal Budget Deficit.” Gallup. March 2018. Retrieved From: https://news.gallup.com/poll/147626/federal-budget-deficit.aspx.

Budgets and Resources Congress Option Papers Thomas United States

Options for the West to Address Russia’s Unconventional Tactics

This article is published as part of the Small Wars Journal and Divergent Options Writing Contest which runs from March 1, 2019 to May 31, 2019.  More information about the writing contest can be found here.


Jesse Short was enlisted in the U.S. Marine Corps infantry and served in the Republic of Iraq between 2005 and 2008.  He currently works as a security contractor in the Middle East and recently finished his M.S. in Global Studies and International Relations from Northeastern University.  He can be found on LinkedIn at www.linkedin.com/in/jesse-s-4b10a312a. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Russian Federation’s limited forms of warfare against western states and associated influence in other regions challenges the world as it is conducted below the threshold of war.

Date Originally Written:  March 3, 2019.

Date Originally Published:  March 25, 2019.

Author and / or Article Point of View:  The author is a veteran of the infantry in both the United States Marine Corps and United States Army. The author believes in checking clear threats to western states with strong and decisive, but intelligent responses. This article is written from the point of view of western states under the threat of the ‘unconventional’ actions of the Russian Federation.  

Background:  Russia, under the leadership of President Vladimir Putin, has established its foreign policy in the last ten years on interrupting and negatively influencing the stability of other states. This foreign policy has largely gone unanswered by the international community and only serves to reinforce the use of these actions by Russian actors. Georgia was the first case and Ukraine is a much more dynamic second example of this policy[1]. These two policy tests have proven to Russia, and in some sense to other states like China, that limited forms and unconventional forms of coercion, intimidation, and violence will go unchecked so long as they do not go too far with these actions. The West’s lack of imagination and adherence to one-sided western rules and laws are its glaring weakness. This weakness is being exploited relentlessly with little meaningful response.   

Significance:  Since around the time of Russia’s incursion into the Republic of Georgia in 2008, Putin has been operating unchecked around the world. Putin’s actions have been disastrous for what is an already tumultuous world order. If continued, these actions will create more direct and indirect issues in the future and increase the threat to western stability. 

Option #1:  The West influences Russia within its border.

The equal and opposite response to Russian transgressions around the world would be to attempt to spread misinformation and potentially destabilize Russian society by targeting the citizenry’s trust in Putin and his government. The aim with this approach is to distract the Russian government and intelligence services to preoccupy them with trouble within their own borders as to limit their ability to function effectively outside of their state borders. 

Risk:  While this approach is opposite to what actions most western societies are willing to take, this option can also have severely negative consequences on a political level in domestic politics in the West. While Russia can take similar actions as a semi-authoritarian state with little repercussion, the proposed actions would be a bigger issue in western democracies which are at the mercy of public opinion[2]. Russian media also has greater pull and influence within its community than western media does in the West, so Russia can shape its truth accordingly. Another large issue is that the Russian people should not be made to suffer for the actions that are mostly to be blamed on what appears to be their poorly representative government. This option could serve to galvanize polarity between Russians and western citizens unjustly if discovered. Finally, it is unlikely that western intelligence services would be given the support or be able to maintain the secrecy required to conduct these actions effectively without it being made public and having even more severe consequences once those actions were exposed[3]. 

Gain:  A misinformation campaign or the exposure to hidden truths covered up by the Russian government may have a positive effect on Russians and their relationship with / control of their government. Exposing voters to what their government is doing around the world with state funds may influence that relationship in a more positive manner. Also, if things did work out according to plan, Russia may be forced to withdraw somewhat from its politically divisive ventures in Georgia, Ukraine, Syria, and perhaps Africa and Belarus.     

Option #2:  The West responds outside of Russia.

Western states could act more aggressively in checking Russian support of small political factions and insurgencies in specific regions. The issue of Russian occupation in the Republic of Georgia and Russian material and personnel support in eastern Ukraine are the best places to start. A greater commitment to supporting the incoming regime following Ukraine’s upcoming elections and the involvement of western states in more intensive training and operations with Ukrainian forces would be a welcomed adjustment of policy[4]. The West’s turning of the other cheek that has largely followed Russia’s annexation of Crimea and support for the Donetsk and Luhansk Peoples’ Republics send the wrong messages to the friends and enemies of western powers.

Risk:  The risks that are ever-present with a stronger approach to Russian interventionist tactics are mainly geared at avoiding a larger conflict. The reason behind Russia’s low-intensity application of force and influence is to scare the faint-hearted away[5]. It is working. No state wants a war. War with Russia would not end well for any party that is involved. While war is unlikely, it is still a possibility that needs to be considered when additional states become involved in these limited conflicts. Again, politics must be factored into the commitment of force with warfighters, financial support, or materiel support. Democratic leaders are going to be hesitant to become involved in small wars with no strategy to back them up. Afghanistan and Iraq have already done enough damage to western powers with their lack of direction and their continued drain on resources to no end. 

Gain:  Showing aggressive states that their divisive actions will be met with a sure and solid response is the best thing that could happen for international stability in the coming years. The negligence the world community has shown to an overaggressive Russia and China in recent years has set a very dangerous precedent.  

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] United States Congress: Commission on Security Cooperation in Europe. (2018). Russia’s Occupation of Georgia and the Erosion of the International Order: Hearing before the Commission on Security and Cooperation in Europe, One Hundred Fifteenth Congress, Second Session, July 17, 2018.

[2] Zakem, V., Saunders, P., Hashimova, U., & Frier, P. (2017). Mapping Russian Media Network: Media’s Role in Russian Foreign Policy and Decision-Making (No. DRM-2017-U-015367-1Rev). Arlington, Virginia: CNA Analysis and Solutions. 

[3] Reichmann, D. (2017). “CIA boss Mike Pompeo says ‘leaker worship’ compromising American intelligence”. Global News. Retrieved from https://globalnews.ca/news/3554008/mike-pompeo-leakers-us-intelligence/

[4] Deychakiwsky, O. (2018). “Analysis: U.S. Assistance to Ukraine”. U.S. Ukraine Foundation. Retrieved from https://www.usukraine.org/analysis-u-s-assistance-ukraine/

[5] Khramchikhin, A. (2018). “Rethinking the Danger of Escalation: The Russia-NATO Military Balance”. Carnegie Endowment of International Peace. Retrieved from https://carnegieendowment.org/2018/01/25/rethinking-danger-of-escalation-russia-nato-military-balance-pub-75346.    

2019 - Contest: Small Wars Journal Below Established Threshold Activities (BETA) Jesse Short Option Papers Russia

Options for Peace in the Continuing War in Afghanistan

Suzanne Schroeder is an independent analyst.  She can be found on Twitter @SuzanneSueS57, and on Tumblr.  She is currently working on a long-term project on school poisonings in Afghanistan and has previously written for War on the Rocks.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  The war in Afghanistan continues to hurt the Afghan people, Afghan Government, Afghan Taliban (Taliban), and causes the U.S. and its Allies and Partners to expend lives and treasure in pursuit of elusive political objectives. The goal of a defeated Taliban has proven to be outside of the realm of realistic expectations, and pursing this end does not advance American standing.

Date Originally Written:  February 6, 2019.

Date Originally Published:  March 11, 2019.

Author and / or Article Point of View:  Suzanne Schroeder is an independent analyst. She has a particular interest in the history of the Taliban movement, and how it will continue to evolve.

Background:  As of this writing, talks have begun between the U.S. and the Taliban. What decisions can promote and sustain constructive dialogue?

Significance:  It remains to be seen if, after almost eighteen years in Afghanistan, the U.S. can achieve a “respectable” peace, with a credible method of ensuring long-term security.

Option #1:  The U.S. makes peace with the Taliban, and begins a withdrawal of U.S. forces. 

Risk:  Terrorists with global ambitions will again operate from Afghanistan, without being checked the Afghan Government. In the past two weeks, former U.S. Ambassador to Afghanistan Ryan Crocker has written two pieces, and was interviewed in a third, warning of the dangers of making a hasty peace deal with the Taliban. In a February 10, 2019 interview for New York magazine, Crocker replied to a question about the chances of the Taliban (if they took power), allowing Afghanistan to be used as a “staging ground, for U.S. attacks.” Crocker replied: “Well, that’s one way to look at it. Another way is that the Taliban decided it would continue to stand with Al Qaeda, even though it cost them the country. They would not break those ties, and I would absolutely not expect them to do so now[1].” In the recently published work, The Taliban Reader, Section 3, which covers the period when the Taliban re-emerged as an insurgency, is introduced with this remark: “In the run-up to Operation Enduring Freedom, opinions among the Taliban leadership were split: some were convinced the US would attack, others-including Mullah Mohammed Omar-did not think the US would go to war over bin Laden[2].” The Taliban Reader essentially challenges Crocker’s assertion, that the Taliban made a conscious decision to lose their Emirate, in defense of Al Qaeda.

Gain:  The gain would be an end to a costly and destructive war that U.S. President Donald Trump has stated is “not in our national interest.” Peace with the Taliban might allow Afghanistan to achieve a greater level of stability through regional cooperation, and a more towards level of self-sufficiency.  This assumes that supportive means are well thought-out, so the war’s end would not be viewed as U.S. abandonment. In the absence of ongoing conflict, civil institutions might develop and contribute to social stability. Obviously, this is a delicate and precarious process, and it cannot be judged, until the participation of the Afghan Government takes place.

In July 2018, Dr. Barnett Rubin, the Director of the Center for International Cooperation at New York University, appeared on Tolo News to discuss the Eid Ceasefire that had just taken place between the Taliban and Afghan Government forces the previous month. Dr. Rubin made the following statement about the Taliban: “They have acted in reciprocity to the Afghan Government’s offer, which shows that they are part of the Afghan political system, whether they accept its current legal framework or not[3].” Dr. Rubin’s point was that the Taliban, at some juncture, must enter the Afghan system not defined as necessarily entering the Afghan Government per se, but no longer being a party to conflict, and an eventual end to the restrictions that were currently in place would give them a means to full civil participation. 

Negotiations are at an initial stage and will not be fully underway until the Taliban begins to speak to the current Afghan Government. But with the widespread perception that the Afghan government is not viable without continued U.S. support, this means that the Afghan Government will be negotiating from a disadvantaged position. A possible way to overcome this may be for the Taliban to be included in international development initiatives, like the Chabahar Port[4] and the Belt and Road Initiative[5].  With a role that would require constructive participation and is largely non-ideological, former enemies might become stakeholders in future economic development.

Option #2:  The U.S. and Afghan Government continue to apply pressure on the Taliban — in short, “talk and fight.” 

Risk:  This strategy is the ultimate double-edged sword, from the Taliban’s point of view. It’s said that every civilian casualty wins the Taliban a new supporter. But these casualties also cause an increased resentment of Taliban recalcitrance, and stirs anger among segments of the population that may not actively oppose them. The Afghan Peace march, which took place in the summer of 2018, shows the level of war fatigue that motivated a wide range of people to walk for hundreds of miles with a unified sense of purpose. Their marchers four main demands were significant in that they did not contain any fundamental denouncements, specifically directed at the Taliban. Rather, they called for a ceasefire, peace talks, mutually agreed upon laws, and the withdrawal for foreign troops[6] (italics added). With such strong support for an end to this conflict, the U.S., the Afghan Government and the Taliban all damage themselves, by ignoring very profound wishes for peace, shared by a large segment of the Afghan population. The U.S. also recognized taking on a nuclear-armed Pakistan may not be worth it, especially as the conflict in Kashmir has once again accelerated, and it’s unlikely that Pakistan will take measures against the Taliban.

Gain:  U.S. and Afghan forces manage to exert sufficient pressure on the Taliban, to make them admit to the futility of continued conflict. The U.S. manages to construct a narrative that focuses on the complexities of the last thirty years of Afghan history, rather than the shortcomings of U.S. policy in the region.  

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Hart, B. (2019, February 10). A Former U.S. Ambassador to Afghanistan Thinks Trump’s Exit Strategy Is a Huge Mistake. NewYork.

[2] Linschoten, A. S., & Kuehn, F. (2018). The Taliban Reader: War, Islam and Politics in their Own Words. New York, NY: Oxford University Press.

[3] Tolo News Special Interview with US Expert Barnett Rubin [Video file]. Retrieved from https://www.youtube.com/watch?v=PEEDrRTlrvY

[4] Afghanistan opens new export route to India through Iran’s Chabahar port – Times of India. (2019, February 24). Retrieved from https://timesofindia.indiatimes.com/business/international-business/afghanistan-launches-new-export-route-to-india-through-irans-chabahar-port/articleshow/68140985.cms

[5] Afghanistan’s Role in the Belt and Road Initiative (Part 1). (2018, October 11). Retrieved from http://www.outlookafghanistan.net/topics.php?post_id=21989

[6] Ali M Latifi for CNN. (2018, June 18). Afghans who marched hundreds of miles for peace arrive in Kabul. Retrieved from https://www.cnn.com/2018/06/18/asia/afghanistan-peace-march-intl/index.html

Afghanistan Option Papers Suzanne Schroeder United States

Alternative Futures: United Kingdom Options in Venezuela

Hal Wilson is a member of the Military Writers Guild, and uses narrative to explore future conflict.  His finalist fiction contest entries have been published by the leading national security journal War on the Rocks, as well as the Atlantic Council’s Art of the Future Project.  His fiction has also been published by the U.S. Army Training and Doctrine Command and the Australian Army Logistics Training Centre.  Hal graduated with first-class honours in War Studies and History from King’s College, London, and is studying an MA on the First World War. He tweets at @HalWilson_.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  In an alternative future, the United States and Brazil will intervene imminently in the Bolivarian Republic of Venezuela. The United Kingdom (UK) faces being pulled into the crisis. 

Date Originally Written:  February 2, 2019.

Date Originally Published:  February 11, 2019.

Author and / or Article Point of View:  This article is written from the point of view of the UK National Security Adviser personally briefing 10, Downing Street on potential courses of action.

Background:  The Venezuelan state has collapsed, leaving the country in the grip of growing civil strife.  The recent death of Venezuelan President Nicholas Maduro in last month’s crash of a Cessna Citation – registration number YV2030, frequently used by the Maduro family[1] – failed to leave a clear successor.  As such, the ‘Bolivarian’ armed forces, affiliated militias (‘colectivos’) and even government-aligned criminal networks (‘pranes[2]’) are clashing for control of the socialist regime.

Mounting violence has seen the abduction-and-murder of opposition leader Juan Guaidó by regime intelligence on February 29, 2019[3], followed by last week’s shoot-down of a Puerto Rico Air National Guard C-130J, tail registration 64-0008. C-130J / 64-0008 was supporting in Operation DELIVER COMFORT – the ongoing U.S. effort to airdrop aid over Venezuela. UK Permanent Joint Headquarters in Northwood now confirms that, late yesterday evening, the Bolivarian Navy of Venezuela (BNV) attacked the Royal Fleet Auxiliary Agrippa.

Agrippa, a maritime support ship, was in-region to conduct Atlantic Patrol Tasking North – the UK’s standing patrol to support Caribbean Commonwealth partners and British Overseas Territories (BOTs). While departing Grenada for Monserrat, a single anti-ship missile (AShM) was fired against Agrippa, which successfully destroyed the missile with its Phalanx Close-In-Weapons-System. The BNV patrol boat – most likely Constitución-class, ironically built in the UK during the 1970s[4]  – withdrew immediately after firing.

It remains unclear why the Agrippa was attacked. Even despite recent aggressiveness by the BNV towards U.S. shipping[5], this represents a grave escalation.

Significance:  Without a leadership figure in the Venezuelan capital of Caracas, the Agrippa incident and the loss of 64-0008 to a Man-Portable-Air-Defence-System (MANPADS) demonstrate a probable loss of control over state arsenals. Despite limited professionalism among the armed forces[6], the availability of such sophisticated weapon-systems is a major threat to regional stability. The risk of proliferation of MANPADS on the black-market is a particular concern.

Uproar over the loss of 64-0008 has also made intervention all but certain: repeated[7] warnings[8] to avert an intervention in Venezuela have lost weight in Washington and Brasilia[9]. U.S. enthusiasm in particular is buoyed in direct proportion to the likely share of effort which will be borne by Brazilian troops[10].

Although the UK faces no direct risk, Commonwealth partners and already-vulnerable BOTs stand to suffer if the violence continues to spill-over. A regional Notice to Mariners has been issued, complementing last week’s Notice to Airmen after the loss of 64-0008. The resultant increase of shipping insurance is further disrupting vital supply chains to isolated BOTs such as Monserrat. The UK is obliged to protect these territories.

Option #1:  The UK provides aerial support to the probable U.S.-Brazilian joint humanitarian intervention.

Risk:  Between Brazilian forces and the U.S. Global Response Force[11], the Venezuelan military will be rapidly overrun[12]. It is illustrative to note the Venezuelan Air Force is grounded by flight-safety issues[13] and defections[14] – to the point where DELIVER COMFORT remains unchallenged by any Venezuelan military aircraft.

The primary challenge will be the U.S./Brazilian occupation of major urban centres such as Caracas or Maracaibo. These cities include neighbourhoods dominated by loyalists to the socialist regime, and will pose considerable counter-insurgency challenges. Improvised explosive devices have already been employed by the opposition[15] and it can only be assumed regime loyalists will use similar techniques following an invasion.

UK sealift capacity is largely tied down supporting EXERCISE SAIF SAIREEA 6 in Oman. This conveniently precludes the prospect of large-scale UK ground contribution in Venezuela. The Royal Air Force (RAF) can nevertheless offer FGR4 Typhoons and Voyager aerial tankers to stage out of Puerto Rico, drawing on experience in long-range deployments[16].

Gain:  The UK will win favour in Washington while avoiding the more substantial risks of a ground deployment. By helping to crush the vying armed groups within Venezuela, Caribbean BOTs and Commonwealth partners will be reassured of ongoing UK support to their security.

Option #2:  The UK coordinates the acquisition or sabotage of Venezuelan MANPADS & AShM systems.

Risk:  By targeting sophisticated weapon-systems, we can not only neutralise a key threat to our U.S. & Brazilian allies, but also the main source of disruption to regional Commonwealth partners and BOTs. Bribery or staged purchases can be used to render these weapons harmless, or to have them delivered to UK hands for safekeeping. A similar activity was pursued by the Secret Intelligence Service during the 1982 Falklands War, targeting stocks of the ‘Exocet’ AShM[17].

This route, however, cannot guarantee complete success – especially where MANPADS may be held by regime loyalists, for instance. The risk to UK contacts inside Venezuela will be severe, besides the public-relations risk of UK taxpayer money being used in the illicit trade of arms. As a covert activity, it will also fail to publicly reassure local Commonwealth partners and the BOTs of a diminishing threat.

Gain:  This averts the expense of a full RAF deployment, while delivering results which can speed the U.S./Brazilian occupation of Venezuela – and ultimately assuring improved Caribbean stability. By not directly involving ourselves in the invasion, we also avoid inadvertent attacks against Russian mercenary forces in-country[18], or Russian civilians engaged in arms deliveries to the regime[19].

Option #3:  The UK enhances Royal Navy (RN) patrols in the Caribbean.

Risk:  The RN is currently thinly stretched. Besides ongoing North Atlantic Treaty Organization deployments and ships based at Bahrain, significant resources are tied up in the HMS QUEEN ELIZABETH Maritime Task Group to Singapore. A Type 45 Destroyer, HMS Dido, can nevertheless be made available. With a significant anti-missile capability[20], Dido can intercept any further AShM attacks and better protect local shipping than the Agrippa.

This will, however, fail to address the wider issue of MANPADS proliferation within Venezuela itself. The presence of a single additional air-defence warship will also do little to assist the U.S./Brazilian invasion: Washington may perceive the deployment as a token gesture.

Gain:  This option again averts the potential costs of an RAF engagement in the upcoming invasion of Venezuela, while offering highly visible reassurance to Caribbean Commonwealth partners and BOTs. Shipping insurance may be induced to return to pre-crisis levels, alleviating local supply chain disruptions.

Other comments:  The Venezuelan crisis poses an increasing destabilization risk to already-vulnerable BOTs and Commonwealth friends in the Caribbean. We must take action to assure their safety and prosperity.

Recommendation:  None.


Endnotes:

[1] Bellingcat, (2018, Dec 22)Identifying Aircraft in the Comina Operation in Venezuela https://www.bellingcat.com/news/americas/2018/12/22/identifying-aircraft-in-the-canaima-operation-in-venezuela/

[2] Centre for Strategic & International Studies, (2019, Jan 23) The Struggle for Control of Occupied Venezuela https://www.csis.org/analysis/struggle-control-occupied-venezuela

[3] The New York Times, (2019, Jan 13) Venezuela Opposition Leader is Arrested After Proposing to Take Power https://www.nytimes.com/2019/01/13/world/americas/venezeula-juan-guaido-arrest.html

[4] Hazegray.org, (2001, Oct 26) World Navies Today: Venezuela
https://www.hazegray.org/worldnav/americas/venez.htm

[5] Navaltoday.com, (2018, Dec 25) Venezuelan Navy stops ExxonMobil ship in Guyana Dispute
https://navaltoday.com/2018/12/25/venezuelan-navy-stops-exxonmob%E2%80%8Eil-ship-in-guyana-dispute/

[6] Bellingcat, (2018, May 13) “We are going to surrender! Stop shooting!”: Reconstructing Oscar Perez’s Last Hours
https://www.bellingcat.com/news/americas/2018/05/13/we-are-going-to-surrender-stop-shooting-reconstructing-oscar-perezs-last-hours/

[7] Foreign Affairs, (2017, Nov 8) What Would a U.S. Intervention in Venezuela Look Like?
https://www.foreignaffairs.com/articles/venezuela/2017-11-08/what-would-us-intervention-venezuela-look

[8] TIME, (2019, Jan 31) I Commanded the U.S. Military in South America. Deploying Soldiers to Venezuela Would Only Make Things Worse
http://time.com/5516698/nicolas-maduro-juan-guaido-venezuela-trump-military/

[9] The Guardian, (2018, Dec 14) Rightwing Venezuelan exiles hope Bolsonaro will help rid them of Maduro
https://www.theguardian.com/world/2018/dec/13/brazil-bolsonaro-maduro-venezuela-dissidents-rightwing

[10] Twitter, (2019. Feb 2)
https://twitter.com/saveriovivas/status/1091733430151364610

[11] RAND, (2016) Enabling the Global Response Force, Access Strategies for the 82nd Airborne Division https://www.rand.org/pubs/research_reports/RR1161.html

[12] Military Review: The Professional Journal of the US Army, (January 2019) Venezuela, A ‘Black Swan’ Hot Spot
https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Jan-Feb-2019/Delgado-Venezuela/

[13] The Aviationist,(2012, Nov 28) Photo shows pilots ejecting from their jet moments before it crashed into the ground https://theaviationist.com/2012/11/28/k8-crash/

[14] Daily Sabah, (2019, Feb 2) Venezuela air force general defects in rebellion against President Maduro https://www.dailysabah.com/americas/2019/02/02/venezuela-air-force-general-defects-in-rebellion-against-president-maduro

[15] Bellingcat, (2017, Sept 2) The Bombs of Caracas
https://www.bellingcat.com/news/americas/2017/09/02/the-bombs-of-caracas/

[16] Forces Network, (2016, Sept 29) RAF Typhoons Head to Far East Amid Heightened Tensions https://www.forces.net/services/raf/raf-typhoons-head-far-east-amid-heightened-tensions

[17] The Telegraph (2002, Mar 13) How France helped us win Falklands War, by John Nott https://www.telegraph.co.uk/news/uknews/1387576/How-France-helped-us-win-Falklands-war-by-John-Nott.html

[18] The Guardian (2019, Jan 13) Russian mercenaries reportedly in Venezuela to protect Maduro https://www.theguardian.com/world/2019/jan/25/venezuela-maduro-russia-private-security-contractors

[19] TASS, (2018, Apr 4) Kalashnikov plant in Venezuela to start production in 2019 http://tass.com/defense/997625

[20] Savetheroyalnavy.com (2015, Sep 28) UK and NATO navies take further small steps in developing ballistic missile defence
https://www.savetheroyalnavy.org/uk-and-nato-navies-take-further-small-steps-in-developing-ballistic-missile-defence/

 

Alternative Futures / Alternative Histories / Counterfactuals Brazil Option Papers United Kingdom Venezuela

Options for the U.S. Middle East Strategic Alliance

Colby Connelly is an MA Candidate in Global Security Studies at Johns Hopkins University.  He previously worked in Saudi Arabia for several years.  He can be found on Twitter @ColbyAntonius.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Disunity among U.S. partners in the Persian Gulf threatens prospects for the establishment of the Middle East Strategic Alliance (MESA).

Date Originally Written:  January 6, 2019.

Date Originally Published:  January 8, 2019.

Author and / or Article Point of View:  The author is a graduate student interested in U.S. security policy towards Gulf Cooperation Council (GCC) states.

Background:  The Trump Administration has expressed the intention to create a Sunni Arab alliance aimed at countering Iranian influence in the Middle East through the establishment of MESA, often referred to as the “Arab North Atlantic Treaty Organization (NATO)[1].” Prospective MESA member states are Saudi Arabia, Bahrain, Qatar, Kuwait, the United Arab Emirates, Oman, Jordan, and Egypt. Such an alliance would constitute a unified bloc of U.S.-backed nations and theoretically indicate to the Iranian government that a new, highly coordinated effort to counter Iranian influence in the region is taking shape.

Significance:  Since the inception of the Carter Doctrine, which firmly delineates American national security interests in the Persian Gulf, the U.S. has developed extensive political, security, and economic ties with through the GCC. GCC members include Saudi Arabia, Kuwait, the United Arab Emirates, Qatar, Bahrain, and Oman. While the Trump Administration envisions the GCC members making up the backbone of MESA, in recent years the bloc has been more divided than at any time in its history. The GCC is effectively split between Saudi Arabia, the United Arab Emirates, and Bahrain, who favor more assertive measures to counter Iranian influence in the Middle East, and Qatar, Kuwait, and Oman, who advocate a softer approach to the Iranian question. How to approach Iranian influence is one issue among others that has contributed to the ongoing boycott of Qatar by Saudi Arabia, the United Arab Emirates, Bahrain, and Egypt since 2017. The Trump Administration has encouraged a settlement to the dispute but has made little headway.

Option #1:  The Trump Administration continues to advocate for the formation of MESA.

Risk:  Forming MESA is a challenge as there is no agreement among potential members regarding the threat Iran poses nor how to best address it[2]. Historically, GCC states are quicker to close ranks in the face of a commonly perceived threat. The GCC was formed in response to the Iran-Iraq war, and the bloc was most united in its apprehension to what it perceived as U.S. disengagement from the Middle East during the Obama Administration. So long as the GCC states feel reassured that the U.S. will remain directly involved in the region, they may see no need for national security cohesion amongst themselves. The ongoing GCC crisis indicates that Arab Gulf states place little faith in regional institutions and prefer bilateralism, especially where security issues are concerned. The failure of the Peninsula Shield Force to ever develop into an effective regional defense body able to deter and respond to military aggression against any GCC member is perhaps the most prolific example of this bilateralism dynamic[3]. Further, a resolution to the ongoing boycott of Qatar by GCC members would almost certainly be a prerequisite to the establishment of MESA. Even if the Qatar crisis were to be resolved, defense cooperation would still be impeded by the wariness with which these states will view one another for years to come.

Gain:  The formation of a unified bloc of U.S. partner states committed to balancing Iranian influence in the Middle East may serve to deter increased Iranian aggression in the region. This balancing is of particular relevance to the Strait of Hormuz and Bab El-Mandab Strait; both of which are chokepoints for global commercial shipping that can be threatened by Iran or armed groups that enjoy Iran’s support[4]. In backing MESA, the U.S. would also bolster the strength of the relationships it already maintains with prospective member states, four of which are major non-NATO Allies. As all prospective MESA members are major purchasers of U.S. military equipment, the alliance would consist of countries whose weapons systems have degrees of interoperability, and whose personnel all share a common language.

Option #2:  The Trump Administration continues a bilateral approach towards security partners in the Middle East.

Risk:  Should an imminent threat emerge from Iran or another actor, there is no guarantee that U.S. partners in the region would rush to one another’s defense. For example, Egypt may be averse to a military engagement with Iran over its activities in the Gulf. This may leave the U.S. alone in defense of its partner states. A bilateral strategy may also lack some of the insulation provided by multilateral defense agreements that could dissuade adversaries like Iran and Russia from exploiting division among U.S. partners. For instance, Russia has courted Qatar since its expression of interest in purchasing the Russian S-400 air defense system, which is not interoperable with other U.S.-made systems deployed throughout the Gulf region[5].

Gain:  The U.S. can use a “hub and spoke” approach to tailor its policy to regional security based on the needs of its individual partners. By maintaining and expanding its defense relationships in the Gulf, including the U.S. military presence in Kuwait, Qatar, and Bahrain, the U.S. can ensure that both itself and its allies are equipped to handle threats as they emerge. Devoting increased resources and efforts to force development may deter Iranian aggression more so than simply establishing new regional institutions, which with few exceptions have often held a poor track record in the Middle East. An approach that favors bilateralism may sacrifice some degree of power projection, but would perhaps more importantly allow the U.S. to ensure that its partners are able to effectively expand their defense capabilities.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] NATO for Arabs? A new Arab military alliance has dim prospects. (2018, October 6). Retrieved from The Economist: https://www.economist.com/middle-east-and-africa/2018/10/06/a-new-arab-military-alliance-has-dim-prospects

[2] Kahan, J. H. (2016). Security Assurances for the Gulf States: A Bearable Burden? Middle East Policy, 23(3), 30-38.

[3] Bowden, J. (2017). Keeping It Together: A Historical Approach to Resolving Stresses and Strains Within the Peninsula Shield Force. Journal of International Affairs, 70(2), 134-149.

[4] Lee, J. (2018, 26 July). Bab el-Mandeb, an Emerging Chokepoint for Middle East Oil Flows. Retrieved from Bloomberg: https://www.bloomberg.com/news/articles/2018-07-26/bab-el-mandeb-an-emerging-chokepoint-for-middle-east-oil-flows

[5] Russia and Qatar discuss S400 missile deal. (2018, July 21). Retrieved from Reuters: https://www.reuters.com/article/us-russia-qatar-arms/russia-and-qatar-discuss-s-400-missile-systems-deal-tass-idUSKBN1KB0F0

Allies & Partners Colby Connelly Middle East Option Papers United States

Options for Countering the Rise of Chinese Private Military Contractors

Anthony Patrick is a graduate of Georgia State University and an Officer in the United States Marine Corps.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Future threats to United States (U.S.) interests abroad from Chinese Private Military Contractors.

Date Originally Written:  November, 26, 2018.

Date Originally Published:  December 24, 2018.

Author and / or Article Point of View:  The author is a United States Marine Corps Officer and currently attending The Basic School. 

Background:  Over the last six months, the media has been flooded with stories and articles about the possibility of a trade war between the U.S and the People Republic of China (PRC). These talks have mainly focused around specific trade policies such as intellectual property rights and the trade balance between the two nations. These tensions have risen from the PRC’s growing economic influence around the world. While many problems persist between the U.S and the PRC due to the latter’s rise, one issue that is not frequently discussed is the growing use of Private Military Contractors (PMCs) by the PRC. As Chinese companies have moved operations further abroad, they require protection for those investments. While the current number of Chinese PMCs is not large, it has been growing at a worrying rate, which could challenge U.S interests abroad[1]. 

Significance:  Many countries have utilized PMCs in foreign operations. The most significant international incidents involving PMCs mainly come from those based in the U.S and the Russian Federation. However, many other countries with interests abroad have increasingly started to utilize PMCs. One of the most significant examples has been the growing use of Chinese PMC’s. These PMCs pose a very unique set of threats to U.S national security interest abroad[2]. First, like most PMC’s, Chinese contractors come mainly from the Peoples Liberation Army and policing forces. This means that the PMCs have a significant amount of military training. Secondly, the legal relationship between the PMC’s and the PRC is different than in most other countries. Since the PRC is an authoritarian country, the government can leverage multiple forms of coercion to force PMC’s into a certain course of action, giving the government a somewhat deniable capability to control foreign soil. Lastly, the Chinese can use PMC’s as a means to push their desired political endstate on foreign countries. With the U.S still being ahead of the PRC militarily, and with both states having nuclear capabilities, conventional conflict is highly unlikely. One way for the Chinese to employ forces to counter U.S. interests abroad is through the use of PMC’s, similar to what Russia has done in Syria[3]. With this in mind, the U.S will need a proactive response that will address this problem both in the short and long term.  

Option #1:  Increase the Department of Defense’s (DoD) focus on training to counter irregular/asymmetric warfare to address the threat posed by PRC PMCs. 

Risk:  The new National Defense Strategy (NDS) focuses on many aspects of the future conventional battlefield like increasing the size of the U.S Navy, cyber operations, and cutting edge weapons platforms[4]. By focusing more of the DoD’s resources on training to counter irregular / asymmetric warfare, the military will not be able to accomplish the goals in the NDS. This option could also lead to a new generation of military members who are more adept at skills necessary for smaller operations, and put the U.S at a leadership disadvantage if a war were to break out between the U.S and a near peer competitor. 

Gain:  Another major conventional war is highly unlikely. Most U.S. near peer competitors are weaker militarily or have second strike nuclear capabilities. Future conflicts will most likely require the U.S. to counter irregular / asymmetric warfare methodologies, which PRC PMCs may utilize.  By focusing DoD resources in this area, the U.S would gain the ability to counter these types of warfare, no matter who employs them. In addition to being better able to conduct operations similar to Afghanistan, the U.S. would also have the tools to address threats posed by PRC PMCs.  Emphasizing this type of warfare would also give U.S actions more international legitimacy as it would be employing recognized state assets and not trying to counter a PRC PMC with a U.S. PMC. 

Option #2:  The U.S. pursues an international treaty governing the use of PMC’s worldwide.  

Risk:   Diplomatic efforts take time, and are subject to many forms of bureaucratic blockage depending on what level the negations are occurring. Option #2 would also be challenging to have an all-inclusive treaty that would cover every nation a PMC comes from or every country from which an employee of these firms might hail. Also, by signing a binding treaty, the U.S would limit its options in foreign conflict zones or in areas where Chinese PMC’s are operating or where the U.S. wants to use a PMC instead of the military.

Gain:  A binding international treaty would help solve most of the problems caused by PMC’s globally and set the stage for how PRC PMC’s act as they proliferate globally[5]. By making the first move in treaty negotiations, the U.S can set the agenda for what topics will be covered. The U.S can build off of the framework set by the Montreux document, which sets a non-binding list of good practices for PMCs[6]. By using the offices of the United Nations Working Group on PMCs the U.S would be able to quickly pull together a coalition of like minded countries which could drive the larger negotiation process. Lastly, Option #2 would help solve existing problems with PMC’s operating on behalf of other countries, like the Russian Federation. 

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Swaine, M. D., & Arduino, A. (2018, May 08). The Rise of China’s Private Security (Rep.). Retrieved November 26, 2018, from Carnegie Endowment For International Peace website: https://carnegieendowment.org/2018/05/08/rise-of-china-s-private-security-companies-event-6886

[2] Erickson, A., & Collins, G. (2012, February 21). Enter China’s Security Firms. Retrieved November 26, 2018, from https://thediplomat.com/2012/02/enter-chinas-security-firms/3/

[3] United States., Department of Defense, (n.d.). Summary of the 2018 National Defense strategy of the United States of America: Sharpening the American Military’s Competitive Edge (pp. 1-14).

[4] Gibbons-neff, T. (2018, May 24). How a 4-Hour Battle Between Russian Mercenaries and U.S. Commandos Unfolded in Syria. Retrieved November 25, 2018, from https://www.nytimes.com/2018/05/24/world/middleeast/american-commandos-russian-mercenaries-syria.html

[5] Guardians of the Belt and Road. (2018, August 16). Retrieved November 26, 2018, from https://www.merics.org/en/china-monitor/guardians-of-belt-and-road

[6] Switzerland, Federal Department of Foreign Affairs, Directorate of International Law. (2008, September 17). The Montreux Document. Retrieved November 26, 2018, from https://www.icrc.org/en/doc/assets/files/other/icrc_002_0996.pdf

Anthony Patrick Below Established Threshold Activities (BETA) China (People's Republic of China) Irregular Forces / Irregular Warfare Non-Government Entities Option Papers

Great Britain’s Options After Departing the European Union

Steve Maguire has a strong interest in strategic deterrence and British defence and security policy.  He can be found Twitter @SRDMaguire, has published in the Small Wars Journal, and is a regular contributor to the British military blog, The Wavell Room. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Great Britain will leave the European Union in March 2019 ending decades of political and economic integration.  This has left Britain at a strategic crossroads and the country must decide how and where to commit its military and security prowess to best achieve national objectives. 

Date Originally Written:  October, 20, 2018.

Date Originally Published:  November 26, 2018.

Author and / or Article Point of View:  The author believes that Britain is international by design but must better concentrate its assets in support of more targeted economic goals.  

Background:  Britain is a nuclear power, a major North Atlantic Treaty Organization (NATO) ally, head of a Commonwealth of Nations, and a permanent member of the United Nations Security Council with a strong history of global engagement.  Much of this prestige has been tied into Britain’s membership of the European Union and the defence of Europe is currently seen as a critical national security interest.  In September 2017 Prime Minister Theresa May re-iterated that Britain remained ‘unconditionally committed’ to the defence of the continent.  From a traditional view-point this makes sense; the European Union is Britain’s largest export market and Britain has grown international influence through membership.

Significance:  There is a difference between physical ‘Europe’ and the political institution known as the ‘European Union’ but the political institution dominates the European contingent and is a major political actor in its own right.  British policy makers must consider if remaining unconditionally committed to Europe is the right strategy to prosper in an increasingly competitive global environment and whether it is key to Britain’s future.  To continue a relationship with Europe means Britain is likely to become a second-tier European country outside of European political mechanisms.  Britain could choose, instead, to focus its resources on an Extra-European foreign policy and exploit the benefits of its diplomatic reach.   

Option #1:  Britain maintains a focus on and aligns economically with Europe. 

Risk:  Britain would be committed to the defence of Europe but treated as a second-rate member with limited power or influence and unable to reap meaningful benefits.  Analysing the impact of leaving the European Union, a former head of the British Intelligence Service commented that ‘Britain on its own will count for little’ highlighting the impact.  Britain also plans to leave the single market and customs union that binds Europe together denuding many of the wider economic benefits it previously enjoyed.  As Europe develops its own independent defence policy, it is also likely that Europe’s appetite for engagement with NATO begins to weaken reducing Britain’s role in the Alliance.  Without being a member of the European Union, Britain can only hope to be ‘plugged in’ to the political structure and influence policy through limited consultation.  If Britain chooses this option it will have to accept a significantly reduced role as a European power.

Gain:  Many threats to Britain, notably Russia, are mitigated through common European defence and security positions.  By remaining ‘unconditionally’ committed to the defence of Europe, Britain will buy good will and co-operation.  Recent initiatives have seen Britain reaching out with bi-lateral defence deals and these can be exploited to maintain British influence and shape the continent towards British goals.  Further development of bespoke forces through NATO, such as the Joint Expeditionary Force of Northern European countries, would allow Britain to continue leveraging European power outside of the political control of the European Union.  

Option #2:  Britain chooses an Extra-European focus which would concentrate on building relationships with the rest of the world at the expense of Europe.

Risk:  Russia has been described as the ‘most complex security challenge’ to Britain.  If Britain chooses to focus its resources outside of Europe then it could dilute the rewards of a common approach towards Russia.  Britain is also a significant member of NATO and the organisation is the foundation of British security.  Option #2 is likely to undermine British influence and prestige in the Alliance.  Whilst Britain is well placed to renew its global standing, it is likely to have a negative impact on the wider balance of power.  China has recently criticised British foreign policy in the Far-East as provocative and China may choose to undermine British operations elsewhere.  Similarly, Britain will become a direct competitor to its previous partners in the European Union as it seeks to exploit new trading relationships.  If Britain wished to diverge from European positions significantly it could even become the target of additional European tariffs, or worse, sanctions targeting its independent foreign policy.  

Gain:  A recent geopolitical capability audit rated Britain as the world’s second most capable power but questioned if Britain had the right strategy to be a leader of nations.  Defence assets and foreign policy would need to be more concentrated to achieve Britain’s goals if Britain is to build global relationships with meaningful benefits as part of Option #2.  The ‘Global Britain’ strategy is being developed and Britain has been successful when concentrating on Extra-European projects.  For example, in June 2018 a Royal Navy visit to Australia resulted in a major defence contract and ensured interoperability of defence assets.  There is potential for significant projects with countries such as Japan.  More will follow creating new markets and trading alliances better suited to British needs.  Extra-European markets are expanding at a rapid rate and Britain can only fully exploit hem if Option #2 is resourced and not restricted by a major focus on Europe.   

Europe has also not shared Britain’s willingness to directly tackle security threats or conduct military interventions at scale.  Freed from a focus on Europe, Britain would be better enabled to resource other alliances and mitigate threats with a more global strategy without the political processes required to generate common, and therefore diluted, European positions. 

Other Comments:  None.  

Recommendation:  None.


Endnotes:

[1] James, W. (2018). Britain Unconditionally Committed to Maintaining European Security. Reuters. [online] Available at: https://uk.reuters.com/article/uk-britain-eu-defence-security/britain-unconditionally-committed-to-maintaining-european-security-official-document-idUKKCN1BN1DL [Accessed 16 Oct. 2018].

[2] Ward, M. and Webb, D. (2018). Statistics on UK-EU Trade. U.K. Research Briefing. [online] Available at: https://researchbriefings.parliament.uk/ResearchBriefing/Summary/CBP-7851 [Accessed 17 Oct. 2018].

[3] Sawers, J. (2018). Britain on its own will count for little on the world stage. Financial Times. [online] Available at: https://www.ft.com/content/1e11c6a0-54fe-11e7-80b6-9bfa4c1f83d2 [Accessed 17 Oct. 2018].

[4] Bond, I. (2018). Plugging in the British: EU Foreign Policy. Centre for European Reform. [online] Available at: https://cer.eu/publications/archive/policy-brief/2018/plugging-british-eu-foreign-policy [Accessed 16 Oct. 2018].

[5] British Government (2018). UK-Poland Intergovernmental Consultations, 21 December 2017: Joint Communiqué. [online] GOV.UK. Available at: https://www.gov.uk/government/publications/uk-poland-intergovernmental-consultations-21-december-2017-joint-communique [Accessed 16 Oct. 2018].

[6] Carter, N. (2018). Dynamic Security Threats and the British Army. RUSI. [online] Available at: https://rusi.org/event/dynamic-security-threats-and-british-army [Accessed 17 Oct. 2018].

[7] Hayton, B. (2018). Britain Is Right to Stand Up to China Over Freedom of Navigation. Chatham House. [online] Available at: https://www.chathamhouse.org/expert/comment/britain-right-stand-china-over-freedom-navigation [Accessed 16 Oct. 2018].

[8] Rodgers, J. (2018). [online] Towards ‘Global Britain’. Henry Jackson Society. [online] Available at: https://henryjacksonsociety.org/publications/towards-global-britain-challenging-the-new-narratives-of-national-decline/ [Accessed 17 Oct. 2018].

[9] British Government (2018). Global Britain: delivering on our international ambition. [online] Available at: https://www.gov.uk/government/collections/global-britain-delivering-on-our-international-ambition [Accessed 18 Oct. 2018].

[10] BBC News, (2018). BAE wins huge Australian warship contract. [online] Available at: https://www.bbc.co.uk/news/business-44649959 [Accessed 16 Oct. 2018].

[11] Grevett, J. (2018). Japan indicates possible Tempest collaboration with UK | Jane’s 360. [online] Available at: https://www.janes.com/article/82008/japan-indicates-possible-tempest-collaboration-with-uk [Accessed 18 Oct. 2018].

European Union Great Britain Option Papers Steve Maguire

Options at the Battle of Leyte Gulf

Jon Klug is a U.S. Army Colonel and PhD Candidate in Military and Naval History at the University of New Brunswick.  He taught at the U.S. Air Force Academy and at the U.S. Naval Academy, and he holds degrees from the U.S. Military Academy, Louisiana State University, and the U.S. Army’s School of Advanced Military Studies.  In his next assignment, Jon will serve as a U.S. Army War College Professor.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  U.S. Navy Admiral William “Bull” Halsey’s options during the Battle of Leyte Gulf on the night of 24/25 October 1944.

Date Originally Written:  October 21, 2018.

Date Originally Published:  November 12, 2018.

Author and / or Article Point of View:  Robin Collingwood pioneered the concept of historical reenactment[1]. Historian Jon Sumida discussed Collingwood’s concept in Decoding Clausewitz, in which he argued that Carl von Clausewitz anticipated Collingwood by incorporating self-education through “theory-based surmise about decision-making dynamics[2].” This paper uses a method of historically reconstructing events and reenacting a senior leader’s thought processes and options, augmenting historical facts by surmising when necessary[3], to examine Halsey’s options during the Battle of Leyte Gulf.

Background:  In 1944 U.S. Army General Douglas MacArthur commanded the Southwest Pacific Area, and U.S. Navy Admiral Chester Nimitz commanded the Pacific Ocean Areas. In October, U.S. forces remained firmly on the strategic offensive in the Pacific and the Island of Leyte was their next target[4].

KING II was the U.S. codename for the seizure of Leyte via amphibious assault, and there were command issues due to the long-standing division of the Pacific into two theaters of operation. After almost three years of war, these two forces were converging and neither the Army nor the Navy was willing to allow one joint commander. The Army would not accept Nimitz because MacArthur was senior to him, and the Navy did not believe MacArthur sufficiently understood sea power to command its fleet carriers[5]. This led to the unwieldy compromise of U.S. Navy Vice Admiral Thomas Kinkaid’s Seventh Fleet working directly for MacArthur and U.S. Navy Admiral William Halsey’s Third Fleet reporting to Nimitz. In KING II, Halsey was to “cover and support the Leyte Operation[6].” The desire to destroy the Imperial Japanese Navy (IJN) carriers was why Nimitz included the following in the plan: “In case opportunity for destruction of major portion of the enemy fleet is offered or can be created, such destruction becomes the primary task[7].” Thus, the plan was a confusing compromise between services with inherent divided command and control and tasks.

SHO-I was the Japanese codename for their attack to foil the American attempt to seize the island of Leyte. The plan had four major fleet elements converging at Leyte Gulf. The first two were surface groups from Japanese-occupied territories in Southeast Asia, of which IJN Admiral Kurita Takeo commanded the powerful surface group, including the mighty Yamato and Musashi[8]. The third group was a cruiser force and the fourth group was a carrier group, both from the north. The carrier group, commanded by IJN Vice Admiral Ozawa Jisaburo, was bait. They hoped Halsey would attack the carriers and inadvertently allow the three surface groups to slip behind the U.S. Navy’s Third Fleet and destroy the landings[9]. The Japanese did not expect anyone to return if SHO-I worked[10].

Significance:   U.S. carrier raids against Japanese bases in September met with unexpectedly light opposition, and Halsey interpreted the weak response as overall Japanese weakness, which was incorrect as they were husbanding their aircraft. Based off of Halsey’s view, the U.S. cancelled some operations and moved up the invasion of Leyte[11]. Kinkaid’s Seventh Fleet began landing MacArthur’s forces on Leyte Island on 21 October. Consequently, the Japanese put SHO-I in motion.

Alerted by submarines and air patrols on 24 October, Halsey’s carrier aircraft inflicted heavy damage on the most powerful Japanese surface group in the Sibuyan Sea, forcing Kurita to retreat to the west. At roughly 5:00 PM word reached Halsey that search aircraft had spotted the Japanese carriers. Unbeknownst to Halsey, IJN Admiral Kurita had turned his forces around and again headed east.

Option #1:  Halsey maneuvers Third Fleet as a whole to attack IJN Vice Admiral Ozawa’s aircraft carriers.

Risk:  This assumes the greatest levels of tactical, operational, and strategic risk for the chance of achieving a great victory. Halsey moving his forces without breaking out Rear Admiral Willis Lee’s Task Force 34 (TF 34) would leave no fleet carriers or fast battleships to protect the landings on Leyte. If an unexpected threat arises, there are scant uncommitted forces within supporting range of the landings, which is a great tactical risk to landings. The operational risk is the catastrophic failure of the landings and destruction of the forces ashore, which would result in a multi-month setback to retaking the Philippines. Assuming no knowledge of the atomic bomb, the strategic risk was a setback in the overall timeline and a likely change to the post-war situation.

Gain:  Aggressive and bold tactical maneuver often allows the best chance to achieve decisive victory, and U.S. Navy leaders wanted the remaining Japanese carriers sunk. In fact, many criticized U.S. Navy Admiral Raymond Spruance for letting the same IJN carriers escape at the earlier Battle of the Philippine Sea.

Option #2:  Halsey leaves TF 34 to protect the landings at the Island of Leyte while Third Fleet attacks IJN Admiral Kurita’s forces.

Risk:  Halsey leaving TF 34 to protect the Leyte Gulf landings accepts less tactical, operational, and strategic risk than Option #1. Tactically, Halsey’s forces still had an overwhelming advantage over the IJN carriers. Although Halsey knew this, he would also have wanted to be strong at the decisive point and win the decisive last naval battle in the Pacific, and TF 34’s six battleships would not be able to help protect his carriers from aerial attack. Operationally, Halsey felt that there was no real threat to the landings, as his aircraft had previously forced the Japanese center force retreat. Halsey also believed Kinkaid could handle any remaining threat[12]. Strategically, Halsey wanted to ensure that the IJN carriers did not get away and prolonged the war.

Gain:  This option afforded Halsey the opportunity to destroy the IJN carriers while still maintaining a significant surface force to protect the landings[13]. This provides insurance that Halsey had uncommitted and powerful surface forces to react to threats and, more importantly, protect the landings.

Option #3:  Halsey’s Third Fleet protects the landings at the Island of Leyte.

Risk:  This option accepts minimal tactical risk but some operational and strategic risk. If an unexpected threat arose, Halsey would have the entire Third Fleet in range to support the landings, thus avoiding any danger. Operationally, U.S. forces would have had to face any IJN forces that escaped again later. Strategically, the escaped IJN forces may have set back the overall timeline of the operation.


Gain:  Conservative decision-making tends to simultaneously minimize risk as well as opportunity. This option would ensure that Halsey protected the landing force. However, this also provides the smallest probability of sinking the elusive IJN carriers.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] R. G. Collingwood, The Idea of History. Revised ed. (1946, repr., London: Oxford University Press, 2005), 302-315.

[2] Jon T. Sumida, Decoding Clausewitz, (Lawrence, KS: University Press of Kansas, 2008), 150.

[3] Collingwood, 110-114; and Sumida, 65 and 177.

[4] Ronald H. Spector, Eagle against the Sun: The American War with Japan (New York, NY: Vintage, 1985), 214-217, 259-273, 285-294, 308-312, 418-420.

[5] Thomas B. Buell, Master of Sea Power: A Biography of Fleet Admiral Ernest J. King (1980, repr., Annapolis Maryland: Naval Institute Press, 2012), 190-191.

[6] Samuel Eliot Morison, Leyte, June 1944-January 1945, Vol. 12 of History of United States Naval Operations in World War II (Annapolis, MD: Naval Institute Press, 1953), 55-60.

[7] Ibid., 58, 70.

[8] James M. Merrill, A Sailor’s Admiral: A Biography of William F. Halsey (New York, NY: Thomas Y. Crowell Company, 1976), 149.

[9]  Craig L. Symonds, The Naval Institute Historical Atlas of the U.S. Navy (Annapolis, MD: Naval Institute Press, 1995), 176-178; Ernest J. King and Walter Muir Whitehill, Fleet Admiral King: A Naval Record (London: Eyre & Spottiswoode, 1953), 367-368.

[10] Morison, Leyte, 167.

[11] Symonds, 176; Morison, 13-16.

[12] Symonds, 180.

[13] Chester W. Nimitz, Command Summary of Fleet Admiral Chester W. Nimitz, Volume 5 (Newport, RI: United States Naval War College, 2013), 282.

Japan Jon Klug Option Papers United States

Options for Lethal Autonomous Weapons Systems and the Five Eyes Alliance

Dan Lee is a government employee who works in Defense, and has varying levels of experience working with Five Eyes nations (US, UK, Canada, Australia, New Zealand).  He can be found on Twitter @danlee961.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Options for Lethal Autonomous Weapons Systems and the Five Eyes Alliance

Date Originally Written:  September 29, 2018.

Date Originally Published:  October 29, 2018.

Author and / or Article Point of View:  The article is written from the point of view of Five Eyes national defense organizations. 

Background:  The Five Eyes community consists of the United Kingdom (UK), the United States (US), Canada, Australia and New Zealand; its origins can be traced to the requirement to cooperate in Signals Intelligence after World War Two[1]. Arguably, the alliance is still critical today in dealing with terrorism and other threats[2].

Autonomous systems may provide the Five Eyes alliance an asymmetric advantage, or ‘offset’, to counter its strategic competitors that are on track to field larger and more technologically advanced military forces. The question of whether or not to develop and employ Lethal Autonomous Weapons Systems (LAWS) is currently contentious due to the ethical and social considerations involved with allowing machines to choose targets and apply lethal force without human intervention[3][4][5]. Twenty-six countries are calling for a prohibition on LAWS, while three Five Eyes partners (Australia, UK and the US) as well as other nations including France, Germany, South Korea and Turkey do not support negotiating new international laws on the matter[6]. When considering options, at least two issues must also be addressed.

The first issue is defining what LAWS are; a common lexicon is required to allow Five Eyes partners to conduct an informed discussion as to whether they can come to a common policy position on the development and employment of these systems. Public understanding of autonomy is mostly derived from the media or from popular culture and this may have contributed to the hype around the topic[7][8][8]. Currently there is no universally accepted definition of what constitutes a fully autonomous lethal weapon system, which has in turn disrupted discussions at the United Nations (UN) on how these systems should be governed by the Convention on Certain Conventional Weapons (CCWUN)[10]. The US and UK have different definitions, which makes agreement on a common position difficult even amongst like-minded nations[11][12]. This lack of lexicon is further complicated by some strategic competitors using more liberal definitions of LAWS, allowing them to support a ban while simultaneously developing weapons that do not require meaningful human control[13][14][15][16].

The second issue one of agreeing how autonomous systems might be employed within the Five Eyes alliance. For example, as a strategic offset technology, the use of autonomous systems might mitigate the relatively small size of their military forces relative to an adversary’s force[17]. Tactically, they could be deployed completely independently of humans to remove personnel from danger, as swarms to overwhelm the enemy with complexity, or as part of a human-machine team to augment human capabilities[18][19][20].

A failure of Five Eyes partners to come to a complete agreement on what is and is not permissible in developing and employing LAWS does not necessarily mean a halt to progress; indeed, this may provide the alliance with the ability for some partners to cover the capability gaps of others. If some members of the alliance choose not to develop lethal systems, it may free their resources to focus on autonomous Intelligence, Surveillance, and Reconnaissance (ISR) or logistics capabilities. In a Five Eyes coalition environment, these members who chose not to develop lethal systems could provide support to the LAWS-enabled forces of other partners, providing lethal autonomy to the alliance as whole, if not to individual member states.

Significance:  China and Russia may already be developing LAWS; a failure on the part of the Five Eyes alliance to actively manage this issue may put it at a relative disadvantage in the near future[21][22][23][24]. Further, dual-use civilian technologies already exist that may be adapted for military use, such as the Australian COTSbot and the Chinese Mosquito Killer Robot[25][26]. If the Five Eyes alliance does not either disrupt the development of LAWS by its competitors, or attain relative technological superiority, it may find itself starting in a position of disadvantage during future conflicts or deterrence campaigns.

Option #1:  Five Eyes nations work with the UN to define LAWS and ban their development and use; diplomatic, economic and informational measures are applied to halt or disrupt competitors’ LAWS programs. Technological offset is achieved by Five Eyes autonomous military systems development that focuses on logistics and ISR capabilities, such as Boston Dynamics’ LS3 AlphaDog and the development of driverless trucks to free soldiers from non-combat tasks[27][28][29][30].

Risk:  In the event of conflict, allied combat personnel would be more exposed to danger than the enemy as their nations had, in essence, decided to not develop a technology that could be of use in war. Five Eyes militaries would not be organizationally prepared to develop, train with and employ LAWS if necessitated by an existential threat. It may be too late to close the technological capability gap after the commencement of hostilities.

Gain:  The Five Eyes alliance’s legitimacy regarding human rights and the just conduct of war is maintained in the eyes of the international community. A LAWS arms race and subsequent proliferation can be avoided.

Option #2:  Five Eyes militaries actively develop LAWS to achieve superiority over their competitors.

Risk:  The Five Eyes alliance’s legitimacy may be undermined in the eyes of the international community and organizations such as The Campaign to Stop Killer Robots, the UN, and the International Committee of the Red Cross. Public opinion in some partner nations may increasingly disapprove of LAWS development and use, which could fragment the alliance in a similar manner to the Australia, New Zealand and United States Security Treaty[31][32].

The declared development and employment of LAWS may catalyze a resource-intensive international arms race. Partnerships between government and academia and industry may also be adversely affected[33][34].

Gain:  Five Eyes nations avoid a technological disadvantage relative to their competitors; the Chinese information campaign to outmanoeuvre Five Eyes LAWS development through the manipulation of CCWUN will be mitigated. Once LAWS development is accepted as inevitable, proliferation may be regulated through the UN.

Other Comments:  None

Recommendation:  None.


Endnotes:

[1] Tossini, J.V. (November 14, 2017). The Five Eyes – The Intelligence Alliance of the Anglosphere. Retrieved from https://ukdefencejournal.org.uk/the-five-eyes-the-intelligence-alliance-of-the-anglosphere/

[2] Grayson, K. Time to bring ‘Five Eyes’ in from the cold? (May 4, 2018). Retrieved from https://www.aspistrategist.org.au/time-bring-five-eyes-cold/

[3] Lange, K. 3rd Offset Strategy 101: What It Is, What the Tech Focuses Are (March 30, 2016). Retrieved from http://www.dodlive.mil/2016/03/30/3rd-offset-strategy-101-what-it-is-what-the-tech-focuses-are/

[4] International Committee of the Red Cross. Expert Meeting on Lethal Autonomous Weapons Systems Statement (November 15, 2017). Retrieved from https://www.icrc.org/en/document/expert-meeting-lethal-autonomous-weapons-systems

[5] Human Rights Watch and
Harvard Law School’s International Human Rights Clinic. Fully Autonomous Weapons: Questions and Answers. (October 2013). Retrieved from https://www.hrw.org/sites/default/files/supporting_resources/10.2013_killer_robots_qa.pdf

[6] Campaign to Stop Killer Robots. Report on Activities Convention on Conventional Weapons Group of Governmental Experts meeting on lethal autonomous weapons systems – United Nations Geneva – 9-13 April 2018. (2018) Retrieved from https://www.stopkillerrobots.org/wp-content/uploads/2018/07/KRC_ReportCCWX_Apr2018_UPLOADED.pdf

[7] Scharre, P. Why You Shouldn’t Fear ‘Slaughterbots’. (December 22, 2017). Retrieved from https://spectrum.ieee.org/automaton/robotics/military-robots/why-you-shouldnt-fear-slaughterbots

[8] Winter, C. (November 14, 2017). ‘Killer robots’: autonomous weapons pose moral dilemma. Retrieved from https://www.dw.com/en/killer-robots-autonomous-weapons-pose-moral-dilemma/a-41342616

[9] Devlin, H. Killer robots will only exist if we are stupid enough to let them. (June 11, 2018). Retrieved from https://www.theguardian.com/technology/2018/jun/11/killer-robots-will-only-exist-if-we-are-stupid-enough-to-let-them

[10] Welsh, S. Regulating autonomous weapons. (November 16, 2017). Retrieved from https://www.aspistrategist.org.au/regulating-autonomous-weapons/

[11] United States Department of Defense. Directive Number 3000.09. (November 21, 2012). Retrieved from https://www.hsdl.org/?view&did=726163

[12] Lords AI committee: UK definitions of autonomous weapons hinder international agreement. (April 17, 2018). Retrieved from http://www.article36.org/autonomous-weapons/lords-ai-report/

[13] Group of Governmental Experts of the High Contracting Parties to the Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects – Geneva, 9–13 April 2018 (first week) Item 6 of the provisional agenda – Other matters. (11 April 2018). Retrieved from https://www.unog.ch/80256EDD006B8954/(httpAssets)/E42AE83BDB3525D0C125826C0040B262/$file/CCW_GGE.1_2018_WP.7.pdf

[14] Welsh, S. China’s shock call for ban on lethal autonomous weapon systems. (April 16, 2018). Retrieved from https://www.janes.com/article/79311/china-s-shock-call-for-ban-on-lethal-autonomous-weapon-systems

[15] Mohanty, B. Lethal Autonomous Dragon: China’s approach to artificial intelligence weapons. (Nov 15 2017). Retrieved from https://www.orfonline.org/expert-speak/lethal-autonomous-weapons-dragon-china-approach-artificial-intelligence/

[16] Kania, E.B. China’s Strategic Ambiguity and Shifting Approach to Lethal Autonomous Weapons Systems. (April 17, 2018). Retrieved from https://www.lawfareblog.com/chinas-strategic-ambiguity-and-shifting-approach-lethal-autonomous-weapons-systems

[17] Tomes, R. Why the Cold War Offset Strategy was all about Deterrence and Stealth. (January 14, 2015) Retrieved from https://warontherocks.com/2015/01/why-the-cold-war-offset-strategy-was-all-about-deterrence-and-stealth/

[18] Lockie, A. The Air Force just demonstrated an autonomous F-16 that can fly and take out a target all by itself. (April 12, 2017). Retrieved from https://www.businessinsider.com.au/f-16-drone-have-raider-ii-loyal-wingman-f-35-lockheed-martin-2017-4?r=US&IR=T

[19] Schuety, C. & Will, L. An Air Force ‘Way of Swarm’: Using Wargaming and Artificial Intelligence to Train Drones. (September 21, 2018). Retrieved from https://warontherocks.com/2018/09/an-air-force-way-of-swarm-using-wargaming-and-artificial-intelligence-to-train-drones/

[20] Ryan, M. Human-Machine Teaming for Future Ground Forces. (2018). Retrieved from https://csbaonline.org/uploads/documents/Human_Machine_Teaming_FinalFormat.pdf

[21] Perrigo, B. Global Arms Race for Killer Robots Is Transforming the Battlefield. (Updated: April 9, 2018). Retrieved from http://time.com/5230567/killer-robots/

[22] Hutchison, H.C. Russia says it will ignore any UN ban of killer robots. (November 30, 2017). Retrieved from https://www.businessinsider.com/russia-will-ignore-un-killer-robot-ban-2017-11/?r=AU&IR=T

[23] Mizokami, K. Kalashnikov Will Make an A.I.-Powered Killer Robot – What could possibly go wrong? (July 20, 2017). Retrieved from https://www.popularmechanics.com/military/weapons/news/a27393/kalashnikov-to-make-ai-directed-machine-guns/

[24] Atherton, K. Combat robots and cheap drones obscure the hidden triumph of Russia’s wargame. (September 25, 2018). Retrieved from https://www.c4isrnet.com/unmanned/2018/09/24/combat-robots-and-cheap-drones-obscure-the-hidden-triumph-of-russias-wargame/

[25] Platt, J.R. A Starfish-Killing, Artificially Intelligent Robot Is Set to Patrol the Great Barrier Reef Crown of thorns starfish are destroying the reef. Bots that wield poison could dampen the invasion. (January 1, 2016) Retrieved from https://www.scientificamerican.com/article/a-starfish-killing-artificially-intelligent-robot-is-set-to-patrol-the-great-barrier-reef/

[26] Skinner, T. Presenting, the Mosquito Killer Robot. (September 14, 2016). Retrieved from https://quillorcapture.com/2016/09/14/presenting-the-mosquito-killer-robot/

[27] Defence Connect. DST launches Wizard of Aus. (November 10, 2017). Retrieved from https://www.defenceconnect.com.au/key-enablers/1514-dst-launches-wizard-of-aus

[28] Pomerleau, M. Air Force is looking for resilient autonomous systems. (February 24, 2016). Retrieved from https://defensesystems.com/articles/2016/02/24/air-force-uas-contested-environments.aspx

[29] Boston Dynamics. LS3 Legged Squad Support Systems. The AlphaDog of legged robots carries heavy loads over rough terrain. (2018). Retrieved from https://www.bostondynamics.com/ls3

[30] Evans, G. Driverless vehicles in the military – will the potential be realised? (February 2, 2018). Retrieved from https://www.army-technology.com/features/driverless-vehicles-military/

[31] Hambling, D. Why the U.S. Is Backing Killer Robots. (September 15, 2018). Retrieved from https://www.popularmechanics.com/military/research/a23133118/us-ai-robots-warfare/

[32] Ministry for Culture and Heritage. ANZUS treaty comes into force 29 April 1952. (April 26, 2017). Retrieved from https://nzhistory.govt.nz/anzus-comes-into-force

[33] Shalal, A. Researchers to boycott South Korean university over AI weapons work. (April 5, 2018). Retrieved from https://www.reuters.com/article/us-tech-korea-boycott/researchers-to-boycott-south-korean-university-over-ai-weapons-work-idUSKCN1HB392

[34] Shane, S & Wakabayashi, D. ‘The Business of War’: Google Employees Protest Work for the Pentagon. (April 4, 2018). Retrieved from https://www.nytimes.com/2018/04/04/technology/google-letter-ceo-pentagon-project.html

 

Artificial Intelligence / Machine Learning / Human-Machine Teaming Australia Australia, New Zealand, United States Security Treaty (ANZUS) Autonomous Weapons Systems Canada Dan Lee New Zealand Option Papers United Kingdom United States

Alternative Futures: Argentina Attempts a Second Annexation of the Falkland Islands

Hal Wilson lives in the United Kingdom, where he works in the aerospace industry. A member of the Military Writers Guild, Hal uses narrative to explore future conflict.  He has been published by the Small Wars Journal, and has written finalist entries for fiction contests with the U.S. Army Training and Doctrine Command, and the Atlantic Council’s Art of the Future Project.  Hal graduated with first-class honours in War Studies and History from King’s College, London, and is studying an MA on the First World War.  He tweets at @HalWilson_.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  In an alternative future, the Republic of Argentina is attempting a second annexation of the Falkland Islands in the year 2030.

Date Originally Written:  August 27, 2018.

Date Originally Published:  October 15, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the United Kingdom’s (UK) National Security Adviser personally briefing 10, Downing Street on potential responses to Argentina’s action.

Background:  Inconceivable even only two decades ago, we now have positive confirmation that Argentine naval and military forces are conducting long-range precision fire against RAF MOUNT PLEASANT, the Royal Air Force station in the Falkland Islands.

Anglo-Argentine relations have long soured against their high-point around 2017, when favourable Argentine politics dovetailed with our joint operations to rescue the missing Argentine submarine ARA SAN JUAN[1].  These favourable politics were quickly reversed by domestic Argentine authoritarianism of a sort unseen since Argentina’s so-called ‘Dirty War’ of the mid-1970s to mid-1980s.  This authoritarianism built amid economic slowdown in Argentina and overwhelming Venezuelan refugee inflows escaping the totalitarian rule of Venezuela’s President Nicolás Maduro[2].  This refugee influx has only worsened after the 2025 collapse of the Maduro regime and ongoing Venezuelan Civil War, which has also left Argentina as the largest Chinese creditor in Latin America[3].

UK institutional bandwidth remains highly constrained with the fallout of the Russian attack against the Baltic nations in 2028[4].  As such, we have again been surprised by the Argentine leadership’s depth of feeling – and risk-tolerance – in this bid to offset domestic discord with foreign adventure.  We assess this annexation is at least partly driven by the need to service increasingly onerous Chinese debts with Falkland oil revenues[5].  Finally, British Forces Falkland Islands (BFFI) stands at token levels.  Initially justified by Anglo-Argentine détente, this was sustained even while historic Argentine military weaknesses[6] were resolved through years of Chinese financing.

Significance:  With our focus on the North Atlantic Treaty Organization (NATO) Eastern Flank, BFFI is under-strength and at risk of being cut-off.  RAF MOUNT PLEASANT constitutes the lynchpin of our position on the Falkland Islands; its neutralisation will leave our forces vulnerable to a follow-on amphibious assault.  The Argentine goal will be to damage or seize the airbase to cut off our ‘air-bridge’ of rapid reinforcement and present the annexation as a fait accompli.

Option #1:  Assemble a Task Group at once to defend, or retake, the Islands.

Risk:  This option is not without risk; we cannot expect a repeat of 1982.  Geography is against us in every sense, with 3,000 miles of ocean separating us from the islands.  Moreover, the Argentine Navy now operates a large inventory of ex-Chinese drone-submarines capable of operating farther north than their forbears could reach in 1982.  Safe anchorage at Ascension Island is not guaranteed.

Unlike 1982, our fleet is also not concentrated for rapid reaction into the South Atlantic.  Whereas the nucleus of the previous Task Group was concentrated at Gibraltar for Exercise SPRING TRAIN 82, our carriers and major surface escorts are dispersed to Singapore (HMS PRINCE OF WALES) and the North Sea (HMS QUEEN ELIZABETH).  Redeploying these assets to the South Atlantic will take time, and compromise our obligations to NATO among others; we must hope our allies can meet these shortfalls.

We nevertheless have the advantage that the Argentine military, despite their investments, suffer from limited amphibious and airlift capabilities.  These will limit their scope to capture and garrison the Islands, should BFFI be overrun.  Effective targeting of these assets will be key to crippling the Argentine position.

Gain:  Britain can decisively restore the sovereignty of the Falkland Islands, should we succeed. There is a high risk of casualties, including the loss of high-value warships, although we will deter future threats.

Option #2:  Pursue non-kinetic operations against the Argentine mainland.

Risk:  Cyber operations against targets in Argentina itself, coupled with targeted influence operations on social media, may destabilise the Argentine leadership.  Expanded operational scope could also incur meaningful economic difficulties; even simply revoking shipping insurance from leading British firms[7] might disrupt vital exports from the fragile Argentine economy.  We must nevertheless beware the public relations impact of too broad a target set.

We must also calibrate these operations for the greatest and quickest effect possible, as the BFFI garrison will not survive indefinitely.  The garrison’s most effective component includes a pair of Typhoon F2 fighters, reduced from the historic complement of four.  While some of our oldest airframes, they can match the second-hand Chinese models operating with the Argentine Air Force. But their effectiveness is not assured amid precision-fire threats to the MOUNT PLEASANT runway.

Gain:  Non-kinetic operations against the Argentine mainland might provoke the collapse of the Argentine leadership, while avoiding the risk of sending a full Task Group into the South Atlantic.  This may shorten the conflict and prevent a larger British casualty list.

Option #3:  Appeal to the United Nations (UN) for a return to the previously existing state of affairs.

Risk:  The United States, Canada and Australia will certainly support an appeal in the General Assembly.  However, our French and German counterparts have failed to support us on national security issues at the UN in the past[8].  The Chinese will also exert great influence among their client states to protect their creditor.

We cannot expect a resolution in our favour, but even a successful outcome may see our conduct thereafter bound by UN guidance.  The Argentine leadership likely shall not observe any rulings, and simply use the time spent to defeat the BFFI then consolidate their position on the Islands.

Gain:  A successful appeal through the UN will frame global perception as one of legality against Chinese-driven opportunism.  It will also leverage diplomatic legitimacy and economic tools in our favour, with potential for appeal among the Argentine domestic opposition, for a longer struggle.

Other Comments:  The Falkland Islanders have repeatedly affirmed their status as fellow Britons.  We must not fail them.

Recommendation:  None.


Endnotes:

[1] Savetheroyalnavy.org (2017, Nov. 29) Reflecting on the sad loss of the ARA San Juan https://www.savetheroyalnavy.org/reflecting-on-the-sad-loss-of-argentine-submarine-ara-san-juan/ (Accessed 29.08.18)

[2] Phillips, D. (2018, Aug. 6) Brazil: judge shuts border to Venezuelan migrants fleeting hunger and hardship https://www.theguardian.com/world/2018/aug/06/brazil-shuts-border-venezuelan-migrants (Accessed 28.08.18)

[3] Wheatley, J. (2018, Jun. 5) Argentina woos China in hunt for support package
https://www.ft.com/content/2e0cf612-68b0-11e8-b6eb-4acfcfb08c11 (Accessed 28.08.18)

[4] Shlapak, D. & Johnson, M. (2016) Reinforcing Deterrence on NATO’s Eastern Flank https://www.rand.org/pubs/research_reports/RR1253.html (Accessed 28.08.18)

[5] Yeomans, John. (2016, Jan 11.) Rockhopper shares bounce after Falkland oil discovery  https://www.telegraph.co.uk/finance/newsbysector/energy/oilandgas/12092516/Rockhopper-shares-bounce-after-Falkland-oil-well-discovery.html (Accessed 28.08.18)

[6] Wilson, H. (2016, Feb. 17) Whence the threat? Lessons from Argentina’s Air-Naval Arsenal in 2015 http://cimsec.org/21667-2/21667 (Accessed 28.08.18)

[7] The Telegraph (2012, Jun. 19) Britain stops Russian ship carrying attack helicopters for Syria https://www.telegraph.co.uk/news/worldnews/middleeast/syria/9339933/Britain-stops-Russian-ship-carrying-attack-helicopters-for-Syria.html (Accessed 28.08.18)

[8] Harding, A. (2018, Aug. 27) Chagos Islands dispute: UK ‘threatened’ Mauritius.
https://www.bbc.co.uk/news/world-africa-45300739 (Accessed 29.08.18)

Alternative Futures / Alternative Histories / Counterfactuals Argentina Falkland Islands Hal Wilson Option Papers

Assessment of Russia’s Cyber Relations with the U.S. and its Allies

Meghan Brandabur, Caroline Gant, Yuxiang Hou, Laura Oolup, and Natasha Williams were Research Interns at the College of Information and Cyberspace at National Defense University.  Laura Oolup is the recipient of the Andreas and Elmerice Traks Scholarship from the Estonian American Fund.  The authors were supervised in their research by Lieutenant Colonel Matthew Feehan, United States Army and Military Faculty member.  This article was edited by Jacob Sharpe, Research Assistant at the College of Information and Cyberspace.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Russia’s Cyber Relations with the U.S. and its Allies

Date Originally Written:  August 7, 2018.

Date Originally Published:  October 1, 2018.

Summary:  Russia frequently employs offensive cyber operations to further its foreign policy and strategic goals.  Prevalent targets of Russian activity include the United States and its allies, most recently culminating in attacks on Western national elections by using cyber-enabled information operations.  Notably, these information operations have yielded national security implications and the need for proactive measures to deter further Russian offenses.

Text:  The United States and its allies are increasingly at risk from Russian offensive cyber operations (OCOs).  Based on the definition of the Joint Chiefs of Staff, OCOs are operations which aim “to project power in or through cyberspace[1].”  Russia utilizes OCOs to further their desired strategic end state: to be perceived as a great power in a polycentric world order and to wield greater influence in international affairs.  Russia uses a variety of means to achieve this end state, with cyber tools now becoming more frequently employed.

Since the 2007 cyber attacks on Estonia, Russia has used OCOs against the United States, Great Britain, France, and others[2].  These OCOs have deepened existing societal divisions, undermined liberal democratic order, and increased distrust in political leadership in order to damage European unity and transatlantic relations.  Russian OCO’s fall into two categories: those projecting power within cyberspace, which can relay kinetic effects, and those projecting power indirectly through cyberspace.  The latter, in the form of cyber-enabled information operations, have become more prevalent and damaging. 

Throughout the 2016 U.S. Presidential election, Russia conducted an extended cyber-enabled information operation targeting the U.S. political process and certain individuals whom Russia viewed as a threat[3].  Presidential candidate Hillary Clinton, known for her more hawkish views on democracy-promotion, presented a serious political impediment to Russian foreign policy[4].  Thus, Russia’s information operations attempted to thwart Hillary Clinton’s presidential aspirations. 

At the same time, the Russian operation aimed to deepen existing divisions in the society which divided U.S. citizens along partisan lines, and to widen the American public’s distrust in their democratic system of government.  These actions also sought to decrease U.S. primacy abroad by demonstrating how vulnerable the U.S. is to the activity of external actors.  The political reasoning behind Russia’s operations was to promote a favorable environment within which Russian foreign policy and strategic aims could be furthered with the least amount of American resistance.  That favorable environment appeared to be through the election of Donald J. Trump to the U.S. Presidency, a perception that was reflected in how little Russia did to damage the Trump operation by either OCO method.

Russia also targeted several European countries to indirectly damage the U.S. and undermine the U.S. position in world affairs.  As such, Russian OCOs conducted in the U.S. and Europe should not be viewed in isolation.  For instance, presidential elections in Ukraine in 2014 and three years later in France saw cyber-enabled information operations favoring far-right, anti-European Union candidates[5]. 

Russia has also attempted to manipulate the results of referendums throughout Europe.  On social media, pro-Brexit cyber-enabled information operations were conducted in the run-up to voting on the country’s membership in the European Union[6].  In the Netherlands, cyber-enabled information operations sought to manipulate the constituency to vote against the Ukraine-European Union Association Agreement that would have prevented Ukraine from further integrating into the West, and amplified existing fractions within the European Union[7].

These cyber-enabled information operations, however, are not a new tactic for Russia, but rather a contemporary manifestation of Soviet era Komitet Gosudarstvennoy Bezopasnosti (K.G.B.) techniques of implementing, “aktivniye meropriyatiya,” or, “‘active measures’”[8].  These measures aim to “[influence] events,” and to “[undermine] a rival power with forgeries,” now through the incorporation of the cyber domain[9]. 

Russia thus demonstrates a holistic approach to information warfare which actively includes cyber, whereas the Western viewpoint distinguishes cyber warfare from information warfare[10].  However, Russia’s cyber-enabled information operations – also perceived as information-psychological operations – demonstrate how cyber is exploited in various forms to execute larger information operations [11].

Although kinetic OCOs remain a concern, we see that the U.S. is less equipped to deal with cyber-enabled information operations[12].  Given Western perceptions that non-kinetic methods such as information operations, now conducted through cyberspace, are historically, “not forces in their own right,” Russia is able to utilize these tactics as an exploitable measure against lagging U.S. and Western understandings of these capabilities[13].  Certain U.S. political candidates have already been identified as the targets of Russian OCOs intending to interfere with the 2018 U.S. Congressional midterm elections[14].  These information operations pose a great threat for the West and the U.S., especially considering the lack of consensus towards assessing and countering information operations directed at the U.S. regardless of any action taken against OCOs. 

Today, cyber-enabled information operations can be seen as not only ancillary, but substitutable for conventional military operations[15].  These operations pose considerable security concerns to a targeted country, as they encroach upon their sovereignty and enable Russia to interfere in their domestic affairs. Without a fully developed strategy that addresses all types of OCOs including the offenses within cyberspace and the broader information domain overall Russia will continue to pose a threat in the cyber domain. 


Endnotes:

[1] Joint Chiefs of Staff. (2018). “JP 3-12, Cyberspace Operations”, Retrieved July 7, 2018, from http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf?ver=2018-06-19-092120-930, p. GL-5.

[2] For instance: Brattberg, Erik & Tim Maurer. (2018). “Russian Election Interference – Europe’s Counter to Fake News and Cyber Attacks”, Carnegie Endowment for International Peace.; Burgess, Matt. (2017, November 10). “Here’s the first evidence Russia used Twitter to influence Brexit”, Retrieved July 16, 2018 from http://www.wired.co.uk/article/brexit-russia-influence-twitter-bots-internet-research-agency; Grierson, Jamie. (2017, February 12). “UK hit by 188 High-Level Cyber-Attacks in Three Months”, Retrieved July 16, 2018, from https://www.theguardian.com/world/2017/feb/12/uk-cyber-attacks-ncsc-russia-china-ciaran-martin; Tikk, Eneken, Kadri Kaska, Liis Vihul. (2010). International Cyber Incidents: Legal Considerations. Retrieved July 8, 2018, from https://ccdcoe.org/publications/books/legalconsiderations.pdf; Office of the Director of National Intelligence. (2017, January 6). “Background to ‘Assessing Russian Activities and Intentions in Recent US Elections’: The Analytic Process and Cyber Incident Attribution” Retrieved July 9, 2018, from https://www.dni.gov/files/documents/ICA_2017_01.pdf. 

[3] Office of the Director of National Intelligence. (2017, January 6). “Background to ‘Assessing Russian Activities and Intentions in Recent US Elections’: The Analytic Process and Cyber Incident Attribution” Retrieved July 9, 2018 https://www.dni.gov/files/documents/ICA_2017_01.pdf p.1.

[4] Flournoy, Michèle A. (2017).  Russia’s Campaign Against American Democracy: Toward a Strategy for Defending Against, Countering, and Ultimately Deterring Future Attacks Retrieved July 9, 2018, from http://www.jstor.org/stable/j.ctt20q22cv.17, p. 179. 

[5] Nimmo, Ben. (2017, April 20). “The French Election through Kremlin Eyes” Retrieved July 15, 2018, from https://medium.com/dfrlab/the-french-election-through-kremlin-eyes-5d85e0846c50

[6] Burgess, Matt. (2017, November 10). “Here’s the first evidence Russia used Twitter to influence Brexit” Retrieved July 16, 2018, from http://www.wired.co.uk/article/brexit-russia-influence-twitter-bots-internet-research-agency 

[7] Cerulus, Laurens. (2017, May 3). “Dutch go Old School against Russian Hacking” Retrieved August 8, 2018, from https://www.politico.eu/article/dutch-election-news-russian-hackers-netherlands/ ; Van der Noordaa, Robert. (2016, December 14). “Kremlin Disinformation and the Dutch Referendum” Retrieved August 8, 2018, from https://www.stopfake.org/en/kremlin-disinformation-and-the-dutch-referendum/

[8] Osnos, Evan, David Remnick & Joshua Yaffa. (2017, March 6). “Trump, Putin, and the New Cold War” Retrieved July 9, 2018 https://www.newyorker.com/magazine/2017/03/06/trump-putin-and-the-new-cold-war 

[9] Ibid.

[10] Connell, Michael & Sarah Vogler. (2017). “Russia’s Approach to Cyber Warfare” Retrieved July 7, 2018, from  https://www.cna.org/cna_files/pdf/DOP-2016-U-014231-1Rev.pdf ; Giles, Keir. & William Hagestad II (2013). “Divided by a Common Language: Cyber Definitions in Chinese, Russian and English”. In K. Podins, J. Stinissen, M. Maybaum (Eds.), 2013 5th International Conference on Cyber Conflict.  Retrieved July 7, 2018, from  https://ccdcoe.org/publications/2013proceedings/d3r1s1_giles.pdf, pp. 420-423; Giles, Keir. (2016). “Russia’s ‘New’ Tools for Confronting the West – Continuity and Innovation in Moscow’s Exercise of Power” Retrieved July 16, 2018, from https://www.chathamhouse.org/sites/default/files/publications/2016-03-russia-new-tools-giles.pdf, p. 62-63.

[11] Iasiello, Emilio J. (2017). “Russia’s Improved Information Operations: From Georgia to Crimea” Retrieved August 10, 2018 from https://ssi.armywarcollege.edu/pubs/parameters/issues/Summer_2017/8_Iasiello_RussiasImprovedInformationOperations.pdf p. 52. 

[12] Coats, Dan. (2018, July 18). “Transcript: Dan Coats Warns The Lights Are ‘Blinking Red’ On Russian Cyberattacks” Retrieved August 7, 2018, from https://www.npr.org/2018/07/18/630164914/transcript-dan-coats-warns-of-continuing-russian-cyberattacks?t=1533682104637

[13] Galeotti, Mark (2016). “Hybrid, ambiguous, and non-linear? How new is Russia’s ‘new way of war’?” Retrieved July 10, 2018, from Small Wars & Insurgencies, Volume 27(2), p. 291.

[14] Geller, Eric. (2018, July 19) . “Microsoft reveals first known Midterm Campaign Hacking Attempts” Retrieved August 8, 2018, from https://www.politico.com/story/2018/07/19/midterm-campaign-hacking-microsoft-733256 

[15] Inkster, Nigel. (2016). “Information Warfare and the US Presidential Election” Retrieved July 9, 2018, from Survival, Volume 58(5), p. 23-32, 28 https://doi.org/10.1080/00396338.2016.1231527

Caroline Gant Cyberspace Jacob Sharpe Laura Oolup Matthew Feehan Meghan Brandabur Natasha Williams Option Papers Psychological Factors Russia United States Yuxiang Hou

Alternative Futures: U.S. Options for a Chinese Invasion of North Korea (Part 3 of 3)

(Editor’s Note:  This Options Paper is part of our Alternatives Future Call for Papers and examines an invasion of North Korea by the People’s Republic of China from the point of view of North Korea, South Korea, and the United States.  We hope you have enjoyed all three articles and many thanks to Jason Hansa for choosing to write for Divergent Options!) 

Mr. Jason Hansa is a retired U.S. Army officer that served in Germany, Korea, and CONUS, with two deployments each to OIF and OEF. He currently works as a military contractor at CASCOM on Fort Lee, Virginia. His twitter address is @HauptmannHansa. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

National Security Situation:  In an alternative future the People’s Republic of China invades North Korea.

Date Originally Written:  June 14, 2018.

Date Originally Published:  September 10, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the U.S. Secretary of Defense personally briefing the President of the United States regarding a potential Chinese invasion into North Korea, circa 2020.

Background:  The U.S. has a complicated relationship with China.  This complicated relationship spans the nineteenth century to now, including the turn of the twentieth century when the U.S. Army fought alongside allied nations inside Beijing proper to defeat the Boxer rebellion[1].

As the People’s Republic of China (PRC) has grown in power and strength, so have their ambitions.  They have worked to seal the South China Sea from the surrounding nations; they have conducted incursions into Bhutan and engaged with dangerous stand-offs with the Indian Army; they have repeatedly provoked incidents with the Japanese government off the Japanese Senkaku islands[2][3][4].

Against the U.S., the PRC has hacked our systems and stolen intelligence, intercepted our aircraft, and shadowed our fleets.  China is not a friend to the U.S. or to the world at large[5][6][7].

During the Korean War in 1950, as U.S. forces—with our South Korean and United Nations (UN) allies—neared victory, the Chinese attacked across the Yalu River, stretching out the war and quadrupling our casualties[8].

While the North Koreans in the Democratic People’s Republic of Korea (DPRK) are also not a U.S. friend, relations with them have improved while our relations with the PRC simultaneously fell.  Our relationship with the Republic of Korea (ROK) in the south has never been stronger: we have stood shoulder to shoulder with them for seventy years, and their troops fought alongside ours in Vietnam and Afghanistan.  The South Koreans support territorial claims by the North Koreans, thus it’s a near certainty they will see an invasion of the North by the Chineseas as invasion against all of Korea.

Significance:  Our satellites confirm the movement of three Chinese Army Groups towards the North Korean border.  At best, the Chinese plan to invade the Northern provinces, seizing the majority of the North Korean nuclear launch sites and giving themselves a port on the Sea of Japan.  At worst, the Chinese will invade to where North Korea narrows near Kaechon, giving themselves the best possible defensive line upon which to absorb the almost guaranteed combined DPRK and ROK counterattack.  We estimate DPRK forces are currently outnumbered approximately three-to-one.

Option #1:  The U.S. remains neutral.

Risk:  This option maintains our currently relationship with China, and technically is in accordance with the original UN charter and our defense treaties.  If we are not asked to participate, we lose nothing; but if the ROK asks for our assistance and we remain neutral, our allies around the world will question our commitment to their defense.

Gain:  Staying neutral allows us the best possible positioning to advocate for a peaceful ending to hostilities.  Neutrality also allows our nation the opportunity to provide humanitarian aid and assistance, and as war depresses all belligerent economies, our economy will likely strengthen as international investors look for a safe haven for funds.

Option #2:  The U.S. ally with the ROK, but ground forces do not proceed north of the DMZ.

Risk:  For decades, our motto for troops stationed in Korea has been “Katchi Kapshida, ‘We go forward together’.”  If we are asked but decline to fight inside North Korea alongside our long-time South Korean allies, it may bring turmoil and resentment at the diplomatic and military levels.  The PRC may see it as a show of weakness, and push back against us in every domain using a global hybrid warfare approach.

Gain:  Option #2 would preserve our forces from the hard infantry fight that will certainly define this war, while also upholding our treaty obligations to the letter.  We could use our robust logistic commands to support the ROK from within their borders, and every air wing or brigade we send to defend their land is another unit they can free up to deploy north, hopefully bringing the war to a quicker conclusion.

Option #3:  The U.S. fights alongside the ROK across the entire peninsula.

Risk:  North Korea is a near-continuous mountainous range, and the fighting would be akin to a war among the Colorado Rockies.  This will be an infantry war, fought squad by squad, mountaintop to mountaintop.  This is the sort of war that, despite advancements in medical technology, evacuation procedures, and body armor, will chew units up at a rate not seen since at least the Vietnam War.  We will receive thousands of U.S. casualties, a wave of fallen that will initially overwhelm U.S. social media and traditional news outlets, and probably tens-of-thousands of injured who our Department of Veterans Affairs will treat for the rest of their lives.

Also worth noting is that North Korean propaganda for decades told stories of the barbaric, dangerous U.S. troops and prepared every town to defend themselves from our forces.  Even with the permission of the North Korean government, moving forward of the DMZ would bring with it risks the ROK solders are unlikely to face.  We would face a determined foe to our front and have uncertain lines of supply.

Gain:  Fighting alongside our ROK allies proves on the world stage that the U.S. will not sidestep treaty obligations because it may prove bloody.  We have put the credibility of the United States on-line since World War 2, and occasionally, we have to pay with coin and blood to remind the world that freedom is not free.  Fighting alongside the ROK in North Korea also ensures a U.S. voice in post-war negotiations.

Option #4:  The U.S. fights China worldwide.

Risk:  Thermonuclear war.  That is the risk of this option, there is no way to sugarcoat it.  The PRC has left themselves vulnerable at installations around the world, locations we could strike with impunity via carrier groups or U.S.-based bombers.  More than the previous options, this option risks throwing the Chinese on the defensive so overwhelmingly they will strike back with the biggest weapon in their arsenal.  U.S. casualties would be in the millions from the opening nuclear strikes, with millions more in the post-blast environment.  While we would also gain our measure of vengeance and eliminate millions of Chinese, the ensuing “nuclear autumn” or full-on “nuclear winter” would drop international crops by 10-20%, driving worldwide famines and economic collapse.  Short-term instant gains must be balanced with an equally intense diplomatic push by uninvolved nations to keep the war conventional.

Gain:  Quick and easy victories across the globe with a bloody stalemate in the North Korean mountains may push the Chinese to quickly accept a cease-fire and return to the pre-conflict borders.  A well-run media campaign focusing on the numbers of PRC casualties to one-child families across the world may help push the Chinese citizens to overthrow the government and sue for peace before nuclear weapons are used.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Encyclopedia Britannica. Boxer Rebellion. Retrieved 15 June 2018. https://www.britannica.com/event/Boxer-Rebellion 

[2] Guardian, (2018, May 19) China lands nuclear strike-capable bombers on South China Sea islands. Retrieved 15 June 2018. https://www.theguardian.com/world/2018/may/19/china-says-air-force-lands-bombers-on-south-china-sea-islands

[3] Panda, A. (2017, October 22). The Doklam Standoff Between India and China is far from over. Retrieved 14 June 2018. https://thediplomat.com/2017/10/the-doklam-standoff-between-india-and-china-is-far-from-over/ 

[4] Graham-Harrison, E. (2017, February 4). Islands on the frontline of a new global flashpoint: China v japan. Retrieved 15 June 2018. https://www.theguardian.com/world/2017/feb/05/china-v-japan-new-global-flashpoint-senkaku-islands-ishigaki

[5] Nakashima, E. and Sonne, P. (2018, June 8). China hacked a Navy contractor and secured a trove of highly sensitive data on submarine warfare. Retrieved 15 June 2018. https://www.washingtonpost.com/world/national-security/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-data-on-submarine-warfare/2018/06/08/6cc396fa-68e6-11e8-bea7-c8eb28bc52b1_story.html

[6] Ali., I. (2017, July 24) Chinese jets intercept U.S. surveillance plane: U.S. officials. Retrieved 15 June 2018. https://www.reuters.com/article/us-usa-china-military-idUSKBN1A91QE 

[7] Kubo, N. (2016, June 14) China spy ship shadows U.S., Japanese, Indian naval drill in Western Pacific. Retrieved 15 June 2018. https://www.reuters.com/article/us-usa-pacific-exercises-idUSKCN0Z10B8 

[8] Stewart, R. The Korean War: The Chinese Intervention. Archived 2011, Retrieved 14 June 2018. https://web.archive.org/web/20111203234437/http://www.history.army.mil/brochures/kw-chinter/chinter.htm

Jason Hansa North Korea (Democratic People’s Republic of Korea) Option Papers South Korea (Republic of Korea) United States

Alternative Futures: South Korea Options for a Chinese Invasion of North Korea (Part 2 of 3)

(Editor’s Note:  This Options Paper is part of our Alternatives Future Call for Papers and examines an invasion of North Korea by the People’s Republic of China from the point of view of North Korea, South Korea, and the United States.  We hope you enjoy all three articles over the coming weeks and many thanks to Jason Hansa for choosing to write for Divergent Options!) 

Mr. Jason Hansa is a retired U.S. Army officer that served in Germany, Korea, and CONUS, with two deployments each to OIF and OEF. He currently works as a military contractor at CASCOM on Fort Lee, Virginia. His twitter address is @HauptmannHansa. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

National Security Situation:  In an alternative future the People’s Republic of China invades North Korea.

Date Originally Written:  June 12, 2018.

Date Originally Published:  September 3, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the South Korean defense minister personally briefing the South Korean President regarding a potential Chinese invasion of North Korea, circa 2020.

Background:  Our nation has a complicated relationship with China, stretching back centuries.  Our geographic location has made the peninsula the battlefield of choice for Chinese and Japanese invaders, going as far back as the double Manchu invasions of the seventeenth century, the Japanese invasions of the sixteenth century, and even skirmishes against Chinese states during our three-kingdoms period in the seventh century[1].

More recently and in living memory, the Chinese Army swarmed across the Yalu River in 1950, extending the war and inflicting tens of thousands of additional casualties upon our forces.  Had the Chinese not intervened, the war would have ended with our nation forming a new unified democracy with the North, not a land with a Demilitarized Zone (DMZ) and a never-ending war[2].

The Chinese have made no secret of their desire to expand at the cost of smaller nations.  Indeed, what the world calls the “South China Sea,” they internally refer to as the South Chinese Sea, a difference in terminology they point to as a misunderstanding.  But in politics and in war, words have meanings, and their meaning is clear.

Finally, while we have had periods of improved and degraded relationships with our wayward cousins in North Korea, we have always supported their territorial claims on the global stage, as they have supported ours.  Because we long for the day our nations reunite, on the international stage, both of our nations often speak with one voice.  Mount Baeku has, for centuries, been either wholly Korean or shared with our Chinese neighbors; the thought of it entirely under the rule of the Chinese due to a pending invasion is a disturbing one[3].

Significance:  Our intelligence agencies have confirmed the Chinese activation of three Army Groups on the North Korean border.  These groups have already begun preparatory movements and logistical staging, and have not issued the standard “only an exercise” proclamations.  It is clear their intent is to claim (at a minimum) the Paeku thumb, and most likely the entire ladle-handle of provinces stretching from Kimcheak north to the Russian Border.  North Korean forces are outnumbered approximately three-to-one.

Option #1:  We remain neutral as the Chinese invade North Korea.

Risk:  This option maintains our current relationship with China and North Korea.  This solution has several risks: if China wins and captures the northern provinces, they may be loath to ever return them; if the North Korean state survives the attack, they might feel betrayed by our lack of assistance, delaying peaceful integration.  If the North Korean regime collapses, we may see hundreds of thousands, possibly millions of refugees streaming across the DMZ that we will have to care for.  And, not least of all, a threatened North Korean regime may use nuclear weapons in a last-ditch effort to defend itself.  This use of nuclear weapons will no doubt bring about a vicious retaliation and devastate their land and risk effecting us as well.

Gain:  If the Chinese are able to topple North Korea, then it’s possible the remnants of the North Korean state would be equitable to peaceful reunification with our nation.  We could then, after absorbing the Northern provinces, pursue a peaceful diplomatic solution with the Chinese to return to an ante bellum border.  Our economy, untroubled by war, would be ready to integrate the provinces or care for refugees if necessary.  Finally, if the North Korea regime survived, our military would stand ready to defend against any vengeful tantrums.

Option #2:  We attack the North Koreans and knock them out of the war.

Risk:  This is an unpalatable solution, but as defense minister, I would be remiss in my duty if I didn’t mention it. 

Launching a strike into North Korea once they are fully engaged fighting the Chinese brings about several risks.  The first risk is that most of our planning and simulations are for defensive wars, or—at most—counterstriking into North Korea after degrading their artillery, air force, and supply lines.  Even engaged against the Chinese, it is unlikely the North Koreans will or can move their currently emplaced heavy artillery, which is aimed towards us.  In essence, we will be attacking into the teeth of a prepared enemy.

Our forces will also not be seen as liberators, avengers, or brothers by the North Koreans, but as vultures looking to finish off an opponent already weakened by the Chinese.  Our own people would not look kindly upon our nation launching a war of aggression, and the world at large will question if we’d made a secret treaty with the Chinese.

Finally, it is an open question if a desperate North Korea would launch nuclear warheads at us, the Chinese, or both.

Gain:  Striking the North Koreans while they are engaged fighting the Chinese means they will fight a two-front war and won’t have a depth of reserves to draw upon.  Their forces may be more inclined to surrender to us than to the foreign Chinese, and striking into the country will surely bring the Chinese pause as they will not want to engage us, and we can seek to liberate as much of the North as we could, as fast as possible, diplomatically leaving us in a better post-war situation.

Option #3:  We—alone—join the war alongside the north.

Risk:  Our Northern cousins have always agreed and supported our territorial claims on the global stage, as we have supported theirs.  No matter our differences, we are Korean and stand united against outsiders.  An invasion of their territory is an invasion of Korea.

A risk in using only our brave and proud forces to assist the North is we would lose one of our most vital military assets: our technologically advanced allies.  The defense of our nation has always been an integrated one, so to leave our allies behind the DMZ as we travel north to fight as we have never trained is a risky proposition.

Gain:  This option gains the diplomatic ability to claim this is a Korean-only situation, allowing our allies to work behind the scenes for diplomatic solutions.  This option would also not preclude our allies from enacting their defensive obligations to us: we can turn more forces to the offense if our skies are still protected by the United States Air Force.  On the ground, the terrain of North Korea is mountainous and unforgiving.  It will be an infantry war, one we are well equipped to fight, but also a quagmire our allies will be wary of participating in.  Finally, fighting side-by-side with only our cousins puts us in the best position to control the post-war reunification negotiations.

Option #4:  We, and our allies, join the war alongside the north.

Risk:  Accepting allied assistance north of the DMZ—outside of medical, humanitarian, and possibly logistical—brings with it a number of risks.  First, this option must meet with North Korean approval, or the people of North Korea themselves might rise up against the very troops hoping to save them from invasion.  Second, a wider war could bring the global economy into a crises and expand—possibly even into a nuclear conflagration—as the forces of the U.S. and China begin worldwide skirmishing.  It is no secret the Chinese strategic weaknesses are nowhere near the peninsula, so it’s a forgone conclusion the Americans would attack anywhere they found an opportunity.  A wider war could expand quickly and with grave consequence to the world.  Finally, a wider war brings with it more voices to the table; the post-war reunification discussion would not be wholly Korean one.

Gain:  The Americans, and others, would strike the Chinese around the globe and deep inside China itself, ensuring their populace felt the pinch of the war.  If managed properly, this might not only bring about a quicker end to the invasion, but maybe even spark a popular uprising that would overthrow the Chinese communist.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] New World Encyclopedia (2018, January 10). History of Korea, Retrieved 14 June 2018. http://www.newworldencyclopedia.org/entry/History_of_Korea 

[2] Stewart, R. The Korean War: The Chinese Intervention. Archived 2011, Retrieved 14 June 2018. https://web.archive.org/web/20111203234437/http://www.history.army.mil/brochures/kw-chinter/chinter.htm 

[3] New York Times, (2016, September 27). For South Koreans, a long detour to their holy mountain. Retrieved 14 June 2018. https://www.nytimes.com/2016/09/27/world/asia/korea-china-baekdu-changbaishan.html

China (People's Republic of China) Jason Hansa North Korea (Democratic People’s Republic of Korea) Option Papers South Korea (Republic of Korea)

Alternative Futures: North Korea Options for a Chinese Invasion (Part 1 of 3)

(Editor’s Note:  This Options Paper is part of our Alternatives Future Call for Papers and examines an invasion of North Korea by the People’s Republic of China from the point of view of North Korea, South Korea, and the United States.  We hope you enjoy all three articles over the coming weeks and many thanks to Jason Hansa for choosing to write for Divergent Options!) 

Mr. Jason Hansa is a retired U.S. Army officer that served in Germany, Korea, and CONUS, with two deployments each to OIF and OEF. He currently works as a military contractor at CASCOM on Fort Lee, Virginia. His twitter address is @HauptmannHansa. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

National Security Situation:  In an alternative future the People’s Republic of China invades North Korea.

Date Originally Written:  June 10, 2018.

Date Originally Published:  August 27, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the North Korean Defense Minister personally briefing his Supreme Leader regarding a potential Chinese invasion, circa 2020.

Background:  Our nation, in truth, owes our existence to our allies in China for their assistance in our most desperate hour in our war to liberate our Southern Comrades.  For this reason, many of our nuclear research and weapons storage facilities were placed within 160 kilometers of their border, to use the Chinese radar and anti-air umbrellas as additional deterrents to American adventurism.

However, our friendship with China has slowly deteriorated, often because they have not always agreed with our decisions when dealing with the U.S. and our Southern Comrades.

Moreover, since our efforts to begin improving relationships with our Southern Comrades, the U.S., and the outside world began during the 2018 Winter Olympics, our relationship with China has soured quickly.  It is also not a secret that the Chinese have welcomed and supported our existence as a buffer state between their borders and that of our ambitious Southern Comrades and their U.S. allies.

The Chinese have long desired a port on the Sea of Japan, and they have spent time and money improving the route between their mostly Korean population of Jillian province and our port-city of Rasan.  We have long-standing agreements allowing them to access our ports with little-to-no customs interference, and they fear that unification will sever their access[1].

Finally, the Chinese have been moving to consolidate territory they consider to be theirs, rightfully or not, as a means to push their dominance onto other nations.  The Chinese have entered into territorial disputes with the Japanese, our Southern Comrades, the Vietnamese, and the Indians[2].  The Chinese have long argued that Mount Baektu, the spiritual homeland of our nation, belongs to them; however, maps and treaties for centuries have either split the mountain down the middle, or made it wholly ours[3][4].  On this, our Southern Comrades agree: the mountain must not be wholly consumed in a Chinese land grab.

Significance:  Our intelligence agencies have determined the Chinese have activated the three Army Groups on our border and intend to invade within the next 48 to 72 hours.  Their goals are to seize our nuclear facilities and many of our northern provinces, most likely from Mount Paektu east to the Sea of Japan.  With most of our forces either aligned towards the south or beginning to stand down in conjunction with peace talks, we are outnumbered approximately three-to-one.

Option #1:  We fight alone.

Risk:  This is a high risk answer because we do not have enough forces in place at this time, and our transportation infrastructure will be the logical first targets in the opening moments of the war.  Our fighter jets, though we have many of them, are antiquated compared to the Chinese air forces.  We do have an advantage in geography: Beijing is close, within our missile range across the Yellow Sea.

Tactically, we would order our forces to hold as long as possible while we brought our southern army groups to bear.  We have the advantages of interior lines, more troops, a populace that is willing to bear any sacrifice against invaders, and incredibly defensible terrain.  We would have to gamble that our Southern comrades would not strike at the same time across the demilitarized zone.

However, if our nuclear launch facilities were in danger of getting overrun by the People’s Liberation Army (PLA), there might be a very real choice in which we must “use-them-or-lose-them” concerning our nuclear weapons.  Millions of Chinese are in range of our weapons, including their capital, but the reprisals would be fierce, our nation as we know it would most likely not survive.

Gain:  We would show the world that our nation is strong and unconquerable, provided we won.  There is a significant chance we would not be able to move our forces in time and would have to concede our northern provinces, though our nation as a whole would survive.

Option #2:  We ask only our Southern Comrades and long-time allies for assistance.

Risk:  Our Southern Comrades have always agreed and supported our territorial claims on the global stage, as we have supported theirs.  No matter our differences, we are all Korean, and stand united against outsiders.  Asking for their support would add their technologically advanced forces to our order of battle, thousands of well-trained and motivated infantrymen plus their supporting forces, and a transportation network stretching from Busan to Rasan.  Asking our international allies—such as Sweden—for diplomatic support would put pressure on China both internationally and economically, and would be a way for our nation to gain global support for our cause and condemnation of China’s activities without their active military participation.

However, there would be no return to a pre-war status quo, no chance of our nation surviving independently.  Asking for assistance and allowing the military forces of the south into our nation and fighting side-by-side as one Korea means that, once the war is over, we would reunite as one Korea.  Finally, it can be safely assumed our Southern Comrades will not allow us to use our nuclear weapons against China, no matter what the cost.

Gain:  This option gains us the military of the South without allowing in the U.S. or other allies, maintaining the pretense of a Korea-only problem.  This allows nations that might not feel comfortable fully siding with us an option to save face by aligning with our allies and conducting diplomatic and economic battle with China while remaining out of the active conflict.  Finally, fighting side-by-side with only our Southern Comrades puts us in the best position to ensure both the survival of our regime leadership and bargain for our people as we reunite with the south after the war.

Option #3:  We ask assistance from any who offer.

Risk:  It is likely assured our Southern Comrades would immediately join with us to fend off an invasion.  It is trickier to know the actions of the Americans, among others.  The Americans would have the most to lose fighting a war with China, their biggest creditor and a major trading partner.  But it could also be offered the Americans have the most to gain, a war against China as a possible means of clearing their debt.

As problematic as accepting U.S. assistance may be, there could be other nations that bring with them a host of issues.  Our people would be loath to accept Japanese military assistance, though they have technological capabilities on par with the U.S. and China.  Accepting Russian help once again puts us in their debt, and they always demand repayments in some form or another.  We may be unwilling to pay the costs of Russian assistance down the road.

Finally, accepting outside assistance means our post-war reintegration will be shaped by nations outside of Korea.  These outside nations desire a unified Korea to meet their needs, which is not necessarily the nation we are meant to be.

Gain:  The Americans, and others, would bring with them the capability of expanding the war, striking the Chinese around the globe, and attacking their supply lines, ensuring that the Chinese populace felt the pinch of the war, not only the PLA.  This global striking would probably dramatically shorten the war and reduce casualties among our brave fighting divisions.  Additionally, the U.S. could rally the world to our cause, bringing with them military, diplomatic, humanitarian, and economic aid.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] AP (2012, August 22) NKorea’s economic zone remains under construction. Retrieved 14 June 2018. https://web.archive.org/web/20120823065244/http://www.thestate.com/2012/08/22/2408642/nkoreas-economic-zone-remains.html#.WyLBFWYUnxh

[2] Panda, A. (2017, October 22). The Doklam Standoff Between India and China is far from over. Retrieved 14 June 2018. https://thediplomat.com/2017/10/the-doklam-standoff-between-india-and-china-is-far-from-over/

[3] Lych, O. (2006, July 31) China seeks U.N. Title to Mt. Beakdu. Retrieved 14 June 2018. http://english.donga.com/List/3/all/26/248734/1

[4] New York Times, (2016, September 27). For South Koreans, a long detour to their holy mountain. Retrieved 14 June 2018. https://www.nytimes.com/2016/09/27/world/asia/korea-china-baekdu-changbaishan.html

China (People's Republic of China) Jason Hansa North Korea (Democratic People’s Republic of Korea) Option Papers South Korea (Republic of Korea)

Alternative Futures: Options for the Deployment of Iraqi Peacekeepers

Mr. Jason Hansa is a retired U.S. Army officer that served in Germany, Korea, and CONUS, with two deployments each in support of Operations Iraqi Freedom and Operation Enduring Freedom.  He currently works as a military contractor at the U.S. Army Combined Arms Support Command on Fort Lee, Virginia.  He can be found on Twitter @HauptmannHansa.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  In an alternative future, the Government of Iraq in 2020 considers deploying its troops as United Nations (UN) Peacekeepers.

Date Originally Written:  June 1, 2018.

Date Originally Published:  August 6, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the Iraqi Defense Minister writing a personal options paper for the Iraqi Prime Minister, circa 2020.  This point of view assumes the Muslim Rohinga minority in Myanmar are still persecuted and an international coalition is forming to help them[1].

Background:  Our nation has been at war for nearly twenty years, thirty if our invasion of Kuwait is included.  Our military, thanks to training with the U.S. and a long war against the Islamic State (IS), is strong and has an experienced Noncommissioned Officer Corps.  Our population votes.  Our women can drive.  We are more moderate than many Islamic nations, and yet, when the people of the world look to the Middle East, they see our nation only for our troubles.  It is nearly impossible to entice foreign investment when the only image potential investors have of us is one of war.  Moreover, the international spotlight often overlooks our nation entirely.  The ongoing rivalry between Iran and Saudi Arabia continues to divide the world, the Palestinians continue their fights with Israel, and Egypt seems to implode every three years.  Our neighbors scare away as much investment as our own beleaguered history.

Significance:  If we are to bring our nation back into the spotlight, we must find a way to attract the world’s attention.  We must find a way to demonstrate our ability to peacefully step up and stand on the world stage.  Failure will keep our economy stagnant.

Option #1:  Iraq asks to participate in UN peacekeeping missions.

Risk:  This is a low-risk option demonstrating the strength of our military by helping others.  Dispatching troops to join UN Peacekeeping operations is a solution that will bring about some short-term media notice, but probably very little else.  Many small nations participate in UN Peacekeeping simply as a way to earn money and help bankroll their own militaries.  There is no formalized training system for Peacekeepers, nations are left to send what units they choose.  Our battle-tested battalions will serve alongside whatever troops the UN can scrounge up[2].

Gain:  Our military hadn’t conducted operations outside of Iraq since our war with Iran in the 1980’s and the 1973 October War against Israel.  Deployments with the UN will allow our forces to practice rotational deployment schedules.  It is not an easy thing, sending troops and equipment outside of our borders, and moving them in conjunction with the UN will allow us time to practice and learn without a heavy media glare.

Option #2:  Iraqi forces join other nations and conduct humanitarian operations in Myanmar.

Risk:  With no prior practice of deployments, we stand the chance of making major mistakes while in the world’s eye.  While we could swallow some pride and ask long-time allies for advice—especially our friends in Indonesia and India—neither country has a long history of overseas deployments.  We would be best served asking new friends with deployment experience, such as the South Koreans, for help, a solution that is both diplomatically palatable and socially acceptable.  Finally, we would have to assure our religious leaders and population that our military is not becoming mercenaries to serve, bleed, and die at the behest of western nations.

Gain:  Participating in a humanitarian effort, especially if we were seen working with the consultation of a friend such as India, would be recognized as a major step towards participation on the global stage.  For our population, assisting fellow brothers in Islam like the Rohinga would be a source of pride in our nation and our military.

Option #3:  Iraqi forces work alongside European nations and conduct rotational operations in the Baltics.

Risk:  This is a high-risk for high-gains solution.  First, we have always maintained a cautious friendship with Russia, as they are a major source of our military’s weapons and arms.  Aligning with Europe and the North Atlantic Treaty Organization (NATO) nations against them will probably close that door for decades.  Second, our people would question why we are sending our nation’s forces to faraway lands, and spending treasure (and possible lives) to fix a problem that does not concern us.  Finally, our deployment inexperience will most hurt us during this option: unlike peacekeeping operations, our forces must deploy fully ready for war.

Gain:  If we are to ask nations to invest in our country, we must stand ready to invest in the safety of theirs.  Putting our forces in the Baltics will present our nation in a favorable light to the people and businessmen of small but relatively wealthy nations.  While we lack deployment experience, we will have the entire logistical backbone and experience of NATO to draw upon to ensure our forces move in an organized fashion.  Finally, the forces NATO assembles and trains in the Baltics are among their very best.  Training alongside these forces is a cost-effective way to ensure our battle-hardened troops maintain their edge[3].

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Smith, N. and Krol, C. (2017, September 19). Who are the Rohingya Muslims? The stateless minority fleeing violence in Burma. Retrieved 14 June 2018 https://www.telegraph.co.uk/news/0/rohingya-muslims/

[2] Schafer, B. (2016, August 3). United Nations Peacekeeping Flaws and Abuses: The U.S. Must Demand Reform. Retrieved 14 June 2018 https://www.heritage.org/report/united-nations-peacekeeping-flaws-and-abuses-the-us-must-demand-reform %5B3%5D McNamara, E. (NATO Magazine, 2016). Securing the Nordic-Baltic region. Retrieved 14 June 2018. https://www.nato.int/docu/review/2016/also-in-2016/security-baltic-defense-nato/EN/index.htm 

[3] McNamara, E. (NATO Magazine, 2016). Securing the Nordic-Baltic region. Retrieved 14 June 2018. https://www.nato.int/docu/review/2016/also-in-2016/security-baltic-defense-nato/EN/index.htm

Alternative Futures / Alternative Histories / Counterfactuals Iraq Jason Hansa Option Papers Peace Missions

U.S. Options for Responding to Sharp Power Threats

Anthony Patrick is a student at Georgia State University where he majors in political science and conducts research on Sharp Power.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Threats to U.S. and allied nations by sharp power actions (defined below).

Date Originally Written:  June 16, 2018.

Date Originally Published:  July 30, 2018.

Author and / or Article Point of View:  The author is an undergraduate student of defense policies and an Officer Candidate in the United States Marine Corps.  This article is written with the base assumption that foreign actions against the U.S political system is a top national security challenge and a continuing threat.

Background:  Recent U.S. news cycles have been dominated by the Mueller investigation into Russian interference in the U.S political system.  Other allied nations such as the United Kingdom, France, Australia, and New Zealand have also recently dealt with foreign political influence campaigns[1].  While historically nations have projected power either through military might (hard power) or cultural influence (soft power), rising authoritarian actors like the People’s Republic of China (PRC), Russia, Iran, and North Korea are resulting to a hybrid mix of classical power projection through emerging technologies with revisionist intent in the international system known as sharp power[2].  Sharp power is more direct than soft power, not as physically destructive as hard power, and does not cause enough damage to justify a military response like Article 5 of the North Atlantic Treaty Organization. 

Sharp power actions are normally covert in nature allowing the perpetrator plausible deniability.  Given the combined military and economic power of western democracies, sharp power is the preferred method for disruptive actions against the international order by authoritarian powers.  The effectiveness of sharp power is amplified by the open nature of democratic societies, especially in the information age[3].  Other examples of sharp power attacks include the North Korean hacking of Sony Pictures, the Iranian hacking of a dam in New York, PRC surveillance of Chinese students in foreign classrooms[4], and Russian actions in Ukraine and Moldova[5]. 

Significance:  The effects of sharp power actions can be very dangerous for western democracies.  One effect is a decrease in democratic legitimacy in an elected government.  When the citizens question if it was themselves or foreign actors who helped elect a government, that government is hamstrung due to a lack of legitimacy.  This lack of legitimacy can create new divisions or heighten polarization in the targeted countries.  Foreign actors can use the internet as a guise, pretend to be domestic actors, and push extreme ideas in communities, creating the potential for conflict.  This series of effects has already happened in U.S communities, where Russian actors have organized a protest and the counter protest[6].  These new divisions can also heighten political infighting, diverting political resources from international problems to deal with issues in the domestic sphere.  This heightened political infighting can give these revisionist actors the breathing room they need to expand their influence.  The increasing prevalence of these effects is a direct threat to U.S national security, chipping away at the government’s freedom of action and diverting resources to the domestic sphere away from international problems. 

Option #1:  Adopt military operational planning methodologies like Effects Based Operations (EBO) and Systematic Operational Design (SOD) at the interagency level to organize a response to adversary sharp power actions.

Risk:  The U.S also has the largest pool of soft power in the world and reverting to sharp power actions would hurt that important U.S resource[7].  Also, since these adversary countries are not as open, targeting would be a difficult task, and actions against the wrong group could be used as a rallying cry in the adversary country.  This rallying cry would give these adversaries a greater mandate to continue their actions against western democracies.  Lastly, successful sharp power actions against authoritarian countries could lead to more destructive domestic instability, harming allies in the region and disrupting global trading networks[8].

Gain:  By utilizing sharp power methodologies, the U.S would be able to strike back at opposing countries and deter further actions against the U.S.  The U.S has a large pool of resources to pull from in the interagency, and only needs a methodology to guide those resources.  Military style operational planning like EBO and SOD contain important theoretical constructs like System of System Analysis, Center of Gravity, and the constant reviewing of new information[9][10].  This planning style fits well for sharp power actions since it allows the government to create an operational plan for directed international political actions.  The U.S government can pull from the wealth of knowledge within the Department of Defense on how to combine these various frameworks to achieve sharp power action given their experience with designing complex operations on the joint level[11].  Successful actions would also give the U.S more leverage in negotiations with these countries on other areas and would divert their political resources from international actions 

Option #2:  Congress passes a Goldwater-Nichols-like Act to create a horizontal organization within the interagency, to address sharp power threats[12].

Risk:  Such reform would be substantial and would take a long time to implement.  The length of this process could delay any government response to both continued foreign interference and other international problems.  The congressional process is historically slow and designing the bill would also take a substantial amount of time.  Different agencies have set rules, procedures, and operating cultures, and changing those enough to allow effective interagency cooperation would also be difficult.  Option #2 would not change the defensive posture of the U.S government, thus it would not create the desired deterrent effect. 

Gain:  Streamlining the interagency process would increase the government’s ability to counter sharp power threats.  Option #2 would lead to better allocation of resources, more intelligence sharing, better allocation of authority during interagency deliberations, and provide more clarity on rules, regulations, and processes that govern interagency cooperation.  By adopting this reform, the national security council would be able to give task to a joint structure instead of a single lead agency.  This joint structure could operate like the joint command within the Department of Defense and create broad policy for interagency work[13].  By keeping a defensive posture, the U.S would also be able to protect its soft power appeal[14]. 

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  Kurlantzick, J. (2017, December 13). Australia, New Zealand Face China’s Influence. Retrieved from https://www.cfr.org/expert-brief/australia-new-zealand-face-chinas-influence

[2] National Endowment for Democracy. (2017, December 5). Sharp Power: Rising Authoritarian Influence. Retrieved from https://www.ned.org/sharp-power-rising-authoritarian-influence-forum-report/

[3]  Wanless, A., & Berk, M. (2018, March 7). The Strategic Communication Ricochet: Planning Ahead for Greater Resiliency. Retrieved from https://thestrategybridge.org/the-bridge/2018/3/7/the-strategic-communication-ricochet-planning-ahead-for-greater-resiliency

[4]  Sulmeyer, M. (2018, March 22). How the U.S. Can Play Cyber-Offense. Retrieved from https://www.foreignaffairs.com/articles/world/2018-03-22/how-us-can-play-cyber-offense

[5]  Way, L. A. (2018, May 17). Why Didn’t Putin Interfere in Armenia’s Velvet Revolution? Retrieved from https://www.foreignaffairs.com/articles/armenia/2018-05-17/why-didnt-putin-interfere-armenias-velvet-revolution

[6]  Lucas, R. (2017, November 01). How Russia Used Facebook To Organize 2 Sets of Protesters. Retrieved from https://www.npr.org/2017/11/01/561427876/how-russia-used-facebook-to-organize-two-sets-of-protesters

[7]  Nye, J. S., Jr. (2018, January 24). How Sharp Power Threatens Soft Power. Retrieved from https://www.foreignaffairs.com/articles/china/2018-01-24/how-sharp-power-threatens-soft-power

[8]  Breen, J. G. (2017). Covert Actions and Unintended Consequences. InterAgency Journal,8(3), 106-122. Retrieved from http://thesimonscenter.org/featured-article-covert-action-and-unintended-consequences/

[9]  Strange, J., Dr., & Iron, UK Army, R., Colonel. (n.d.). Understanding Centers of Gravity and Critical Vulnerabilities(United States, Department of Defense, United States Marine Corps War College).

[10]  Vego, M. N. (2006). Effects-based operations: A critique. National Defense University, Washington D.C. Institute for National Strategic Studies.

[11]  Beutel, C. (2016, August 16). A New Plan: Using Complexity In the Modern World. Retrieved    from https://thestrategybridge.org/the-bridge/2016/8/16/a-new-plan-using-complexity-in-the-modern-world

[12]  Dahl, U.S. Army, K. R., Colonel. (2007, July 1). New Security for New Threats: The Case for Reforming the Interagency Process. Retrieved from https://www.brookings.edu/research/new-security-for-new-threats-the-case-for-reforming-the-interagency-process/

[13]  United States, Department of Defense, Joint Chiefs of Staff. (2018). Joint Concept for Integrated Campaigning.

[14]  Nye, J. S., Jr. (summer 2004). Soft Power and American Foreign Policy. Political Science Quarterly,119(2), 255-270. Retrieved from http://www.jstor.org/stable/20202345

Anthony Patrick Below Established Threshold Activities (BETA) Deterrence Major Regional Contingency Option Papers United States

Divergent Trajectories for U.S. Military Power

Jeff Becker is a consultant in the U.S. Joint Staff J-7, Joint Concepts Division and writes extensively on military futures and joint force development, including the 2016 edition of the Joint Operating Environment:  The Joint Force in a Contested and Disordered World. He can be found at LinkedIn at https://www.linkedin.com/in/jeffrey-becker-10926a8 or at Jeffrey.james.becker@gmail.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Divergent trajectories for U.S. military power.

Date Originally Written:  May 30, 2018.

Date Originally Published:  July 23, 2018.

Author and / or Article Point of View:  The author is a military futurist supporting the U.S. Joint Chiefs of Staff J7 which is responsible for the six functions of joint force development: Doctrine, Education, Concept Development & Experimentation, Training, Exercises and Lessons Learned.  The author is a classical realist and believes strongly in the importance of husbanding U.S. strategic power and avoiding wasting conflicts around the world, while simultaneously believing in the judicious use of the U.S. military to protect its interests and support and defend a favorable world order. 

Background:  Today U.S. understanding of the long-term trajectory of its power is at a crossroads, with two divergent and highly consequential potential futures as options[1].  Each future is plausible.  Each future has widely different implications for the kind of Joint Force that the U.S. will need.

Significance:  New national security and national defense strategies direct a recapitalization of the Joint Force after nearly two decades of war.  Clarifying which future is more probable and the force modernization implications that flow from each can help to illuminate what the U.S. and its military can reasonably aspire to and achieve in the future[2].  Basing force design on sound assumptions about the relative trajectory of U.S. power – particularly economic power, but also other intangibles such as scientific innovation or social cohesion – is central to well-defined Joint Force roles and missions and the requisite concepts and capabilities it will need in the future

Articulating two distinct visions for the possible trajectory of American power, and then consistently anchoring force design choices on the expected one, will ensure the future armed forces can be an effective part of future national strategy. 

Option #1:  The consensus future understands the U.S. to remain as the single most powerful state on the world stage.  In this view, the economic and military potential of the U.S. remains relatively constant – or at the very worst – only sees a slight decline relative to other countries over the next two decades.  In such a world, the U.S. and its Joint Force, though generally superior, will be increasingly challenged and the Joint Force is forced to adapt as its power relative to others undergoes a slow erosion.  Such a world emphasizes the need to address great powers, in a period of “long term strategic competition between nations[3].”  Competition is multi-faceted, but nations generally avoid the overt use military force and pursue regional opportunities to challenge U.S. interests and objectives – particularly within their regions – in indirect and subversive ways.    

Risk:  In a world in which U.S. power is perceived as too formidable to confront directly, state rivals may prioritize indirect, proxy, and hybrid approaches as well as new forms of cyber and information confrontation that avoid open clashes with the Joint Force.  This places the Joint Force in a dilemma, as the large nuclear and conventional forces required to keep conflict contained are likely unsuitable to these indirect coercive challenges.  Option #1 would leave the U.S. more vulnerable to threats arising from persistent disorder, substate violent conflict, political subversion, influence operations, and novel and unexpected asymmetric military developments that avoid confronting the U.S. military directly.   

Gain:  Joint Force development activities in this world will be able to take advantage of greater freedom of action – including a large and capable alliance system and ability to operate through and from global commons – to deter and impose costs on competitors and adversaries.  The U.S. may have the strategic and military margins to direct more resources and effort as a “systems administrator” for the global commons.  In this role the U.S. would use military power to secure maritime global trade, open and uninhibited use of space, and thus, continue to support and defend an open world order largely favorable to U.S. against even great power competitors.

Option #2:  In this alternative future, relative U.S. economic and technological decline translate into significant strategic and military challenges more rapidly than many expect.  This world is plausible.  A particularly striking assessment in the U.K.’s Global Strategic Trends describes a 2045 People’s Republic of China (PRC) with an economy more than double that of the United States ($62.9 trillion versus $30.7 trillion) and noting that even today, the PRC military may already be “close to matching that of the U.S., perhaps exceeding it in some areas.”  A CSBA study notes that the trajectory of PRC growth means that it “poses a far greater economic challenge to the United States than did Soviet Russia, Imperial Japan, or Nazi Germany[4].”  In this world, great powers are able to translate this growing relative power into more expansive and often hostile national objectives.  

Risk:  The military consequences of a world in which the U.S. possesses one-fourth the population and one half the economy of the PRC would be profound.  Here, the U.S. is the “smaller superpower” and the PRC translates demographic potential and economic and technological prowess into more expansive strategic goals and potentially overmatches the Joint Force in a number of important capability areas.   In such a world, other competitive and openly aggressive adversaries may also pursue military spheres of influence and make regional and local arrangements incompatible with a free and open international order.  Adversaries may be able to project power globally with advanced expeditionary forces, but also through new space, information, cyber weapons, and long-range precision strike systems.  Combined, these may force the U.S. to invest more in homeland defense at the expense of our own global power projection capabilities.

Gain:  Joint force development efforts in this world are forced to be agile enough to confront aggressive and powerful adversaries in asymmetric, unexpected, and flexible ways.  Counterintuitively, in such a world it may be easier for the U.S. military to counter aggressive adversary moves.  In a world of powerful defensive capabilities in which projecting power through dense and connected defensive complexes is extremely difficult, the U.S. could optimize the Joint Force to construct defensive systems and perimeters around Allies and Partners.  The U.S. can also invest in strategic mobile defenses in-depth to raise the risk and cost of adversary initiatives around the world. 

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  These alternative futures are derived from “challenged assumption #1 in a Joint Staff J7 study, Challenged Assumptions and Potential Groupthink (April 2018), p. 9.

[2]  See, Joint Operating Environment 2035 (July 2016), p. 50-51

[3]   Summary of the 2018 National Defense Strategy (January 2018), p. 2.

[4]   Andrew Krepinevich, Preserving the Balance: A U.S. Eurasia Defense Strategy, CSIS (2017), p. 40

Alternative Futures / Alternative Histories / Counterfactuals Capacity / Capability Enhancement Economic Factors Jeff Becker Option Papers United States

Options to Manage the Risks of Integrating Artificial Intelligence into National Security and Critical Industry Organizations

Lee Clark is a cyber intelligence analyst.  He holds an MA in intelligence and international security from the University of Kentucky’s Patterson School.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  What are the potential risks of integrating artificial intelligence (AI) into national security and critical infrastructure organizations and potential options for mitigating these risks?

Date Originally Written:  May 19, 2018.

Date Originally Published:  July 2, 2018.

Author and / or Article Point of View:  The author is currently an intelligence professional focused on threats to critical infrastructure and the private sector.  This article will use the U.S. Department of Homeland Security’s definition of “critical infrastructure,” referring to 16 public and private sectors that are deemed vital to the U.S. economy and national functions.  The designated sectors include financial services, emergency response, food and agriculture, energy, government facilities, defense industry, transportation, critical manufacturing, communications, commercial facilities, chemical production, civil nuclear functions, dams, healthcare, information technology, and water/wastewater management[1].  This article will examine some broad options to mitigate some of the most prevalent non-technical risks of AI integration, including legal protections and contingency planning.

Background:  The benefits of incorporating AI into the daily functions of an organization are widely championed in both the private and public sectors.  The technology has the capability to revolutionize facets of government and private sector functions like record keeping, data management, and customer service, for better or worse.  Bringing AI into the workplace has significant risks on several fronts, including privacy/security of information, record keeping/institutional memory, and decision-making.  Additionally, the technology carries a risk of backlash over job losses as automation increases in the global economy, especially for more skilled labor.  The national security and critical industry spheres are not facing an existential threat, but these are risks that cannot be dismissed.

Significance:  Real world examples of these concerns have been reported in open source with clear implications for major corporations and national security organizations.  In terms of record keeping/surveillance related issues, one need only look to recent court cases in which authorities subpoenaed the records of an Amazon Alexa, an appliance that acts as a digital personal assistant via a rudimentary AI system.  This subpoena situation becomes especially concerning to users, given recent reports of Alexa’s being converted into spying tools[2].  Critical infrastructure organizations, especially defense, finance, and energy companies, exist within complex legal frameworks that involve international laws and security concerns, making legal protections of AI data all the more vital.

In the case of issues involving decision-making and information security, the dangers are no less severe.  AIs are susceptible to a variety of methods that seek to manipulate decision-making, including social engineering and, more specifically, disinformation efforts.  Perhaps the most evident case of social engineering against an AI is an instance in which Microsoft’s AI endorsed genocidal statements after a brief conversation with users on Twitter[3].  If it is possible to convince an AI to support genocide, it is not difficult to imagine the potential to convince it to divulge state secrets or turn over financial information with some key information fed in a meaningful sequence[4].  In another public instance, an Amazon Echo device recently recorded a private conversation in an owner’s home and sent the conversation to another user without requesting permission from the owner[5].  Similar instances are easy to foresee in a critical infrastructure organization such as a nuclear energy plant, in which an AI may send proprietary information to an uncleared user.

AI decisions also have the capacity to surprise developers and engineers tasked with maintenance, which could present problems of data recovery and control.  For instance, developers discovered that Facebook’s AI had begun writing a modified version of a coding language for efficiency, having essentially created its own code dialect, causing transparency concerns.  Losing the ability to examine and assess coding decisions presents problems for replicating processes and maintenance of a system[6].

AI integration into industry also carries a significant risk of backlash from workers.  Economists and labor scholars have been discussing the impacts of automation and AI on employment and labor in the global economy.  This discussion is not merely theoretical in nature, as evidenced by leaders of major tech companies making public remarks supporting basic income as automation will likely replace a significant portion of labor market in the coming decades[7].

Option #1:  Leaders in national security and critical infrastructure organizations work with internal legal teams to develop legal protections for organizations while lobbying for legislation to secure legal privileges for information stored by AI systems (perhaps resembling attorney-client privilege or spousal privileges).

Risk:  Legal teams may lack the technical knowledge to foresee some vulnerabilities related to AI.

Gain:  Option #1 proactively builds liability shields, protections, non-disclosure agreements, and other common legal tools to anticipate needs for AI-human interactions.

Option #2:  National security and critical infrastructure organizations build task forces to plan protocols and define a clear AI vision for organizations.

Risk:  In addition to common pitfalls of group work like bandwagoning and group think, this option is vulnerable to insider threats like sabotage or espionage attempts.  There is also a risk that such groups may develop plans that are too rigid or short-sighted to be adaptive in unforeseen emergencies.

Gain:  Task forces can develop strategies and contingency plans for when emergencies arise.  Such emergencies could include hacks, data breaches, sabotage by rogue insiders, technical/equipment failures, or side effects of actions taken by an AI in a system.

Option #3:  Organization leaders work with intelligence and information security professionals to try to make AI more resilient against hacker methods, including distributed denial-of-service attacks, social engineering, and crypto-mining.

Risk:  Potential to “over-secure” systems, resulting in loss of efficiency or overcomplicating maintenance processes.

Gain:  Reduced risk of hacks or other attacks from malicious actors outside of organizations.

Other Comments:  None.

Recommendation: None.


Endnotes:

[1] DHS. (2017, July 11). Critical Infrastructure Sectors. Retrieved May 28, 2018, from https://www.dhs.gov/critical-infrastructure-sectors

[2] Boughman, E. (2017, September 18). Is There an Echo in Here? What You Need to Consider About Privacy Protection. Retrieved May 19, 2018, from https://www.forbes.com/sites/forbeslegalcouncil/2017/09/18/is-there-an-echo-in-here-what-you-need-to-consider-about-privacy-protection/

[3] Price, R. (2016, March 24). Microsoft Is Deleting Its AI Chatbot’s Incredibly Racist Tweets. Retrieved May 19, 2018, from http://www.businessinsider.com/microsoft-deletes-racist-genocidal-tweets-from-ai-chatbot-tay-2016-3

[4] Osaba, O. A., & Welser, W., IV. (2017, December 06). The Risks of AI to Security and the Future of Work. Retrieved May 19, 2018, from https://www.rand.org/pubs/perspectives/PE237.html

[5] Shaban, H. (2018, May 24). An Amazon Echo recorded a family’s conversation, then sent it to a random person in their contacts, report says. Retrieved May 28, 2018, from https://www.washingtonpost.com/news/the-switch/wp/2018/05/24/an-amazon-echo-recorded-a-familys-conversation-then-sent-it-to-a-random-person-in-their-contacts-report-says/

[6] Bradley, T. (2017, July 31). Facebook AI Creates Its Own Language in Creepy Preview Of Our Potential Future. Retrieved May 19, 2018, from https://www.forbes.com/sites/tonybradley/2017/07/31/facebook-ai-creates-its-own-language-in-creepy-preview-of-our-potential-future/

[7] Kharpal, A. (2017, February 21). Tech CEOs Back Call for Basic Income as AI Job Losses Threaten Industry Backlash. Retrieved May 19, 2018, from https://www.cnbc.com/2017/02/21/technology-ceos-back-basic-income-as-ai-job-losses-threaten-industry-backlash.html

Critical Infrastructure Cyberspace Emerging Technology Lee Clark Option Papers Private Sector Resource Scarcity

Options for U.S. Naval Force Posture in East Africa

Matt Hein is a U.S. Navy Surface Warfare Officer currently studying for his Masters in Security Studies at Georgetown University.  He can be found on Twitter @Matt_TB_Hein.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Low intensity maritime conflict and engagement in Eastern Africa.

Date Originally Written:  February 11, 2018.

Date Originally Published:  May 21, 2018.

Author and / or Article Point of View:  This article addresses U.S. naval force posture options in East Africa and the implications for a resource-constrained force.

Background:  Demands for counter-piracy operations, countering maritime human smuggling, countering the growth of violent extremism in Sub-Saharan African countries, and partner nation capacity building require the constant presence of U.S. naval forces in East African littoral zones.  Friction arises when high-end combatants such as aircraft carriers and destroyers divert from their East African littoral mission to the nearby Persian Gulf and Mediterranean Sea to conduct other missions.

Significance:  U.S. naval presence in East Africa has improved maritime security and facilitated operations on land.  Coalition efforts reduced piracy incidents from 237 attempted hijackings in 2011 to only three such attempts in 2017[1].  Joint exercises, such as Cutlass Express, have developed partner nation maritime law enforcement capacity[2].  Intelligence gathering from sea based platforms has enabled multiple U.S. military missions ashore[3].  Increasing demand for high-end combatants in the Persian Gulf and Mediterranean Sea leaves the East African littoral mission vulnerable to having its gains reversed and questions the utility of those ships for low intensity missions.  Enhanced naval presence from the People’s Republic of China (PRC) in the region, most notably the establishment of a port facility in Djibouti, further complicates force posture decision-making.   Despite the incredible gains realized for maritime security in the region, there is a demand signal for deliberate planning to match appropriate naval assets with a growing range of regional needs.

Option #1:  The U.S. maintains its current naval force posture for the East Africa littoral mission.

Risk:  Current naval force posture rotates multiple Expeditionary Strike Groups and Carrier Strike Groups through the region annually, in addition to several independent deployers dispatched for counter-piracy operations[4].  The opportunity cost of these deployments is enormous.  These ships were designed for much more complex operating environments and can often be better utilized in those environments.  Using multi-billion dollar warships for low intensity engagement not only limits the utility of these ship’s advanced combat systems but also inflates the likelihood they will be diverted to other specialized missions such as ballistic missile defense or integrated air defense.

Gain:  The existing force posture is responsible for enhanced maritime security already realized in the region.  While expanding threats may challenge the ability to maintain these gains, this hasn’t happened to the extent that a dramatic rise in piracy or a drop in partner nation capacity has occurred.  Further, the historical integration and corporate knowledge of U.S. ships deploying to the theater gives them an inherent advantage for conducting these types of operations.

Option #2:  The U.S. forward deploys two Littoral Combat Ships (LCS) to Djibouti Naval Base.

Risk:  Forward-deploying the LCS is expensive and would require a large logistics and maintenance footprint in Djibouti.  Maintenance issues have plagued the LCS and will be exacerbated by a remote maintenance infrastructure with little experience.  Maintenance issues are compounded by difficult crew rotation schedules that have already hampered a similar forward deployment of LCS to Singapore[5].  The probability that forward deployed LCS will provide a persistent capability for the East Africa littoral mission is limited significantly by these LCS-wide problems.

Gain:  The LCS surface warfare mission package is uniquely suited for the East Africa littoral mission.  The LCS uses a combination of high speeds and shallow draft to operate aviation facilities, dedicated boarding teams, and anti-surface capabilities in littoral environments[6].  These attributes make the LCS ideal for intelligence gathering, capacity building, and counter-piracy missions.  Additionally, the use of LCS allows the multi-billion dollar warships currently conducting these missions to operate in more contested environments and across a broader swath of missions in the Red Sea and Persian Gulf.   Option #2 also builds on the surge of LCS in similar mission sets from counter-drug operations in the Caribbean to fisheries patrols and bilateral engagements in Southeast Asia.

Option #3:  The U.S. decreases its naval presence in East Africa.

Risk:  The construction of the PRC naval base in Djibouti means the gap in activity from the U.S. Navy would likely be filled, at least in part, by a PRC presence.  The construction of a military docking facility, capable of berthing most People’s Liberation Army (Navy) ships, means previous PRC task forces deployed to the region could become a permanent fixture[7].  As foreign investment pours into East Africa, a reduced naval presence could cause countries such as Tanzania, Kenya, and Somalia to turn elsewhere for maritime security support of their burgeoning economies.  Option #3 could further challenge the efficacy of counter-extremist efforts on land that require logistical and intelligence support from offshore assets.

Gain:  Decreasing U.S. naval presence does not mean disavowing the East Africa littoral mission entirely.  A P-3 squadron forward-deployed to Djibouti naval base combined with transiting strike groups still leaves intermittent capacity in the region to continue to support the East Africa littoral mission.  Option #3 also eliminates the requirements of keeping ships off the coast of Djibouti.  Not having to keep ships off Djibouti would allow a refocus towards heightened Iranian tensions, threats from Houthi rebels in Yemen, or even relocation to the Pacific fleet operating area in support of growing requirements.

Other Comments:  The Surface Navy Strategic Readiness Review, released in December 2017, stated that increasing readiness “require(s) a variety of naval assets and capabilities tailored to best achieve desired results[8].”  Shifting from a “demand” to “supply” model for naval surface forces means capabilities must be optimized against the mission with which they are tasked.  The options presented in this paper are three examples, of many, for shifting to a supply-based model for naval assets without sacrificing the East Africa littoral mission.

Recommendation:   None.


Endnotes:

[1] Sow, M. (2017, April 12). Figures of the week: Piracy and Illegal Fishing in Somalia. Africa in Focus.Retrieved February 9, 2018. https://www.brookings.edu/blog/africa-in-focus/2017/04/12/figures-of-the-week-piracy-and-illegal-fishing-in-somalia/

[2] Williams, F. (2018, February 7), Exercise Cutlass Express 2018 Closes. Retrieved February 10, 2018. http://www.c6f.navy.mil/news/exercise-cutlass-express-2018-closes

[3] Eckstein, M. (2017, July 5).Textron’s Aerosonde Small Unmanned Aerial Vehicle Eligible for Navy Sea-Based ISR. United States Naval Institute News. Retrieved February 10, 2018. https://news.usni.org/2017/07/05/textrons-aerosonde-small-unmanned-aerial-vehicle-eligible-navy-sea-based-isr

[4] Defense Media Activity for U.S. Navy Office of Information. Navy Versus Piracy  #PresenceMatters. Retrieved February 10, 2018 from http://www.navy.mil/ah_online/antipiracy/index.html

[5] Lartner, D. (2017, February 20) LCS crew marooned in Singapore on open-ended
deployment. Navy Times. Retrieved February 9, 2018 from https://www.navytimes.com/news/your-navy/2017/02/20/lcs-crew-marooned-in-singapore-on-an-open-ended-deployment/

[6] United States Navy Chief of Information. Fact File: Littoral Combat Ships – Surface Warfare Mission Package. Retrieved February 10, 2018 from http://www.navy.mil/navydata/fact_display.asp?cid=2100&tid=437&ct=2.

[7] Chan, M (2017, September 17) China plans to build Djibouti facility to allow naval flotilla to dock at first overseas base. South China Morning Post. Retrieved February 9, 2018 from http://www.scmp.com/news/china/diplomacy-defence/article/2112926/china-plans-build-djibouti-facility-allow-naval

[8] Bayer, M. Roughead, G. (2017, December 4) United States Navy Strategic Readiness
Review. Pg.20. Retrieved February 11, 2018 from http://s3.amazonaws.com/CHINFO/
SRR+Final+12112017.pdf

Africa China (People's Republic of China) Djibouti East Africa Horn of Africa Maritime Matt Hein Option Papers United States

Options to Address Terrorism Financing in Australia

Ryan McWhirter has a master’s degree of Terrorism and Security Studies at Charles Sturt University.  He can be found on twitter at ryanmc__89.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The enforcement of terrorism financing for terror organisations such as the Islamic State (IS) within Australia.

Date Originally Written:  January 30, 2018.

Date Originally Published:  May 7, 2018.

Author and / or Article Point of View:  This article is written from the point of view of challenging the symbolism of investigating all terrorism financing with the effect of better employment of limited investigatory resources based upon an impact assessment of action or inaction.

Background:  Most terrorist organisations require vast amounts of external support to fund their operations.  At the height of its power, the Islamic State were vastly different in the way they funded their group, with an estimated valuation at $2 billion US dollars.  The group was almost entirely self-sufficient, relying on natural resources within their controlled territory, taxes and extortion[1].

Whilst the group is most certainly winding down due to being militarily defeated in the terrain they controlled, it is not unsound to assess that other groups will try to emulate them.  During their peak, only 5% of the group’s finances were obtained through foreign donation[2].

Significance:  The enforcement of all things terrorism has become a political hot point within Australia.  Governments profess to the public that they are doing all in their power to suppress the threat groups such as IS pose.  The financing of the group is no exception to this rule and many investigations have been squarely aimed at individuals funding terrorism.

However, when 95% of a groups finances come from internal resources, is the enforcement of external donations a cost-effective measure, particularly in a small nation such as Australia?  Whilst it is unknown the exact amount Australians contributed to IS at its peak, it can safely be measured to be a small amount of the 5% the group reaps from donations.

This situation is purely economic.  Counter terrorism operations are not cheap.  It would not be out of the realm of possibilities to estimate an operation may cost between $100,000 to $150,000 a day, given the amount of staff, resources and other intangibles required to thoroughly investigate.  If an operation runs for three months, the cost is $ 9 million.

Can these resources be put to better use?  A case in point occurred in 2016 when a young male and female were arrested in Sydney, Australia for sending $5,000 to IS[3].  This operation didn’t occur over night.  If for example it ran for two months, intelligence and security agencies spent an estimated $6 million dollars to investigate $5,000 going overseas.  The two offenders were refused bail and remanded in custody, with the male being sent to a supermax prison.  Is sending a young male to supermax for terror financing going to change his views or intensify them?

The key question is, for an almost entirely self-sufficient group, is enforcing this small amount of finance an efficient and productive measure?

Option #1:  The Australian government continues with total enforcement of laws regarding terror finance.

Risk:  This option maintains the status quo.  The continuation of the total enforcement of these offences may lead to effected communities feeling targeted and vilified by authorities.

A risk this option poses is that the resources and finances used in these investigations are not being used in more serious matters.  Whilst intelligence and security agencies are busy investigating small time terror financers, other serious offences are going unchecked, these offences include human trafficking, large-scale drug importations and actual terrorist activity being directed at citizens.

Gain:  This option allows political capital to be garnered, particularly with a government obsessed with giving the appearance of being tough on terror.  It also sets an example to other individuals who may be contemplating financing terror groups that their actions are unacceptable and will be investigated and prosecuted.

Option #2:  The Australian government conducts a cost and benefit analysis before investigating the financing of groups such as IS.

Risk:  The risks in this option are profound.  Individuals may use this loophole to contribute to their group of choice by only donating small amounts, knowing they won’t be investigated if the amount is small enough.  This small donation activity may be seen as a gateway to conducting further terrorist related activities and a key step in the radicalization process.

Politically, this option is problematic.  If this option became policy, it would be seized upon by the government’s opposition to imply they are soft on terrorism.

Gain:  Australian government terrorism-related resources and finances are diverted into more serious criminal offences and social programs.  Deradicalization programs in schools and community centers could be better funded, perhaps stopping individuals wanting to finance a terror group, or even help stop a terrorist attack before it happens.  The government could make the case that by saving resources in this area they are in fact showing a genuine attempt to stop terrorism before it happens, reducing the need to be tough on it.

Other Comments:  It should be noted that in cases of financing terror groups such as Al-Qa’ida who have a greater reliance on outside donation, option two would not be feasible.  As such, these incidents would be investigated as usual.

Recommendation:  None.


Endnotes:

[1]  Centre for the analysis of terrorism. (2015). ISIS Financing

[2]  Ibid.

[3]  Olding, Rachel. (2016) Texts between schoolgirl terror suspect and co-accused Milad Atai released in court. Sydney Morning Herald.

Australia Economic Factors Islamic State Variants Option Papers Ryan McWhirter

Episode 0003: Military Planning Constructs (The Smell of Victory Podcast by Divergent Options)

9M2vSSDs

image003

Screen Shot 2018-05-02 at 4.27.45 PM


In this episode of The Smell of Victory Podcast Bob Hein, Steve Leonard, and Phil Walter tackle the phases of military operations and the new Joint Concept for Integrated Campaigning.  The trio discusses the historic role of the phased planning construct and why the Joint Staff felt a need to change.  They also spend a lot of time examining war termination and the implications of not planning adequately for the transition to peace, using Operation Iraqi Freedom as the primary example while also exploring World War 2 and Operation Desert Storm.  Also mentioned on the podcast, and able to be downloaded here, is a July 2013 memo from U.S. Army General and Chairman of the Joint Chiefs of Staff Martin E. Dempsey to the Chairman of the Senate Armed Services Committee that discusses military options in Syria.

You can listen via Sticher by clicking here, or iTunes by clicking here.  You can also listen on our website by clicking play below or download The Smell of Victory to your favorite podcatcher via our RSS feed below.

Option Papers The Smell of Victory Podcast by Divergent Options

Options for Decentralized Local Defence Forces in Iraq & Afghanistan

Patrick Blannin (@PatrickBlannin) is a PhD Candidate, teaching fellow and research assistant at Bond University, Queensland, Australia.  The authors doctoral research focuses on the role and scope of defence diplomacy in contemporary counterinsurgency and counterterrorism.  The author has published a research monograph titled Defence Diplomacy in the Long War (Brill) as well as peer-reviewed journal articles on topics related to transnational terrorism (organisations, funding sources and counter measures).  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Can decentralized Local Defence Forces (LDF) reliably fill the security void in the Long War (Iraq and Afghanistan)?  Will LDFs such as the Tribal Mobilization Forces and the Afghan Local Police generate or maintain stability until the capability of state forces improves?  Or should such entities remain as a state sanctioned, locally drawn, semi-autonomous component of a formal security apparatus[1]?

Date Originally Written:  January 29, 2018.

Date Originally Published:  April 23, 2018.

Author and / or Article Point of View:  From an academic perspective, the author analyses national security issues, and the responses to them, through the lens of a whole-of-government approach.  This approach ensures all the U.S.’ tools of statecraft (DIMEFIL) are utilized pursuant of its national security strategic objectives[2].

Background:  In a perfect world, when the long-arm of the state is unable or unwilling to extend through the entirety of its sovereign territory, effectively filling the security vacuum by calling for a grass-roots approach to security and policing would represent a “compelling argument[2].”  However, the Long War theatres of Iraq and Afghanistan are far from perfect, and for over a decade numerous iterations of so-called Local Defence Forces (LDF, or Local Police Forces, Community Defence Units, Public Protection Force, etc.) have been stood up.  Results are mixed, with often short-term benefits yielding mid-term pain.  For example, the highly vaulted Sons of Iraq (’Sahawa al-Anbar’, the Sunni Awakening) constituted a number of strategically aligned LDFs which combined to facilitate the routing of Al Qa’ida from Western Iraq (primarily Anbar Province)[3].  At the time however, with stories of its recent successes reported around the world, some analysts were guarded in their praise, identifying the short-term security gains in at least some areas, while recognizing “[T]here is little guarantee that these gains will persist, and there is some chance that the strategy will backfire in the medium term[4].”  Similar conversations, and associated apprehension, regarding Afghanistan were occurring before, during and after the 2009 ‘Surge[5].’  The intoxicating aroma of tactical victory soon fades and is replaced by the lingering odour of arms races and power grabs between tribally aligned militias, and the often undermining influence and/or actions of the state.

Significance:  Over the past 16 years, the U.S. and its Coalition partners have encouraged the Iraq and Afghan governments, such as they were, to incorporate LDFs into their national security strategy.  LDFs are designed to contribute to clearing or holding missions as well as local law enforcement in broader stabilization efforts.  Although each theatre offers innumerable differences and associated challenges, one constant remains, that short-term tactical successes are followed by mid-term strategic losses.  A legacy of its Long War experience, U.S. and Coalition civilian and military decision-makers have a ‘better’ understanding of the social/cultural anthropology in Iraq and Afghanistan.  Although lessons have been learned and mistakes addressed, repeating the same flawed approach remains a primary strategic choice, and our expectations continually failed to be met[6].

Option #1:  Firstly, limit the size of LDFs.  Secondly, ensure U.S. and Coalition personnel play a role, clandestinely wherever possible, in the vetting and training process which would allow the U.S. and its partners to identify recruits and influence the operating culture of the LDF.  Additional constraints could include the amount, and type of weaponry supplied, limit or equalize the political influence/politicization of all LDF leadership as well as introducing an enforceable set of operating parameters[7].

Risk:  Attempts to constrain LDFs by limiting their size, political influence, or access to weapons risks undermining the capacity of the LDF to fulfill their objective.  Moreover, a constrained and disempowered force can leverage traditional community relations to operate a shadow or parallel security apparatus which effectively monopolizes the use of violence within their respective area of operations which would undermine broader stabilization efforts[8].

Gain:  Limiting the size and capability of the LDF makes it more able to be managed by the government.  Additionally, introducing a personnel cap in conjunction with more rigorous vetting would create a more effective and perhaps malleable security force.  Standing up an effective LDF may mitigate the role/presence/agenda of existing militias affording tribal leadership the ability to pursue legitimate, non-violent, political activities[9].

Option #2:  Firstly, acknowledge, accept and plan for the inherent challenges and limitations of LDFs[10].  Secondly, increase the tempo of the current, centrally controlled train, advise, assist, accompany, and enable and police force capacity building programs, leveraging the arrival of the nascent U.S. Army Security Force Assistance Brigades and private sector trainers/advisors.  Centrally controlled, locally drawn LDFs can be generated through the existing security, stabilization and capacity building framework[11].

Risk:  Convincing/guaranteeing local militia and populations that their acquiescence to a degree of central government control and/or oversight will not prove detrimental to their local security objectives will be a challenge.  Lack of progress in establishing security creates a security vacuum which nefarious actors will exploit rendering the situation worse than prior to implementing this option.

Gain:  Using the existing capacity building framework expedites implementation of this option.  Moreover, generating requisite personnel should not represent a barrier, with existing militiae and a willing local population providing significant pool to draw from.

Other Comments:  For many, a situation in which locals (including LDFs) governed locals would significantly reduce tensions.  However, this local-for-local governance does not equate with the preferred central government model.  Both options are based on realities on the ground rather than a theoretical construct, thus LDFs such as the Tribal Mobilization Forces and the Afghan Local Police represent a rare triptych.  This triptych is an opportunity to empower in situ populations, reduce the anxiety of the central government, and achieve the stabilization objectives of the U.S./Coalition Long War strategy.  The objectives and concerns of all stakeholders are legitimate, yet they are diverse and need to be addressed in a comprehensive manner.  LDFs do deliver short-term tactical benefits and can positively contribute to the strategic objective of sustainable stabilization in Iraq and Afghanistan[12].

Recommendation:  None.


Endnotes: 

[1] Clark, K. (2017). ‘Update on Afghan Local Police: Making Sure they are armed, trained, paid and exist’, Afghan Analysts Network at https://www.afghanistan-analysts.org/update-on-the-afghan-local-police-making-sure-they-are-armed-trained-paid-and-exist/; Gaston, E. (2017). ‘Sunni Tribal Forces’, Global Public Policy Institute Report at http://www.gppi.net/publications/sunni-tribal-forces/ ; For a comprehensive list of Article about the Afghan Local Police from Afghan War News see: http://www.afghanwarnews.info/police/ALPnews.htm

[2] Field Manual (FM) 3-0, Operations, defines the “instruments of national power” as Diplomatic, Informational, Military, and Economic, normally referred to as the DIME.  The DIMEFIL acronym encapsulates: Diplomacy, Information, Military, Economic, Financial, Intelligence & Law Enforcement. DIMEFIL is an extension of the DIME construct that can be found in the National Strategy for Combating Terrorism (NSCT-2003) and the National Military Strategic Plan for the War on Terrorism (NMSP-WOT). The NMSP-WOT defines DIMEFIL as the means, or the resources, used for the War on Terrorism (2006: 5) at http://archive.defense.gov/pubs/pdfs/2006-01-25-Strategic-Plan.pdf; For a brief overview of DIMEFIL see: Smith, A.K. (2007), Turning on a DIME: Diplomacy’s Role in National Security, Carlisle, VA: Strategic Studies Institute, pp. 1-17 at https://ssi.armywarcollege.edu/pdffiles/PUB801.pdf

[3] Arraf, J. (2014). ‘A New Anbar Awakening’, Foreign Policy at http://foreignpolicy.com/2014/01/08/a-new-anbar-awakening/; Jones, S. G. (2011). ‘Security from the Bottom Up’, Time at ; Theros, M & Kaldor, (2007) M. ‘Building Afghan Peace from the Ground Up’, A Century Foundation Report, New York: The Century Foundation, pp. 1-60 at http://www.operationspaix.net/DATA/DOCUMENT/4311~v~Building_Afghan_Peace_from_the_Ground_Up.pdf

[4] Hamilton, B. (2017). ‘Illusions of Victory: The Anbar Awakening and the Rise of the Islamic State’, US Army; Kagan, E, (2007). ‘The Anbar Awakening: Displacing al Qaeda from its Stronghold in Western Iraq’, Iraq Report, The Institute for the Study of War & the Weekly Standard, pp. 1-18 at http://www.understandingwar.org/sites/default/files/reports/IraqReport03.pdf

[5] Long, A. 2008). ‘The Anbar Awakening’, Survival’, Vol. 50, no. 2, pp. 67-94 at http://www.tandfonline.com/doi/pdf/10.1080/00396330802034283?needAccess=true

[6] Human Rights Watch. (2012). Impunity, Militias, and the “Afghan Local Police”, pp.  1-100 at https://www.hrw.org/report/2011/09/12/just-dont-call-it-militia/impunity-militias-and-afghan-local-police ; Long, A., Pezard, S., Loidolt, B & Helmus, T. C. (2012). Locals Rule: Historic Lessons for Creating Local Defence Forces for Afghanistan and Beyond, Santa Monica, CA: RAND Corporation, pp. 1-232 at https://www.hrw.org/report/2011/09/12/just-dont-call-it-militia/impunity-militias-and-afghan-local-police

[7] Dearing, M. P. (2011). ‘Formalizing the Informal: Historical Lessons on Local Defense in Counterinsurgency’, Small Wars Journal at http://smallwarsjournal.com/jrnl/art/formalizing-the-informal-historical-lessons-on-local-defense-in-counterinsurgency .

[8] Mansour, R & Jabar, F. A. (2017). ‘The Popular Mobilization Forces and Iraq’s Future’, Carnegie Middle East Center at http://carnegie-mec.org/2017/04/28/popular-mobilization-forces-and-iraq-s-future-pub-68810 ;  Gharizi, O & Al-Ibrahimi, H. (2018). ‘Baghdad Must Seize the Chance to Work with Iraq’s Tribes’, War on the Rocks at https://warontherocks.com/2018/01/baghdad-must-seize-chance-work-iraqs-tribes/

[9] Gibbs, D. 1986). ‘The Peasant as Counter Revolutionary: The Rural Origins of the Afghan’, International Development, Vol. 21, no. 1, pp. 37–45 at http://dgibbs.faculty.arizona.edu/sites/dgibbs.faculty.arizona.edu/files/peasant.pdf

[10] El-Hameed, R. (2017). ‘The Challenges of Mobilizing Sunni Tribes in Iraq’, Carnegie Endowment for International Peace at http://carnegieendowment.org/sada/59401; n/a. (2016). Militias in Iraq: The hidden face of terrorism, Geneva International Center for Justice at http://www.gicj.org/GICJ_REPORTS/GICJ_report_on_militias_September_2016.pdf

[11] Cox, M. (2017). ‘Army Stands Up 6 Brigades to Advise Foreign Militaries’, Military.com; Cooper, N. B. (2017). ‘Will the Army’s New Advisory Brigades get Manning and Intel Right?’, War on the Rocks at https://warontherocks.com/2017/09/will-the-armys-new-advisory-brigades-get-manning-and-intel-right/ ; Gutowski, A. (2017). ‘Newly created ‘teaching’ brigade prepares to deploy to Afghanistan, FDD Long War Journal at https://www.longwarjournal.org/archives/2018/01/sfab.php ; Keller, J. (2018). ‘The 1st SFAB’s Afghan Deployment Is A Moment Of Truth For The Global War On Terror’, Task & Purpose at  https://taskandpurpose.com/sfab-train-advise-assist-afghanistan/  Strandquist, J. (2015). ‘Local defence forces and counterinsurgency in Afghanistan: learning from the CIA’s Village Defense Program in South Vietnam’, Small Wars & Insurgencies, Vol. 26, no. 1, pp. 90–113 at http://www.tandfonline.com/doi/pdf/10.1080/09592318.2014.959772?needAccess=true ; Green, D. (2017). In the Warlord’s Shadow: Special Operations Forces, the Afghans, and their Fight Against the Taliban, Annapolis, MD: Naval Institute Press, 2017, pp. 1-256.

[12] Al-Waeli, M. (2017). ‘Rationalizing the Debate Over the PMF’s Future: An Organizational Perspective’, 1001 Iraqi Thoughts at http://1001iraqithoughts.com/2017/12/14/rationalizing-the-debate-over-the-pmfs-future-an-organizational-perspective/

[13] Inspector General for Overseas Contingency Operations. (2017). Operation Inherent Resolve, Report to the U.S. Congress-July 2017-September 2017, pp. 1-126; U.S. Department of Defence. (2016). Enhancing Security and Stability in Afghanistan, Report to Congress, pp. 1-106 at https://www.defense.gov/Portals/1/Documents/pubs/Afghanistan-1225-Report-December-2016.pdf ; Hammes, T. X. (2015). ‘Raising and Mentoring Security Forces in Afghanistan and Iraq’, in Hooker Jr, R. D., & Joseph J. Collins. J. J. (eds.), Lessons Encountered: Learning from the Long War, Fort MacNair: National Defence University, pp. 277-344 at https://www.sciencedirect.com/science/article/pii/S0030438715000691

Afghanistan Allies & Partners Insurgency & Counteinsurgency Iraq Irregular Forces / Irregular Warfare Option Papers Patrick Blannin United States

Options to Manage the Kingdom of Saudia Arabia’s Nuclear Ambitions

Joshua Urness is an officer in the United States Army who has served both in combat and strategic studies roles.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  In a notional future the Kingdom of Saudi Arabia (KSA) Defense Ministry leadership are strongly advocating for initiating a domestic nuclear weapons development program and have begun discussing the issue at King Abdullah City for Atomic and Renewable Energy.

Date Originally Written:  January 14, 2018.

Date Originally Published:  March 26, 2018.

Author and / or Article Point of View:  This article is written from the point of view of a non-proliferation and arms control professional working in the U.S. government. This professional was asked to provide recommendations to members of the national security council on how to dissuade the Kingdom of Saudi Arabia from pursuing nuclear weapons.

Background:  This background, though containing some facts, is based on the above described notional situation. Key drivers for the KSA on the issue are anticipation of the expiration of the Iranian Joint Comprehensive Plan of Action within 10-15 years and persistent adversarial relations with Iran; likely attributable to continued Islamic Revolutionary Guard Corps activity throughout the Gulf Cooperation Council region. This adversarial activity includes perceived Iranian support of Houthi Rebels, by proxy, in Yemen, a force that frequently fires ballistic missiles into KSA territory and has destabilized the KSA’s southern border region.

For this notional scenario we assume that the KSA:

– is a member of the Nuclear Non-proliferation Treaty (NPT) and has actively supported the establishment of a Weapons of Mass Destruction Free Zone in the Middle East (as recently as May, 2017[1]).

– does not currently possess the technological, intellectual or infrastructural capability necessary to produce fissile material or a nuclear weapon[2].

– has been working to develop a domestic nuclear energy program.

– possesses nuclear weapon capable delivery vehicles which were purchased in 2007 from China (DF-21 ballistic missile variants) and has spent substantial resources developing its Strategic Missile Force[3].

– recently published a plan for state-level economic reformation (“Vision 2030”[4]).

– signed a memorandum of understanding with the U.S. in 2008 on nuclear energy cooperation, an objective also discussed with France[5].

– has illicit agreements with states such as Pakistan for “off the shelf” nuclear weapons capabilities based on the known fact that the KSA funded work by A.Q. Khan[6].

Significance:  This situation matters to the United States because of the following U.S. national security interests:

– Prevent the spread and use of weapons of mass destruction (National Security Strategy, 2017)

– “Checking Iran’s malign influence while strengthening regional friends and allies” (Defense Posture Statement, 2017) and, therefore, the security of trade within and through the Middle East.

– Support of the Nuclear Non-Proliferation Treaty and the NPT 2020 review.

– Support of weapons of mass destruction free zones and, therefore, the establishment of a nuclear weapon free zone in the Middle East.

Option #1:  The U.S. focuses on influencing KSA key stakeholder and future king, Crowned Prince Mohammed Bin Salman, to neutralize proponents of nuclear weapons development by supporting his keystone political platform, “Vision 2030.”

“Vision 2030” is an extremely ambitious and aggressive plan that is heavily reliant on both foreign direct investment[7] and non-native intellectual contribution to domestic institutional development. The U.S. could assist the KSA in providing both in a manner that emphasizes domestic nuclear energy and deemphasizes the pursuit of nuclear weapons. Mohammed Bin Salman, author of the plan, is expected to accede the throne soon (to ensure the passing of power under supervision of the current king), and already exercises significant authority regarding the KSA’s future and will be the primary stakeholder in all major decisions.

Risk:  This option accepts that the KSA develops a domestic nuclear energy program which may require more than customary monitoring to determine if this program will become dual-use for nuclear weapons development.

Gain:  This option demonstrates public U.S. support for key allies sustainable economic development in a manner that obscures specific intentions of policy and  will benefit the U.S. economy in long run because of increased ties to development.

Option #2:  The U.S. enhances its current security guarantee and cooperation by expanding the types of weapon systems/services delivered to the KSA and making rapid initial delivery of key systems, which will provide public regional assurance of commitment.

Recent weapons agreement with the KSA totaling $110 billion (bn) U.S. dollars ($350 bn over 10 years) does not include long-range stand-off weapons (land, air or sea) capable of counter-battery fire that could reach Iran. The agreements do include air defense systems (Patriot, THAAD) in limited numbers. This option would expand the current weapons agreement to include such stand-off weapons and increases in air defense systems. This option also emphasizes rapid delivery of equipment currently available to satisfy urgency of KSA military leaders. Expanding service packages with equipment would require forward stationing of U.S. service members in the KSA to train, maintain and develop technical institutional knowledge of new systems, further promoting STEM initiatives of “Vision 2030.”

Risk:  This option only passively addresses KSA nuclear weapon development discussions as it seeks to address insecurity by attempting to conventionally deter Iran.

Gain:  The U.S. Department of Defense is currently seeking acquisition of long-range munitions in significant numbers and funding from this expanded agreement could be used to jump-start production. Rapid delivery would reinforce commitment to all allies in the region.

Other Comments:  Option #1 maximizes benefits for both parties, better than other options. While U.S. national interests are supported in the region, the U.S. will also benefit economically from partnerships built out of acknowledgment and support of the KSA’s effort to achieve “Vision 2030.” Option #1 will also demonstrate U.S. engagement in the region’s key interests and political/economic initiatives. Discussions of nuclear weapons development will be decisively dealt with in a non-public manner; an issue that, if handled publicly, could cause concern in other regional states.

Recommendation:  None.


Endnotes:

[1] “United Nations PaperSmart – Secretariat – UNODA – NPT – First Session (NPT) – Documents.” Accessed September 22, 2017. http://papersmart.unmeetings.org/secretariat/unoda/npt/2017-first-session-of-the-preparatory-committee/documents/

[2] “Will Saudi Arabia Acquire Nuclear Weapons? | NTI.” Accessed September 22, 2017. http://www.nti.org/analysis/articles/will-saudi-acquire-nuclear-weapons/

[3] “Why Did Saudi Arabia Buy Chinese Missiles?” Foreign Policy. Accessed September 22, 2017. https://foreignpolicy.com/2014/01/30/why-did-saudi-arabia-buy-chinese-missiles/

[4] “Saudi Vision 2030.” Accessed September 22, 2017. http://vision2030.gov.sa/en

[5] Department Of State. The Office of Electronic Information, Bureau of Public Affairs. “U.S.-Saudi Arabia Memorandum of Understanding on Nuclear Energy Cooperation,” May 16, 2008. https://2001-2009.state.gov/r/pa/prs/ps/2008/may/104961.htm

[6] Sanger, David E. “Saudi Arabia Promises to Match Iran in Nuclear Capability.” The New York Times, May 13, 2015, sec. Middle East. https://www.nytimes.com/2015/05/14/world/middleeast/saudi-arabia-promises-to-match-iran-in-nuclear-capability.html

[7] “Goals | Saudi Vision 2030.” Accessed September 22, 2017. http://vision2030.gov.sa/en/goals

Capacity / Capability Enhancement Chemical, Biological, Radiological, and Nuclear Weapons Joshua Urness Nuclear Issues Option Papers Saudi Arabia (Kingdom of Saudi Arabia)

Options for the U.S. to Deter China in the East & South China Seas

Lieutenant Colonel Christopher Curtin is a Field Artillery Officer with over 20 years of experience in the United States Marine Corps, including at the Pacific Division of Plans, Policies, and Operations at Headquarters Marine Corps.  Annie Kowalewski is a Chinese military and defense researcher at Georgetown’s Center for Security Studies. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Chinese militarization of artificial islands in disputed waters in the East and South China Seas.

Date Originally Written:  March 1, 2018.

Date Originally Published:  March 12, 2018.

Author and / or Article Point of View:  The authors are a military member and a defense researcher.  The authors believe that Chinese actions in the East and South China Sea are destabilizing and threaten to shift the balance of power in the Asia-Pacific region.

Background:  China is showing no evidence of slowing down its territorial aspirations within the “nine dash line” and continues to emplace anti-aircraft guns and close-in weapons systems on its man-made islands in the East and South China Seas[1].  China also uses its maritime militia to bully neighboring countries and extend Chinese fishing rights and territorial reach.  The United States has thus far been unsuccessful in responding to or deterring these Chinese challenges to the status quo.

Significance:  Chinese actions represent a “salami-slicing” strategy aimed at slowly changing regional norms and asserting Chinese dominance in the East and South China Seas.  This strategy allows China to exert influence and establish itself as a regional hegemon, thereby threatening the balance of power and U.S. primacy in the region.  Chinese militarization and power projection also threaten the United States’ allies and security partners, some of which the United States is bound by treaty to offer security assistance.

Option #1:  The United States invests in capabilities-based deterrents that can deter specific Chinese actions.

Risk:  China has objected to the capabilities that provide this type of deterrent, such as the new F-35B fighter operating on naval vessels in the pacific[2].  China may use the deployment of these capabilities as an excuse to finally militarize islands such as the Scarborough Shoal.

Gain:  A capabilities-based deterrent will make Chinese islands in the East and South China Seas vulnerable and, ultimately, a military liability rather than an advantage.  New technologies such as the F-35B allow the United States more flexibility when operating in the Pacific, by providing U.S. and allied commanders with a 5th generation aircraft that is normally only employed off traditional U.S. aircraft carriers.  Option #1 would not only help offset the eventual Chinese People’s Liberation Army Navy (PLA(N)) numerical superiority in the Pacific, but also demonstrate the U.S. commitment to modernizing a capability that has been historically suited for military operations against static, geographically isolated island targets.  This option may help shift China’s risk calculus when deciding how aggressively it hopes to militarize the islands, once it realizes that increased island investment actually increases vulnerability instead of capability.

Option #2:  The United States invests in strategic deterrence by helping boost allies’ and security partners’ amphibious capabilities.

Risk:  Boosting allies’ and security partner amphibious capabilities runs the risk of antagonizing China.  China has already strongly condemned proposed amendments to the Japanese constitution calling for a larger defense budget[3].  China has been known to use economic and political coercion to pressure regional countries to adopt, or abandon, policies.

Gain:  Boosting allies’ and security partner amphibious capabilities will be key to creating a sea force able to challenge an increasingly capable PLA(N).  This option would also allow allies and security partners to better deal with Chinese salami-slicing activities by providing them with the capability to deter or engage the Chinese on their own, rather than rely on U.S. deployments and assistance[4].

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Bader, Jeffrey. (2014). The U.S. and China’s Nine-Dash Line: Ending the Ambiguity. Retrieved from https://www.brookings.edu/opinions/the-u-s-and-chinas-nine-dash-line-ending-the-ambiguity/.

[2] Lockheed Martin. (2018). The F-26B Lightning II. Retrieved from https://www.f35.com/about/variants/f35b.

[3] Huang, Kristin. (2017, October 23). China to keep wary watch on Abe’s push to change pacifist constitution. Retreived from http://www.scmp.com/news/china/diplomacy-defence/article/2116635/china-keep-wary-watch-abes-push-change-pacifist.

[4] Erickson, Andrew. (2016, September 21). Seapower and Projection Forces in the South China Sea. Retreived from https://armedservices.house.gov/legislation/hearings/seapower-and-projection-forces-south-china-sea.

A2AD (Anti Access and Area Denial) Allies & Partners Annie Kowalewski China (People's Republic of China) Christopher Curtin Maritime Option Papers South China Sea United States

Options for the Strategic Goals of the Royal Canadian Navy

Lieutenant(N) Fred Genest is a Naval Warfare Officer in the Royal Canadian Navy and has deployed operationally in HMCS Charlottetown and HMCS Fredericton.  He is currently completing a Master of Public Administration degree while on staff at the Royal Military College of Canada.  He tweets at @RMCNavyGuy.  This article does not represent the policies or opinions of the Government of Canada or the Royal Canadian Navy.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Royal Canadian Navy (RCN) is in the process of recapitalizing its fleet but has not had a significant debate on its strategic goals in decades.

Date Originally Written:  December 19, 2017.

Date Originally Published:  March 12, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the senior Canadian political and military leadership.

Background:  Successive governments have asserted that Canada must deploy warships overseas to help maintain international security and stability[1].  Despite the RCN’s fleet recapitalization, there has been no debate about the best way to employ its forces.

Current RCN employment is based on history, Cold War thinking, and national myths. Canada sees itself as “punching above its weight” since the Second World War.  In that war, Canada gave control of its forces to the British and American leaders, with disastrous results at home such as the closure of the St. Lawrence seaway.  During the Cold War, Canadian warships deployed with North Atlantic Treaty Organization (NATO) Standing Naval Forces; this continues in the 21st century.  In its role as a “junior partner” since World War 2, Canada has followed the British and American lead in security and defence, subordinating its national interest to the alliance’s goals.

Significance:  As a sovereign middle power, Canada can set its own strategic priorities[2].  A commitment-capability gap—insufficient units to accomplish designated tasks—has been identified in the RCN since at least the 1964 White Paper on Defence[3].  The Canadian Department of National Defence (DND) saw this as normal at the end of the Cold War[4].  A 2013 report[5] stated that Canada would have difficulty meeting its readiness and force posture requirements until well into the 2020s.  Adjusting the current strategy could help reduce the gap.

Option #1:  Maintain the status quo with a medium global force projection navy[6], constant rotations with NATO, and a worldwide presence.

Risk:  With Option #1 the commitment-capability gap could grow.  The Government of Canada (GoC) intends to be prepared to participate in concurrent operations across multiple theatres[7].  However, readiness goals will not be met until the late 2020s[8], perhaps even until the Canadian Surface Combatant (CSC) project is completed in the 2040s.  Manning is, and will remain, a problem in certain areas like anti-submarine warfare and engineering.

By continuing the historical pattern of letting alliance leaders determine its strategy, Canada is abdicating its responsibility to protect its national interests.

Gain:  There is prestige in being one of the few navies that routinely deploys around the world[9], and RCN ships are recognized by its allies as the “go-to” during operations[10].  Option #1 improves Canada’s standing in the world, especially amongst peer allied nations, and allows Canada to exercise some leadership in international affairs.  This increased leadership role allows Canada to further its interests through diplomacy.

Furthermore, there is a morale-boosting effect in having regular overseas deployments; sailors, like soldiers, are keen to acquire “bits of coloured ribbon.”  In the RCN, this is achieved through overseas operations.  Regular overseas deployments or lack thereof may therefore be a factor in recruitment and retention.

There is also an internal political gain: by highlighting successes abroad, the GoC can raise awareness of the RCN and increase popular support for its foreign policy[11].  This is beneficial to the RCN, as popular support can translate into political pressure to obtain the tools required to achieve its institutional goals.

Option #2:  Downgrade the RCN to a medium regional power projection navy.  Cease overseas deployments except for specific, time-limited United Nations or NATO missions critical for peace or security.

Risk:  No longer routinely deploying internationally would be seen as a loss of prestige, and could lead to a loss of informal diplomatic leadership.

Local operations are often unpopular with sailors, and removing the opportunity to go overseas could lead to a loss of morale, with obvious effects on retention.  Also, one of the main ways Canadian sailors are trained for full-spectrum operations is through workups leading to an overseas deployment, and through multinational exercises while deployed.  Removing those training opportunities could reduce personnel readiness.  Option #2 could also harm the justifications for future, or even current, procurement projects.

Gain:  RCN commitments would be more in line with capabilities.  The GoC’s commitments will continue to be difficult for the RCN to meet in the next decade[12]; reducing the level of commitment would allow the RCN and its allies to plan based on actual capabilities.

Carefully selecting operations as part of Option #2 would also let Canada set its own priorities for its warships.  In recent years, Canadian ships have taken part in operations that were only vaguely related to Canadian interests, such as European Union migrant activities.  Not committing to those operations would free up the RCN to take part in more nationally-relevant operations.

With the CSC, Canada will maintain a full-spectrum capability, and being a medium regional power projection navy does not preclude overseas deployments.  Option #2 would bring Canada in line its European NATO peers, who keep their warships near their own waters, to protect their national interests.

Another challenge for the RCN is its maintenance budget, which is insufficient to meet all requirements. One of the effects is that ships have to swap parts to achieve material readiness and some repairs are left undone due to a lack of parts or available personnel.  Deployments, especially repeated overseas deployments by the same units, are hard on equipment. Reducing the number of overseas deployments under Option #2 would reduce premature failures and maintenance costs.

Other Comments:  Option #2 may not be feasible in the current political climate, but this does not preclude vigorous examination.

Recommendation:  None.


Endnotes:

[1] Department of National Defence. (2017a). Leadmark 2050: Canada in a New Maritime World. Ottawa. Retrieved from http://navy-marine.forces.gc.ca/assets/NAVY_Internet/docs/en/analysis/rcn-leadmark-2050_march-2017.pdf 
— Leadmark 2050 is a document produced by the Royal Canadian Navy to set its long-term vision beyond its five-year strategic plan. It is a follow-up to the 2001 publication, Leadmark 2020.

[2] Lindley-French, J. (2017). Brexit and the Shifting Pillars of NATO. Retrieved from http://www.cgai.ca/brexit_and_the_shifting_pillars_of_nato

[3] Department of National Defence. (1964). White Paper on Defence. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2012/dn-nd/D3-6-1964-eng.pdf — While it did not call it as such, the concern was evident.
  In Commonwealth countries, White Papers are used to provide information about government policy to parliamentarians and the public.  In Canada, there have been three White Papers on Defence since World War 2: 1964, 1971, and 1994. Major defence policy documents were also released in 1984, 1992 and 2017.

[4] Department of National Defence. (1987). Challenge and commitment : a defence policy for Canada. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2012/dn-nd/D2-73-1987-eng.pdf

[5] Department of National Defence – Chief Review Services. (2013). Evaluation of Naval Forces. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2015/mdn-dnd/D58-33-2013-eng.pdf 
— This document evaluated the RCN’s performance from 2008 to 2013, particularly the ability to generate and employ naval forces as directed by the GoC.

[6] Department of National Defence. (2017a). Leadmark 2050: Canada in a New Maritime World. Ottawa. Retrieved from http://navy-marine.forces.gc.ca/assets/NAVY_Internet/docs/en/analysis/rcn-leadmark-2050_march-2017.pdf

[7] Department of National Defence. (2017b). Strong Secure Engaged: Canada’s Defence Policy. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2017/mdn-dnd/D2-386-2017-eng.pdf

[8] Department of National Defence – Chief Review Services. (2013). Evaluation of Naval Forces. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2015/mdn-dnd/D58-33-2013-eng.pdf

[9] Department of National Defence. (2017a). Leadmark 2050: Canada in a New Maritime World. Ottawa. Retrieved from http://navy-marine.forces.gc.ca/assets/NAVY_Internet/docs/en/analysis/rcn-leadmark-2050_march-2017.pdf

[10] Department of National Defence – Chief Review Services. (2013). Evaluation of Naval Forces. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2015/mdn-dnd/D58-33-2013-eng.pdf

[11] Ibid.

[12] Ibid.

Canada Fred Genest Maritime Option Papers Policy and Strategy

China’s Options Towards the (Re)emerging Quadrilateral Security Dialogue

Adam Ni is a researcher at the Strategic and Defence Studies Centre, Australian National University.  His areas of interest include China’s foreign and security policy.  He can be found on Twitter @adam_ni.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The People’s Republic of China (China) is facing the (re)emergence of the Quadrilateral Security Dialogue, known as the Quad, consisting of the United States, India, Japan and Australia.  The unstated aim of the Quad is to constrain China’s growing power in Asia through possible military and economic cooperation that would raise the cost if Beijing challenges the status quo.

Date Originally Written:  February 28, 2018.

Originally Published:  March 5, 2018.

Author and / or Article Point of View:  The author is a scholar of China’s foreign and security policy.  The article is written from the point of view of Chinese decision-makers considering policy options in response to the Quad’s challenges.

Background:  The Quad can be traced back to 2007 when diplomatic efforts culminated in a multilateral naval exercise off the Bay of Bengal.  While the countries involved contended that their activities were not aimed at China, it was clear that these activities were largely a response to China’s growing power.  However, the Quad was short-lived with Australia pulling out in February 2008 under Chinese pressure[1].

Recently, the Quad has been revived in the face of an increasingly powerful and assertive China with expanded geopolitical ambitions.  In November 2017, officials from the Quad nations met on the sidelines of the East Asia Summit in the Philippines and agreed that a “free, open, prosperous and inclusive Indo-Pacific region” is in the interest of all countries[2].  This meeting was followed in January by the meeting of the Quad navy chiefs at the Raisina Dialogue in India.  During the meeting, Admiral Harry Harris, the Commander of U.S. Pacific Command, characterized China as a “disruptive, transitional force” in the region, and urged Quad nations to take measures against China’s “unilateral ways to change the use of global commons” and uphold “rule-based freedom of navigation[3].”  This sentiment was echoed by the navy chiefs of the other three Quad nations.

Significance:  While it is still too early to tell what the Quad would entail, in theory, it aims to constrain China’s growing power and to ameliorate China’s behavior by altering Beijing’s strategic calculus.  The military dimension of the Quad could take the form of expanded military cooperation that would raise the cost for China to use or threaten the use of force, including in relation to the East and South China Seas.  The economic dimension could take the form of expanded economic and infrastructure cooperation that would compete with China’s Belt and Road Initiative, a grand plan to reshape the world economy with China at the center.

Option #1:  Reassurance.  China continues to emphasize to the Quad nations its intent to develop peacefully through public statements and diplomatic channels.

Risk:  Without pushing back against the Quad, the Quad nations and others in the region may believe that China is unwilling to impose a cost on them for challenging China’s security and economic interests.  This lack of push back may lead to further coalescence of the Quad and may even draw in other states in the region that have become wary of China’s growing power, including those that have territorial disputes with China in the South China Sea.

Gain:  Option #1 may help to undermine the narrative of an ambitious China with a willingness to adopt coercive means to protect and advance its interests.  This option would strengthen the arguments of domestic forces in the Quad nations that advocate a softer approach in responding to Chinese power.

Option #2:  Punishment.  China applies a high degree of economic and diplomatic pressure on Quad nations to demonstrate the cost of challenging China’s interests and thus deter further challenges.  This option could take the form of economic coercion, formal diplomatic protests, and the downgrading of bilateral cooperation in key fields.

Risk:  Option #2 would strengthen the rationale for the Quad and the argument for constraining China’s power in the first place by demonstrating China’s willingness to adopt coercive measures against those that challenge its interests.  This option may further exacerbate the negative perception of China among the Quad nations, especially where there is already a lively debate about China’s influence (such as in Australia and the United States).  In addition, economic coercion may damage the Chinese economy and in the long run make the target economies less dependent on China.

Gain:  China demonstrating strength and resolve early on may lead to the collapse of the Quad if the Quad nations are not willing to pay the high cost of challenging China’s interests.  For example, Australia is highly dependent on China for trade and investment flows.  The Chinese government could put in place measures to reduce Chinese tourists or students from going to Australia and link these restrictions to Australia’s involvement with the Quad.  Such measures may also deter other regional countries from cooperating with the Quad against China’s interests.

Option #3:  Reassurance and caution.  China continues to emphasize its peaceful intent while also signaling its willingness to impose an economic and political cost on the Quad nations should they continue to challenge China’s interests.

Risk:  Option #3 may not be effective due to a lack of concrete cost imposed on the Quad nations, through, for example, coercive economic measures.  At the same time, the cautioning may be interpreted as an aggressive warning of China’s coercive intent, further exacerbating public anxiety in the Quad nations.

Gain:  This approach may be enough to forestall the further development of the Quad through providing reassurance but also signals China’s resolve to protects its interests.  Option #3’s key benefit is that it does not incur large political or economic cost for China immediately, but hinges Chinese retaliation on further Quad activities.

Other Comments:  The revived Quad is still in the early stages of its development, and it is too early to tell what the Quad would entail.  The above options are presented on the basis that the Quad may involve military and economic dimensions that challenge China’s interests, including its territorial claims in the South China Sea as well as its Belt and Road Initiative.  Given the diversity of strategic interests between the Quad nations in relation to China, there is a likelihood that the Quad will not develop beyond a mechanism for dialogue.

Recommendation:  None.


Endnotes:

[1] Indrani Bagchi, “Australia to pull out of ‘quad’ that excludes China,” Times of India, February 6, 2008. Available at: https://timesofindia.indiatimes.com/india/Australia-to-pull-out-of-quad-that-excludes-China/articleshow/2760109.cms.

[2] “India-Australia-Japan-U.S. Consultations on Indo-Pacific (November 12, 2017),” Ministry of External Affairs, Government of India, November 12, 2017. Available at: http://mea.gov.in/press-releases.htm?dtl/29110/IndiaAustraliaJapanUS_Consultations_on_IndoPacific_November_12_2017

[3] “‘China a disruptive power,’ say navy chiefs of Quadrilateral nations,” Times of India, January 19, 2018. Available at: https://timesofindia.indiatimes.com/india/china-a-disruptive-power-quad-nations-navy-chiefs/articleshow/62562144.cms.

Adam Ni Australia China (People's Republic of China) India Japan Option Papers United States

Options to Build Local Capabilities to Stabilise the Lake Chad Region

Fulan Nasrullah is a national security policy adviser based in Nigeria.  He currently works for an international research and policy advisory firm.  Fulan tweets at @fulannasrullah and blogs here.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government.


National Security Situation:  Counterinsurgency and stabilisation campaigns in the Lake Chad region.

Date Originally Written:  December 11, 2017.

Date Originally Published:  March 5, 2018.

Author and / or Article Point Of View:  This article is written from the point of view of a Nigerian National Security Advisor, offering options on the building of key local capabilities in the Lake Chad region to further degrade destabilising non-state armed groups in the region, while fostering stability in the area.

Background:  With the launch of conventional offensives by the Nigerian and Chadian armies in 2015, non-state armed groups in the Lake Chad region and Northeast Nigeria have lost much of the territory which they had earlier captured.  The successes of the regional governments’ conventional offensives have forced the non-state armed groups to return to a heavy emphasis on revolutionary and asymmetric warfare, which the local armies and governments are ill prepared to confront.

The conventional offensive resulted in a situation where local security capabilities, already inadequate, are  increasingly overstretched and worn down, by having to manage multiple security problems over such a wide area.

The Nigerian Army has an estimated 40,000-45,000 combat and support personnel (out of a total 130,000+ personnel) deployed in Northeast Nigeria, in over forty combat battalions.  These include the battalions that make up the in theatre 7 and 8 Divisions, plus those backfilling from 3, 1 and 2 Divisions.  These forces represent the majority of the Nigerian Army’s combat deployable strength, most of whom have been serving a minimum of 2 years of continuous deployment in the Northeast theatre.

However, unlike the much larger Nigerian military, other regional armies involved in this conflict have fewer manpower and material resources to expend.  These less capable forces struggle to combat an insurgency that has proven itself adaptable, and which despite losing conventionally, has sustained itself and progressively gained momentum on the asymmetric front.  The insurgency specifically uses armed groups to offset the disadvantage they suffer in conventional strength, through guerrilla operations, terror, and a heavy focus on information operations and ideological education and propagation targeted at local populations in rural areas.

Weak institutional capabilities, in addition to lack of intelligence and analysis-based understanding of these armed groups, have contributed to multiple conflicting and unrealistic strategies from the regional states, plus enhanced insurgent momentum.

Significance:  United States investment in building local capabilities is a necessity for both the U.S. and Lake Chad regional states, both to degrade active non-state armed groups in the region, and to build, foster, and maintain stability.  Without this investment by the United States, regional states will  be unable to stop the conflict which, though currently at a  strategic stalemate, could turn into a strategic victory for the insurgent groups.

While Jamaa’atu Ahlis-Sunnati Lid-Da’wati Wal-Jihad poses a serious threat to local stability, the Islamic State’s West African Province (ISWAP) is a greater worry for United States’ interests globally and in the long-term.  The power vacuum created by regional states failing to degrade insurgent capabilities[1], thus ceding territory, will create a huge opening for ISWAP and its local affiliates in the Lake Chad, Sahel, and Libyan regions to exploit.  Power vacuums have already been created in the Lake Chad Islands[2], and will be further created as the Nigerian government plans to abandon the rural Borno State[1].

Option #1:  The U.S. invests solely in a kinetic buildup, by establishing a regional infantry and counterinsurgency training centre in Nigeria, in the mold of the Fort Irwin National Training Centre, drawing on lessons the U.S. military learnt in Iraq and Afghanistan, to train local militaries.  A kinetic build up would also involve providing training and funding for more troops and units for the Nigerian and Chadian armies.  These troops would be dedicated to the clearing out of the Lake Chad Islands and areas around the Lake, in addition to training and funding more special operations units with the firepower and mobility necessary to engage in relentless pursuit of insurgents.  Finally, this option would invest in training, funding, and arming already existing local volunteer militia and paramilitary organisations such as the Civilian Joint Task Force in Nigeria, while embedding U.S. advisors with both militia, paramilitary, and regular armed forces units down to the platoon level.

Risk:  Option #1 results in the U.S. de facto owning the war against non-state armed groups in the Lake Chad region.  In the U.S. this owning would lead to deeper engagement in yet another foreign war in an era of President Donald Trump’s “America First,” and increase the risks of more American combat deaths in this region with the accompanying political blowback.  Within the region, Option #1 would increase resistance from local political and military elements who do not want to admit they are incapable of dealing with the crisis themselves, or who may simply be war profiteers not interested in this conflict ending.

Gain:  Option #1 results in the degrading of the military, logistic, and organisational capabilities of ISWAP and Jamaa’atu Ahlis-Sunnati Lid-Da’wati Wal-Jihad and the rolling back of ISWAP’s growing structure in the region.  This degrading and rolling back would place destabilising actors under constant crushing military pressure, increase the tactical performance of local military forces, and use existing volunteer militias to stabilize the government-controlled areas when the conventional military forces depart.  All of the preceding will enable military units to concentrate on offensive operations thus eliminating the ability of global-level actors, e.g. the Islamic State and Al-Qaeda, to use bases and ungoverned spaces in the region to attack U.S. interests.

Option #2:  The U.S. invests in a non-kinetic build-up, by helping to establish and expand regional states’ information operations capabilities particularly in electronic warfare, psychological operations, and targeted information dissemination via “Radio-In-A-Box” and other mediums.  Option #2 also includes the U.S. providing training and funding for comprehensive reformations of local intelligence services to create lacking signals intelligence, human intelligence, and intelligence analysis capabilities.  Option #2 will enhance the U.S. Security Governance Initiative programme[3] which seeks to enhance local civil administration capabilities in law enforcement, anti-corruption, and criminal justice, and enhance local capabilities to deliver humanitarian support and government services to communities in the conflict zone.

Risk:  Option #2 reduces emphasis on degrading insurgent capabilities so soft-power efforts are properly funded.  This option would leave the insurgents alone and lead to indirect validation of regional government falsehoods that the insurgents have been defeated and the war is over.  This indirect validation will foster nonchalance and complacency from states of the region, to the strategic advantage of the insurgents. Option #2 will ensure de facto reduction of pressure on the insurgents, which gives room for the insurgents and their external allies to exploit the resultant power vacuum.

Gain:  Option #2 strengthens local governance capabilities, increases civil stability in government controlled areas, and is less expensive, less visible, and shorter term in an era of “America First.”  Option #2 would greatly reduce the risk of American combat deaths.

Other Comments:  None

Recommendations:  None.


Endnotes:

[1] Carsteen, Paul and Lanre, Ola. (December 1, 2017) “Nigeria Puts Fortress Towns At Heart Of New Boko Haram Strategy”, Reuters, retrieved from: https://www.reuters.com/article/us-nigeria-security-borno/nigeria-puts-fortress-towns-at-heart-of-new-boko-haram-strategy-idUSKBN1DV4GU

[2] Taub, Ben (December 4, 2017), “Lake Chad: World’s Most Complex Humanitarian Disaster”, New Yorker Magazine, retrieved from: https://www.newyorker.com/magazine/2017/12/04/lake-chad-the-worlds-most-complex-humanitarian-disaster

[3] Chalfin, Julie E. and Thomas-Greenfield, Linda. (May 16, 2017), “The Security Governance Intiative” PRISM Vol 6. No.4, Center For Complex Operations, National Defense University (US) retrieved from: http://cco.ndu.edu/News/Article/1171855/the-security-governance-initiative/

Africa Fulan Nasrullah Insurgency & Counteinsurgency Irregular Forces / Irregular Warfare Lake Chad Option Papers United States

Call for Papers: The Pacific

89920-050-809B5D63

Background:

Divergent Options is a non-politically aligned national security website that, in 1,000 words or less, provides unbiased, dispassionate, candid articles that assess a national security situation, present multiple options to address the situation, and articulate the risk and gain of each option.  Please note that while we assess a national security situation and may provide options, we never recommend a specific option.

Call for Papers:

Divergent Options is calling for papers assessing situations or discussing options related to national security interests with a Pacific Ocean nexus.

Please limit your article to 1,000 words and write using our Options Paper or Assessment Paper templates which are designed for ease of use by both writers and readers alike.

Please send your article to submissions@divergentoptions.org by April 13th, 2018.

If you are not interested in writing on this topic, we always welcome individual articles on virtually any national security situation an author is passionate about.  Please do not let our call for papers cause you to hesitate to send us your idea.  We look forward to hearing from you!

One of our Strategic Advisors, Dr. Kori Schake, offered the following prompts to inspire potential writers:

– Assess the potential second-order effects of a U.S. preventative strike on North Korea.

– Develop options to compensate for the U.S. losing blue water invulnerability and air superiority in potential conflicts with China.

Our Twitter and Facebook followers offered the following prompts to inspire potential writers:

– Assess U.S. national interests regarding North Korea and their associated intensities.

– What options does the U.S. have regarding North Korea?

– Assess the threat of sea-based missile capabilities.

– What options do countries have to defend against sea-based missile capabilities?

– Assess the threat to freedom of navigation posed by Chinese man-made islands in the Pacific.

– What additional options does China have in a military conflict in the Pacific now that they have built and militarized islands?

– What options does the U.S. have towards the tri border region of Malaysia, Indonesia, and the Philippines?

– What options does the U.S. have regarding joint military training with China?

– Assess if a U.S. military-to-military relationship with Japan prior to World War 2 would have impacted the likelihood of war.

– Assess the impact narratives about World War 2 have on today’s security environment.

– What options does the U.S. have to balance its priorities and risk as it shifts away from the Middle East and towards the Pacific?  A specific focus on shifting strategic air assets, munitions, and wartime reserve and prepositioned stocks stocks away from two still active wars in Iraq and Afghanistan and partner activities in Yemen is welcome.

Call For Papers Option Papers

Should I Stay or Should I Go Now?  Options for the U.S. Presence in Syria

Dr. Christopher Bolan has served in Jordan, Tunisia, and Egypt and worked as a Middle East foreign policy advisor to Vice Presidents Gore and Cheney.  He presently teaches and researches national security issues at the Strategic Studies Institute at the U.S. Army War College.  He can be found on Twitter @DrChrisBolan.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  U.S. Force Posture in Syria following the strategic defeat of the Islamic State (IS).

Date Originally Written:  February 23, 2018.

Date Originally Published:  February 26, 2018.

Author and / or Article Point of View:  Author writes from the perspective of a seasoned regional analyst focusing on the Middle East.

Background:  The U.S. military battle against IS is nearing completion in both Iraq and Syria.  An intensified U.S. air campaign in support of local ground forces has effectively (and literally) destroyed the physical infrastructure of the so-called IS “caliphate” that at its peak occupied a territorial expanse roughly equivalent to that of Great Britain, extended its brutal authority over 11 million people, and gave it access to annual economic resources estimated at $1 billion[1].  In Iraq, a combination of U.S.-equipped and trained Iraqi security forces fighting alongside a variety of Shi’ia militia groups (some backed by Iran) allowed Iraqi Prime Minister Haider al-Abadi to declare victory over IS in early December 2017.  In Syria, Kurdish and Syrian Arab forces enabled by U.S. special operations forces and an aggressive coalition bombing campaign liberated the IS caliphate’s self-proclaimed capital at Raqqa last fall and IS is now largely restricted to the Idlib province.

Significance:  The combined coalition military advances in both Iraq and Syria represent the strategic defeat of IS as a terrorist organization capable of holding territory in the Middle East.  These visible defeats strike at the heart of IS’s claim to leadership of the global jihadist movement.  The destruction of the ‘caliphate’ leaves IS a much diminished and impoverished organization.  Nonetheless, these significant battlefield victories do not entirely eliminate the IS threat as it remains capable of inspiring (if not planning) attacks that threaten regional instability and target Western interests.  In Iraq, a continued U.S. military presence codified through traditional security assistance programs in coordination with the central Iraqi government in Baghdad is virtually a foregone conclusion.  However, Syria presents a different strategic calculus for U.S. policymakers as they weigh options at a time when Syrian President Bashar al-Assad appears to be consolidating his control with the active support of his allies in Moscow and Tehran.

Option #1:  Establish a long-term U.S. military presence in Syria.  U.S. Secretary of State Rex Tillerson announced in mid-January 2018 that the U.S. “will maintain a military presence in Syria” for an indefinite period of time[2].  In doing so, Tillerson committed the U.S. to achieving an expansive set of strategic objectives that include: ensuring the defeat of IS and al-Qa’ida; diminishing the influence of Iran; facilitating the return of Syrian refugees; advancing a United Nations (UN)-led political resolution to the crisis; and guaranteeing that Syria is free of weapons of mass destruction.

Risk:  The continued presence of the U.S. military in Syria is opposed to one extent or another by virtually every other important actor in Syria including the internationally recognized government of President Bashar al-Assad, Russia, Iran, and even North Atlantic Treaty Organization (NATO) ally Turkey.  The proximate defeat of IS and the failure of the U.S. Congress to explicitly authorize U.S. military operations in Syria seriously erodes the international and domestic legal basis for this presence.  More importantly, the actual risk of direct military conflict between the U.S. and any one of these outside actors or their local proxies is real and growing.  In early February 2018, the U.S. conducted defensive strikes killing hundreds of Syrian troops and dozens of Russian contractors.  Meanwhile, the U.S. announcement that it was creating a Kurdish security border force in northern Syria prompted the ongoing Turkish incursion into Afrin that is now threatening a direct military confrontation between a NATO ally and both the Syrian Army and U.S-backed Kurdish militias.  Lastly, Turkish President Recep Erdogan has directly threatened the U.S. with a punitive ‘Ottoman slap’ if the U.S. doesn’t end its support for Kurdish elements or abandon its positions further east in Manbij[3].

Gain:  Russian and Iranian military support to Assad have given him the decisive advantage in the civil war restoring his control over the majority of Syria’s population and key economic centers.  Given this existing reality, an indefinite U.S. military presence in eastern Syria may well be the only concrete leverage that the U.S. has to influence the behavior of the other actors in this crisis.  To accomplish the wide-ranging goals of U.S. strategy as articulated by Tillerson, however, this presence will likely need to maintained or even expanded for the foreseeable future.

Option #2:  Withdraw U.S. military forces from Syria.  The U.S. could use the recent battlefield victories against IS as a justification to declare ‘mission accomplished’ and begin a phased and conditions-based withdrawal of forces from Syria.

Risk:  As Tillerson himself argued, a U.S. withdrawal from Syria could create a security vacuum which IS and other Islamist terrorist groups would exploit to regain a foothold in eastern Syria.  Moreover, with the UN Geneva peace process moribund, the absence of a physical U.S. presence on the ground will leave policymakers with precious little direct leverage to influence the ultimate political or military outcomes in Syria.  This approach also feeds the perception of declining U.S. regional influence and could bolster the reputation of Russia and Iran as reliable partners.

Gain:  U.S. policymakers could use a phased withdrawal as diplomatic leverage to press for the withdrawal of all foreign forces from Syria to include Russia, Iran, and their paramilitary proxies (e.g., Hizbollah, Islamic Revolutionary Guards Corps).  The scale and timing of the U.S. withdrawal could be explicitly tied to the departure of these other foreign forces, as well as to progress in defeating the remnants of IS.  This would accomplish the two most critical U.S. strategic objectives outlined by Tillerson:  the defeat of IS; and reducing the influence of Iran.  Additionally, such a phased withdrawal would relieve the U.S. of the substantial costs of reconstruction in Syria which is estimated to easily exceed $250 billion[4].  Finally, the prospect of an imminent U.S. military withdrawal would increase pressure on Kurdish elements to come to a workable compromise with both Damascus and Ankara and thereby bolster prospects for a durable political outcome in Syria that enhances regional stability.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] John Feffer, “The Fall of the House of ISIS,” Foreign Policy in Focus, October 25, 2017.  Available at: http://fpif.org/fall-house-isis/.

[2] Secretary of State Rex W. Tillerson, “Remarks on the Way Forward for the United States Regarding Syria,” Hoover Institute at Stanford University, January 17, 2018.

[3] Bethan McKernan, “Turkish President Erdogan offers US ‘Ottoman Slap’ ahead of Rex Tillerson’s visit to Turkey,” The Independent, February 15, 2018.

[4] UN estimate quoted by Somini Sengupta, “Help Assad or Leave Cities in Ruins?  The Politics of Rebuilding Syria,” The New York Times, December 3, 2017.

Dr. Christopher Bolan Islamic State Variants Option Papers Syria U.S. Army War College Violent Extremism

Options for Streamlining U.S. Department of Defense Decision Making

Dr. John T. Kuehn has served at the U.S. Army Command and General Staff College, Fort Leavenworth, Kansas since 2000.  He retired from the U.S. Navy in 2004 with the rank of Commander.  He presently teaches as a Professor of Military History in the Department of Military History, as well as teaching for Norwich University (Vermont), Naval War College (Rhode Island), and Wolverhampton University (UK) as an adjunct professor.  He can be found on Twitter @jkuehn50 and writes at https://networks.h-net.org/node/12840/blog.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

Editor’s Note:  This article is an entry into our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  The author submitted this article under the contest heading of Most Disruptive.


National Security Situation:  Updating the National Security Act of 1947 (NSA 47) so that Department of Defense (DoD) decision-making is as streamlined as possible.

Date Originally Written:  August 30, 2017.

Date Originally Published:  December 4, 2017.

Author and / or Article Point of View:  The author is a retired Naval Officer and values a return to a national defense structure that includes a broader range of advice and decentralization of power as represented by cabinet secretaries.

Background:  NSA 47 has outlived its utility in the service of the national security of the United States.  In a post-Cold War world of the 21st Century, the system the United States used prior to 1947 is much more suitable to its traditions, Constitution, and the range of threats posed today.  NSA 47 has gone beyond the utility it provided to the United States after World War II.  NSA 47 once had value, especially in a bi-polar Cold War strategic dynamic informed by the terror of atomic and thermonuclear weapons[1].  However, NSA 47’s utility and value have degraded, especially with the end of the Cold War in 1989-1991.  History moved forward while the United States’ macro-security structure remained static.  Subsequent reforms to the 1947 re-organization, such as that by the Goldwater-Nichols Reform Act of 1987 (GNA), have merely “polished the bowling ball,” not recast it into a new shape[2].

Significance:  The Project for National Security Reform (PNSR) began looking at this issue in 2008 and found that NSA 47 no longer fit the strategic environment we are currently facing or will face in the 21st Century[3].  The 2011 PNSR did a good job of describing the problem and challenges in reforming and reorganizing the system[4].  However, the 2011 PNSR provided little else—no bold recommendations about how to make this happen.  What follows are options I modified from a summation of recommendations the PNSR solicited from me in 2011-12:

Option #1:  Disestablish the position of Secretary of Defense (SecDef) and the Office of the Secretary of Defense (OSD).  The SecDef / OSD structure has too broad a span of control and this limits the scope of strategic advice Presidents receive.  The SecDef functions would move back under the civilian secretaries of the military departments: Army, Navy and Air Force.

Risk:  Medium.  The risk here was much lower when I first made this recommendation in 2010.  It is higher right now because of the North Korean situation and the need for unity of command of the nuclear arsenal if the worst happens and the U.S. needs to conduct a retaliatory strike should North Korea use nuclear weapons first.  However, the ultimate transfer of that unity of command could go to the Chairman, Joint Chiefs of Staff (JCS) although the President would have to be a direct participant in any nuclear release, just as he is now.  One need not burn the Pentagon down and start afresh, but certainly who answers to whom is a legitimate topic worthy of serious discussion and, more importantly, serious action—by Congress AND the President.

Gain:  DoD decision-making is decentralized to the Military Departments and thus decisions are made quicker.  OSD manpower is redistributed to the Military Departments and the Office of the Chairman of the Joint Chiefs of Staff thus increasing their respective capability to support the military operations conducted by the Combatant Commands.

Option #2:  Move the civilian Secretaries of Navy, Air Force, and Army back into the cabinet, but retain the SecDef, similar to the way things were organized prior to and during World War II.  The SecDef would still be a part of cabinet, but would be co-equal with the other civilian service secretaries.  Retain the current JCS organization and staff, but enhance the Chairman’s role on the National Security Council (NSC).  As an appointed position, the Chairman can always be relieved in the same manner that President Truman relieved General MacArthur.

Risk:  Low to medium low, for similar reasons listed for Option #1, the security situation is fluid as of this writing with threat of nuclear war.  No other current “crisis,” though, need impede the move to reform.  JCS Chairman role on NSC should include a substantial decrease in the size of the NSC staff, which should leverage more the capabilities of existing organizations like the JCS and the U.S. Intelligence Community.

Gain:  A balance is struck between decentralizing and streamlining decision-making to the Secretaries of the Military Departments while maintaining a SecDef in a coordinating role.  Option #2 is likely more palatable to Congress as current structures are maintained manpower wise yet power is shifted around.

Other Comments:  Congress must be a part of the solution[5].  Policy recommendations need Congressional oversight, responsibility, and accountability so that if a President goes against an NSC-recommended policy or strategy Congress will be in the loop.  One fear has been that this might drive the U.S. toward a “cabinet” system of government and curtail Presidential power.  That fear sounds like a benefit to me.

Additionally, there will be a need for a national debate that includes social media—where politicians quit pre-emptively tweeting and sniping at each other and instead “message” about national security reform—staying on task and staying on message as the public participates in the dialog.  We might turn again to the past, as a generation of millennial Publius’s step forward in a new round of Federalist Paper-type thinking and writing to kick these ideas around and to build real consensus—not just that of Washington insiders[6].  There is no deficit of political and intellectual talent out there-despite what the pundits say and write.  All too often, however, we consult the advice of specially constituted commissions (such as that for 9/11) and then ignore their advice or imperfectly implement only the portions that stop the media howl.

The United States has time.  The current system, as ineffective as it is, is not so broken that we must act quickly and without reflection.  However, I prefer to close with an even more powerful means of highlighting the problem—a story.  Every year, at the end of my World War II series of classes to military officers attending the Army Command and General Staff Office Course, I post the following questions: “The security system that existed prior to and during World War II was so ineffective that it had to be replaced in 1947, right?  This was the same system that the United States used to lose the most desperate and far-ranging war in its history, right?”  Wrong—we won World War II–handily–and we can win again by adopting a system that proved successful in a pre-Cold War world that looks a lot like our world of today.  So-called progress does not always lead to better solutions.  The founders looked backwards to go forward, so can we.

Recommendation:  None.


Endnotes:

[1] This is not the first time the author has made this argument, see John T. Kuehn, “Abolish the Office of the Secretary of Defense?” Joint Force Quarterly, Issue 47, 4th Quarter 2007, 114-116.

[2] Recent attempt have been made to have a second round of GNA via the Project for National Security Reform effort, see James Locher et al. “Project for National Security Reform: Preliminary Findings” January 2008 (hereafter PNSR 2008), Washington, D.C.; and more recently the follow-on report from the PNSR from November 2011, “AMERICA’S FIRST QUARTER MILLENNIUM: ENVISIONING A TRANSFORMED NATIONAL SECURITY SYSTEM IN 2026,” see www.pnsr.org (accessed 7/31/2017). Full disclosure, the author was an unpaid consultant for the second report.

[3] PNSR, 2008 and 2011.

[4] PNSR, 2011, p.5.

[5] John T. Kuehn, “I Liked Ike . . . Whence Comes Another? Why PME Needs a Congressional Advocate,” in Joint Force Quarterly 83 (4th Quarter, October 2016): 40-43.

[6] Publius was the pen name for the authors of the Federalist Papers who argued the merits and reasoning behind the Constitution: Alexander Hamilton, John Jay, and (especially) James Madison. See, Hamilton, Jay, and Madison, The Federalist Papers (New York: Penguin, 1987), paperback.

Contest (General) Governing Documents and Ideas John T. Kuehn Option Papers United States

Options for U.S. National Service

Adam Yefet has a Master’s degree in International of Affairs at George Washington University’s Elliott School of International Affairs.  He is based in Israel.  He can be found on Twitter at @YefetGlobal.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

Editor’s Note:  This article is an entry into our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  The author submitted this article under the contest heading of Most Disruptive.


National Security Situation:  A revised National Security Act of 1947 could create a national service requirement.

Date Originally Written:  September 30, 2017.

Date Originally Published:  November 20, 2017.

Author and / or Article Point of View:  Adam Yefet has a Master’s degree in International Affairs from George Washington University.  He writes here as an American concerned with U.S. National Security.

Background:  Seventy years after the signing of the 1947 National Security Act, the world is still an unpredictable and dangerous place, but it is not governed by the same fears.  In 1947, the chief concerns of U.S. national security professionals were re-establishing European stability, and preparing for the coming Cold War with the Soviet Union, and ensuring the United States remained atop the new post-war order in an age of industrialized, mass-produced warfare and nuclear bombs.  The urgency of a threat could be measured in the number of troops, tanks, ships, missiles etcetera that enemy states could marshal.  As such, the 1947 National Security Act established an American military and intelligence complex meant to sustain American interests in the face of these challenges.  Today, conventional warfare remains a primary concern, but not the only one.

Significance:  The modern American political environment has revealed intense cleavages in American socio-politics.  Social trust seems on the verge of breakdown as citizens retreat to curated information bubbles not limited to of-the-day political commentary but expanding into the very facts and analysis of events both modern and historical.  Shared truths are shrinking and becoming a thing of the past.  Internal divisions are the greatest existential threat to the United States of America.  A 2017 National Security Act that includes provisions to bridge this divide could reunite the American people behind the values that helped shape America.

Option #1:  Mandatory National Service.  

A new National Security Act could include a provision for one year of mandatory national service to be required of all Americans to be completed between a certain age rage, for example between the ages of 18 and 25.  There would need to a be a number of service options, some existing, some needing to be created, including service in any of the military branches (which would require longer service) or one of several national organizations such as Peace Corps, Teach for America, and City Year.  New services to be created could involve public, local community, and international development, such as public works projects, agriculture development, vocational work, early childhood development, and senior care.  National service will affect all Americans equally, across socioeconomic, ethnic, cultural, gender, racial, and religious lines. No one can buy their way out of the program.

Risk:  The creation of a national service program in peaceful and relatively prosperous times would be a massive economic and political endeavor that would reshape several industries with an influx of cheap labor.  The financial investment on the part of the government to train, house, and pay even a meager salary would be enormous.  The transition process within affected industries would be long and complicated and would face a winding legal path.  The executive power to do so and the consent of the government and the governed to receive it may be impossible to create outside the aftermath of a sharp crisis like World War II and the ensuing Cold War that brought about the original National Security Act.

The gaping political divide and widespread political disillusionment the program seeks to solve would be two of the greatest threats to undermine the program before it got started.  A requirement of national service would be anathema to many Americans as an assault on their principles of limited government and freedom.  Bipartisan political support may not be enough in the current political environment.  Prolonged resistance to service could be politicized and create another ugly divide within the nation.  A program plagued by political divides and undermined from the beginning would risk doing more harm than good.

Gain:  This requirement to serve would be an opportunity for young Americans to live, work, and consociate and will bind them to each other in common national cause.  Service will create an equal opportunity for American citizens to work and learn in a team environment with a sense of national purpose.

Americans found a significant common bond in the 20th century in the course of winning two world wars, crossing the Depression in between, and living the fears and competitions of the Cold War.  Success in these endeavors came from a sense of purpose, for American victory, and required massive government investments in people, jobs, infrastructure and science that paid off in the creation of our modern state and economy a modern global order that has delivered peace and prosperity to more people than at any previous time in human history.  A mandatory national service program would give all American’s a common bond of shared burden that comes before political divisions.

Option #2:  Re-Instate the Draft.

The United States military is stretched thin from the two longest wars in the country’s history, and the global deployment of troops and resources.  If these conflicts are going to be seen to a successful end while maintaining the U.S. military as the strongest in the world, the United States must ask more of its citizens.  Global politics are entering a transitional period heralding the decline of the American-led global order established after World War II.  Interstate and intrastate conflicts are spreading across the Middle East, Asia, and Eastern Europe.  The future of international relations and affairs is unknowable but the U.S. military and intelligence apparatus should be prepared for catastrophic events.  The Selective Service and Training Act[1] already requires young men, and now women, to register.  The foundation already exists for America’s men and women to be called to service.

Risk:  The peacetime draft of potentially millions of citizens will require the enlargement of the already massive Defense Department budget.  The long-term increased costs for veteran support areas of the government, especially health care, would be significant.  The influx of potentially millions of troops, many of whom do not want to be there will demand experienced leadership from military and political figures who may not be up to the task.  The draft may have the effect of lowering the standards of the military branches as they seek to find places for new soldiers and retain them into the future to meet the demands of American foreign policy.

Gain:  All Americans will share the burden of America’s global role as a military and economic superpower.  Service will give the United States government the manpower it needs to be prepared for the conflicts of the present and future.  The American people called to service will have a greater appreciation of their responsibility as citizens in the management of American democracy and American foreign policy.  The draft would pull in America’s best and brightest for service to the nation’s security.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] 50 U.S.C. – SELECTIVE TRAINING AND SERVICE ACT OF 1940. (n.d.). Retrieved October 27, 2017, from https://www.gpo.gov/fdsys/granule/USCODE-2009-title50/USCODE-2009-title50-app-selective-dup1

Contest (General) National Service Option Papers United States

Victory Over the Potomac: Alternatives to Inevitable Strategic Failure

Michael C. Davies has written three books on the Wars of 9/11 and is a progenitor of the Human Domain concept.  He currently works for an international law firm.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 

Editor’s Note:  This article is an entry into our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  The author submitted this article under the contest heading of Most Disruptive.


National Security Situation:  Unless the National Security Act of 1947 is scrapped and replaced, the United States will inevitably suffer grand strategic failure.  After 16 years of repeated, overlapping, and cascading strategic failures[1], the ineptitude of the U.S. national security system has been laid bare for all to see.  These failures have allowed America’s enemies to view the National Security Act’s flaws and provided the time and space to develop effective competitive strategies against the U.S. and successfully threaten both the international order and the U.S. social contract.

Date Originally Written:  September 10, 2017.

Date Originally Published:  October 9, 2017.

Author and / or Article Point of View:  This article is written from the point of view of an individual who previously conducted research on the Wars of 9/11 at the U.S. National Defense University and concluded that the United States of America, as a government, a military, and a society, is currently functionally and cognitively incapable of winning a war, any war.

Background:  Because the U.S. national security system, modeled via the 1947 Act, is built for a different era, different enemies, and different mental models, it is incapable of effectively creating, executing, or resourcing strategies to match the contemporary or future strategic environment.  The deficiencies of the current system revolve around its inability to situate policy and politics as the key element in strategy, competitively match civilian and military forces with contemporary and future environments and missions, maintain strategic solvency, end organizational stovepipes, and consider local and regional politics in strategic decision-making.

Significance:  Without immediate and revolutionary reorganization, a series of ever-more consequential strategic failures is inevitable, eventually leading to grand strategic failure.

Option #1:  Revolutionary Reorganization.

The list below offers the necessary revolutionary reorganization of the national security system to negate the previously mentioned deficiencies.

  1. Command and control of the Geographic Combatant Commands (GCCs) is moved to the Department of State.  Senate-approved civilian Ambassadors are given unity of command over all civilian and military forces and policymaking processes in their area.
  2. The Department of State is reorganized around foreign policymaking at the GCCs, super-empowered Chiefs of Mission in each country[2], and functional areas of expertise[3].
  3. The Department of Defense is reorganized into mission-centric cross-functional corps[4].
  4. The intelligence community is rationalized into a smaller number of agencies and reorganized around, and made dependent on, the above structures.
  5. The National Security Council is curtailed into a presidential advisory unit, a grand strategy unit headed by the Secretary of State to align national objectives, GCC policies, civilian and military force structures, and budgets, and a red team cell.
  6. The Joint Chiefs of Staff remain, but transfer all organizational power to the GCCs and the cross-functional corps.  The Chairman remains as the President’s chief military advisor.  The heads of each military Service will retain a position as military advisors to the President and ceremonial heads of the respective Services.
  7. A second tier is added to the All-Volunteer Force to allow for rapid scaling of civilian personnel into military service as needed, negating the need for National Service and the use of contractors.  Second tier individuals undertake a fast-track boot camp, provided functional training according to skills and need, given operational ranks, and assigned to units as necessary to serve a full tour or more.

Because of the magnitude of power given to the Executive Branch by this Act, the War Powers Resolution must be redrafted into a constitutional amendment.  Congress must now approve any action, whether a Declaration of War or an Authorization for the Use of Force (AUMF), within 5 days of the beginning of combat by simple majority.  The President, the relevant GCC Ambassador, and the relevant country-team Ambassador(s) will be automatically impeached if combat continues without Congressional approval.  All majority and minority leaders of both houses and the relevant Committees will be automatically impeached if an authorizing vote is not held within the 5-day period.  Any AUMF must be re-authorized at the beginning of each new Congressional term by a super-majority of both houses.

Risk:  This reorganization will cause significant turmoil and take time to organizationally and physically relocate people, agencies, and bureaucratic processes to the new structure.  Large-scale resignations should be expected in response also.  Effective execution of policy, processes, and institutional knowledge will likely be diminished in the meantime.  Furthermore, the State Department is not currently designed to accept this structure[5], and few individuals exist who could effectively manage the role as regional policy proconsul[6].  This reorganization therefore demands significant planning, time, and care in initial execution.

Gain:  This reorganization will negate the current sources of strategic failure and align national policy, ground truth, and effective execution.  It will free the President and the Executive Branch from attempting to manage global politics on a granular level daily.  It will enable local and regional expertise to rise to the forefront and lessen the impact of ideologues and military operationalists on foreign policy.  And above all else, America will be capable of winning wars again.

Option #2:  Goldwater-Nichols for the Interagency.

The implementation of all the recommendations from the Project for National Security Reform’s, Forging a New Shield[7], will allow for superior strategic decision-making by lessening the negative impact of organizational stovepipes.

Risk:  The maintenance of a strong President-centric system, Departmental stovepipes, and the military Services as independent entities that overlay Forging’s proposed interagency teams retains too much of the current national security system to be forcefully effective in negating the factors that have caused repeated strategic failures.  This option could be also used to give the appearance of reform without investing the time and energy to make its goals a reality.

Gain:  This reorganization can be readily adopted onto current national security structures with minimal disruption.  Demands for a ‘Goldwater-Nichols for the Interagency’ is an oft-repeated call to action, meaning that significant support for these reforms is already present.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Kapusta, P. (2015, Oct.-Dec.) The Gray Zone. Retrieved Sept. 10, 2017 from https://www.dvidshub.net/publication/issues/27727

[2] Lamb, C. and Marks, E. (2010, Dec.) Chief of Mission Authority as a Model for National Security Integration. Retrieved Sept. 10, 2017 from http://ndupress.ndu.edu/Portals/68/Documents/stratperspective/inss/StrategicPerspectives-2.pdf

[3] Marks, E. (2010, Mar.) A ‘Next Generation’ Department of State: A Proposal of the Management of Foreign Affairs. Retrieved Sept. 10, 2017 from http://www.unc.edu/depts/diplomat/item/2010/0103/oped/op_marks.html

[4] Brimley, S. and Scharre, P. (2014, May 13) CTRL + ALT + DELETE: Resetting America’s Military. Retrieved September 10, 2017, from http://foreignpolicy.com/2014/05/13/ctrl-alt-delete

[5] Schake, K. (2012, March 1) State of Disrepair: Fixing the Culture and Practices of the State Department. Retrieved Sept. 10, 2017 from http://www.hooverpress.org/State-of-Disrepair-P561.aspx

[6] Blair, D., Neumann, R., and Olson, E., (2014, Aug. 27) Fixing Fragile States. Retrieved Sept. 10, 2017 from http://nationalinterest.org/feature/fixing-fragile-states-11125

[7] Project for National Security Reform (2008, Nov.) Forging a New Shield. Retrieved Sept. 10, 2017 from http://www.freedomsphoenix.com/Uploads/001/Media/pnsr_forging_a_new_shield_report.pdf

Contest (General) Governing Documents and Ideas Michael C. Davies Option Papers United States

Options for Constitutional Change in Afghanistan

David Benson is a Professor of Strategy and Security Studies at the United States Air Force School of Advanced Air and Space Studies (SAASS), part of Air University in Montgomery, Alabama.  His area of focus includes online politics and international relations.  He can be found on Twitter @davidcbenson.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States is attempting to broker peace in Afghanistan allowing it to remove troops, leaving behind a stable country unlikely to be used to stage transnational terror attacks.

Date Originally Written:  August 23, 2017.

Date Originally Published:  September 25, 2017.

Author and / or Article Point of View:  This article provides a neutral assessment of two possible courses of action available to the U.S. and Afghan Governments.

Background:  Afghanistan is a multi-ethnic, religious and linguist state.  Nicknamed “the graveyard of empires,” the disparate nature of the country has prevented both foreign empires and domestic leaders from consolidating control in the country.  The most successful domestic leaders have used Afghanistan’s rough terrain and complicated ethnography to retain independence, while playing larger states off each other to the country’s advantage.

The U.S. and its allies have been conducting military operations in Afghanistan for 16 years.  In that time, the coalition of opposition known as the Taliban has gone from control of an estimated 90% of the country, down to a small fraction, and now controls approximately 50% of the country.  At the time of the U.S.-led invasion, the Taliban was a pseudo-governmental organization capable of fielding a military that used modern tactics, but since than has devolved into a less hierarchical network, and in some ways is better thought of as a coalition of anti-government forces.  Although officially a religious organization, the Taliban has historically drawn its greatest support from among the Pashto majority in the country.  The current Afghan government is at Kabul and has supporters amongst every ethnic group, but has never controlled much territory outside of Kabul.

Following the collapse of the Taliban the U.S.-sponsored government installed a constitution which established a strong central government.  Although the constitution recognizes the various minority groups, and provides protections for minority communities, it reserves most authority for the central government.  For example, though the government recognizes 14 ethnic groups and as many as 5 language families as part of Afghanistan, it still calls for a single centrally developed educational curriculum.  The president even appoints regional governors.

Recently, U.S. President Donald Trump and some of his key advisors have raised the possibility of a negotiated solution in Afghanistan.  Such a negotiation would necessarily include the Taliban, and Taliban associated groups.  Insofar as the ongoing conflict is between the central government and those opposed to the central government, a natural accommodation could include a change in the government structure.

Significance:  Afghanistan was the base of operation for the terrorist organization al-Qa’ida, and where the September 11, 2001 attacks on the United States were planned.  The importance of the September 11th attacks in the U.S. and international consciousness cannot be overstated.  The perceived threat of international terrorism is so great that if Afghanistan is not stable enough to prevent transnational terror attacks from originating there, regional and global powers will be constantly tempted to return.  Afghanistan is also a potential arena for competition between nuclear rivals India and Pakistan.  India seeks an ally that can divide Pakistan’s attention away from India and the Jammu and Kashmir, while Pakistan wants to avoid encirclement.

Option #1:  Do not change the constitution of Afghanistan which would continue to centralize authority with the government in Kabul.

Risk:  The conflict never ends.  The Afghan constitution provides for a far more centralized government than any western democracy, and yet Afghanistan is more heterogeneous than any of those countries.  Ongoing populist revolts against elite leadership personified by Brexit in the United Kingdom and the election of President Trump demonstrate the desire for local control even in stable democracies.  Combined with Afghanistan’s nearly 40 year history of war, such desires for local control that are currently replicated across the globe could easily perpetuate violence in the country.  Imagine the local popular outrage in the U.S. when Barack Obama and Donald Trump were elected if the President also appointed the governors of every state, and dictated the curriculum in every school.

A second-order risk is heightened tension between India and Pakistan.  So long as Afghanistan is internally fractured, it is a source of conflict between India and Pakistan.  If Pakistan is able and willing to continue to foment the Taliban to thwart India’s outreach into the country, then this raises the possibility of escalation between the two nuclear countries.

Gain:  Afghanistan externally looks more like other states, at least on paper.  The Taliban and other terror groups are in violation of local and international law, and there is a place in Kabul for the U.S. and others to press their claims.  The advantage of the constitution as it now stands is that there is a single point of institutional control.  If the president controls the governors, and the governors control their provinces, then Afghanistan is a more easily manageable problem internationally, if not domestically.

Option #2:  Change the constitution of Afghanistan decentralizing some governing authority.

Risk:  Once the Afghan constitution is on the table for negotiation, then there is no telling what might happen.  The entire country could be carved up into essentially independent territories, with the national state of Afghanistan dissolving into a diplomatic fiction.  Although this would essentially replicate de jure what is de facto true on the ground, it could legitimize actors and outcomes that are extremely deleterious for international peace.  At worst, it might allow bad actors legal protection to develop power bases in regions of the country they control without any legal recourse for other countries.

Gain:  A negotiated solution with the Taliban is much more likely to succeed.  Some Taliban members may not give up their arms in exchange for more autonomy, and perhaps even a legal seat at the table, but not all people fighting for the Taliban are “true believers.”  The incentives for people who just want more local control, or official recognition of the control they already exercise, change with a constitution that cedes control from the central government.  Ideally the constitution would replicate to some degree the internal autonomy with external unity created in the 20th under the monarchy.

Other Comments:  War, even civil war, is always a political problem.  As such, a political solution may be more practical than a military one.  While changes can be applied to force structure, rules of engagement and strategy, until all involved are willing and able to change the politics of the situation, failure is imminent.

Recommendation:  None.


Endnotes:

None.

Afghanistan David Benson Governing Documents and Ideas Option Papers United States

U.S. Options for Basing Forces to Deter North Korea

Mark Loncar is retired from the United States Air Force and is a graduate of the Defense Intelligence College, now called National Intelligence University.  He served in South Korea for 23 months.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The U.S. faces a growing existential Intercontinental Ballistic Missile (ICBM) threat from North Korea’s nuclear weapons development program.

Date Originally Written: August 1, 2017.

Date Originally Published:  September 18, 2017.

Author and / or Article Point of View:  This article is written from the point of view of a U.S. foreign policy advisor.

Background:  North Korea recently tested another ballistic missile, the second major test in a month, as part of a nuclear weapons program that, if brought to fruition, could threaten the U.S.  Policymakers in the U.S. are understandably reticent because of the serious threat that North Korea may respond with aggressive military action against South Korea and bring the U.S. into another Korean conflict.

The U.S. security commitment to its South Korea ally has not been in doubt since the Korean War started in 1950.  However, the positioning of U.S. forces in South Korea has been debated, and over the years, the number of U.S. troops has decreased from the mid-30 thousands before the North Korean nuclear program started in the 1990s to around 28,000 today.  Amid the present North Korean nuclear challenge, it is time to reexamine the utility of keeping U.S. forces in South Korea.

Significance:  The Korean peninsula is no longer the center of gravity in any hostilities between North Korea and the U.S. as North Korea’s ICBM capability, according to media reports, could reach Honolulu, Anchorage, and Seattle.  U.S. policy must adapt to this drastic expansion of the threat in order to end the impasse that characterizes U.S. dealings with the North Korean ICBM challenge.  In expanding his nuclear capability to ICBMs, North Korean President Kim Jong-un has turned what was a Korean peninsula-centric issue into more of an eyeball-to-eyeball existential threat to the U.S..

Option #1:  U.S. forces remain positioned in South Korea.

Risk:  U.S. policy options concerning the North Korean nuclear program will continue to be limited due to the risk of war to South Korea.  The presence of U.S. forces in South Korea preserves the status quo, but does not move the U.S. closer to a solution to the North Korean nuclear challenge.  Having U.S. forces in South Korea also complicates U.S. – South Korea relations and gives South Korea leverage in how the U.S. should respond to the North Korean nuclear issue, further constraining U.S. freedom of movement to respond to North Korea.

Gain:  The presence of U.S. forces in South Korea signals U.S. resolve in the Korean Conflict through a sharing of risk with South Korean allies.  This option maintains a U.S. capability to respond quickly and forcibly to North Korean conventional incursions and other hostile actions against South Korea.

Option #2:  U.S. forces redeploy from South Korea to present cleaner options for dealing with North Korean nuclear weapons threat.  The policy would relocate U.S. forces from South Korea to Japan and other countries and bases in the region.  A continued U.S. military presence near the Korean peninsula will help to reassure South Korea and Japan that the long-time security commitments will abide.  The redeployment would also represent a continuation of major U.S. conventional capability in the area to counter any North Korean conventional aggression.

Risk:  Perception of outright appeasement by U.S. allies.  How could the U.S. proceed with redeployment of forces from South Korea without communicating to friends and adversaries that it would be engaging in all-out appeasement of the North Korean regime and surrendering important U.S. and allied interests in Northern Asia to the People’s Republic of China (PRC)?

Gain:  The removal of U.S. forces from South Korea would be a major inducement for North Korea to scrap its nuclear weapons program or for the PRC to pressure it to do so.  Indeed, North Korea’s paranoia concerning U.S. – South Korea intentions toward its regime could be significantly pacified by moving U.S. forces off the Korean peninsula.  At the same time, the stakes would be raised for Kim Jong-un and his PRC benefactors to change behavior on terms attractive to all parties—agreeing to a peaceful denuclearization of the Korean peninsula and a reduced threat of war on the peninsula.

Second, removing the threat to U.S. forces on the peninsula would present less cumbersome options for the U.S. with respect to the North Korean nuclear weapons challenge, especially concerns about war on the Korean peninsula.  The U.S. would also be less constrained in deciding to preempt or respond directly to North Korean nuclear aggression.  This is the real capability of such a redeploying U.S. forces from South Korea.  North Korea and the PRC would be on notice that if North Korea continued its nuclear weapons ICBM development after a redeployment of U.S. forces off the Korean peninsula, the regime’s action may be met with the gravest of responses.

Third, this option would deny North Korea a pretext for attacking South Korea should the U.S. strike Kim Jong-un’s nuclear facilities.  Such a U.S. strike on North Korean nuclear facilities would come only after a U.S. redeployment from the peninsula and the North Korean regime’s obstinate refusal to scrap its nuclear weapons program.  In this security construct, any North Korean attack below the 38th parallel in retaliation for a U.S. strike on North Korean nuclear facilities would likely elicit the immediate destruction of the North Korean state.

Other Comments:  An opportunity is in reach to have a return to the status quo without a Korean peninsula-centric relationship.  This relationship would be more North Korea-South Korea focused, with the U.S. and the PRC overseeing the relationship.  The U.S. would no longer be in the middle of the mix with its own forces physically present in South Korea.  It may not be the best the U.S. could hope for – that would be a democratic government in North Korea if not an eventual unification of North and South Korea.  However, a U.S. redeployment to incentivize peninsula denuclearization and present cleaner options concerning North Korea’s nuclear weapons program may be a more viable alternative than accepting and having to deter a North Korean global ICBM capability, or to fight another war on the Korean peninsula.  In the end, by removing U.S. forces from South Korea, friend and foe should understand that if North Korea refuses to scrap its nuclear weapons capability, it will be the North Korean regime alone against the overwhelming power of the U.S..


Endnotes:

None.

Chemical, Biological, Radiological, and Nuclear Weapons China (People's Republic of China) Mark Loncar North Korea (Democratic People’s Republic of Korea) Option Papers South Korea (Republic of Korea) United States

Options for U.S. National Guard Defense of Cyberspace

Jeffrey Alston is a member of the United States Army National Guard and a graduate of the United States Army War College.  He can be found on Twitter @jeffreymalston.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United States has not organized its battlespace to defend against cyberattacks.  Cyberattacks are growing in scale and scope and threaten surprise and loss of initiative at the strategic, operational and tactical levels.  Shortfalls in the nation’s cybersecurity workforce and lack of division of labor amongst defenders exacerbates these shortfalls.

Date Originally Written:  July 23, 2017.

Date Originally Published:  September 4, 2017.

Author and / or Article Point of View:  This paper is written from a perspective of a U.S. Army field grade officer with maneuver battalion command experience who is a senior service college graduate.  The officer has also been a practitioner of delivery of Information Technology (IT) services and cybersecurity for his organization for over 15 years and in the IT industry for nearly 20 years.

Background:  At the height of the Cold War, the United States, and the North American (NA) continent, organized for defense against nuclear attack.  A series of radar early warning lines and control stations were erected and arrayed across the northern reaches of the continent to warn of nuclear attack.  This system of electronic sentries were controlled and monitored through a series of air defense centers.  The actual air defense fell to a number of key air bases across the U.S. ready to intercept and defeat bombers from the Union of Soviet Socialist Republics entering the NA airspace.  The system was comprehensive, arrayed in-depth, and redundant[1].  Today, with threats posed by sophisticated cyber actors who directly challenge numerous United States interests, no equivalent warning structure exists.  Only high level, broad outlines of responsibility exist[2].  Existing national capabilities, while not trivial, are not enough to provide assurances to U.S. states as these national capabilities may require a cyber event of national significance to occur before they are committed to address a state’s cyber defense needs.  Worse, national entities may notify a state after a breach has occurred or a network is believed to be compromised.  The situation is not sustainable.

Significance:  Today, the vast Cold War NA airspace has its analog in undefended space and gray area networks where the cyber threats propagate, unfettered from active security measures[3].  While the capabilities of the myriad of companies and firms that make up the critical infrastructure and key resource sectors have considerable cybersecurity resources and skill, there are just as many that have next to nothing.  Many companies and firms cannot afford cyber capability or worse are simply unaware of the threats they face.  Between all of these entities the common terrain consists of the numerous networks, private and public, that interconnect or expose all of these actors.  With its Title 32 authorities in U.S. law, the National Guard is well positioned to take a key role in the unique spot interface between private industry – especially critical infrastructure – in that it can play a key role in this gray space.

There is a unique role for the National Guard cyber forces in gray space of the internet.  The National Guard could provide a key defensive capability in two different ways.

Option #1:  The National Guard’s Defensive Cyberspace Operations-Element (DCO-E), not part of the Department of Defense Cyber Mission Force, fulfills an active role providing depth in their states’ networks, both public and private.  These elements, structured as full-time assets, can cooperatively work to negotiate the placement of sensors and honeypots in key locations in the network and representative sectors in their states.  Data from these sensors and honey pots, optimized to only detect high-threat or active indicators of compromise, would be aggregated in security operations centers manned primarily by the DCO-Es but with state government and Critical Infrastructure and Key Resources (CIKR) participation.  These security operations centers provide valuable intelligence, analytics, cyber threat intelligence to all and act to provide depth in cybersecurity.  These units watch for only the most sophisticated threats and allow for the CIKR private industry entities to concentrate their resources on internal operations.  Surveilling gray space networks provides another layer of protection and builds a shared understanding of adversary threats, traffic, exploitation attempts returning initiative to CIKR and preventing surprise in cyberspace.

Risk:  The National Guard cannot be expected to intercept every threat that is potentially targeted at a state entity.  Negative perceptions of “mini-National Security Agencies (NSAs)” within each state could raise suspicions and privacy concerns jeopardizing the potential of these assets.  Duplicate efforts by all stakeholders threaten to spoil an available capability rather than integrating it into a whole of government approach.

Gain:  Externally, this option builds the network of cyber threat intelligence and unifies efforts within the particular DCO-E’s state.  Depth is created for all stakeholders.  Internally, allowing National Guard DCO-Es to focus in the manner in this option provides specific direction, equipping options, and training for their teams.

Option #2:  The National Guard’s DCO-Es offer general support functions within their respective states for their Adjutants General, Governors, Department of Homeland Security Advisors, etc.  These elements are tasked on an as-needed basis to perform cybersecurity vulnerability assessments of critical infrastructure when requested or when directed by state leadership.  Assessments and follow-on recommendations are delivered to the supported entity for the purpose of increasing their cybersecurity posture.  The DCO-Es fulfill a valuable role especially for those entities that lack a dedicated cybersecurity capability or remain unaware of the threats they face.  In this way, the DCO-Es may prevent a breach of a lessor defended entity as the entry point for larger scale attacks or much larger chain-reaction or cascading disruptions of a particular industry.

Risk:  Given the hundreds and potentially thousands of private industry CIKR entities within any particular state, this option risks futility in that there is no guarantee the assessments are performed on the entities at the greatest risk.  These assessments are a cybersecurity improvement for the state overall, however, given the vast numbers of industry actors this option is equivalent to trying to boil the ocean.

Gain:  These efforts help fill in the considerable gap that exists in the cybersecurity of CIKR entities in the state.  The value of the assessments may be multiplied through communication of the results of these assessments and vulnerabilities at state and national level industry specific associations and conferences etc.  DCO-Es can gradually collect information on trends in these industries and attempt to use that information for the benefit of all such as through developing knowledge bases and publishing state specific trends.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Winkler, D. F. (1997). SEARCHING THE SKIES: THE LEGACY OF THE UNITED STATES COLD WAR DEFENSE RADAR PROGRAM(USA, Headquarters Air Combatant Command).

[2]  Federal Government Resources. (n.d.). Retrieved July 22, 2017, from https://www.americanbar.org/content/dam/aba/marketing/Cybersecurity/2013march21_cyberroleschart.authcheckdam.pdf

[3]  Brenner, J. (2014, October 24). Nations everywhere are exploiting the lack of cybersecurity. Retrieved July 21, 2017, from https://www.washingtonpost.com/opinions/joel-brenner-nations-everywhere-are-exploiting-the-lack-of-cybersecurity

 

 

 

Cyberspace Jeffrey Alston Non-Full-Time Military Forces (Guard, Reserve, Territorial Forces, Militias, etc) Option Papers United States

Great Power Interaction: United States Options Towards Iran

Phillip J. Giampapa is a personnel security assistant contracted with United States Customs and Border Protection.  Prior to that, Phillip was a civil affairs specialist with the 96th Civil Affairs Battalion (Airborne) at Fort Bragg, North Carolina and is currently an Officer Candidate in the Washington, D.C. Army National Guard.  Phillip has operational experience in Afghanistan and Qatar, as well as familiarity with the Levant and Gulf Countries.  He can be found on Twitter at @phillipgiampapa.  The views expressed in this article do not represent the views or policies of his employer, the Department of the Army, the Department of Defense, or the United States Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  United States’ interactions with Iran under the Trump Administration.

Date Originally Written:  June 6th, 2017.

Date Originally Published:  August 7, 2017.

Author and / or Article Point of View:  This article is written from the point of view of a United States policymaker advising the Trump Administrations on possible options towards Iran.

Background:  In the Middle East, the Trump Administration has signaled its preference to strengthen relationships with the Sunni Gulf states by way of Saudi Arabia and the United Arab Emirates.  By strengthening relationships with the Sunni Gulf states, as well as announcing an arms deal with Saudi Arabia, the United States appears willing to continue isolating Iran.  This has the potential to exacerbate tensions with Iran, which if one views it through an international relations theory lens, Iran will attempt to counteract actual or perceived Saudi (read: Sunni) influence gains to maintain balance in the region, as well as prevent loss of Iranian influence.

Iran has a variety of proxies, as well branches of its armed services serving in countries throughout the Middle East.  This is illustrated through the Iranian-backed Hezbollah in southern Lebanon, as well as deployment of the Islamic Revolutionary Guard Corps (IRGC) in Syria and Yemen.  This does not include the activities of the IRGC in other countries that include Bahrain, Saudi Arabia, Egypt, and Jordan[1].  Iran’s military adventurism throughout the Middle East serves to advance the foreign policy agenda of its Supreme Leader, Ayatollah Ali Khamenei[1].  Put succinctly, the foreign policy agenda of the Supreme Leader is the expansion of Iranian (read: Shia) influence throughout the Middle East to serve as an ideological counterweight against the expansion of Saudi/Wahhabi ideology.

Recently, on May 20, 2017, Iran held a presidential election.  The incumbent, President Hassan Rouhani, won re-election by receiving 57% of the vote[2].  Mr. Rouhani is seen as a reformer in Iran, and he is expected to attempt most of his proposed reforms now that he is in his second term.  How many reforms will actually take place is anyone’s guess, as is the influence Mr. Rouhani will have on IGRC policy, but it will be a factor that should be considered when considering the United States’ approach to great power interactions.

Significance:  The Middle East will continue to be a region that perplexes United States policymakers.  United States’ Allies will continue to be confused as to policy direction in the Middle East until more fidelity is provided from Washington.  Iranian meddling will continue in sovereign nations until it is addressed, whether diplomatically or militarily.  Furthermore, Iranian meddling in the region, and interference in the affairs of sovereign nations, will continue to destabilize the Middle East and exacerbate tensions in areas where conflict is occurring, such as Syria and Yemen.  A complete withdrawal of the United States’ presence in the region would likely create a stronger vacuum potentially filled by an adversary.  As such, the United States must choose the option that will provide the strongest amount of leverage and be amicable to all parties involved in the decision.

Option #1:  Maintain the status quo – the United States continues to strengthen Sunni states and isolate Iran.  Through maintaining the status quo, the United States will signal to its allies and partners in the Middle East that they will continue to enjoy their relationship with the United States as it exists in current form.  President Trump’s recent trip to Saudi Arabia signals this intent through proposed arms sales, announcing the establishment of a center to combat extremism, and the use of negative language towards Iran.

Risk:  The risk inherent in pursuing Option #1 is that the window of opportunity on having a moderate, reform-minded person as President of Iran will eventually close.  Through isolating Iran, it is likely they will not be keen on attempting to make overtures to the United States to reconsider the relationship between the two countries.  Since the United States is not going to pursue a relationship with Iran, other countries will seek to do so.  The risk of missed economic opportunities with an Iran that is an emerging market also has the possibility of closing the window for the United States to be involved in another area where it can exert its influence to change Iranian behavior.

Gain:  Through maintaining the status quo that exists in the Middle East, the United States can be sure that pending any diplomatic, political, or international incidents, it can maintain its presence there.  The United States can continue to nurture the preexisting relationships and attempt to maintain the upper hand in its interactions with Iran.  The United States will also remain the dominant player in the great power interactions with other countries in the Middle East.

Option #2:  The United States strengthens its relationship with Iran through moderate reformers and building relationships with moderates in Sunni states to provide shared interests and commonalities.  Given the propensity of nation-states to expand their power and influence, whether through political or military means, it is likely inevitable that conflict between Iran and the Sunni states will take place in the near future.  If a relationship can be built with moderates in the Iranian government as well as Sunni states, it is possible that commonalities will overlap and reduce tensions between the different powers.

Risk:  The risk exists that neither rival will want to have the United States attempting to influence matters that may be viewed as neighborly business.  The possibility also exists that neither nation would want to build a relationship with the other, likely originating from the religious leaders of Iran or Saudi Arabia.  Finally, the worst-case scenario would be that any type of relationship-building would be undercut through actions from independent and/or non-state actors (i.e. terrorist groups, minority religious leaders, familial rivals from ruling families).  These undercutting actions would destroy trust in the process and likely devolve into reprisals from both sides towards the other.

Gain:  Through interacting with Iran, the United States and other powers can establish relationships which could eventually allow the opportunity to address grievances towards existing policies that serve to inflame tensions.  It is also likely that by having a partner in Iran, instability in the Middle East can be addressed in a more effective manner than is currently being done right now.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] REPORT: Destructive role of Irans Islamic Revolutionary Guard Corps (IRGC) in the Middle East. (2017, March). Retrieved June 06, 2017, from http://www.eu-iraq.org/index.php/press-releases/item/851-report-destructive-role-of-iran’s-islamic-revolutionary-guard-corps-irgc-in-the-middle-east

[2] Erdbrink, T. (2017, May 20). Rouhani Wins Re-election in Iran by a Wide Margin. Retrieved June 06, 2017, from https://www.nytimes.com/2017/05/20/world/middleeast/iran-election-hassan-rouhani.html?_r=0

Great Powers & Super Powers Iran Option Papers Phillip J. Giampapa United States

United States’ Options to North Korea Missile Development

Mike Dyer is a research assistant at a Washington-based international policy think tank.  He can be found on twitter @mikeysdyer.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  United States’ Options in response to North Korea’s nuclear and ballistic missile developments.

Date Originally Written:  July 22, 2017.

Date Originally Published:  July 31, 2017.

Author and / or Article Point of View:  This article is written from the point of view of a senior defense/foreign policy advisor to the Trump Administration.

Background:  After decades of development, for the first time in the history of the Korean conflict, North Korea is nearing the capability to hold U.S. population centers on the continental United States at risk with a small nuclear weapon[1].  Nearing this inflection point requires a reexamination of U.S. policy vis-a-vis Northeast Asia.

Significance:  If North Korea’s Kim regime believes it has an effective deterrent against the United States, it may become emboldened to pursue more provocative and dangerous polices.  Such brinkmanship could lead to disaster.  This new fact threatens U.S. extended deterrence commitments to both Japan and South Korea (Republic of Korea (ROK)), depending on the Trump Administration’s policy response.  The Kim regime, while rational, is certainly volatile, and engages in behaviors well outside of international norms.

Option #1:  The United States accepts the reality of North Korea as a nuclear power while maintaining demands for denuclearization.  This option may require adjustments to U.S. defense posture, namely the reintroduction of tactical nuclear weapons to the Korean peninsula or the expansion of the ballistic missile defense programs.

Risk:  First, the most salient risk the United States would face is relying on deterrence against a regime for which it lacks an acute understanding.  Relying on deterrence to keep the peace on the Korean peninsula is risky because the Kim regime derives power and legitimacy from propping up the United States and others as an aggressive enemy.

Second, even if the United States does nothing, the Kim regime would still be incentivized to provoke the United States and the ROK if only for domestic reasons.

Third, as previously mentioned, North Korea could work to weaken U.S. extended deterrence commitments by credibly threatening the U.S. homeland.  The United States could work to reduce this risk by demonstrating the effectiveness of its missile defense shield.

Gain:  This option does not risk conflict in the near to medium terms, thus it continues to “kick the can down the road.”  This policy trades tactical and operational risk for increased strategic risk over the long-term.  Otherwise, this option gains nothing.

Option #2:  The United States conducts a pre-emptive strike on North Korea’s known nuclear and ballistic missile sites.

Risk:  First, this option risks large-scale retaliation against the ROK and Japan and the U.S. forces stationed there.  There is a significant chance a military strike would miss known or hidden weapons sites or leave North Korea with the capability to deliver a conventional counter strike[2].

Second, a military strike on North Korean nuclear sites is likely to cause an environmental and humanitarian disaster to some degree.  This could result in unnecessary civilian loss of life, increased pan-Korean nationalism at the expense of the U.S.-ROK alliance, and generally loss of support for U.S. leadership/presence in the region.  The illicit transfer of unaccounted for nuclear materiel could also result.

Gain:  If a strike were successful, the Kim regime would effectively be disarmed.  Such a blow to North Korea could lead to a coup against the Kim regime or to the People’s Republic of China (PRC) intervening to stabilize the situation.

Option #3:  The United States increases economic sanctions on the regime to either bring North Korea to the negotiating table or cause the regime to collapse.  This option is not possible without increased support from the PRC a because of its importance to the North Korean economy.

Risk:  First, sanctions need years to take full effect.  During this time, North Korea’s capabilities could grow and the regime would have opportunity to degrade the situation in its favor.

Second, it is unknown what the Kim regime would do if faced with collapse and loss of power.  Some North Korean interlocutors have made the point that North Korea did not build its nuclear weapons only to watch them go unused as the regime collapses.

Third, the regime values security, prestige, and power over a growing economy, it has effective control over its people and they are discouraged from speaking out against the regime even in private.

Gain:  If successful, sanctions have the potential to accomplish U.S. objectives without risking conflict.  Given the Kim regime’s hierarchy of values however, this option is unlikely to work.

Option #4:  The United States and the ROK negotiate a peace treaty with North Korea.  This option accepts the reality of North Korea’s newfound nuclear capability and gives up on past demands for complete, verifiable and irreversible dismantlement of the North’s nuclear program prior to peace negotiations.

Risk:  First, for a durable peace to exist between the United States and North Korea, both sides would have to reach a mutually acceptable political solution, this may mean both North Korea and the ROK giving up on their objectives for reunification—something both states are unwilling to do.  Durable peace would also require security for all concerned and trust that does not currently exist.

Second, negotiating peace without denuclearization would weaken the nuclear nonproliferation regime and cause allies to lose faith in United States’ security commitments.  This option could result in greater nuclear proliferation across Northeast Asia.

Gain:  The gain is limited by the risk of failure, but a peaceful Korean peninsula would benefit regional security and ease the burden on U.S. defense commitments.

Option #5:  The United States undermines the Kim regime by encouraging the flow of information into and out of North Korea.  The United States works with the PRC and ROK to encourage the further development of independent (black) markets in North Korea at the expense of regime control on civil life.

Risk:  First, this policy would require years to fully carry out, allowing North Korea to expand its weapons program in the meantime.

Second, this policy may just raise the quality of life of the North Korean people and expand the regime’s tax base while not convincing the people to push-back against the regime.

Third, as previously mentioned, destabilizing the regime raises the risks of conflict.

Gain:  If successful, this policy could chance the character and policies of the North Korean regime, ultimately leading to peace and reconciliation.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Ackerman, S., & Jacobs, B. (2017). US commander not confident North Korea will refrain from nuclear assault. the Guardian. Retrieved 22 July 2017, from https://www.theguardian.com/world/2017/apr/26/north-korea-nuclear-attack-south-korea-us-navy

[2]  Your Bibliography: Peters, R. (2017). A New Approach to Eliminating North Korean Weapons of Mass Destruction Is Needed. Washington: The U.S. Korea Institute at Johns Hopkins SAIS. Retrieved from http://www.38north.org/wp-content/uploads/pdf/NKIP-Peters-WMDE-062017.pdf  Also see, Bennett, B. (2013). Preparing for the Possibility of a North Korean Collapse. Rand Corporation.

China (People's Republic of China) Mike Dyer North Korea (Democratic People’s Republic of Korea) Nuclear Issues Option Papers South Korea (Republic of Korea)

People’s Republic of China Options Toward North Korea

Paul Butchard is a graduate student in the Department of War Studies at Kings College London in the United Kingdom, where he is pursuing his master’s degree in Intelligence and International Security.  He also holds a bachelor’s degree in International Relations and Politics.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Options for the foreign policy of the People’s Republic of China (PRC) toward North Korea (the Democratic People’s Republic of Korea or DPRK).

Date Originally Written:  July, 15, 2017.

Date Originally Published:  July 24, 2017.

Author and / or Article Point of View:  This article is written from the perspective of foreign policy advisor to the PRC government.

Background:  Since January 2016, the DPRK has conducted two nuclear weapons tests and ten missile tests.  Such actions, coupled with increasingly bombastic rhetoric, displays a more aggressive posture for the DPRK than previous years[1].

Significance:  For the PRC, their relationship with the DPRK is a regional policy issue and a central element of PRC-United States relations.  President Xi Jinping is forging an outgoing, “Striving for Achievement” foreign policy for the PRC[2].  Simultaneously, the PRC has displayed more public disapproval of Pyongyang’s destabilising behaviour than previous years[3].  The course of action the PRC adopts towards the DPRK will play a major role in the relationship between Beijing and Washington in years to come, influencing events globally.

Option #1:  The PRC maintains/increases military, economic and diplomatic aid to the DPRK.  This option sees the PRC continuing or building upon its current course of action, providing vast military and economic aid and diplomatic protection to bring the DPRK’s behaviour in line with the PRC’s wishes.

Risk:  The PRC risks appeasing the DPRK, encouraging it to continue along its current path, one that is increasingly casting the PRC as a suzerain unable to rein in a vassal state, to the casual observer.  The DPRK would view such action as capitulation and an acknowledgment by Beijing that Pyongyang cannot be penalised for actions and policies even when they harm the PRC’s interests[4].  The DPRK is conscious of its strategic importance to Beijing and able to take PRC aid without granting concessions.  The PRC risks escalating confrontation with the United States if the latter perceives the PRC as unwilling to act or enabling the DPRK’s current destabilising behaviour, a possibility given recent remarks by President Trump[5].

Gain:  This option enables the PRC to sustain the DPRK regime, avoiding a humanitarian crisis on its border because of regime collapse, maintaining the tense but peaceful status quo.  The PRC avoids being labelled a United States puppet as the DPRK has previously implied[6].  United States’ sanctions related to the DPRK have so far been limited to private companies and individuals, not the PRC government[7].  This option thus avoids igniting military, diplomatic or economic confrontations with the United States.

Option #2:  The PRC decreases/ceases military, economic and diplomatic aid to the DPRK.  This option sees the PRC ‘sanction’ the DPRK by reducing or halting military, economic or diplomatic aid to alter its behaviour to suit PRC preferences.

Risk:  This option risks the collapse of the DPRK regime due to the PRC being its main economic trading partner.  The PRC also risks economic self-harm due to the vast natural resources it imports from the DPRK[8].  The collapse of the DPRK brings unparalleled security concerns for the PRC from uncontrolled nuclear materials and mass immigration to the potential of a United States ally on its border.

Gain:  By reducing aid the PRC would be acting against the DPRK’s unpredictable actions, potentially slowing its development of an Intercontinental Ballistic Missile (ICBM), increasing its international standing, a cornerstone of President Xi’s foreign policy.  Such action would be seen favourably by the Trump administration increasing the likelihood of favourable trade deals or relative acquiescence to PRC actions in the South China Sea.

Option #3:  Regime change.  This option would see the PRC pursue regime change within the DPRK by means of supporting a coup d’état or palace coup of some description rather than overt military action of its own.

Risk:  The DPRK government and society revolves fully around the Kim dynasty, the removal of the deity that is Kim Jong Un and the Kim lineage risks the total collapse of the state.  There is no clear successor to Kim due to the autocratic nature of the DPRK and any successor would likely be considered a PRC puppet and usurper.  Subsequent destabilisation would result in the aforementioned humanitarian and security crisis’ posing a grave national security threat to the PRC.  Such action would be logistically and strategically difficult to accomplish, requiring multiple sections of the DPRK military and governmental apparatus being coordinated by a vast human intelligence network operated by the PRC.  As such, and due to pervasive North Korean surveillance even of its elites, a coup risks discovery long before execution.  United States and South Korean forces may see any attempt at regime change as an opportunity to launch their own military offensive or as evidence of PRC expansionism and a threat to the South.

Gain:  Replacing Kim Jong Un could lead to increased stability for the PRC’s regional development objectives.  The PRC could avoid total DPRK state collapse due to external pressure and avert the potential national security threats to the PRC mainland.  This option also raises the possibility of enhancing United States-PRC relations, buying the PRC the aforementioned political capital.  A new DPRK regime, allied with the PRC, that tempers its actions toward the United States, also raises the possibility of the removal of the United States’ Terminal High Altitude Area Defense (THAAD) missile defence system from South Korea, which the PRC views as a national security threat.  This option also presents the potential for the reduction of United States troop numbers in South Korea due to increased stability and a reduced threat from the DPRK.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Council on Foreign Relations, (2017) North Korea Crisis. Retrieved July 13, 2017 from https://www.cfr.org/global/global-conflict-tracker/p32137#!/conflict/north-korea-crisis

[2] Yan, X. (2014). From Keeping a Low Profile to Striving for Achievement. The Chinese Journal of International Politics,7(2), 153-184.

[3] Perlez, J. (2017, February 24). China and North Korea Reveal Sudden, and Deep, Cracks in Their Friendship. Retrieved July 14, 2017, from https://www.nytimes.com/2017/02/24/world/asia/china-north-korea-relations-kim-jong-un.html

[4] Pei, M. (2017, March 14). North Korea: What Is China Thinking? Retrieved July 14, 2017, from https://www.theatlantic.com/international/archive/2017/03/china-north-korea-kim-jong-un-nuclear-beijing-pyongyang-thaad/519348/

[5] Weaver, M., Haas, B., & McCurry, J. (2017, April 03). Trump says US will act alone on North Korea if China fails to help. Retrieved July 14, 2017, from https://www.theguardian.com/us-news/2017/apr/02/donald-trump-north-korea-china

[6] Sang-hun, C. (2017, February 23). North Korea Accuses China of ‘Mean Behavior’ After It Tightens Sanctions. Retrieved July 14, 2017, from https://www.nytimes.com/2017/02/23/world/asia/north-korea-china.html

[7] Aleem, Z. (2017, June 29). Why Trump just slapped new sanctions on Chinese banks. Retrieved July 14, 2017, from https://www.vox.com/world/2017/6/29/15894844/trump-sanctions-china-north-korea-bank

[8] Perlez, J., & Huang, Y. (2017, April 13). China Says Its Trade With North Korea Has Increased. Retrieved July 14, 2017, from https://www.nytimes.com/2017/04/13/world/asia/china-north-korea-trade-coal-nuclear.html 

[9] Reuters. (2017, February 28). China reacts with anger, threats after South Korean missile defense decision. Retrieved July 15, 2017, from http://www.reuters.com/article/us-southkorea-usa-thaad-china-idUSKBN16709W

China (People's Republic of China) Leadership Change North Korea (Democratic People’s Republic of Korea) Option Papers Paul Butchard South Korea (Republic of Korea) United States

Options for a Future Strategy for the Afghan Taliban

Paul Butchard is a graduate student in the Department of War Studies at Kings College London in the United Kingdom, where he is pursuing his master’s degree in Intelligence and International Security.  He also holds a bachelor’s degree in International Relations and Politics.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Options for a future strategy for the Afghan Taliban.

Date Originally Written:  July, 12, 2017.

Date Originally Published:  July 17, 2017.

Author and / or Article Point of View:  This article is written from the point of view of someone with influence over strategic policy making within the Afghan Taliban, possibly a member of the Quetta Shura.

Background:  The Taliban has seen continuous conflict for over two decades now and despite its overthrow in 2001 by the United States and the 2013 death of its founder Mullah Omar, remains a potent force within Afghanistan.  The Taliban is currently estimated to hold more territory than at any time since 2001[1].

Significance:  Given the territorial degradation being suffered by Daesh in Iraq and Syria and the presence of a Daesh affiliate in Afghanistan, the Taliban may once again find itself in the crosshairs of an international anti-terrorism coalition.  There are also increasing levels of international training and advisory support being given to the Afghan government[2] to counter the Taliban.  These developments raise the prospect of United States and international re-engagement in Afghanistan.  As such, the Taliban must constantly assess their future direction should they hope to survive and thrive.

Option #1:  Enter negotiations with the Government of Afghanistan (GOA).  Although announcing their intentions not to participate in peace talks, the Taliban, or factions within it, have previously indicated a willingness to engage in negotiations to achieve political goals.  This is evidenced by their opening of a political office in Doha, Qatar and engagement in talks in 2014 among other events.

Risk:  The Taliban risks giving up the 86 districts they currently estimate themselves to fully or partially control, potentially for few guarantees[3].  This option risks the support afforded to the Taliban by Pakistan’s military, as identified by a recent United States Defense Department report, among numerous other sources[4].  Pakistan would not approve a deal in which it loses influence or operational control over the Taliban or subsidiaries like the Haqqani Network.  Pakistan would also oppose subsequent warming of Afghan-Indian relations.  Military demobilisation of any kind leaves the Taliban potentially vulnerable to United States and allied forces reorienting to Afghanistan post-Daesh, a risk when the Trump administration centres its national security policy on the confronting of “[T]he crisis of Islamic extremism, and the Islamists and Islamic terror of all kinds[5].”

Gain:  The GOA has continuously reaffirmed its willingness to enter peace talks with the Taliban and the pardon issued to Gulbuddin Hekmatyar is evidence of a willingness to provide concessions[6].  This option has the support, even if understated, of the British and United States governments[7].  The Taliban enjoyed considerable military success against Afghan forces (ANSF) in 2015-16[8].  Thus, it is in a strong position to push for concessions such as autonomy within its strongholds such as the Pashtun region.  This option enables the Taliban to avoid the ire of the United States coalition turning toward Afghanistan after Daesh in Iraq and Syria are defeated.  This option also points to the possibility of restoration of the notion of the Taliban as a sociopolitical not just militant movement.  Should the right deal be reached, this option also provides chances to increase Pakistani influence in the Taliban-controlled areas of Afghanistan and thus sustain or increase support from the ISI to the Taliban even against international pressure.

Option #2:  The Taliban continues the insurgent war against the ANSF.  This course of action is the one currently favoured and being pursued by Taliban senior command.

Risk:  Although gaining considerable ground since coalition forces withdrew, the Taliban, like the ANSF, has been unable to break the stalemate in Afghanistan.  The Taliban is unlikely to win back Afghanistan through force of arms alone.  By continuing military operations, the Taliban risk attracting the attention of the United States military, which may soon turn to combating the Daesh presence in Afghanistan more directly after the Daesh territorial holdings in Iraq and Syria are eliminated.  By persisting primarily with a military strategy, the Taliban remain somewhat hostage to the whims and machinations of their Pakistani patrons, should the future political environment change, due to domestic or international pressure, the Taliban could theoretically find themselves short on friends and overwhelmed by enemies.

Gain:  The Taliban is enjoying a military resurgence since the withdrawal of coalition forces in 2014.  There are few prospects of an outright ANSF victory.  Operation Mansouri, the recent spring offensive by the Taliban has combined guerrilla tactics, conventional assaults and an increasing number of suicide operations to devastating effect[9].  The Taliban have also seemingly learnt from both coalition successes in Iraq and Afghanistan and from Daesh in their use of small, mobile special operations type units with advanced equipment carving inroads to populations centres and forming of human intelligence networks and sleeper cells, rather than full frontal attacks.  The Taliban’s efforts have culminated in the appearance of the Sara Khitta, or Red Group, a Taliban commando force[10].  Such successes display that the Taliban remain militarily capable and it may be unwise to sacrifice such capability.  The fact that the Taliban have sustained a war of attrition against coalition and ANSF forces shows they have no pressing need to cease military operations, the poppy cultivation it protects, and the goal of conquering the Afghan government it is working toward.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] O’Donnel, L (2016, June 16) The Taliban now hold more ground in Afghanistan than at any point since 2001. Retrieved July 11, 2017, from http://www.militarytimes.com/story/military/pentagon/2016/06/16/afghanistan-nicholson-commander-pentagon-report-war/85972056/

[2] Associated Press (2017, June 16) US sending almost 4,000 extra forces to Afghanistan, Trump official says. Retrieved July 10, 2017, from https://www.theguardian.com/us-news/2017/jun/15/us-troops-afghanistan-trump-administration

[3] Roggio, B (2017, March 28) Afghan Taliban lists ‘Percent of Country under the control of Mujahideen’. Retrieved July 12, 2017, from http://www.longwarjournal.org/archives/2017/03/afghan-taliban-lists-percent-of-country-under-the-control-of-mujahideen.php

[4] United States Department of Defense (2017, June) Enhancing Security and Stability in Afghanistan. Retrieved July 12, 2017, from: https://www.defense.gov/Portals/1/Documents/pubs/June_2017_1225_Report_to_Congress.pdf

[5] Talev, M (2017, May 22) Donald Trump drops phrase ‘radical Islamic terrorism’ on Saudi Arabia trip to soften tone on Muslims. Retrieved July 12, 2007, from http://www.independent.co.uk/news/world/middle-east/donald-trump-saudi-arabia-radical-islamic-terrorism-muslims-soften-tone-iran-palestinians-israel-a7748541.html

[6] Rasmussen, S.E (2016, September 22) ‘Butcher of Kabul’ pardoned in Afghan peace deal. Retrieved July 12, 2017, from https://www.theguardian.com/world/2016/sep/22/butcher-of-kabul-pardoned-in-afghan-peace-deal

[7] Yousafzai et al. (2016, October 18) Taliban and Afghanistan restart secret talks in Qatar. Retrieved July 12, 2017, from https://www.theguardian.com/world/2016/oct/18/taliban-afghanistan-secret-talks-qatar

[8] Koven, B.S (2017, July 09) The End of Afghanistan’s Spring Fighting Seasons and the Demise of the Afghan National Security Forces? Retrieved July 12, 2017, from http://smallwarsjournal.com/jrnl/art/the-end-of-afghanistan%E2%80%99s-spring-fighting-seasons-and-the-demise-of-the-afghan-national-secu

[9] Roggio, B (2017, April 28) Taliban announces start of ‘Operation Mansouri’. Retrieved July 11, 2017, from http://www.longwarjournal.org/archives/2017/04/taliban-announce-start-of-operation-mansouri.php

[10] Snow, S (2016, August 12) Red Group: The Taliban’s New Commando Force. Retrieved on July 11, 2017, from: http://thediplomat.com/2016/08/red-group-the-talibans-new-commando-force/

Afghanistan Islamic State Variants Option Papers Paul Butchard Taliban (Islamic Emirate of Afghanistan)

Options for United States Military Assistance to the Kurdistan Regional Government in Northern Iraq

Brandon Wallace is a policy wonk who spends his time watching Iraq, Kurdish borders, data, and conflict in the Middle East of all varieties.  Brandon can be found on Twitter at @brandonwallacex and at his website www.brandonlouiswallace.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  As the defeat of the Islamic State of Iraq and Syria (ISIS) looms closer and the Kurdistan Regional Government of Iraq (KRG) ponders its future relationship with greater Iraq, the United States must decide what, if any, military assistance it will provide to the Kurds.

Date Originally Written:  July 7, 2017.

Date Originally Published:  July 10, 2017.

Author and / or Article Point of View:  This options paper is written from the hypothetical perspective of a senior policy advisor for a policy maker in the United States government.

Background:  The KRG, a semi-autonomous region in Northern Iraq with intentions of secession, requires both intrastate and external sponsors to sustain functionality.  The KRG depends on resource allocations from the central Government of Iraq (GOI) in Baghdad, as well as assistance from the United States and other international partners.  The campaign to defeat ISIS requires a functioning KRG partnership, resulting in several partners providing additional capital and arms to the region.  Without such assistance, the KRG faces serious economic turmoil.  The GOI allocates 17 percent of the federal budget for the KRG, yet the budget does not balance KRG spending.  The KRG carries an inflated public sector wherein 70 percent of KRG public spending is devoted to payroll[1]. The KRG must also support internally displaced people (IDP).  This year, KRG debts exceeded US$22 billion[2].

Moreover, the KRG cannot sustain itself through oil sales.  It is estimated that the maximum output of KRG oil production is nearly 800 kbd (Thousand Barrels Per Day)[3].  To balance the budget, the KRG would need oil to sell at nearly US$105[4].  Today oil trades at roughly US$50.

Significance:  The KRG’s ability to receive independent assistance from the United States has profound implications for the United States’ relationship with the GOI, Kurdish commutes in Iraq, Iran, Syria, and Turkey, and relations between neighboring states.  Yet, the KRG has been a valuable non-state partner in the fight against ISIS.  The United States paid the KRG Ministry of Peshmerga Affairs (the military forces of the KRG) US$415 million for their role in the Mosul Operation to topple ISIS- this does not include military equipment and other forms of aid from the United States and international partners[5].

Option #1:  The United States sustains its current level of military assistance to the KRG.

Risk:  This option risks dissatisfaction with bordering countries of the KRG.  Sustained support implies United States complicit backing of the KRG to the GOI, Iran, Turkey, and a significantly crippled Syria.  Further, military assistance, specifically cash payments from the United States, contributes to the bloating KRG payroll.

Gain:  The KRG will continue to be an important partner in the campaign against ISIS.  As ISIS is driven out of its controlled territories, a well-supported Peshmerga and other Kurdish forces will be necessary for security operations post-Mosul.  No allied actor is so upset by United States support of the KRG as to dramatically obstruct the campaign against ISIS.  Option #1 carefully mitigates the reservations of other actors while accelerating counter-ISIS operations.

Option #2:  The United States diversifies and increases its assistance to the KRG.

Risk:  Significantly increasing independent assistance to the KRG, without involving the GOI, will likely be met with open hostility.  If the United States increases its support to Kurdish groups, anxious governments with Kurdish minorities may attempt to undermine United States’ interests in retaliation.

Conversely, the United States may choose to diversify its assistance to the KRG by changing its lending model.  Last July, an International Monetary Fund loan of US$5.25 billion conditionally reserved US$225 million for KRG road infrastructure and small projects[4].  However, adopting this model, setting conditions for KRG sharing with the GOI, opens the United States to risks.  The KRG may not have the stability to repay a loan, and it is likely the GOI, who may be better positioned to pay off the loan quickly, will insist on the KRG meeting a 17 percent repayment share.  The symbolism of any conditional loan or military transfer to the KRG will certainly strain relations with the GOI.

Gain:  United States’ Foreign Military Sales (FMS) and Foreign Military Assistance (FMA) programs in Iraq require the approval of the GOI, even when agreements are specifically directed at the KRG.  Per United States law, the FMS and FMA are limited only to interaction with central governments.  To secure large-scale military sales directly to the KRG would require a congressional change to existing United States’ laws.  Option #2 would surely win the favor of the KRG, and it may expedite counter-ISIS operations across northern territories.  Expanding the scope of assistance to the KRG by lending conditionally or giving conditionally to the GOI, could force Erbil, capital of the KRG, and Baghdad to broaden collaboration in developing the Iraqi Security Forces (ISF).  Option #2 ensures the KRG does not return to relative isolation from the international community in a post-ISIS future.

Option #3:  The United States ceases all military assistance to the KRG and relies on the GOI to allocate resources.

Risk:  This option to cease assistance to the KRG may hinder security operations in Northern Iraq, and it diminishes the United States’ presence in the region- a vacuum other countries may fill.  For example, this option will certainly please Iran.  Conversely, the KRG will likely interpret this move as aggressive.

Gain:  Providing the GOI full authority in distributing assistance communicates a strong faith in the central government and the Iraqi state.  Further, this consolidation of assistance to a single power center in Baghdad may simplify bureaucratic procedure and empower the ISF.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Coles, I (2016, February 16) Iraqi Kurdish deputy PM says deal with Baghdad ‘easy’ if salaries paid. Retrieved June 06, 2017, from http://www.reuters.com/article/us-mideast-crisis-iraq-kurds-idUSKCN0VP22Z

[2]  Natali, D (2017, January 3) Is Iraqi Kurdistan heading toward civil war? Retrieved June 7, 2017, from http://www.al-monitor.com/pulse/originals/2017/01/kurdistan-civil-war-iraq-krg-sulaimaniya-pkk-mosul-kurds.html

[3]  Jiyad, A. M (2015, July 7) Midyear Review of the State Budget and Oil Export Revenues. Retrieved June 5, 2017, from http://www.iraq-businessnews.com/wp-content/uploads/2015/07/Ahmed-Mousa-Jiyad-Mid-Year-Review-of-the-State-Budget-and-Oil-Export-Revenues.pdf

[4]  Grattan, M (2017, June 25) David Petraeus on US policy under Donald Trump, the generational war against Islamist terrorism, and dealing with China. Retrieved July 7, 2017, from https://theconversation.com/david-petraeus-on-us-policy-under-donald-trump-the-generational-war-against-islamist-terrorism-and-dealing-with-china-80045

[5]  Knights, M (2016, July 28) The U.S., the Peshmerga, and Mosul. Retrieved June 6, 2017, from http://www.washingtoninstitute.org/policy-analysis/view/the-u.s.-the-peshmerga-and-mosul

Allies & Partners Brandon Wallace Capacity / Capability Enhancement Iraq Kurdistan Option Papers United States

Options for Avoiding U.S. Complicity for Coalition War Crimes in Yemen

Michael R. Tregle, Jr. is a U.S. Army judge advocate officer currently assigned as the Brigade Judge Advocate for the 101st Airborne Division Artillery (DIVARTY).  A former enlisted infantryman, he has served at almost every level of command, from the infantry squad to an Army Service Component Command, and overseas in Afghanistan and the Pacific Theater.  He tweets @shockandlawblog and writes at www.medium.com/@shock_and_law.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  On January 31, 2017, the United Nations (U.N.) Panel of Experts on Yemen issued a report concluding that widespread violations of International Humanitarian Law (IHL)[1] had occurred in the Yemeni armed conflict.  Noting numerous violations throughout 2016 alone, including targeting civilian persons and objects, excessive collateral damage, deprivation of liberty, and torture, the Panel concluded that some of these violations amounted to war crimes.  The U.S. provided billions of dollars in logistical support, munitions, and intelligence sharing to the Saudi-led coalition that was responsible for the IHL violations.  Such support could render the United States liable for Saudi violations under the law of state responsibility[2] or as an aider and abettor.

Date Originally Written:  May 19, 2017.

Date Originally Published:  June 29, 2017.

Author and / or Article Point of View:  The author is an active duty officer in the U.S. Army.  This article is written from the point of view of the United States toward continued support of the Saudi-led coalition in the Yemeni war in light of war crimes allegations made by the U.N. Panel of Experts on Yemen.

Background:  Until October 2016, U.S. support to the Saudi-led coalition fighting Houthi rebels in Yemen included the provision of munitions, including weapons and precision guidance kits, refueling capability, and other logistical support.  Following a coalition attack on a funeral in Sana’a that killed 132 civilians and injured nearly 700, which was carried out with a U.S.-supplied GBU-12 precision guided bomb, the United States denounced the attack and suspended further arms sales to Saudi Arabia[3].  The Trump Administration recently announced the resumption of over $100 billion in arms sales to the Saudis, much of which is likely to be used in Yemen[4].  More recently, another key coalition ally, the United Arab Emirates (UAE), was accused of detainee abuse and disappearances, though the link between U.S. support and these accusations is less clear[5].

Significance:  Once the U.S. became aware of the violations, continued support to a Saudi coalition responsible for war crimes could render the U.S. vicariously liable for those crimes.  The principle of state responsibility renders states legally responsible for the wrongful acts of others when the state aids or assists in the wrongful act and knows of the circumstances making that act wrongful.  Similarly, aider and abettor liability could render the U.S. liable if it knew, or should have known, that the aid it provided could result in war crimes[6].  U.S. liability could take many forms, ranging from international condemnation to the indictment of key U.S. arms-sale decision makers in the International Criminal Court as principles to war crimes.  If nothing else, continued support of the Saudi-led coalition in light of the U.N. allegations would erode U.S. credibility as an advocate for human rights and the rule of law and empower other states to ignore international norms protecting civilians in conflict.

Option #1:  The U.S. ceases all arms sales and other support to the Saudi-led coalition until the coalition demonstrates improved compliance with IHL and greater protection of civilians in Yemen.  Such compliance can be ensured through neutral observers, assurances from coalition members, and the provision of U.S. trainers and advisors to improve coalition targeting procedures and detention and interrogation practices.

Risk:  This option risks damaging the longstanding security relationship with Saudi Arabia and the UAE, key allies in the region.  Furthermore, cutting off all support may well strengthen the Houthi opposition in Yemen and foster still worse humanitarian conditions on the ground.  If the U.S. fully absolves itself of supporting the Saudis in Yemen, very little international leverage to compel coalition compliance with IHL will remain, possibly leading to even more violations.

Gain:  This option seeks to maintain U.S. credibility as a world leader in protecting the victims of conflict and demonstrates a willingness to hold even its closest friends accountable for violations.  It further ensures that the U.S. will not be complicit in any way in continued war crimes or other IHL violations in Yemen, thereby avoiding international condemnation or legal liability.

Option #2:  The U.S. continues arms sales and logistical support to the Saudi-led coalition regardless of its compliance with international law.  This option represents maintaining the status quo, and has been implicitly endorsed by the Trump administration[7].

Risk:  As a result of this option, the U.S. will certainly face international condemnation and potential legal liability for supporting a Saudi regime that the U.S. knows is engaged in widespread IHL violations and potential war crimes.  At best, the U.S. reputation as a leader in upholding IHL and human rights norms will be damaged.  At worst, senior U.S. officials could be indicted as principles to war crimes under theories of state responsibility or aiding and abetting the coalition’s conduct.

Gain:  The U.S. cements its relationship with Saudi Arabia as a key ally in the region and makes clear that defeating the Houthi rebellion, and by extension denying Iranian influence in the region, is of greater import than compliance with IHL.  This option signals to coalition allies that they have U.S. support in imposing their will on Yemen, whatever the cost.

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  International Humanitarian law refers to the international law of war or law of armed conflict.  The three terms are synonymous.

[2]  See also Ryan Goodman & Miles Jackson, State Responsibility for Assistance to Foreign Forces (aka How to Assess US-UK Support for Saudi Ops in Yemen), Just Security, Aug. 31, 2016, https://www.justsecurity.org/32628/state-responsibility-assistance-foreign-forces-a-k-a-assess-us-uk-support-saudi-military-ops-yemen/; Ryan Goodman, Jared Kushner, the Arms Deal, and Alleged Saudi War Crimes, Just Security, May 20, 2017, https://www.justsecurity.org/41221/jared-kushner-arms-deal-alleged-saudi-war-crimes/.

[3]  Phil Stewart & Warren Strobel, U.S. to Halt Some Arms Sales to Saudi, Citing Civilian Deaths in Yemen Campaign, Reuters, Dec. 13, 2016, http://www.reuters.com/article/us-usa-saudiarabia-yemen-exclusive-idUSKBN1421UK.

[4]  Jared Malsin, The Big Problem with President Trump’s Record Arms Deal with Saudi Arabia, Time, May 22, 2017, http://time.com/4787797/donald-trump-yemen-saudi-arabia-arms-deal/?xid=homepage.

[5]  Ryan Goodman & Alex Moorehead, UAE, a Key U.S. Partner in Yemen, Implicated in Detainee Abuse, Just Security, May 15, 2017, https://www.justsecurity.org/40978/uae-key-partner-yemen-implicated-detainee-abuse/.

[6]  Aiding and Abetting liability is described in U.S. Dep’t of Def., DoD Law of War Manual para. 18.23.4 (May 2016).  For a more detailed explanation, see Ryan Goodman, The Law of Aiding and Abetting (Alleged) War Crimes:  How to Assess US and UK Support for Saudi Strikes in Yemen, Just Security, Sep. 1, 2016, https://www.justsecurity.org/32656/law-aiding-abetting-alleged-war-crimes-assess-uk-support-saudi-strikes-yemen/; Ryan Goodman, Jared Kushner, the Arms Deal, and Alleged Saudi War Crimes, Just Security, May 20, 2017, https://www.justsecurity.org/41221/jared-kushner-arms-deal-alleged-saudi-war-crimes/.

[7]  See Malsin, supra note 3.

Law & Legal Issues Michael R. Tregle, Jr. Option Papers United States War Crimes Yemen

Options for Next Generation Blue Force Biometrics

Sarah Soliman is a Technical Analyst at the nonprofit, nonpartisan RAND Corporation.  Sarah’s research interests lie at the intersection of national security, emerging technology, and identity.  She can be found on Twitter @BiometricsNerd.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Next Generation Biometrics for U.S. Forces.

Date Originally Written:  March 18, 2017.

Date Originally Published:  June 26, 2017.

Author and / or Article Point of View:  Sarah Soliman is a biometrics engineer who spent two years in Iraq and Afghanistan as contracted field support to Department of Defense biometrics initiatives.

Background:  When a U.S. Army specialist challenged Secretary of Defense Donald Rumsfeld in 2004, it became tech-innovation legend within the military.  The specialist asked what the secretary was doing to up-armor military vehicles against Improvised Explosive Device (IED) attacks[1].  This town hall question led to technical innovations that became the class of military vehicles known as Mine-Resistant Ambush Protected, the MRAP.

History repeated itself in a way last year when U.S. Marine Corps General Robert B. Neller was asked in a Marine Corps town hall what he was doing to “up-armor” military personnel—not against attacks from other forces, but against suicide within their ranks[2].  The technical innovation path to strengthening troop resiliency is less clear, but just as in need of an MRAP-like focus on solutions.  Here are three approaches to consider in applying “blue force” biometrics, the collection of physiological or behavioral data from U.S. military troops, that could help develop diagnostic applications to benefit individual servicemembers.

1

US Army Specialist Thomas Wilson addresses the Secretary of Defense on base in Kuwait in 2004. Credit: Gustavo Ferrari / AP http://www.nbcnews.com/id/6679801/ns/world_news-mideast_n_africa/t/rumsfeld-inquisitor-not-one-bite-his-tongue

Significance:  The September 11th terrorists struck at a weakness—the United States’ ability to identify enemy combatants.  So the U.S. military took what was once blue force biometrics—a measurement of human signatures like facial images, fingerprints and deoxyribonucleic acid (DNA) (which are all a part of an enrolling military member’s record)—and flipped their use to track combatants rather than their own personnel.  This shift led to record use of biometrics in Operation Iraqi Freedom and Operation Enduring Freedom to assist in green (partner), grey (unknown), and red (enemy) force identification.

After 9/11, the U.S. military rallied for advances in biometrics, developing mobile tactical handheld devices, creating databases of IED networks, and cutting the time it takes to analyze DNA from days to hours[3].  The U.S. military became highly equipped for a type of identification that validates a person is who they say they are, yet in some ways these red force biometric advances have plateaued alongside dwindling funding for overseas operations and troop presence.  As a biometric toolset is developed to up-armor military personnel for health concerns, it may be worth considering expanding the narrow definition of biometrics that the Department of Defense currently uses[4].

The options presented below represent research that is shifting from red force biometrics back to the need for more blue force diagnostics as it relates to traumatic brain injury, sleep and social media.

Option #1:  Traumatic Brain Injury (TBI).

The bumps and grooves of the brain can contain identification information much like the loops and whorls in a fingerprint.  Science is only on the cusp of understanding the benefits of brain mapping, particularly as it relates to injury for military members[5].

Gain:  Research into Wearables.

Getting military members to a field hospital equipped with a magnetic resonance imaging (MRI) scanner soon after an explosion is often unrealistic.  One trend has been to catalog the series of blast waves experienced—instead of measuring one individual biometric response—through a wearable “blast gauge” device.  The blast gauge program made news recently as the markers failed to give vibrant enough data and the program was cancelled[6].  Though not field expedient, another traumatic brain injury (TBI) sensor type to watch is brain activity trackers, which CNN’s Jake Tapper experienced when he donned a MYnd Analytics electroencephalogram brain scanning cap, drawing attention to blue force biometrics topics alongside Veterans Day[7].

 

Risk:  Overpromising, Underdelivering or “Having a Theranos Moment.”

Since these wearable devices aren’t currently viable solutions, another approach being considered is uncovering biometrics in blood.  TBI may cause certain proteins to spike in the blood[8]. Instead of relying on a subjective self-assessment by a soldier, a quick pin-prick blood draw could be taken.  Military members can be hesitant to admit to injury, since receiving treatment is often equated with stigma and may require having to depart from a unit.  This approach would get around that while helping the Department of Defense (DoD) gain a stronger definition of whether treatment is required.

Option #2:  Sleep.

Thirty-one percent of members of the U.S. military get five hours or less of sleep a night, according to RAND research[9].  This level of sleep deprivation affects cognitive, interpersonal, and motor skills whether that means leading a convoy, a patrol or back home leading a family.  This health concern bleeds across personal and professional lines.

Gain:  Follow the Pilots.

The military already requires flight crews to rest between missions, a policy in place to allow flight crews the opportunity to be mission ready through sleep, and the same concept could be instituted across the military.  Keeping positive sleep biometrics—the measurement of human signatures based on metrics like amount of total sleep time or how often a person wakes up during a sleep cycle, oxygen levels during sleep and the repeat consistent length of sleep—can lower rates of daytime impairment.

4
The prevalence of insufficient sleep duration and poor sleep quality across the force. Credit: RAND, Clock by Dmitry Fisher/iStock; Pillow by Yobro10/iStockhttp://www.rand.org/pubs/research_briefs/RB9823.html

Risk:  More memoirs by personnel bragging how little sleep they need to function[10].

What if a minimal level of rest became a requirement for the larger military community?  What sleep-tracking wearables could military members opt to wear to better grasp their own readiness?  What if sleep data were factored into a military command’s performance evaluation?

Option #3:  Social Media.

The traces of identity left behind through the language, images, and even emoji[11] used in social media have been studied, and they can provide clues to mental health.

Gain:  It’s easier to pull text than to pull blood.

Biometric markers include interactivity like engagement (how often posts are made), what time a message is sent (which can act as an “insomnia index”), and emotion detection through text analysis of the language used[12].  Social media ostracism can also be measured by “embeddedness” or how close-knit one’s online connections are[13].

 

Risk:  Misunderstanding in social media research.

The DoD’s tweet about this research was misconstrued as a subtweet or mockery[14].  True to its text, the tweet was about research under development at the Department of Defense and in particular the DoD Suicide Prevention Office.  Though conclusions at the scale of the DoD have yet to be reached, important research is being built-in this area including studies like one done by Microsoft Research, which demonstrated 70 percent accuracy in estimating onset of a major depressive disorder[15].  Computer programs have identified Instagram photos as a predictive marker of depression[16] and Twitter data as a quantifiable signal of suicide attempts[17].

Other Comments:  Whether by mapping the brain, breaking barriers to getting good sleep, or improving linguistic understanding of social media calls for help, how will the military look to blue force biometrics to strengthen the health of its core?  What type of intervention should be aligned once data indicators are defined?  Many tombs of untapped data remain in the digital world, but data protection and privacy measures must be in place before they are mined.

Recommendations:  None.


Endnotes:

[1]  Gilmore, G. J. (2004, December 08). Rumsfeld Handles Tough Questions at Town Hall Meeting. Retrieved June 03, 2017, from http://archive.defense.gov/news/newsarticle.aspx?id=24643

[2]  Schogol, J. (2016, May 29). Hidden-battle-scars-robert-neller-mission-to-save-marines-suicide. Retrieved June 03, 2017, from http://www.marinecorpstimes.com/story/military/2016/05/29/hidden-battle-scars-robert-neller-mission-to-save-marines-suicide/84807982/

[3]  Tucker, P. (2015, May 20). Special Operators Are Using Rapid DNA Readers. Retrieved June 03, 2017, from http://www.defenseone.com/technology/2015/05/special-operators-are-using-rapid-dna-readers/113383/

[4]  The DoD’s Joint Publication 2-0 defines biometrics as “The process of recognizing an individual based on measurable anatomical, physiological, and behavioral characteristics.”

[5]  DoD Worldwide Numbers for TBI. (2017, May 22). Retrieved June 03, 2017, from http://dvbic.dcoe.mil/dod-worldwide-numbers-tbi

[6]  Hamilton, J. (2016, December 20). Pentagon Shelves Blast Gauges Meant To Detect Battlefield Brain Injuries. Retrieved June 03, 2017, from http://www.npr.org/sections/health-shots/2016/12/20/506146595/pentagon-shelves-blast-gauges-meant-to-detect-battlefield-brain-injuries?utm_medium=RSS&utm_campaign=storiesfromnpr

[7]  CNN – The Lead with Jake Tapper. (2016, November 11). Retrieved June 03, 2017, from https://vimeo.com/191229323

[8]  West Virginia University. (2014, May 29). WVU research team developing test strips to diagnose traumatic brain injury, heavy metals. Retrieved June 03, 2017, from http://wvutoday-archive.wvu.edu/n/2014/05/29/wvu-research-team-developing-test-strips-to-diagnose-traumatic-brain-injury-heavy-metals.html

[9]  Troxel, W. M., Shih, R. A., Pedersen, E. R., Geyer, L., Fisher, M. P., Griffin, B. A., . . . Steinberg, P. S. (2015, April 06). Sleep Problems and Their Impact on U.S. Servicemembers. Retrieved June 03, 2017, from http://www.rand.org/pubs/research_briefs/RB9823.html

[10]  Mullany, A. (2017, May 02). Here’s Arianna Huffington’s Recipe For A Great Night Of Sleep. Retrieved June 03, 2017, from https://www.fastcompany.com/3060801/heres-arianna-huffingtons-recipe-for-a-great-night-of-sleep

[11]  Ruiz, R. (2016, June 26). What you post on social media might help prevent suicide. Retrieved June 03, 2017, from http://mashable.com/2016/06/26/suicide-prevention-social-media.amp

[12]  Choudhury, M. D., Gamon, M., Counts, S., & Horvitz, E. (2013, July 01). Predicting Depression via Social Media. Retrieved June 03, 2017, from https://www.microsoft.com/en-us/research/publication/predicting-depression-via-social-media/

[13]  Ibid.

[14]  Brogan, J. (2017, January 23). Did the Department of Defense Just Subtweet Donald Trump? Retrieved June 03, 2017, from http://www.slate.com/blogs/future_tense/2017/01/23/did_the_department_of_defense_subtweet_donald_trump_about_mental_health.html

[15]  Choudhury, M. D., Gamon, M., Counts, S., & Horvitz, E. (2013, July 01). Predicting Depression via Social Media. Retrieved June 03, 2017, from https://www.microsoft.com/en-us/research/publication/predicting-depression-via-social-media/

[16]  Reece, A. G., & Danforth, C. M. (2016, August 13). Instagram photos reveal predictive markers of depression. Retrieved June 03, 2017, from https://arxiv.org/abs/1608.03282

[17]  Coppersmith, G., Ngo, K., Leary, R., & Wood, A. (2016, June 16). Exploratory Analysis of Social Media Prior to a Suicide Attempt. Retrieved June 03, 2017, from https://www.semanticscholar.org/paper/Exploratory-Analysis-of-Social-Media-Prior-to-a-Su-Coppersmith-Ngo/3bb21a197b29e2b25fe8befbe6ac5cec66d25413

Biometrics Emerging Technology Option Papers Psychological Factors Sarah Soliman United States

Authorization for the Use of Military Force Options

Silence Dogood has a background in defense issues and experience working in Congress.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Current operations in the Global War On Terror are carried out under the authority granted by 2001 Authorization for the Use of Military Force (AUMF).  Given changes in the global security environment, there is currently debate over updating the AUMF.

Date Originally Written:  May 26, 2017.

Date Originally Published:  June 22, 2017.

Author and / or Article Point of View:  Author is writing from the perspective of a senior policy advisor to member of Congress sitting on either the House or Senate Armed Services Committees.

Background:  Shortly following the September 11th terrorist attacks, Congress passed Public Law 107-40, the 2001 Authorization for the Use of Military Force[1].  The 2001 AUMF states, “the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States…”  The 2001 AUMF is currently used as the legal authority for counterterrorism operations in multiple countries, against multiple organizations, including the Islamic State.

Significance:  Clearly defining ends, ways, means, and costs are central to the military planning process.  This analysis should extend and be central to the policy planning process as well.  Relying on the 2001 AUMF for the campaign against the Islamic State raises questions about whether statutory authority does, or should, to extend to this campaign.  Revisiting force authorization statutes will help mitigate the risk of perpetual war, simplify legal authorities, and strengthen congressional oversight[2].  Terrorism is a tactic, and thus cannot be defeated.  Those who engage in terrorism can be targeted and the environmental factors leading to terrorism can be addressed.  Less than 25% of the current members of Congress held office when the 2001 AUMF passed[3].  Revisiting the 2001 AUMF allows current policy makers the opportunity to reexamine the scope and extent of current counterterrorism operations.

Option #1:  Amend the 2001 AUMF to restrict Presidential authorities to use force.

Risk:  Efforts to restrict potential overreach of Presidential authorities may also restrict the flexibility of military responses to the emerging threats and capabilities of future terrorist organizations.  Restriction would relegate presidential authorities to those granted by Article II of the Constitution and international self-defense laws, such as Article 51 of the UN Charter.  This may initially restrict operational flexibility, as mentioned before.  However, this could also lead to an expansion of Article II powers as counterterrorism operations continue under the premise of Article II authorities.

Gain:  Option #1 provides Congress with a check on the President’s authority to use military force in an extended and expanded Global War on Terror.  This option also incentivizes non-kinetic counterterrorism efforts.  These efforts include targeting terrorism financing, economic development, information operations, and judicial counterterrorism strategies.  Restricted authorities could limit the geographical areas of operations.  They could also restrict targeting authorities to a list of named enemy organizations[4].

Option #2:  Amend 2001 AUMF to update or expand Presidential authorities to use force.

Risk:  Updating the 2001 AUMF to expand Presidential authorities to use force may lead to excessive use of military force.  It could also lead to further legitimizing endless war.

Gain:  An updated and expanded AUMF could clearly define uses of technologies not widely available in 2001, such as armed unmanned aerial vehicles and cyberwarfare. Option #2 could also enable the targeting of terrorist groups unaffiliated with Al Qaeda that pose a threat to the United States.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  The Authorization for Use of Military Force (AUMF), Pub. L. No. 107-40, 115 Stat. 224 (2001)

[2]  Wittes, B. (2014, November 11). A Response to Steve Vladeck on the AUMF Principles. Retrieved from https://lawfareblog.com/response-steve-vladeck-aumf-principles

[3]  Brandon, H. (2017, May 05). An ISIS AUMF: Where We Are Now, Where to Go Next, and Why It’s So Important to Get It Right. Retrieved from https://www.justsecurity.org/40549/isis-aumf-now-next-important/

[4]  Popplin, C. (2015, June 09). National Security Network Proposes Plan to Repeal AUMF. Retrieved from https://lawfareblog.com/national-security-network-proposes-plan-repeal-aumf

Authorization for the Use of Military Force (AUMF) Option Papers Silence Dogood United States Violent Extremism

Options to Counter Piracy in the Horn of Africa

Captain Robert N. Hein (U.S. Navy, Retired) was a career Surface Warfare Officer in the U.S. Navy.  He previously commanded the USS Gettysburg (CG-64) and the USS Nitze (DDG-94).  He can be found on Twitter @the_sailor_dogClaude Berube teaches at the United States Naval Academy, was a 2004 Brookings Institution LEGIS Congressional Fellow and a 2010 Maritime Security Studies Fellow at The Heritage Foundation.  He can be found on Twitter @cgberube.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  After lying dormant for a few years, following a large international response, piracy off the Horn of Africa is again threatening the free flow of global commerce.

Date Originally Written:  May 29, 2017.

Date Originally Published:  June 19, 2017.

Author and / or Article Point of View:  Claude Berube has operated off the Horn of Africa, and has written extensively on piracy and private maritime security companies.  Bob Hein has hunted pirates off Somalia.  Bob’s final assignment was the Deputy Director of Strategy on the U.S. Navy Staff.

Background:  Somali piracy threatens major trade routes.  Over 30,000 ships transit the Gulf of Aden annually.  At its peak in 2007, the cost of Somali pirate attacks to the shipping industry was $7B.  The cost decreased to $1.3B in 2015, and climbed to $1.7B in 2016[1].  In May 2017, the Commander of U.S. Africa Command, U.S. Marine Corps General Thomas Walderhauser, indicated as many as six piracy attacks occurred in the last month[2].  Given the expanse of unpatrolled waters in the region and opportunities for criminal and pirate networks to exploit maritime security gaps, there will inevitably be more attacks.

Significance:  Since the Romans and Carthaginians raised their Navies against each other in the Punic Wars, the purpose of Navies has been to protect the coast, and protect maritime commerce.  Prior to that, Thucydides mentions piracy in History of the Peloponnesian War.  The actions of pirates in Africa led to the establishment and deployment of the U.S. Navy in the early 19th century.  A resurgence in Somali piracy represents a renewed threat to global trade, and the stability of Somalia.

Option #1:  The U.S. cedes the constabulary role for counter-piracy activities to the People’s Republic of China (PRC) People’s Liberation Army (Navy) (PLA(N)).  In April 2017 the PRC deployed its 26th anti-piracy flotilla to the Horn of Africa.  In that time, the PRC escorted 5,900 ships in the region[3], and established a base in nearby Djibouti to maintain a mission to not only protects the PRC’s “One Belt” initiative, but give PRC Naval Commanders experience operating far from home.

Risk:  Taking over this mission allows the PRC to gain experience in operating far from home, a key attribute for an historic land power seeking increased influence abroad.  Prior to its first anti-piracy flotilla in 2008, the PLA(N) had been largely absent in international waters for five centuries.  The PRC may also give a false sense of security to those areas where it does not have a direct interest.  By ceding additional maritime security missions to the PLA(N), the U.S. and its partners empower PLA(N) overseas capabilities and the possibility that regional powers will become more reliant on the PRC.  For example, in 2015 the PRC was able to evacuate its citizens from the growing crisis in Yemen due, in part, to their enhanced capabilities from long-range operations in the region and newer platforms[4].

Gain:  The PRC does provide a short-term solution with a modern navy.  It has the motivation to prove itself as a guarantor of maritime security, not just a consumer.  The PRC has the capability and the desire to contain and curtail piracy in the Horn of Africa if not to simply secure shipping then for longer-range operational and strategic goals.

Option #2:  The U.S. builds capacity in the Somali maritime forces, and trains nascent Somali governments with the tools required to ensure domestic maritime security.  Local Somali governments have had some recent success in counter-piracy activity, rescuing eight Indian mariners captured by Somali pirates[5].  Introducing counter-piracy training, maritime domain awareness and intelligence sharing would go far in allowing regions of Somalia to work together to stop what should be a Somali law enforcement issue.

Risk:  The threat of corruption is a major concern; also the responsibility for building maritime law enforcement capacity would be a political minefield for any host nation.

Gain:  Using the dictum of “Teach a man to fish,” places Somalia in a position to police its waterways will provide a permanent solution to the piracy problem.  It will also ensure illegal fishing or overfishing by other states does not further deplete local fishing grounds[6].  Piracy in Somalia was born of frustrated fisherman who had no recourse against foreign fishing boats poaching their grounds.  Giving Somalia the ability to not only deter piracy, but also police their waters against illegal fishing should provide a complete long-term solution.

Option #3:  The U.S. continues to enable Private Maritime Security Companies, (PMSCs), to provide on-board armed guards at the shipping companies’ discretion.  To date, no ship with an armed team aboard has been successfully taken by Somali pirates.

Risk:  PMSCs are subject to market fluctuations.  As piracy rose in 2006-2008, PMSCs proliferated providing a wide spectrum of cost, capabilities, and legitimacy.  Ceding full maritime security control to unregulated PMSCs or to PMSCs from non-partnered nations could have other consequences as well, such as future military operations employing a trained, unaligned and unregulated force.  Additionally, many of the smaller shipping companies, favored by pirates, cannot afford PMSCs thus potentially identifying the smaller shipping companies as soft targets.

Gain:  Working with shipping companies and PMSCs would ensure the U.S. and its partners contribute to regulation of legitimate and capable PMSCs and would deny the PLA(N) an opportunity to enhance its capabilities through gaining experience in counter-piracy operations.

Option #4:  Coalition operations in the region continue.  In addition to independent operations, Somali piracy resulted in the creation of several key partnerships including Combined Task Force 151, the European Union’s Operation ATALANTA, and the North Atlantic Treaty Organization’s (NATO) Operation OCEAN SHIELD.

Risk:  Coalition investment of time, money, staff, and platforms for any operation takes away from other missions.  If other missions such as North Korea, Iran, and threats in the Mediterranean Sea have a higher immediate priority, then coalition ships might not be available if the pirate threat level is assessed as low.  In November 2016, for example, NATO concluded Operation OCEAN SHIELD as it shifted resources to the Baltic and Black Seas[7].

Gain:  Coalition operations enhance interoperability between traditional and new partners.  The larger the coalition, the fewer resources each nation has to contribute.  In most maritime operations, few countries can go it alone.

Other Comments:  While the options are limitless, the options presented here are those the authors assess as being the most feasible and acceptable.

Recommendation:  None


Endnotes:

[1]  CNBC Int’l, Luke Graham, “Somali Pirates are Back,” 03 May 2017

[2] The Trumpet, Anthony Chibarirwe, “Somali Pirates are Back,” 19 May 2017

[3]  The Diplomat, Ankit Panda, “As Somali Pirates Return, Chinese Navy Boasts of Anti-Piracy Operations,” 16 April 2017

[4]  The Diplomat, Kevin Wang, “Yemen Evacuation a Strategic Step Forward for China,” 10 April 2015

[5]  The New York Times, Hussein Mohamed, “8 Indians rescued from Somali Pirates, Officials say,” 12 April 2017

[6]  Asia Today, Hong Soon-Do, “Chinese Illegal Fishing Threatens World Waters,” May 2017

[7]  Reuters, Robin Emmott, “NATO Ends Counter-Piracy Mission as Focus Shifts to Mediterranean,” 23 November 2016

Bob Hein China (People's Republic of China) Claude Berube Horn of Africa Option Papers Piracy

U.S. Options to Address a Growing People’s Republic of China Army (Navy)

Thomas is a junior sailor in the United States Navy.  He can be found on Twitter @CTNope.  The views expressed in this article are the author’s alone and do not represent the official position of the United States Navy, the Department of Defense, or the United States Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Worrying trends in military shipbuilding by the People’s Republic of China (PRC).

Date Originally Written:  April, 29, 2017.

Date Originally Published:  June, 15, 2017.

Author and / or Article Point of View:  The author believes that the current balance of naval forces, both qualitatively and quantitatively, between the U.S. and the PRC, must be examined or the U.S. will face severe policy consequences.  The article is written from the point of view of U.S. Navy (USN) leadership as they assess the growth of the People’s Liberation Army’s (Navy) (PLAN).  This article focuses on options that U.S. policymakers have in response to the trends in the PRC’s military shipbuilding, not the trends themselves.

Background:  Since the mid-2000’s the PRC’s economic situation has vastly improved, most evident as its GDP has grown from 1.2 billion to 11 billion over fifteen years, a growth of over 900 percent[1].  This growth has enabled the PRC to embark on a remarkable shipbuilding program, achieving vast strides in training, technology, capabilities, and actual hull count of modern vessels[3][2].  This growth is creating security challenges in the Pacific as well as igniting tensions between the U.S. and the PRC, as the disparity between the USN and the PLAN shrinks at an alarming rate[4].  These developments have been closely watched by both the U.S. and her Partners, challenging U.S. policymakers to address this new, rising maritime presence while maintaining security in the region.

Significance:  In the U.S. there is a growing bipartisan voice concerned about an assertive PRC[5], as halfway across the globe Asian nations wearily observe the PRC’s growth.  A more powerful PLAN allows greater flexibility for PRC officials to exert influence.  These impressive shipbuilding trends will embolden the PRC, as now they can brush aside actors that held credible deterrence when competing against an unmodernized PLAN.  If current trends in the capacity of PRC shipbuilding and technological advancement continue, the PLAN will be able to challenge the efforts of the USN and U.S. Partners to continue to keep sea lanes of communication open in the space around the disputed ‘nine-dash-line’ as well as other parts of the Pacific.  It is plausible that in the long-term the PLAN will emerge as a near-peer to the USN in the Pacific; as U.S. has to provide for its own security, the security of others, and the security of the Global Commons, while the PRC only has to provide security for itself and its interests.

Option #1:  Platform centric approach.  Review the current force structure of the USN to decide how large the force needs to be to satisfy U.S. policy goals and modify the fleet accordingly.

Risk:  Focusing too heavily on platforms could leave the USN without the tools needed to be on the technological forefront during the next conflict.  Also, a focus on building legacy systems could take resources away from initiatives that require them.

Gain:  An increased number of platforms would allow U.S. policymakers more flexibility in how they decide to most effectively use the USN.  Additionally, more hulls would not only contribute to the deterrence generated by the USN, but also improve the readiness of the USN as more ships can remain in port and undergo maintenance, while other ships conduct missions.  Option #1 maximizes readiness for the next conflict.

Option #2:  Modernization approach.  Focus on improving today’s platforms while additionally investing in the future with disruptive technologies, but do not undertake an extensive build up of hulls.  In this option the fleet would still expand in accordance with current programs, to include the Littoral Combat Ship (LCS), Arleigh Burke Class Destroyers, and Virginia Class Submarines, but these production runs would be cut short to save funds.

Risk:  In the mid-term the USN might not have the hulls necessary to address global security concerns.  However, having fewer hulls does not mean that the USN can’t fight and win, instead, it will require that the USN’s leaders adapt.

Gain:  Investing in the future could yield powerful technologies that change the calculus on how the U.S. employs military forces.  Technologies like the railgun or unmanned systems change the way the USN fights by improving critical traits such as firepower and survivability.  Future technologies could create even greater offsets than previously discovered technologies, with the advent of artificial intelligence on the horizon, future applications appear limitless.  Option #2 increases the chance that the U.S. will continue to operate at the cutting edge of technology.

Option #3:  Balanced approach.  Modify the USN’s size, but not as broadly as the first option, instead providing additional funding towards Research and Development (R&D).

Risk:  This option could prove to be too little, too late.  The USN would benefit from the handful of additional hulls, but PRC shipbuilding pace might negate the benefit of the extra vessels.  The PRC could possibly out-build the USN by adding two new hulls for every one the USN commissions.  Likewise, the USN might need significantly more resources for R&D efforts.

Gain:  The USN would receive additional Arleigh Burke Class Destroyers, LCS Frigates, and Virginia Class Submarines.  In addition, this option would free up more funds to put into R&D to keep the USN ahead of the PLAN in terms of technology.  Overall, this would keep the USN on a balanced footing to be “ready to fight tonight” in the short to mid-term, yet still on a decent footing in the long-term, from R&D efforts.  Option #3 could turn out to be the best of both worlds, combining the increased readiness through hulls as well as continued technological innovation.

Other Comments:  The PLAN still has many issues, ranging from naval subsystems, to C4I, to training and manning[3], but they are correcting their deficiencies at an impressive rate. As such, there is a cost for the U.S. in terms of both omission and commission.

Recommendation:  None.


Endnotes:

[1]  The World Bank Statistics. Retrieved from: http://data.worldbank.org/indicator/NY.GDP.MKTP.CD?

[2]  Gabriel Collins and LCDR Michael Grubb, USN. “A Comprehensive Survey of China’s Dynamic Shipbuilding Industry, Commercial Development and Strategic Implications”.     Published August 2008. Retrieved from: https://www.usnwc.edu/Research—Gaming/China-Maritime-Studies-Institute/Publications/documents/CMS1_Collins-Grubb.aspx

[3]  Ronald O’Rourke . “China Naval Modernization: Implications for U.S. Navy Capabilities—Background and Issues for Congress”. Retrieved from: https://fas.org/sgp/crs/row/RL33153.pdf

[4]  Shannon Tiezzi with Andrew Erickson. “Chinese Naval Shipbuilding: Measuring the Waves”.  Retrieved from: http://thediplomat.com/2017/04/chinese-naval-shipbuilding-measuring-the-waves/

[5]  Various. “Hotspots Along China’s Maritime Periphery”.
Retrieved from: https://www.uscc.gov/Hearings/hotspots-along-china%E2%80%99s-maritime-periphery

Capacity / Capability Enhancement China (People's Republic of China) Maritime Option Papers Thomas United States

Hamas Policy Options Amidst Regional & Internal Change

Miguel Galsim is a final year student completing a double Bachelor of International Relations/Middle Eastern and Central Asian Studies at the Australian National University, with an academic interest in non-state violence.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Hamas Organisation’s purportedly softened political principles and its reshuffling of senior leadership figures has left the group fraught between a path towards further moderation and a road of continued, even elevated, violence.

Date Originally Written:  May 19, 2017

Date Originally Published:  June 12, 2017.

Author and / or Article Point of View:  This options paper is written from the perspective of a senior policymaker within Hamas providing options to the political leadership of the movement.

Background:  On May 1, 2017, Hamas released a document of “General Principles and Policies[1]” that displayed an apparent toning-down of Hamas’ long criticised dogmatism, evident in its original 1988 charter.  The document is bereft of references to the Muslim Brotherhood, instead refers to Hamas’ enemies as Zionists and not Jews, and while not recognising Israel, outlines its recognition of a de-facto Palestinian state along the 1967 borders.  It is widely believed that the document is a device to bring Hamas out of the diplomatic cold.

At the same time, Hamas elected former Prime Minister of Gaza Ismail Haniyeh to head its political bureau on May 6, replacing the highly pragmatic and externally focused Khaled Mashal who was barred by internal regulations from running for another term.  It is also worth noting that prior to the release of the General Principles and Policies and the election of Haniyeh, in February Yahya Sinwar, a military figurehead and former Hamas counterintelligence chief, was elected to become Gaza’s Prime Minister.  Sinwar has 22 years of imprisonment experience under Israel.  Both Haniyeh and Sinwar are insiders in Hamas[2] – having extensive grassroots experience, particularly in Gaza – and have strong links with the military wing, the latter more staunchly.

Compounding Hamas’ internal shifts, regional unrest has deprived Hamas of its traditional backers in Syria and Iran[3], and the return of an anti-Islamist leadership in Egypt has imperilled Hamas supply chains into Gaza and hardened an already difficult border for civilians living under Hamas government.

Significance:  Such a complex situation, buffeted by the potentially countervailing forces of ideological moderation and an insider-oriented shift, creates an uncertain future for Hamas as Gaza’s Islamic-nationalist militant group.  With Hamas insiders now in charge, Gaza becomes a more prominent reference point for strategic thinking.  Accordingly, facing an increasingly dissatisfied populace weary from siege, attempting to preserve its popular support, and also looking to fill the cavities left by a hostile Egypt and a distracted Syria and Iran, Hamas’ next strategic choices will be crucial for its success in pursuing its goals, and at the very least, surviving as a movement.

Option #1:  Hamas allows military imperatives to drive its broader strategic thinking, resulting in a potential escalation of violent operations.

This option would be a conceivable outcome of the election of Sinwar and Haniyeh who, while following in their predecessor’s pragmatic footsteps, nonetheless have better military ties due to their experiences in Gaza.

Risk:  This option would be inflexible and incognizant of the external factors fuelling grievances within their controlled territory.  Increased attacks on Israel would invite disastrous Israeli offensives on Gaza and substantial damage to the group’s own assets, as Hamas has learned to expect.  This would result not only in an immediate danger to Gaza’s populace, but a tightened economic blockade.  A militaristic mindset would also render Hamas even more isolated from global diplomatic support and hostile to Egyptian interests – a subsequent thinning of material and financial resources into Gaza would be the likely result.  These factors would consequently worsen the humanitarian situation in Gaza, withering Hamas’ popular support base.  Simultaneously, increased Hamas violence would give Fatah extended pretexts to dismantle Hamas cells in the West Bank.

Gain:  Emphasising its military needs would help Hamas retain the leadership of violent resistance against Israel and sustain its main differentiator from its rivals in Fatah who renounced armed resistance in 1993.  For certain sectors of the population, militancy would be a pull factor towards the group.  Enhanced coercive capabilities would also assist Hamas’ crackdown on hostile Salafi elements in Gaza and, if not applied haphazardly, act as deterrence against hostile manoeuvres from Fatah and Israel.  Additionally, a focus on military capacity could potentially reinvigorate Hamas’ relationship with Iran as the military wing’s traditional patron[4], as well as a provider of armaments.

Option #2:  Hamas pursues a course of broader political moderation and resorts only to limited, targeted applications of violence.

Given the publication of Hamas’ new political document, the path of moderation is also a viable option.  Haniyeh may be open to pragmatic change, despite his commitment to resistance[5], given the hard lessons he would have learnt first-hand from conflagrations in Gaza.  This should not be taken as disarmament, however – such a move would be disastrous for Hamas’ popularity, territorial control, and deterrence abilities.  Furthermore, it cannot be considered an option as heightened discontent within the military wing would simply endanger the integrity of the entire Organisation.

Risk:  Political compromise may widen rifts between the moderates and conservatives within Hamas, with champion hardliner Mahmoud al-Zahar already stating to the public that the new platform was an “extension” and not a “replacement” of the original, maximalist charter[6].  A more restrained Hamas could also result in external criticisms of Hamas’ failure to carry the banner of resistance, and may inspire a shift in some grassroots support towards more radical elements in Gaza.  Traditional partners in Syria and Iran may also become more estranged.

Gain:  The clear benefit of moderation is its potential to open regional and global diplomatic channels.  Doing so keeps Hamas open to a wider array of policy options and could lead to the future easing of terrorist classifications in some countries, thereby alleviating constraints on its financial flows.  Additionally, an eased political position may boost public appreciation for Hamas’ efforts by alleviating the blockade of Gaza from Israel and Egypt, and giving Israel fewer reasons to launch high-intensity offensives on Gaza.  Concurrently, opting for more surgical military operations – particularly given Sinwar’s sophisticated understanding of Israel, his ability to act with moderation, and the potential that he will work sanguinely with the politburo[7] – would retain Hamas’ coercive edge while not instigating another round of heavy fighting.

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  The Islamic Resistance Movement “Hamas”. (2017, May 1). A Document of General Principles and Policies. http://hamas.ps/en/post/678/a-document-of-general-principles-and-policies

[2]  See Ghassan Khatib’s comments in Mitnick, J & Abualouf, R. (2017, May 6). Hamas selects popular Gaza politician Ismail Haniyeh as its new leader. Los Angeles Times, http://www.latimes.com/world/middleeast/la-fg-hamas-leader-haniyeh-20170506-story.html

[3]  Uthman, T. (2013, March 4). Hamas and the Arab Spring: Arguments on gains and losses (Arabic). Namaa Center for Research and Studies, http://nama-center.com/ActivitieDatials.aspx?id=223

[4]  Mounir, S. (2017, April 23). The predicament of regional options for Hamas after the victory of Yahya Sinwar (Arabic). Al-Ahram Center for Political and Strategic Studies, http://acpss.ahram.org.eg/News/16285.aspx

[5]  Author unknown. (2017, April 30). Haniyeh: Two important merits are coming (Arabic). Shasha News, https://www.shasha.ps/news/263298.html

[6]  Author unknown. (2017, May 17). The new document splitting Hamas from the inside (Arabic). Al-Arab, http://bit.ly/2rvj7El

[7]  Caspit, B. (2017, February 15). Why some in Israel are wary of Hamas’ new Gaza boss. Al-Monitor, http://www.al-monitor.com/pulse/originals/2017/02/israel-gaza-new-hamas-leader-yahya-sinwar-security.html

Hamas Israel Miguel Galsim Option Papers Palestine

Options for Paying Ransoms to Advanced Persistent Threat Actors

Scot A. Terban is a security professional with over 13 years experience specializing in areas such as Ethical Hacking/Pen Testing, Social Engineering Information, Security Auditing, ISO27001, Threat Intelligence Analysis, Steganography Application and Detection.  He tweets at @krypt3ia and his website is https://krypt3ia.wordpress.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  Paying ransom for exploits being extorted by Advanced Persistent Threat Actors: Weighing the Options.

Date Originally Written:  June 1, 2017.

Date Originally Published:  June 8, 2017.

Author and / or Article Point of View:  Recent events have given rise to the notion of crowd funding monies to pay for exploits being held by a hacking group called ShadowBrokers in their new “Dump of the month club” they have ostensibly started.  This article examines, from a red team point of view,  the idea of meeting actors’ extortion demands to get access to new nation state-level exploits and, in doing so, being able to reverse engineer them and immunize the community.

Background:  On May 30, 2017 the ShadowBrokers posted to their new blog site that they were starting a monthly dump service wherein clients could pay a fee for access to exploits and other materials that the ShadowBrokers had stolen from the U.S. Intelligence Community (USIC).  On May 31, 2017 a collective of hackers created a Patreon site to crowd fund monies in an effort to pay the ShadowBrokers for their wares and gather the exploits to reverse engineer them in the hopes of disarming them for the greater community.  This idea was roundly debated on the internet and as of this writing  has since been pulled by the collective after collecting about $3,000.00 of funds.  In the end it was the legal counsel of one of the hackers who had the Patreon site shut down due to potential illegalities with buying such exploits from actors like ShadowBrokers.  There were many who supported the idea with a smaller but vocal dissenting group warning that it was bad idea.

Significance:  The significance of these events has import on many levels of national security issues that now deal with information security and information warfare.  The fact that ShadowBrokers exist and have been dumping nation-state hacking tools is only one order of magnitude here.  Since the ShadowBrokers dumped their last package of files a direct international event ensued in the WannaCrypt0r malware being augmented with code from ETERNALBLUE and DOUBLEPULSAR U.S. National Security Agency exploits and infecting large numbers of hosts all over the globe with ransomware.  An additional aspect of this was that the code for those exploits may have been copied from the open source sites of reverse engineers working on the exploits to secure networks via penetration testing tools.  This was the crux of the argument that the hackers were making, simply put, they would pay for the access to deny others from having it while trying to make the exploits safe.  Would this model work for both public and private entities?  Would this actually stop the ShadowBrokers from posting the data publicly even if paid privately?

Option #1:  Private actors buy the exploits through crowd funding and reverse the exploits to make them safe (i.e. report them to vendors for patching).

Risk:  Private actors like the hacker collective who attempted this could be at risk to the following scenarios:

1) Legal issues over buying classified information could lead to arrest and incarceration.

2) Buying the exploits could further encourage ShadowBrokers’ attempts to extort the United States Intelligence Community and government in an active measures campaign.

3) Set a precedent with other actors by showing that the criminal activity will in fact produce monetary gain and thus more extortion campaigns can occur.

4) The actor could be paid and still dump the data to the internet and thus the scheme moot.

Gain:  Private actors like the hacker collective who attempted this could have net gains from the following scenarios:

1) The actor is paid, and the data is given leaving the hacker collective to reverse engineer the exploits and immunize the community.

2) The hacker collective could garner attention to the issues and themselves, this perhaps could get more traction on such issues and secure more environments.

Option #2:  Private actors do not pay for the exploits and do not reward such activities like ransomware and extortion on a global scale.

Risk:  By not paying the extortionists the data is dumped on the internet and the exploits are used in malware and other hacking attacks globally by those capable of understanding the exploits and using or modifying them.  This has already happened and even with the exploits being in the wild and known of by vendors the attacks still happened to great effect.  Another side effect is that all operations that had been using these exploits have been burned, but, this is already a known quantity to the USIC as they likely already know what exploits have been stolen and or remediated in country.

Gain:  By not paying the extortionists the community at large is not feeding the cost to benefit calculation that the attackers must make in their plans of profit.  If we do not deal with extortionists or terrorists you are not giving them positive incentive to carry out such attacks for monetary benefit.

Other Comments:  While it may be laudable to consider such schemes as crowd funding and attempting to open source such exploit reversal and mitigation, it is hubris to consider that this will stop the actor with bad intent to just sell the data and be done with it.  It is also of note that the current situation that this red team article is based on involves a nation-state actor, Russia and its military intelligence service Glavnoye Razvedyvatel’noye Upravleniye (GRU) and its foreign intelligence service the Sluzhba Vneshney Razvedki (SVR) that are understood to not care about the money.  This current situation is not about money, it is about active measures and sowing chaos in the USIC and the world.  However, the precepts still hold true, dealing with terrorists and extortionists is a bad practice that will only incentivize the behavior.  The takeaway here is that one must understand the actors and the playing field to make an informed decision on such activities.

Recommendation:  None.


Endnotes:

None.

Cyberspace Extortion Option Papers Scot A. Terban

Options for Defining “Acts of War” in Cyberspace

Michael R. Tregle, Jr. is a U.S. Army judge advocate officer currently assigned as a student in the 65th Graduate Course at The Judge Advocate General’s Legal Center & School.  A former enlisted infantryman, he has served at almost every level of command, from the infantry squad to an Army Service Component Command, and overseas in Afghanistan and the Pacific Theater.  He tweets @shockandlawblog and writes at www.medium.com/@shock_and_law.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The international community lacks consensus on a binding definition of “act of war” in cyberspace.

Date Originally Written:  March 24, 2017.

Date Originally Published:  June 5, 2017.

Author and / or Article Point of View:  The author is an active duty officer in the U.S. Army.  This article is written from the point of view of the international community toward common understandings of “acts of war” in cyberspace.

Background:  The rising prominence of cyber operations in modern international relations highlights a lack of widely established and accepted rules and norms governing their use and status.  Where no common definitions of “force” or “attack” in the cyber domain can be brought to bear, the line between peace and war becomes muddled.  It is unclear which coercive cyber acts rise to a level of force sufficient to trigger international legal rules, or how coercive a cyber act must be before it can be considered an “act of war.”  The term “act of war” is antiquated and mostly irrelevant in the current international legal system.  Instead, international law speaks in terms of “armed conflicts” and “attacks,” the definitions of which govern the resort to force in international relations.  The United Nations (UN) Charter flatly prohibits the use or threat of force between states except when force is sanctioned by the UN Security Council or a state is required to act in self-defense against an “armed attack.”  While it is almost universally accepted that these rules apply in cyberspace, how this paradigm works in the cyber domain remains a subject of debate.

Significance:  Shared understanding among states on what constitutes legally prohibited force is vital to recognizing when states are at war, with whom they are at war, and whether or not their actions, in war or otherwise, are legally permissible.  As the world finds itself falling deeper into perpetual “gray” or “hybrid” conflicts, clear lines between acceptable international conduct and legally prohibited force reduce the chance of miscalculation and define the parameters of war and peace.

Option #1:  States can define cyberattacks causing physical damage, injury, or destruction to tangible objects as prohibited uses of force that constitute “acts of war.”  This definition captures effects caused by cyber operations that are analogous to the damage caused by traditional kinetic weapons like bombs and bullets.  There are only two known instances of cyberattacks that rise to this level – the Stuxnet attack on the Natanz nuclear enrichment facility in Iran that physically destroyed centrifuges, and an attack on a German steel mill that destroyed a blast furnace.

Risk:  Limiting cyber “acts of war” to physically destructive attacks fails to fully capture the breadth and variety of detrimental actions that can be achieved in the cyber domain.  Cyber operations that only delete or alter data, however vital that data may be to national interests, would fall short of the threshold.  Similarly, attacks that temporarily interfere with use of or access to vital systems without physically altering them would never rise to the level of illegal force.  Thus, states would not be permitted to respond with force, cyber or otherwise, to such potentially devastating attacks.  Election interference and crashing economic systems exemplify attacks that would not be considered force under the physical damage standard.

Gain:  Reliance on physical damage and analogies to kinetic weapons provides a clear, bright-line threshold that eliminates uncertainty.  It is easily understood by international players and maintains objective standards by which to judge whether an operation constitutes illegal force.

Option #2:  Expand the definition of cyber force to include effects that cause virtual damage to data, infrastructure, and systems.  The International Group of Experts responsible for the Tallinn Manual approached this option with the “functionality test,” whereby attacks that interfere with the functionality of systems can qualify as cyber force, even if they cause no physical damage or destruction.  Examples of such attacks would include the Shamoon attack on Saudi Arabia in 2012 and 2016, cyberattacks that shut down portions of the Ukrainian power grid during the ongoing conflict there, and Iranian attacks on U.S. banks in 2016.

Risk:  This option lacks the objectivity and clear standards by which to assess the cyber force threshold, which may undermine shared understanding.  Expanding the spectrum of cyber activities that may constitute force also potentially destabilizes international relations by increasing circumstances by which force may be authorized.  Such expansion may also undermine international law by vastly expanding its scope, and thus discouraging compliance.  If too many activities are considered force, states that wish to engage in them may be prompted to ignore overly burdensome legal restrictions on too broad a range of activities.

Gain:  Eliminating the physical damage threshold provides more flexibility for states to defend themselves against the potentially severe consequences of cyberattacks.  Broadening the circumstances under which force may be used in response also enhances the deterrent value of cyber capabilities that may be unleashed against an adversary.  Furthermore, lowering the threshold for legally permissible cyber activities discourages coercive international acts.

Other Comments:  None.

Recommendation:  None.


Endnotes:

None.

Cyberspace Law & Legal Issues Michael R. Tregle, Jr. Option Papers

“Do You Have A Flag?” – Egyptian Political Upheaval & Cyberspace Attribution

Murad A. Al-Asqalani is an open-source intelligence analyst based in Cairo, Egypt.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


(Author’s Note — “Do You Have A Flag?” is a reference to the Eddie Izzard sketch of the same name[1].)

National Security Situation:  Response to offensive Information Operations in cyberspace against the Government of Egypt (GoE).

Date Originally Written:  May 15, 2017.

Date Originally Published:  June 1, 2017.

Author and / or Article Point of View:  This article discusses a scenario where the GoE tasks an Interagency Special Task Force (ISTF) with formulating a framework for operating in cyberspace against emergent threats to Egyptian national security.

Background:  In 2011, a popular uprising that relied mainly on the Internet and social media websites to organize protests and disseminate white, grey and black propaganda against the Mubarak administration of the GoE, culminated in former President Mubarak stepping down after three decades in power.

Three disturbing trends have since emerged.  The first is repeated deployment of large-scale, structured campaigns of online disinformation by all political actors, foreign and domestic, competing for dominance in the political arena.  Media outlets and think tanks seem to primarily cater to their owners’ or donors’ agendas.  Egyptian politics have been reduced to massive astroturfing campaigns, scripted by creative content developers and mobilized by marketing strategists, who create and drive talking points using meat and sock puppets, mask them as organic interactions between digital grassroots activists, amplify them in the echo chambers of social media, then pass them along to mainstream media outlets, which use them to pressure the GoE citing ‘public opinion’; thus, empowering their client special interest groups in this ‘digital political conflict’.

The second trend to emerge is the rise in Computer Network Attack (CNA) and Computer Network Exploitation (CNE) incidents.  CNA incidents mainly focus on hacking GoE websites and defacing them with political messages, whereas CNE incidents mainly focus on information gathering (data mining) and spear phishing on social media websites to identify and target Egyptian Army and Police personnel and their families, thus threatening their Personal Security (PERSEC), and overall Operation Security (OPSEC).  The best known effort of this type is the work of the first-ever Arabic Advanced Persistent Threat (APT) group: Desert Falcons[2].

The third trend is the abundance of Jihadi indoctrination material, and the increase in propaganda efforts of Islamist terrorist organizations in cyberspace.  New technologies, applications and encryption allow for new channels to reach potential recruits, and to disseminate written, audio, and multimedia messages of violence and hate to target populations.

Significance:  The first trend represents a direct national security threat to GoE and the interests of the Egyptian people.  Manipulation of public opinion is an Information Operations discipline known as “Influence Operations” that draws heavily on Psychological Operations or PSYOP doctrines.  It can render drastic economic consequences that can amount to economic occupation and subsequent loss of sovereignty.  Attributing each influence campaign to the special interest group behind it can help identify which Egyptian political or economic interest is at stake.

The second trend reflects the serious developments in modus operandi of terrorist organizations, non-state actors, and even state actors controlling proxies or hacker groups, which have been witnessed and acknowledged recently by most domestic intelligence services operating across the world.  Attributing these operations will identify the cells conducting them as well as the networks that support these cells, which will save lives and resources.

The third trend is a global challenge that touches on issues of freedom of speech, freedom of belief, Internet neutrality, online privacy, as well as technology proliferation and exploitation.  Terrorists use the Internet as a force multiplier, and the best approach to solving this problem is to keep them off of it through attribution and targeting, not to ban services and products available to law-abiding Internet users.

Given these parameters, the ISTF can submit a report with the following options:

Option #1:  Maintain the status quo.

Risk:  By maintaining the status quo, bureaucracy and fragmentation will always place the GoE on the defensive.  GoE will continue to defend against an avalanche of influence operations by making concessions to whoever launches them.  The GoE will continue to appear as incompetent, and lose personnel to assassinations and improvised explosive device attacks. The GoE will fail to prevent new recruits from joining terrorist groups, and it will not secure the proper atmosphere for investment and economic development.

This will eventually result in the full disintegration of the 1952 Nasserite state bodies, a disintegration that is central to the agendas of many regional and foreign players, and will give rise to a neo-Mamluk state, where rogue generals and kleptocrats maintain independent information operations to serve their own interests, instead of adopting a unified framework to serve the Egyptian people.

Gain:  Perhaps the only gain in this case is avoidance of further escalation by parties invested in the digital political conflict that may give rise to more violent insurgencies, divisions within the military enterprise, or even a fully fledged civil war.

Option #2:  Form an Interagency Cyber Threat Research and Intelligence Group (ICTRIG).

Risk:  By forming an ICTRIG, the ISTF risks fueling both intra-agency and interagency feuds that may trigger divisions within the military enterprise and the Egyptian Intelligence Community.  Competing factions within both communities will aim to control ICTRIG through staffing to protect their privileges and compartmentalization.

Gain:  Option #2 will define a holistic approach to waging cyber warfare to protect the political and economic interests of the Egyptian people, protect the lives of Egyptian service and statesmen, protect valuable resources and infrastructure, and tackle extremism.  ICTRIG will comprise an elite cadre of highly qualified commissioned officers trained in computer science, Information Operations, linguistics, political economy, counterterrorism, as well as domestic and international law to operate in cyberspace.  ICTRIG will develop its own playbook of mission, ethics, strategies and tactics in accordance with a directive from the political leadership of GoE.

Other Comments:  Option #1 can only be submitted and/or adopted due to a total lack of true political will to shoulder the responsibility of winning this digital political conflict.  It means whoever submits or adopts Option #1 is directly undermining GoE institutions.  Since currently this is the actual reality of GoE’s response to the threats outlined above, uncoordinated efforts at running several independent information operations have been noted and documented, with the Morale Affairs Department of the Military Intelligence and Reconnaissance Directorate running the largest one.

Recommendation:  None.


Endnotes:

[1]  Eddie Izzard: “Do you have a flag?”, Retrieved from: https://www.youtube.com/watch?v=_9W1zTEuKLY

[2]   Desert Falcons: The Middle East’s Preeminent APT, Kaspersky Labs Blog, Retrieved from https://blog.kaspersky.com/desert-falcon-arabic-apt/7678/

Cyberspace Egypt Murad A. Al-Asqalani Option Papers Psychological Factors

U.S. Options to Develop a Cyberspace Influence Capability

Sina Kashefipour is the founder and producer of the national security podcast The Loopcast.  He  currently works as an analyst.  The opinions expressed in this paper do not represent the position of his employer.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The battle for control and influence over the information space.

Date Originally Written:  May 18, 2017.

Date Originally Published:  May 29, 2017.

Author and / or Article Point of View:  The author believes that there is no meat space or cyberspace, there is only the information space.  The author also believes that while the tools, data, and knowledge are available, there is no United States organization designed primarily to address the issue of information warfare.

Background:  Information warfare is being used by state and non-state adversaries.  Information warfare, broadly defined, makes use of information technology to gain an advantage over an adversary.  Information is the weapon, the target, and the medium through which this type of conflict takes place[1][2][3].  Information warfare includes tactics such as misinformation, disinformation, propaganda, psychological operations and computer network operations [3][4][5].

Significance:  Information warfare is a force multiplier.  Control and mastery of information determines success in politics and enables the driving of the political narrative with the benefit of not having to engage in overt warfare.  Information warfare has taken a new edge as the information space and the political are highly interlinked and can, in some instances, be considered as one[6][7][8].

Option #1:  The revival of the United States Information Agency (USIA) or the creation of a government agency with similar function and outlook. The USIA’s original purpose can be summed as:

  • “To explain and advocate U.S. policies in terms that are credible and meaningful in foreign cultures”
  • “To provide information about the official policies of the United States, and about the people, values, and institutions which influence those policies”
  • “To bring the benefits of international engagement to American citizens and institutions by helping them build strong long-term relationships with their counterparts overseas”
  • “To advise the President and U.S. government policy-makers on the ways in which foreign attitudes will have a direct bearing on the effectiveness of U.S. policies.[9]”

USIA’s original purpose was largely designated by the Cold War.  The aforementioned four points are a good starting point, but any revival of the USIA would involve the resulting organization as one devoted to modern information warfare.  A modern USIA would not just focus on what a government agency can do but also build ties with other governments and across the private sector including with companies like Google, Facebook, and Twitter as they are platforms that have been used recently to propagate information warfare campaigns [10][11].  Private sector companies are also essential to understanding and limiting these types of campaigns [10][12][13][14].  Furthermore, building ties and partnering with other countries facing similar issues to engage in information warfare would be part of the mission [15][16][17].

Risk:  There are two fundamental risks to reconstituting a USIA: where does a USIA agency fit within the national security bureaucracy and how does modern information warfare pair with the legal bounds of the first amendment?

Defining the USIA within the national security apparatus would be difficult[18].  The purpose of the USIA would be easy to state, but difficult to bureaucratically define.  Is this an organization to include public diplomacy and how does that pair/compete with the Department of State’s public diplomacy mission?  Furthermore, if this is an organization to include information warfare how does that impact Department of Defense capabilities such as the National Security Agency or United States Cyber Command?  Where does the Broadcasting Board of Governors fit in?  Lastly, modern execution of successful information warfare relies on a whole of government approach or the ability to advance strategy in an interdisciplinary fashion, which is difficult given the complexity of the bureaucracy.

The second risk is how does an agency engage in information warfare in regards to the first amendment?  Consider for a moment that if war or conflict that sees information as the weapon, the target, and the medium, what role can the government legally play?  Can a government wage information warfare without, say, engaging in outright censorship or control of information mediums like Facebook and Twitter?  The legal framework surrounding these issues are ill-defined at present [19][20].

Gain:  Having a fully funded cabinet level organization devoted to information warfare complete with the ability to network across government agencies, other governments and the private sector able to both wage and defend the United States against information warfare.

Option #2:  Smaller and specific interagency working groups similar to the Active Measures Working Group of the late eighties.  The original Active Measures Working Group was an interagency collaboration devoted to countering Soviet disinformation, which consequently became the “U.S Government’s body of expertise on disinformation [21].”

The proposed working group would focus on a singular issue and in contrast to Option #1, a working group would have a tightly focused mission, limited staff, and only focus on a singular problem.

Risk:  Political will is in competition with success, meaning if the proposed working group does not show immediate success, more than likely it will be disbanded.  The group has the potential of being disbanded once the issue appears “solved.”

Gain:  A small and focused group has the potential to punch far above its weight.  As Schoen and Lamb point out “the group exposed Soviet disinformation at little cost to the United States but negated much of the effort mounted by the large Soviet bureaucracy that produced the multibillion dollar Soviet disinformation effort[22].”

Option #3:  The United States Government creates a dox and dump Wikileaks/Shadow Brokers style group[23][24].  If all else fails then engaging in attacks against adversary’s secrets and making them public could be an option.  Unlike the previous two options, this option does not necessarily represent a truthful approach, rather just truthiness[25].  In practice this means leaking/dumping data that reinforces and emphasizes a deleterious narrative concerning an adversary.  Thus, making their secrets very public, and putting the adversary in a compromising position.

Risk:  Burning data publicly might compromise sources and methods which would ultimately impede/stop investigations and prosecutions.  For instance, if an adversary has a deep and wide corruption problem is it more effective to dox and dump accounts and shell companies or engage in a multi-year investigatory process?  Dox and dump would have an immediate effect but an investigation and prosecution would likely have a longer effect.

Gain:  An organization and/or network is only as stable as its secrets are secure, and being able to challenge that security effectively is a gain.

Recommendation:  None


Endnotes:

[1]  Virag, Saso. (2017, April 23). Information and Information Warfare Primer. Retrieved from:  http://playgod.org/information-warfare-primer/

[2]  Waltzman, Rand. (2017, April 27). The Weaponization of Information: The Need of Cognitive Security. Testimony presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity on April 27, 2017.

[3]  Pomerantsev, Peter and Michael Weiss. (2014). The Menace of Unreality: How the Kremlin Weaponizes Information, Culture, and Money.

[4]  Matthews, Miriam and Paul, Christopher (2016). The Russian “Firehose of Falsehood” Propaganda Model: Why It Might Work and Options to Counter It

[5]  Giles, Keir. (2016, November). Handbook of Russian Information Warfare. Fellowship Monograph Research Division NATO Defense College.

[6]  Giles, Keir and Hagestad II, William. (2013). Divided by a Common Language: Cyber Definitions in Chinese, Russian, and English. 2013 5th International Conference on Cyber Conflict

[7]  Strategy Bridge. (2017, May 8). An Extended Discussion on an Important Question: What is Information Operations? Retrieved: https://thestrategybridge.org/the-bridge/2017/5/8/an-extended-discussion-on-an-important-question-what-is-information-operations

[8] There is an interesting conceptual and academic debate to be had between what is information warfare and what is an information operation. In reality, there is no difference given that the United States’ adversaries see no practical difference between the two.

[9] State Department. (1998). USIA Overview. Retrieved from: http://dosfan.lib.uic.edu/usia/usiahome/oldoview.htm

[10]  Nuland, William, Stamos, Alex, and Weedon, Jen. (2017, April 27). Information Operations on Facebook.

[11]  Koerner, Brendan. (2016, March). Why ISIS is Winning the Social Media War. Wired

[12]  Atlantic Council. (2017). Digital Forensic Research Lab Retrieved:  https://medium.com/dfrlab

[13]  Bellingcat. (2017).  Bellingcat: The Home of Online Investigations. Retrieved: https://www.bellingcat.com/

[14]  Bergen, Mark. (2016). Google Brings Fake News Fact-Checking to Search Results. Bloomberg News. Retrieved: https://www.bloomberg.com/news/articles/2017-04-07/google-brings-fake-news-fact-checking-to-search-results

[15]  NATO Strategic Communications Centre of Excellence. (2017). Retrieved: http://stratcomcoe.org/

[16]  National Public Radio. (2017, May 10). NATO Takes Aim at Disinformation Campaigns. Retrieved: http://www.npr.org/2017/05/10/527720078/nato-takes-aim-at-disinformation-campaigns

[17]  European Union External Action. (2017). Questions and Answers about the East Stratcom Task Force. Retrieved: https://eeas.europa.eu/headquarters/headquarters-homepage/2116/-questions-and-answers-about-the-east-

[18]  Armstrong, Matthew. (2015, November 12). No, We Do Not Need to Revive The U.S. Information Agency. War on the Rocks. Retrieved:  https://warontherocks.com/2015/11/no-we-do-not-need-to-revive-the-u-s-information-agency/ 

[19]  For example the Countering Foreign Propaganda and Disinformation Act included in the National Defense Authorization Act for fiscal year 2017 acts more with the issues of funding, organization, and some strategy rather than legal infrastructure issues.  Retrieved: https://www.congress.gov/114/crpt/hrpt840/CRPT-114hrpt840.pdf

[20]  The U.S Information and Educational Exchange Act of 1948 also known as the Smith-Mundt Act. The act effectively creates the basis for public diplomacy and the dissemination of government view point data abroad. The law also limits what the United States can disseminate at home. Retrieved: http://legisworks.org/congress/80/publaw-402.pdf

[21]  Lamb, Christopher and Schoen, Fletcher (2012, June). Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference. Retrieved: http://ndupress.ndu.edu/Portals/68/Documents/stratperspective/inss/Strategic-Perspectives-11.pdf

[22]  Lamb and Schoen, page 3

[23]  RT. (2016, October 3). Wikileaks turns 10: Biggest Secrets Exposed by Whistleblowing Project. Retrieved: https://www.rt.com/news/361483-wikileaks-anniversary-dnc-assange/

[24]  The Gruqg. (2016, August 18). Shadow Broker Breakdown. Retrieved: https://medium.com/@thegrugq/shadow-broker-breakdown-b05099eb2f4a

[25]  Truthiness is defined as “the quality of seeming to be true according to one’s intuition, opinion, or perception, without regard to logic, factual evidence, or the like.” Dictionary.com. Truthiness. Retrieved:  http://www.dictionary.com/browse/truthiness.

Truthiness in this space is not just about leaking data but also how that data is presented and organized. The goal is to take data and shape it so it feels and looks true enough to emphasize the desired narrative.

Capacity / Capability Enhancement Cyberspace Option Papers Psychological Factors Sina Kashefipour United States

Evolution of U.S. Cyber Operations and Information Warfare

Brett Wessley is an officer in the U.S. Navy, currently assigned to U.S. Pacific Command.   The contents of this paper reflect his own personal views and are not necessarily endorsed by U.S. Pacific Command, Department of the Navy or Department of Defense.  Connect with him on Twitter @Brett_Wessley.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  Evolving role of cyber operations and information warfare in military operational planning.

Date Originally Written:  April 19, 2017.

Date Originally Published:  May 25, 2017.

Author and / or Article Point of View:  This article is intended to present options to senior level Department of Defense planners involved with Unified Command Plan 2017.

Background:  Information Warfare (IW) has increasingly gained prominence throughout defense circles, with both allied and adversarial militaries reforming and reorganizing IW doctrine across their force structures.  Although not doctrinally defined by the U.S. Department of Defense (DoD), IW has been embraced with varying degrees by the individual branches of the U.S. armed forces[1].  For the purposes of this paper, the definition of IW is: the means of creating non-kinetic effects in the battlespace that disrupt, degrade, corrupt, or influence the ability of adversaries or potential adversaries to conduct military operations while protecting our own.

Significance:  IW has been embraced by U.S. near-peer adversaries as a means of asymmetrically attacking U.S. military superiority.  Russian Defense Minister Sergei Shoigu recently acknowledged the existence of “information warfare troops,” who conduct military exercises and real-world operations in Ukraine demonstrating the fusion of intelligence, offensive cyber operations, and information operations (IO)[2].   The People’s Republic of China has also reorganized its armed forces to operationalize IW, with the newly created People’s Liberation Army Strategic Support Force drawing from existing units to combine intelligence, cyber electronic warfare (EW), IO and space forces into a single command[3].

Modern militaries increasingly depend on sophisticated systems for command and control (C2), communications and intelligence.  Information-related vulnerabilities have the potential for creating non-kinetic operational effects, often as effective as kinetic fires options.  According to U.S. Army Major General Stephen Fogarty, “Russian activities in Ukraine…really are a case study for the potential for CEMA, cyber-electromagnetic activities…It’s not just cyber, it’s not just electronic warfare, it’s not just intelligence, but it’s really effective integration of all these capabilities with kinetic measures to actually create the effect that their commanders [want] to achieve[4].”  Without matching the efforts of adversaries to operationalize IW, U.S. military operations risk vulnerability to enemy IW operations.

Option #1:  United States Cyber Command (USCYBERCOM) will oversee Military Department efforts to man, train, and equip IW and IW-related forces to be used to execute military operations under Combatant Command (CCMD) authority.  Additionally, USCYBERCOM will synchronize IW planning and coordinate IW operations across the CCMDs, as well as execute some IW operations under its own authority.

Risk:  USCYBERCOM, under United States Strategic Command (USSTRATCOM) as a sub-unified command, and being still relatively new, has limited experience coordinating intelligence, EW, space and IO capabilities within coherent IW operations.  USSTRATCOM is tasked with responsibility for DoD-wide space operations, and the Geographic Combatant Commands (GCCs) are tasked with intelligence, EW, and IO operational responsibility[5][6][7].”  Until USCYBERCOM gains experience supporting GCCs with full-spectrum IW operations, previously GCC-controlled IO and EW operations will operate at elevated risk relative to similar support provided by USSTRATCOM.

Gain:  USCYBERCOM overseeing Military Department efforts to man, train, and equip IW and IW-related forces will ensure that all elements of successful non-kinetic military effects are ready to be imposed on the battlefield.  Operational control of IW forces will remain with the GCC, but USCYBERCOM will organize, develop, and plan support during crisis and war.  Much like United States Special Operations Command’s (USSOCOM) creation as a unified command consolidated core special operations activities, and tasked USSOCOM to organize, train, and equip special operations forces, fully optimized USCYBERCOM would do the same for IW-related forces.

This option is a similar construct to the Theater Special Operations Commands (TSOCs) which ensure GCCs are fully supported during execution of operational plans.  Similar to TSOCs, Theater Cyber Commands could be established to integrate with GCCs and support both contingency planning and operations, replacing the current Joint Cyber Centers (JCCs) that coordinate current cyber forces controlled by USCYBERCOM and its service components[8].

Streamlined C2 and co-location of IW and IW-related forces would have a force multiplying effect when executing non-kinetic effects during peacetime, crisis and conflict.  Instead of cyber, intelligence, EW, IO, and space forces separately planning and coordinating their stove-piped capabilities, they would plan and operate as an integrated unit.

Option #2:  Task GCCs with operational responsibility over aligned cyber forces, and integrate them with current IW-related planning and operations.

Risk:  GCCs lack the institutional cyber-related knowledge and expertise that USCYBERCOM maintains, largely gained by Commander, USCYBERCOM traditionally being dual-hatted as Director of the National Security Agency (NSA).  While it is plausible that in the future USCYBERCOM could develop equivalent cyber-related tools and expertise of NSA, it is much less likely that GCC responsibility for cyber forces could sustain this relationship with NSA and other Non-Defense Federal Departments and Agencies (NDFDA) that conduct cyber operations.

Gain:  GCCs are responsible for theater operational and contingency planning, and would be best suited for tailoring IW-related effects to military plans.  During all phases of military operations, the GCC would C2 IW operations, leveraging the full spectrum of IW to both prepare the operational environment and execute operations in conflict.  While the GCCs would be supported by USSTRATCOM/USCYBERCOM, in addition to the NDFDAs, formally assigning Cyber Mission Teams (CMTs) as the Joint Force Cyber Component (JFCC) to the GCC would enable the Commander influence the to manning, training, and equipping of forces relevant to the threats posed by their unique theater.

GCCs are already responsible for theater intelligence collection and IO, and removing administrative barriers to integrating cyber-related effects would improve the IW capabilities in theater.  Although CMTs currently support GCCs and their theater campaign and operational plans, targeting effects are coordinated instead of tasked[9].  Integration of the CMTs as a fully operational JFCC would more efficiently synchronize non-kinetic effects throughout the targeting cycle.

Other Comments:  The current disjointed nature of DoD IW planning and operations prevents the full impact of non-kinetic effects to be realized.  While cyber, intelligence, EW, IO, and space operations are carried out by well-trained and equipped forces, these planning efforts remain stove-piped within their respective forces.  Until these operations are fully integrated, IW will remain a strength for adversaries who have organized their forces to exploit this military asymmetry.

Recommendation:  None.


Endnotes:

[1]  Richard Mosier, “NAVY INFORMATION WARFARE — WHAT IS IT?,” Center for International Maritime Security, September 13, 2016. http://cimsec.org/navy-information-warfare/27542

[2]  Vladimir Isachenkov, “Russia military acknowledges new branch: info warfare troops,” The Associated Press, February 22, 2017. http://bigstory.ap.org/article/8b7532462dd0495d9f756c9ae7d2ff3c/russian-military-continues-massive-upgrade

[3]  John Costello, “The Strategic Support Force: China’s Information Warfare Service,” The Jamestown Foundation, February 8, 2016. https://jamestown.org/program/the-strategic-support-force-chinas-information-warfare-service/#.V6AOI5MrKRv

[4]  Keir Giles, “The Next Phase of Russian Information Warfare,” The NATO STRATCOM Center of Excellence, accessed April 20, 2017. http://www.stratcomcoe.org/next-phase-russian-information-warfare-keir-giles

[5]  U.S. Joint Chiefs of Staff, “Joint Publication 2-0: Joint Intelligence”, October 22, 2013, Chapter III: Intelligence Organizations and Responsibilities, III-7-10.

[6]  U.S. Joint Chiefs of Staff, “Joint Publication 3-13: Information Operations”, November 20, 2014, Chapter III: Authorities, Responsibilities, and Legal Considerations, III-2; Chapter IV: Integrating Information-Related Capabilities into the Joint Operations Planning Process, IV-1-5.

[7]  U.S. Joint Chiefs of Staff, “Joint Publication 3-12 (R): Cyberspace Operations”, February 5, 2013, Chapter III: Authorities, Roles, and Responsibilities, III-4-7.

[8]  Ibid.

[9]  U.S. Cyber Command News Release, “All Cyber Mission Force Teams Achieve Initial Operating Capability,” U.S. Department of Defense, October 24, 2016.  https://www.defense.gov/News/Article/Article/984663/all-cyber-mission-force-teams-achieve-initial-operating-capability/

Brett Wessley Cyberspace Information and Intelligence Option Papers Planning Psychological Factors United States

Cyber Vulnerabilities in U.S. Law Enforcement & Public Safety Communication Networks

The Viking Cop has served in a law enforcement capacity with multiple organizations within the U.S. Executive Branch.  He can be found on Twitter @TheVikingCop.  The views reflected are his own and do not represent the opinion of any government entities.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Cyber vulnerabilities in regional-level Law Enforcement and Public Safety (LE/PS) communication networks which could be exploited by violent extremists in support of a physical attack.

Date Originally Written:  April 15, 2017.

Date Originally Published:  May 22, 2017.

Author and / or Article Point of View:  Author is a graduate of both University and Federal LE/PS training.  Author has two years of sworn and unsworn law enforcement experience.  Author had been a licensed amateur radio operator and builder for eleven years.

Background:  Currently LE/PS agencies in the U.S. operate on communication networks designed on the Association of Public-Safety Communications Officials, Project 25 (P25) standard established in 1995[1].  European and East Asian Countries operate on a similar network standard known as the Terrestrial Trunked Radio.

The push on a federal level for widespread implementation of the P25 standard across all U.S. emergency services was prompted by failures of communication during critical incidents such as the September 11th attacks, Columbine Massacre, and the Oklahoma City bombing[2].  Prior to the P25 implementation, different LE/PS organizations had been operating on different bands, frequencies, and equipment that prevented them from directly communicating to each other.

During P25 implementation many agencies, in an effort to offset cost and take advantage of the interoperability concept, established Regional Communication Centers (RCC) such as the Consolidated Communication Bureau in Maine, the Grand Junction Regional Communications Center in Colorado, and South Sound 911 in Washington.  These RCCs have consolidated dispatching for all LE/PS activities thus providing the ability of smaller jurisdictions to better work together handling daily calls for service.

Significance:  During a critical incident the rapid, clear, and secure flow of communications between responding personnel is essential.  The ability of responding LE/PS organizations is greatly enhanced by the P25 standard where unified networks can be quickly established due to operating on the same band and the flow of information can avoid bottle necks.

Issues begin to arise as violent extremist groups, such as the Islamic State of Iraq and Syria (ISIS), have been attempting to recruit more technically minded members that will be able to increase the group’s ability to plan and conduct cyber operations as a direct attack or in support of a physical attack[3].  Electronic security researchers have also found various security flaws in the P25 standard’s method of framing transmission data that prove it is vulnerable to practical attacks such as high-energy denial of service attacks and low-energy selective jamming attacks[4][5].

This article focuses on a style of attack known as Selective Jamming, in which an attacker would be able to use one or more low-power, inexpensive, and portable transceivers to specifically target encrypted communications in a manner that would not affect transmissions that are made in the clear (unencrypted).  Such an attack would be difficult to detect because of other flaws in the P25 standard and the attacks would last no more than a few hundredths of a second each [4].

If a series of Selective Jamming transceivers were activated shortly before a physical attack responding units, especially tactical units, would have minutes to make a decision on how to run communications.

Option #1:  Push all radio traffic into the clear to overcome a possible selective jamming attack.  This option would require all responding units to disable the encryption function on their radios or switch over to an unencrypted channel to continue to effectively communicate during the response phase.

Risk:  The purpose of encrypted communications in LE/PS is to prevent a perpetrator from listening to the tactical decisions and deployment of responders.  If a perpetrator has developed and implemented the capability to selectively jam communications they will likely have the ability and equipment to monitor radio traffic once it is in the clear.  This option would give the perpetrator of an attack a major advantage on knowing the response to the attack.  The hesitancy to operate in the clear by undercover teams was noted as a major safety risk in the after action report of the 2015 San Bernardino Shooting[6].

Gain:  LE/PS agencies responding to an incident would be able to continue to use their regular equipment and protocols without having to deploy an alternative system.  This would give responders the most speed in attempting to stop the attack with the known loss of operational security.  There would also be zero equipment costs above normal operation as P25 series radios are all capable of operating in the clear.

Option #2:  Develop and stage a secondary communications system for responding agencies or tactical teams to implement once a selective jamming attack is suspected to be occurring.

Risk:  Major cost and planning would have to be implemented to have a secondary system that is jamming-resistant that could be deployed rapidly by responding agencies.  This cost factor could prompt agencies to only equip tactical teams with a separate system such as push-to-talk cellphones or radio systems with different communications standards than P25.  Any LE/PS unit that does not have access to the secondary system will experience a near-communications blackout outside communications made in the clear.

Gain:  Responding units or tactical teams, once a possible selective jamming attack was recognized, would be able to maintain operational security by switching to a secure method of communications.  This would disrupt the advantage that the perpetrator was attempting to gain by disrupting and/or monitoring radio traffic.

Other Comments:  Both options would require significant additional training for LE/PS personnel to recognize the signs of a Selective Jamming attack and respond as appropriate.

Recommendation:  None.


Endnotes:

[1]  Horden, N. (2015). P25 History. Retrieved from Project 25 Technology Interest Group: http://www.project25.org/index.php/technology/p25-history

[2]  National Task Force on Interoperability. (2005). Why Can’t We Talk. Washington D.C.: National Institute of Justice.

[3]  Nussbaum, B. (2015). Thinking About ISIS And Its Cyber Capabilities: Somewhere Between Blue Skies and Falling One. Retrieved from The Center for Internet and Society: http://cyberlaw.stanford.edu/blog/2015/11/thinking-about-isis-and-its-cyber-capabilities-somewhere-between-blue-skies-and-falling

[4]  Clark, S., Metzger, P., Wasserman, Z., Xu, K., & Blaze, M. (2010). Security Weaknesses in the APCO Project 25 Two-Way Radio System. University of Pennsylvania Department of Computer & Information Science.

[5]  Glass, S., Muthukkumarasamy, V., Portmann, M., & Robert, M. (2011). Insecurity in Public-Safety Communications:. Brisbane: NICTA.

[6]  Braziel, R., Straub, F., Watson, G., & Hoops, R. (2016). Bringing Calm to Chaos: A Critical Incident Review of the San Bernardino Public Safety Response to the December 2, 2015, Terrorist Shooting Incident at the Inland Regional Center. Washington: Office of Community Oriented Policing Services.

Communications Cyberspace Law Enforcement & Public Safety Option Papers The Viking Cop United States

U.S. Diplomacy Options for Security & Adaptability in Cyberspace

Matthew Reitman is a science and technology journalist.  He has a background in security policy and studied International Relations at Boston University.  He can be found on Twitter @MatthewReitman.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  U.S. competitors conducting national security activities in cyberspace below the threshold of war aka in the “Gray Zone.”

Date Originally Written:  April 14, 2017.

Date Originally Published:  May 18, 2017.

Author and / or Article Point of View:  This article is written from the point of view of the U.S. State Department towards cyberspace.

Background:  State actors and their non-state proxies operate aggressively in cyberspace, but within a gray zone that violates international norms without justifying a “kinetic” response.  Russian influence operations in the 2016 U.S. election were not an act of war, but escalated tensions dramatically[1].  North Korea used the Lazarus Group to circumvent sanctions by stealing $81 million from Bangladesh’s central bank[2].  Since a U.S.-People’s Republic of China (PRC) agreement in 2015 to curb corporate espionage, there have been 13 intrusions by groups based in the PRC against the U.S. private sector[3].  The State Department has helped to curb Islamic State of Iraq and Syria propaganda online via the Global Engagement Center[4].  The recent creation of another interagency entity, the Russia Information Group, suggests similar efforts could be effective elsewhere[5].

The State Department continues to work towards establishing behavior norms in cyberspace via multilateral channels, like the United Nations Group of Governmental Experts, and bilateral channels, but this remains a slow and tedious process.  Until those norms are codified, gray zone activities in cyberspace will continue.  The risk of attacks on Information Technology (IT) or critical infrastructure and less destructive acts will only grow as the rest of the world comes online, increasing the attack surface.

Significance:  The ever-growing digitally connected ecosystem presents a chimera-like set of risks and rewards for U.S. policymakers.  Protecting the free exchange of information online, let alone keeping the U.S. and its allies safe, is difficult when facing gray zone threats.  Responding with conventional tools like economic sanctions can be evaded more easily online, while “hacking back” can escalate tensions in cyberspace and further runs the risk of creating a conflict that spills offline.  Despite the challenge, diplomacy can reduce threats and deescalate tensions for the U.S. and its allies by balancing security and adaptability.  This article provides policy options for responding to and defending against a range of gray zone threats in cyberspace.

Option #1:  Establish effective compellence methods tailored to each adversary.  Option #1 seeks to combine and tailor traditional coercive diplomacy methods like indictments, sanctions, and “naming and shaming,” in tandem with aggressive counter-messaging to combat information warfare, which can be anything from debunking fake news to producing misinformation that undermines the adversary’s narrative.  A bifocal approach has shown to be more effective form of coercion[6] than one or the other.

Risk:  Depending on the severity, the combined and tailored compellence methods could turn public opinion against the U.S.  Extreme sanctions that punish civilian populations could be viewed unfavorably.  If sanctions are evaded online, escalation could increase as more aggressive responses are considered.  “Naming and shaming” could backfire if an attack is falsely attributed.  Fake bread crumbs can be left behind in code to obfuscate the true offender and make it look as though another nation is responsible.  Depending on the severity of counter-propaganda, its content could damage U.S. credibility, especially if conducted covertly.  Additionally, U.S. actions under Option #1 could undermine efforts to establish behavior norms in cyberspace.

Gain:  Combined and tailored compellence methods can isolate an adversary financially and politically while eroding domestic support.  “Naming and shaming” sends a clear message to the adversary and the world that their actions will not be tolerated, justifying any retaliation.  Sanctions can weaken an economy and cut off outside funding for political support.  Leaking unfavorable information and counter-propaganda undermines an adversary’s credibility and also erodes domestic support.  Option #1’s severity can range depending on the scenario, from amplifying the spread of accurate news and leaked documents with social botnets to deliberately spreading misinformation.  By escalating these options, the risks increase.

Option #2:  Support U.S. Allies’ cybersecurity due diligence and capacity building.  Option #2 pursues confidence-building measures in cyberspace as a means of deterrence offline, so nations with U.S. collective defense agreements have priority.  This involves fortifying allies’ IT networks and industrial control systems for critical infrastructure by taking measures to reduce vulnerabilities and improve cybersecurity incident response teams (CSIRTs).  This option is paired with foreign aid for programs that teach media literacy, “cyber hygiene,” and computer science to civilians.

Risk:  Improving allies’ defensive posture can be viewed by some nations as threatening and could escalate tensions.  Helping allies fortify their defensive capabilities could lead to some sense of assumed responsibility if those measures failed, potentially fracturing the relationship or causing the U.S. to come to their defense.  Artificial Intelligence (AI)-enhanced defense systems aren’t a silver bullet and can contribute to a false sense of security.  Any effort to defend against information warfare runs the potential of going too far by infringing freedom of speech.  Aside from diminishing public trust in the U.S., Option #2 could undermine efforts to establish behavior norms in cyberspace.

Gain:  Collectively, this strategy can strengthen U.S. Allies by contributing to their independence while bolstering their defense against a range of attacks.  Option #2 can reduce risks to U.S. networks by decreasing threats to foreign networks.  Penetration testing and threat sharing can highlight vulnerabilities in IT networks and critical infrastructure, while educating CSIRTs.  Advances in AI-enhanced cybersecurity systems can decrease response time and reduce network intrusions.  Funding computer science education trains the next generation of CSIRTs.  Cyber hygiene, or best cybersecurity practices, can make civilians less susceptible to cyber intrusions, while media literacy can counter the effects of information warfare.

Other Comments:  The U.S. Cyber Command and intelligence agencies, such as the National Security Agency and Central Intelligence Agency, are largely responsible for U.S. government operations in cyberspace.  The U.S. State Department’s range of options may be limited, but partnering with the military and intelligence communities, as well as the private sector is crucial.

Recommendation:  None.


Endnotes:

[1]  Nakashima, E. (2017, February 7) Russia’s apparent meddling in U.S. election is not an act of war, cyber expert says. Washington Post. Retrieved from: https://www.washingtonpost.com/news/checkpoint/wp/2017/02/07/russias-apparent-meddling-in-u-s-election-is-not-an-act-of-war-cyber-expert-says

[2]  Finkle, J. (2017, March 15) “North Korean hacking group behind recent attacks on banks: Symantec.” Reuters. Retrieved from: http://www.reuters.com/article/us-cyber-northkorea-symantec

[3]  FireEye. (2016, June 20). Red Line Drawn: China Recalculates Its Use Of Cyber Espionage. Retrieved from: https://www.fireeye.com/blog/threat-research/2016/06/red-line-drawn-china-espionage.html

[4]  Warrick, J. (2017, February 3). “How a U.S. team uses Facebook, guerrilla marketing to peel off potential ISIS recruits.” Washington Post. Retrieved from: https://www.washingtonpost.com/world/national-security/bait-and-flip-us-team-uses-facebook-guerrilla-marketing-to-peel-off-potential-isis-recruits/2017/02/03/431e19ba-e4e4-11e6-a547-5fb9411d332c_story.html

[5]  Mak, T. (2017, February 6). “U.S. Preps for Infowar on Russia”. The Daily Beast. Retrieved from: http://www.thedailybeast.com/articles/2017/02/06/u-s-preps-for-infowar-on-russia.html

[6]  Valeriano, B., & Jensen, B. (2017, March 16). “From Arms and Influence to Data and Manipulation: What Can Thomas Schelling Tell Us About Cyber Coercion?”. Lawfare. Retrieved from: https://www.lawfareblog.com/arms-and-influence-data-and-manipulation-what-can-thomas-schelling-tell-us-about-cyber-coercion

Below Established Threshold Activities (BETA) Cyberspace Diplomacy Matthew Reitman Option Papers United States

Options for Private Sector Hacking Back

Scot A. Terban is a security professional with over 13 years experience specializing in areas such as Ethical Hacking/Pen Testing, Social Engineering Information, Security Auditing, ISO27001, Threat Intelligence Analysis, Steganography Application and Detection.  He tweets at @krypt3ia and his website is https://krypt3ia.wordpress.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  A future where Hacking Back / Offensive Cyber Operations in the Private Sphere are allowed by the U.S. Government.

Date Originally Written:  April 3, 2017.

Date Originally Published:  May 15, 2017.

Author and / or Article Point of View:  This article is written from the point of view of a future where Hacking Back / Offensive Cyber Operations as a means for corporations to react offensively as a defensive act has been legally sanctioned by the U.S. Government and the U.S. Department of Justice.  While this government sanctioning may seem encouraging to some, it could lead to national and international complications.

Background:  It is the year X and hacking back by companies in the U.S. has been given official sanction.  As such, any company that has been hacked may offensively react to the hacking by hacking the adversaries infrastructure to steal back data and / or deny and degrade the adversaries from attacking further.

Significance:  At present, Hacking Back / Offensive Cyber Operations are not sanctioned activities that the U.S. Government allows U.S. corporations to conduct.  If this were to come to pass, then U.S. corporations would have the capabilities to stand up offensive cyber operations divisions in their corporate structure or perhaps hire companies to carry out such actions for them i.e. Information Warfare Mercenaries.  These forces and actions taken by corporations, if allowed, could cause larger tensions within the geopolitical landscape and force other nation states to react.

Option #1:  The U.S. Government sanctions the act of hacking back against adversaries as fair game.  U.S. corporations stand up hacking teams to work with Blue Teams (Employees in companies who attempt to thwart incidents and respond to them) to react to incidents and to attempt to hack the adversaries back to recover information, determine who the adversaries are, and to prevent their infrastructure from being operational.

Risk:  Hacking teams at U.S. corporations, while hacking back, make mistakes and attack innocent companies/entities/foreign countries whose infrastructure may have been unwittingly used as part of the original attack.

Gain:  The hacking teams of these U.S. corporations manage to hack back, steal information, and determine if it had been copied and further exfiltrated.  This also allows the U.S. corporations to try to determine who the actor is and gather evidence as well as degrade the actor’s ability to attack others.

Option #2:  The U.S. Government allows for the formation of teams/companies of information warfare specialists that are non-governmental bodies to hack back as an offering.  This offensive activity would be sanctioned and monitored by the government but work for companies under a letter of marque approach with payment and / or bounties on actors stopped or for evidence brought to the judicial and used to prosecute actors.

Risk:  Letters of marque could be misused and attackers could go outside their mandates.  The same types of mistakes could also be made as those of the corporations that formed offensive teams internally.  Offensive actions could affect geopolitics as well as get in the way of other governmental operations that may be taking place.  Infrastructures could be hacked and abused of innocent actors who were just a pivot point and other not yet defined mistakes could be made.

Gain:  Such actors and operations could deter some adversaries and in fact could retrieve data that has been stolen and perhaps prevent that data from being further exploited.

Other Comments:  Clearly the idea of hacking back has been in the news these last few years and the notion has been something many security professionals have said was a terrible idea.  There are certain advantages to the idea that firms can protect themselves from hacking by hacking back, but generally the sense of things today is that many companies cannot even protect their data properly to start with so the idea of hacking back is a red herring to larger security concerns.

Recommendation:  None.


Endnotes:

None.

Cyberspace Offensive Operations Option Papers Private Sector Scot A. Terban United States

Options to Deter Cyber-Intrusions into Non-Government Computers

Elizabeth M. Bartels is a doctoral candidate at the Pardee RAND Graduate School and an assistant policy analyst at the nonprofit, nonpartisan RAND Corporation.  She has an M.S. in political science from the Massachusetts Institute of Technology and a B.A. in political science with a minor in Near Eastern languages and civilization from the University of Chicago.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Unless deterred, cyber-intrusions into non-government computer systems will continue to lead to the release of government-related information.

Date Originally Written:  March 15, 2017.

Date Originally Published:  May 11, 2017.

Author and / or Article Point of View:  Author is a PhD candidate in policy analysis, whose work focuses on wargaming and defense decision-making.

Background:  Over the years, a great deal of attention has been paid to gaining security in cyberspace to prevent unauthorized access to critical infrastructure like those that control electrical grids and financial systems, and military networks.  In recent years a new category of threat has emerged: the cyber-theft and subsequent public release of large troves of private communications, personal documents and other data.

This category of incident includes the release of government data by inside actors such as Chelsea Manning and Edward Snowden.  However, hacks of the Democratic National Committee and John Podesta, a Democratic party strategist, illustrate that the risk goes beyond the theft of government data to include information that has the potential to harm individuals or threaten the proper functioning of government.  Because the federal government depends on proxies such as contractors, non-profit organizations, and local governments to administer so many public functions, securing information that could harm the government – but is not on government-secured systems – may require a different approach.

Significance:  The growing dependence on government proxies, and the risk such dependence creates, is hardly new[1], and neither is concern over the cyber security implications of systems outside government’s immediate control[2].  However, recent attacks have called the sufficiency of current solutions into question.

Option #1:  Build Better Defenses.  The traditional approach to deterring cyber-exploitation has focused on securing networks, so that the likelihood of failure is high enough to dissuade adversaries from attempting to infiltrate systems.  These programs range from voluntary standards to improve network security[3], to contractual security standards, to counter-intelligence efforts that seek to identify potential insider threats.  These programs could be expanded to more aggressively set standards covering non-governmental systems containing information that could harm the government if released.

Risk:  Because the government does not own these systems, it must motivate proxy organizations to take actions they may not see as in their interest.  While negotiating contracts that align organizational goals with those of the government or providing incentives to organizations that improve their defenses may help, gaps are likely to remain given the limits of governmental authority over non-governmental networks and information[4].

Additionally, defensive efforts are often seen as a nuisance both inside and outside government.  For example, the military culture often prioritizes warfighting equipment over defensive or “office” functions like information technology[5], and counter-intelligence is often seen as a hindrance to intelligence gathering[6].  Other organizations are generally focused on efficiency of day-to-day functions over security[7].  These tendencies create a risk that security efforts will not be taken seriously by line operators, causing defenses to fail.

Gain:  Denying adversaries the opportunity to infiltrate U.S. systems can prevent unauthorized access to sensitive material and deter future attempted incursions.

Option #2:  Hit Back Harder.  Another traditional approach to deterrence is punishment—that is, credibly threatening to impose costs on the adversary if they commit a specific act.  The idea is that adversaries will be deterred if they believe attacks will extract a cost that outweighs any potential benefits.  Under the Obama administration, punishment for cyber attacks focused on the threat of economic sanctions[8] and, in the aftermath of attacks, promises of clandestine actions against adversaries[9].  This policy could be made stronger by a clear statement that the U.S. will take clandestine action not just when its own systems are compromised, but also when its interests are threatened by exploitation of other systems.  Recent work has advocated the use of cyber-tools which are acknowledged only to the victim as a means of punishment in this context[10], however the limited responsiveness of cyber weapons may make this an unattractive option.  Instead, diplomatic, economic, information, and military options in all domains should be considered when developing response options, as has been suggested in recent reports[11]. 

Risk:  Traditionally, there has been skepticism that cyber incursions can be effectively stopped through punishment, as in order to punish, the incursion must be attributed to an adversary.  Attributing cyber incidents is possible based on forensics, but the process often lacks speed and certainty of investigations into traditional attacks.  Adversaries may assume that decision makers will not be willing to retaliate long after the initiating incident and without “firm” proof as justification.  As a result, adversaries might still be willing to attack because they feel the threat of retaliation is not credible.  Response options will also need to deal with how uncertainty may shape U.S. decision maker tolerance for collateral damage and spillover effects beyond primary targets.

Gain:  Counter-attacks can be launched regardless of who owns the system, in contrast to defensive options, which are difficult to implement on systems not controlled by the government.

Option #3:  Status Quo. While rarely discussed, another option is to maintain the status quo and not expand existing programs that seek to protect government networks.

Risk:  By failing to evolve U.S. defenses against cyber-exploitation, adversaries could gain increased advantage as they develop new ways to overcome existing approaches.

Gain:  It is difficult to demonstrate that even the current level of spending on deterring cyber attacks has meaningful impact on adversary behavior.  Limiting the expansion of untested programs would free up resources that could be devoted to examining the effectiveness of current policies, which might generate new insights about what is, and is not, effective.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  John J. Dilulio Jr. [2014], Bring Back the Bureaucrats: Why More Federal Workers Will Lead to Better (and Smaller!) Government, Templeton Press.

[2]  President Barack Obama [2013], Executive Order—Improving Critical Infrastructure Cybersecurity, The White House Office of the Press Secretary.

[3]  National Institute of Standards and Technology (NIST) [2017], Framework for Improving Critical Infrastructure Cybersecurity, Draft Version 1.1.

[4]  Glenn S. Gerstell, NSA General Councel, Confronting the Cybersecurity Challenge, Keynote address at the 2017 Law, Ethics and National Security Conference at Duke Law School, February 25, 2017.

[5]  Allan Friedman and P.W. Singer, “Cult of the Cyber Offensive,” Foreign Policy, January 15, 2014.

[6]  James M. Olson, The Ten Commandments of Counterintelligence, 2007.

[7]  Don Norman, “When Security Gets in the Way,” Interactions, volume 16, issue 6: Norman, D. A. (2010).

[8]  President Barack Obama [2016], Executive Order—Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities.

[9]  Alex Johnson [2016], “US Will ‘Take Action’ on Russian Hacking, Obama Promises,” NBC News.

[10]  Evan Perkoski and Michael Poznansky [2016], “An Eye for an Eye: Deterring Russian Cyber Intrusions,” War on the Rocks.

[11]  Defense Science Board [2017], Task Force of Cyber Deterrence.

Cyberspace Deterrence Elizabeth M. Bartels Non-Government Entities Option Papers

Trump Administration Options Towards Iran

Ted Martin has a keen interest in Iranian affairs and has spent time in Iraq and Afghanistan.  Divergent Options content does not contain information of an official nature nor does the content represent the official position of  any government, any organization, or any group.


National Security Situation:  Iran, sanctions, and the Joint Comprehensive Plan of Action (JCPOA) / United Nations (UN) Resolution 2231(2015)[1].

Date Originally Written:  March 27, 2017.

Date Originally Published:  May 8, 2017.

Author and / or Article Point of View:  Author has spent time in Iraq and Afghanistan as a member of the U.S. Military.  He has also studied Iran and Hezbollah since 2000.  This article is written as advice to a U.S. decision maker.

Background:  Despite the negotiation of the JCPOA, Iran is still a U.S. foreign policy concern.  Iran occupies a strategic position, able to block the export of oil through the Persian Gulf at the narrow Strait of Hormuz, and able to strike the Arab countries that produce that oil.  Iran has long had aspirations of regional hegemony and employed destabilizing proxy forces to further its ends in the region.  Iran’s continued belligerent behavior and the recent U.S. election of President Donald Trump beg a re-assessment of U.S. options.

Significance:  The JCPOA was negotiated by the previous administration under President Barack Obama and has been subject to harsh criticism by the new administration under President Trump.  Iran has recently engaged in provocative behavior by conducting new ballistic missile tests[2].  Although these new ballistic missile tests do not violate the JCPOA, these actions suggest Iran may test the limits of the JCPOA and the Trump administration[2].  As a counter-point to any hard-line the Trump administration may take against Iran, many European companies are already renewing business and banking contacts with the regime[3].  There is little interest in canceling the JCPOA in Europe, and without European support, it would be nearly impossible to re-impose effective sanctions[8].

Option #1:  The U.S. treats Iran as a pariah and continues to work to isolate Iran from the international system.  This assumes that isolation, as a punishment that negatively impacts the Iranian people, will serve to pull Iran back into the fold of acceptable behavior.

Risk:  Iran developed ties with other states on the margins such as Russia and the People’s Republic of China that helped to sustain it during 30 years of sanctions[4][5].  Iran has become proficient at working behind the scenes and using proxies and can mitigate some of the impacts of sanctions and continue its attempts to influence its neighbors[6].  It is unlikely that Europe will willingly join in another round of sanctions if the U.S. decides to renew them[8].  The U.S.’s likely only remaining option would be military action with few international partners.

Gain:  With Option #1, the U.S. will continue to keep local allies in the region who despise Iran such as Saudi Arabia and other Arab states happy[7].  The enduring threat of sanctions and the forced isolation of Iran by the U.S. will maintain the balance of power in the region cultivated over the last twenty years and is an important consideration.  A shunned Iran may make U.S. allies in the region stronger.

Option #2:  The U.S. allows Iran to continue to integrate into the international system.  This assumes that the closer Iran comes to the rest of the world, the less likely it will be to lash out and the more vulnerable it will be to economic or diplomatic pressure.

Risk:  Iran gains legitimacy by being allowed to rejoin the economic and political systems of the world.  Iran would also gain the ability to access items needed for its nuclear program on the international market.  Iran has blustered about closing the Gulf to oil transit before.  However, Iran has never done so, even during its war with Iraq, as such a move would hurt its own oil exports[7].  Closing the Persian Gulf at the straits of Hormuz is still a risk, even if mitigated by Iran’s increased dependence on the world.  Saudi Arabia would oppose Option #2 in the strongest possible terms, and it may seriously damage U.S. formal relations with them[9].

Gain:  Iran in the international community would find itself the beneficiary of access to the international banking system to enable oil exports and other civil export and import rules that would benefit its civil and military population.  As a member of the international community, Iran may find it harder to justify proxies such as Hezbollah.  The U.S. has long hoped to influence Iran to become more moderate and this may further that goal.

Other Comments:  The proxy war between Iran and the allies of Saudi Arabia has involved the U.S and is currently raging in Syria, Lebanon, Iraq, and Yemen[6][9].  Both the U.S. and Iran are likely to continue to fight using proxies in other countries, and the potential to involve the U.S. in more regional conflicts is high.  Iran’s nuclear ambitions are a central part of this problem and finding a solution is important.  Iran may also consider keeping the region chaotic to distract the U.S. and Europe to benefit its purposes.

Recommendation:  None.


Endnotes:

[1]  United Nations. (2015) Retrieved from: http://www.un.org/en/sc/2231/

[2]  Kenyon, P. (2017 February 3). Did Iran’s ballistic missile test violate a U.N. resolution? National Public Radio. Retrieved from: http://www.npr.org/sections/parallels/2017/02/03/ 513229839/did-irans-ballistic-missile-test-violate-a-u-n-resolution

[3]  Arnold, M. (2016 April 3). Europe’s banks begin tentative return to Iran. Financial Times. Retrieved from: https://www.ft.com/content/75dc8d7e-f830-11e5-803c-d27c7117d132

[4]  Katz, M.N. (2010). Iran primer: Iran and Russia. Public Broadcasting System. Retrieved from: http://www.pbs.org/wgbh/pages/frontline/tehranbureau/2010/10/iran-primer-iran-and-russia.html

[5]  Takeyh, R., & Maloney, S. (2011). The self-limiting success of Iran sanctions. International affairs 87 (6) pp. 1297-1312. doi: 10.1111/j.1468-2346.2011.01037.x

[6]  Fisher, M. (2016, November 19). How the Iranian-Saudi proxy struggle tore apart the Middle East. The New York Times. Retrieved from: https://www.nytimes.com/2016/11/20/world/middleeast/iran-saudi-proxy-war.html

[7]  Glaser, C.L. & Kelanic, R.A. (2017 January/February). Getting out of the gulf. Foreign Affairs 96(1).

[8]  Alkhalisi, Z. (2016, November 10). Trump could hit Iran with sanctions — but Europe would scream. CNN Money. Retrieved from: http://money.cnn.com/2016/11/10/news/economy/trump-iran-sanctions/

[9]  Morris, L. & Naylor, H. (2015 July 14). Arab states fear nuclear deal with give Iran a bigger regional role. The Washington Post. Retrieved from: https://www.washingtonpost.com/world/middle_east/arab-states-fear-dangerous-iranian-nuclear-deal-will-shake-up-region/2015/07/14/96d68ff3-7fce-4bf5-9170-6bcc9dfe46aa_story.html

Arms Control Economic Factors Iran Option Papers Ted Martin Treaties and Agreements

Options for Bougainville Independence

Iain Strutt has been involved in military, police and private security in Australia for over twenty years.  He is currently completing a Bachelor of Science (Security) degree with a minor in international relations at Edith Cowan University, Perth, Western Australia.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organisation, or any group.  


Area_Map_Bougainville

National Security Situation:  Independence options for Bougainville Island, an autonomous region of Papua New Guinea (PNG).

Date Originally Written:  March 26, 2016.

Date Originally Published:  May 4, 2017.

Author and / or Article Point of View:  While Bougainville may be a small Pacific Island and seem minor geopolitically, the author believes the outcome of the independence vote in 2019 will have regional implications.

Background:  Bougainville Island will hold a referendum on independence from PNG on June 15th, 2019.  Independence from PNG has been deliberated and defeated before[1].  Historically, Bougainville was administered first by Germany, then Britain.  After World War 2, Australia administered the territory as part of the United Nations Trust Territory of New Guinea.  With PNG independence from Australia in 1975, Bougainville became part of the new nation[2].  Bougainville was originally known as the North Solomons’, being as they were, part of the Solomon Islands.

Secessionists caused an insurrection in Bougainville in 1988 and it continued until the late 1990s.  The conflict succeeded in closing the giant Panguna copper mine in 1989, situated in the southern highlands.  Panguna was vital to the economy of PNG and Bougainville, as it has copper in abundance.  The two most prominent causes for the guerrilla war on Bougainville can be traced back to the longstanding imbalance between ethnicity and financial reward.  Inadequate sharing of revenue with the traditional landowners of the copper mine has since been settled, with their involvement in future mining now a reality[3].

Following the ending of the guerrilla war, agreement was reached by the secessionists and the PNG government in 2001, seeing Bougainville declared an autonomous region, governed by the Autonomous Bougainville Government (ABG).  Both the ABG and PNG signed the Bougainville Peace Agreement, known as the Arawa Accord in 2001 which has three related processes: 

  1. Autonomy
  2. Referendum
  3. Weapons disposal plan[4]

Two of the three have been accomplished, although it is not known precisely how many weapons were cached or even in existence before or after the December 2001 disposal process, so questions remain over weapons numbers[5].  Of concern is that the independence votes’ outcome hinges upon its ratification by the PNG parliament as the “final decision-making authority[6].”  The state as a person in international law should possess the following qualifications: (a) a permanent population; (b) a defined territory; (c) government; and (d) capacity to enter relations with the other states[7].  Bougainville satisfies all criteria despite efforts to resist the breakup by PNG.

This region has previously been of strategic interest to the Peoples Republic of China (PRC) due to its resources[8].  Foreign powers attempt at influence is nothing new and it appears that the PRC is endeavoring to extend its influence past the so-called Second Island Chain.  The chain is a strategic line that stretches from Japan, to Guam, then to the “vicinity of New Guinea[9].”  Similarly, Australia has a profound strategic interest in South-East Asia, particularly PNG and the islands of the South Pacific[9].  Australia, New Zealand, United States Security Treaty (ANZUS) nations have fought wars and participated in peacekeeping missions in this area over the past 75 years and Bougainville lies within this region.

Financing the reopening of the Panguna mine is something that the PRC can afford, in keeping with its desire for infrastructure projects globally and commercial diplomacy[10].  To get the copper to market requires access from Panguna to Kieta port, with its adjacent airfield, on the east coast of Bougainville.  The strategic importance of Bougainville should therefore not be overlooked as the island is in a sound position to monitor the western Pacific.

Bougainville_Neighbourhood

Significance:  The recent visit to Australia by PRC Premier Li Keqinang has led to the increased warming of the bilateral relationship between the PRC and Australia.  Although Australia is still a firm ANZUS partner, U.S. foreign policy is now inward looking, prompting a refocus by the ANZUS partners.  Australian foreign policy can now act as a positive influence over the PRC in this region, with a “non-provocative, pragmatic diplomatic stance[11].”

Option #1:  Bougainville achieves independence in 2019 and ANZUS can assume defense duties in rotation on the island as there is no allowance for a defense force in the Bougainville constitution.

Risk:  Low.  This is the preferred outcome due to the minimal risk to regional stability.  It would give greater influence in the area to ANZUS nations.  The PNG military can benefit from cross training in keeping with Australia’s regional outlook.

Gain:  Positive.  Economic benefit for Bougainville.  The Panguna mine would reopen without PNG involvement with income provided to the local landowners.

Option #2:  The Bougainville referendum result is denied by the PNG government.  Bougainville declares sovereignty itself, following the examples of Bangladesh, Croatia, Georgia and Moldova (see Other Comments below).

Risk:  Moderate.  If PNG denies the result of the referendum to preserve its sovereignty over Bougainville, civil discontent is highly likely as Bougainville independence is preferred and has been over time.

Gain:  Negative.  An outcome regional partners would not want, due to the potential for violence and civil unrest.  Intervention requiring peacekeepers may occur, a situation the islanders have endured before.

Option #3:  Regardless of the result of the referendum, with closer relationships between Australia, the PRC and the ABG, a mining joint venture could commence at Panguna.  It is conceivable that this would involve the PRC as a partner in the joint venture with an Australian mining company.

Risk:  High.  Although PRC preference is for critical infrastructure projects globally, the risk would be high as there are elements within the ABG itself who have a definite preference not to deal with the PRC in any form.  Politically, this option would be impractical.

Gain:  Moderate.  Economically this would be of benefit to Bougainville for the life of the mine, which is expected to be twenty-five years.

Other Comments:  Bangladesh, Croatia, Georgia and Moldova, came to statehood in differing ways with one common denominator, at the time of their proclamation of independence there was no effective government in all four.  This differs from Bougainville, which has had effective governance for some time, elected officials, and its’ own administration separate from PNG.  Of the four nations mentioned above, Moldova is the most relative to Bougainville.  Moldova declared sovereignty on June 23, 1990, providing for the Moldovan constitution and laws to have primacy over those of the Soviet Union.  This was a proclamation of sovereignty and not independence but was a step towards it.

Recommendation:  None.


Endnotes:

[1]  Jennings P. & Claxton K. (2013) A stitch in time. Preserving peace on Bougainville. Australian Strategic Policy Institute Limited.  p.3.

[2]  Jennings P. & Claxton K. (2013) A stitch in time. Preserving peace on Bougainville. Australian Strategic Policy Institute Limited.  p.15.

[3]  Bougainville Mining Act 2015. Autonomous Region of Bougainville (no.3 of 2015).

[4]  United Nations [UN] (2001) Bougainville Peace Agreement. Introduction and OutlineS/2001/988 Enclosure II Bougainville Peace Agreement.  23rd October 2001. p.8

[5]  Woodbury J. (2015) The Bougainville independence referendum: Assessing the risks and challenges before, during and after the referendum. Australian Defence College. Centre for Defence and Strategic Studies. p.9.

[6]  Woodbury J. (2015) The Bougainville independence referendum: Assessing the risks and challenges before, during and after the referendum. Australian Defence College. Centre for Defence and Strategic Studies.  P.7

[7]  Raic D. (2002) Statehood and the Law of Self-Determination. Brill Academic Publishers. p.406.

[8]  Hegarty M. (2015) Chinas growing influence in the South-West Pacific: Australian policies that could respond to Chinese intentions and objectives. Australian Defence College, Centre for Defence and Strategic Studies. p. 8

[9]  Holmes J.R. (2011) Island Chain Defence. The Diplomat. Retrieved 27th March 2017. http://thediplomat.com/2011/04/island-chain-defense/

[10]  Frost E.L. (2007) Chinas Rise and the Balance of Influence in Asia. Edited by William W. Keller and Thomas G. Rawsky. Ch. 5. Chinas’ Commercial Diplomacy in Asia. University of Pittsburg  Press. p.95.

[11]  Carr. B. (2017) Canberra’s sensible South China Sea Stand is contingent on continual pragmatism in Beijing. The Weekend Australian. March 18-19, 2017, p.24. News Ltd. Sydney.

Australia Australia, New Zealand, United States Security Treaty (ANZUS) Bougainville China (People's Republic of China) Iain Strutt New Zealand Option Papers Papua New Guinea Referendums United States

Options for United States Intelligence Community Analytical Tools

Marvin Ebrahimi has served as an intelligence analyst.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Centralization of United States Intelligence Community (USIC) Analytical Tools.

Date Originally Written:  March 6, 2017.

Date Originally Published:  May 1, 2017.

Author and / or Article Point of View:  Author has served as an all-source analyst.  The author has personal experience with the countless tool suites, programs, and platforms used by intelligence analysts within the USIC to perform their analytical function, and the fact that there is no centralized collaborative environment from which such tools can be learned, evaluated, or selected for unit-specific mission sets tailored to the end-user.

Background:  Various USIC agencies and components have access to countless tool suites, some which are unique to that agency, and some available across the community.  These tools vary according to intelligence function, and are available across the multiple information systems used by intelligence components within the community[1].  While a baseline of tools are available to all, there is little centralization of these tools.  This lack of centralization requires analysts to learn and retain knowledge of how to manipulate the information systems and search engines at their disposal in order to find specific tools required for specific analytical functions.

Significance:  Digital collocation or compilation of analytical tool suites, programs, and platforms in a collaborative space would benefit all-source analysts who require access to a diverse set of tools required of their broadly focused function.  The knowledge and ability required to conduct tool-specific searches, i.e. manipulating a basic search engine in order to navigate to a landing page or agency-specific site where tool-specific information can hopefully be found, is time-consuming and detracts from analysts’ time available to conduct and employ analytical tradecraft.  This loss of time from an analyst’s daily schedule creates an opportunity cost that has yet to be realized.

Option #1:  Centralize analytical training, visibility, and accessibility to tool suites, programs, and platforms through creation of a USIC-wide collaborative analytical environment such as the Director of National Intelligence’s Intelligence Community IT Enterprise initiative[2].  Centralization of analytical training is used here to describe the necessity to train analysts on how to manipulate various databases, search engines, and environments effectively to find the specific tool suite or program required for their function.  Option #1 does not refer to centralizing all USIC member analytical training as outlined in the Intelligence Community Directive 203, “Analytical Standards.”

Risk:  Centralization of analytical training and accessibility leads to conflict primarily within respective USIC members’ unique identities and analytical functions.  The tools used by one agency may not work or be required by another.  Various agencies provide different functions, and centralizing access to tools requires further integration of all USIC agencies in the same or at least a compatible digital space.

Creation of a USIC-wide entity to collate, evaluate, and manage access to the multitude of tool suites, etc. creates yet another potentially bureaucratic element in an already robust community.  Such an entity would have to be controlled by the Office of the Director of National Intelligence unless delegated to a subordinate element.

Compartmentalization required to protect agencies’ sources and methods, analytical tradecraft included, may preclude community-wide collaborative efforts and information sharing necessary to create an effective space.

Gain:  Shared information is a shared reality.  Creation of a community-wide space to colocate analytical tool suites enables and facilitates collaboration, information exchange, and innovation across agencies.  These are positive factors in an information-driven age where rapid exchange of information is expected.

Effectiveness of end-user analysts increases with greater access to collective knowledge, skills, and abilities used by other professionals who perform similar specific analytical functions.

Community-wide efforts to improve efficiency in mission execution, development of analytical tradecraft, and the associated tools or programs can be captured and codified for mass implementation or dissemination thereby improving the overall capability of the USIC analytical workforce.

Option #2:  Improve analyst education and training that increases knowledge, skills, and abilities to better manipulate current and existing tool suites, programs, and platforms.

Risk:  USIC components continue to provide function-specific training to their own analysts while other agency partners do not benefit from agency-specific tools, due to inaccessibility or ignorance of tool), thereby decreasing the analytical effectiveness of the community as a whole.  Worded differently, community-wide access to the full range of analytical tools available does not reach all levels or entities.

Analysts rely on unstructured or personal means such as informal on-the-job training and personal networks in learning to manipulate current tools, while possibly remaining unaware or untrained on other analytical tools at their disposal elsewhere in the community.  Analysts rely on ingenuity and resolve to accomplish tasks but are not as efficient or effective.

Gain:  Analytical tradecraft unique to specific community members remains protected and inaccessible to analysts that do not possess required access, thereby preserving developed tradecraft.

Other Comments:  The author does not possess expert knowledge of collaborative spaces or the digital infrastructure required to create such an information environment; however, the author does have deployment experience as an end-user of several tool suites and programs utilized to perform specific analytical functions.  The majority of these were somewhat proliferated across a small portion of USIC components but were not widely accessible or available past basic search engine functions.

Recommendation:  None.


Endnotes:

[1] Treverton, G. F. (2016). New Tools for Collaboration. Retrieved March, 2016, from https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/160111_Treverton_NewTools_Web.pdf

[2] Office of the Director of National Intelligence IC IT Enterprise Fact Sheet. Retrieved March, 2017, from https://www.dni.gov/files/documents/IC%20ITE%20Fact%20Sheet.pdf

Information and Intelligence Information Systems Marvin Ebrahimi Option Papers United States

Options for Managing Xinjiang Uighur Ethnic Tensions

Daniel Urchick is a defense and foreign policy analyst.  Daniel tweets at @DanielUrchick.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Unrest and separatist tendencies amongst the Uighur ethnic minority in Xinjiang Province, People’s Republic of China (PRC).

Date Originally Written:  March 08, 2017.

Date Originally Published:  April 27, 2017.

Author and / or Article Point of View:  The article is written from the perspective of a PRC government official offering options for countering ethnic violence, separatism, and extremism amongst the Uighurs in Xinjiang. 

Background:  Turkic-speaking Muslim Uighurs comprise an estimated 42 percent of Xinjiang’s population of 19 million.  Uighur unrest was historically sporadic and easily suppressed but since 2008 Xinjiang has seen a slow, but noticeable rise in violent activity that appears to be aimed at local actors, such as the local government structure, state security forces, Han immigrants, and Uighur “collaborators,” rather than at the Chinese Central Government in Beijing.  Some Uighurs have called for total independence from the PRC due to cultural oppression.

Uighur terrorism has allegedly occurred across the PRC, including dual bombings in Yunnan Province in 2008, a bombing in Tiananmen Square in 2013, and a knife attack at Kunming Airport in Yunnan that killed 29 and injured 143 in early 2014.  In late February 2017, the Islamic State in Iraq and Syria (ISIS) released a video of Uighur members who claimed they would shed rivers of blood in the PRC and avenge the oppressed[1].  This video marked the first time Uighur militants had officially been tied to ISIS[2].

The PRC has increasingly relied on a heavy-handed and repressive approach to security operations in Xinjiang.  The arrests and detention of protesters, even peaceful ones, are estimated to be well into the tens of thousands, with an estimated 1.8 executions occurring weekly in 2008[3].  Tens of thousands of PRC security components currently operate in Xinjiang[4].

Drivers of Uighur unrest may include being barred from 95 percent of the civil-service positions in Xinjiang[5], being forced to teach Mandarin in Uighur schools, and, until recently, anyone under 18 was prohibited from entering a mosque.  Despite efforts to placate the Uighurs with promises of foreign direct investment, increased employment opportunities, and modernization projects, the majority of these opportunities are still reserved for the Han Chinese.

Significance:  Xinjiang links the PRC to Central Asia and the greater Middle East geographically, ethnically, and religiously.  The problems of ethnic separatism and religious extremism in the Middle East and Central Asia flow into Xinjiang.  For this reason, in addition to poor administrative practices, there is a small, but growing problem with separatism and terrorism in the region.  Fear of an ISIS-like organization forming in Xinjiang, combined with a theoretical collapse of adjacent Tajikistan, has spurred the PRC into creating an entire security organization: the Shanghai Cooperation Organization (SCO).

Option #1:  The “Alaska” model— Reward the Uighurs with economic dividends based on exploiting Xinjiang’s resources.

Risk:  Economic dividends have historically been reserved for Han Chinese who may grow agitated with the loss of an exclusive “perk,” causing them to lash out at the local and Central Government.  Unhappy Han may direct their frustrations towards the Uighur population, who may respond to violence with greater violence, exacerbating the situation.

Gain:  Opening resource management to the Uighur population will co-opt Uighur elites and likely remove environmental concerns and wealth imbalances as a historical justification to protest resource exploitation in Xinjiang.  Option #1 places the onus of environmental degradation on the Uighur elites vice the local and Central Government.

Option #2:  The “Scotland” model— the Chinese Communist Party (CCP) maintains direct control of international and interprovincial trade, as well as military and police functions, but cultural autonomy exists in exchange for loyalty.

Risk:  This model allows the Uighur identity to grow unchecked, which may develop to a point of seeking greater separation from the rest of the PRC.  Misplaced faith in Uighur officials by the CCP could create Uighur opposition leaders in future periods of unrest and rising tensions.  The granting of such a high-level of autonomy to Xinjiang may spark calls for similar policies in other ethnic minority regions in the PRC.

Gain:  The PRC government maintains control of local security apparatus while receiving maximum economic benefit to be distributed as it sees fit.  True autonomy for the region reduces international and domestic criticism of PRC governance in the region.

Option #3:  The “Hawaii” model— Calls for the creation of an “indigenous people’s organization” to communicate with local officials about ongoing and future disputes with the government or Han population.

Risk:  The creation of the indigenous people’s organization could result in a legitimate alternative authority to the Central Government in Beijing, which, in turn, could eventually organize the Uighur population to formally challenge PRC government authority.  This organization may create avenues for Uighurs who support violent extremism to move into positions of authority.

Gain:  This indigenous people’s organization places an administrative barrier between the local government and Uighur population’s criticism and frustrations.  Both the Central Government and local government can use this organization as a scapegoat when tensions flair, while staffing it with vetted personnel. 

Option #4:  The “Australian” model— Special privileges are granted to minorities, such as no birth restrictions, tax exemptions, and assured education.

Risk:  Special privileges conferred to the Uighurs risk increasing resentment among the Han population towards the Uighurs, leading to increased hostility and even greater inter-ethnic violence.  Even more worrisome, the Han populace in Xinjiang, and around the PRC, may become resentful of the Central Government for withholding highly coveted privileges.

Gain:  Removing restrictions that apply to the rest of the country promotes a sense of exceptionalism in the Uighur population, encouraging loyalty to the PRC.  Assured education encourages educated Uighurs to become local elites and support the Central Government that supported them.

Option #5:  The “West Bank” model— Government promotion of cultural and Islamic tourism to Xinjiang Province.

Risk:  Exposes a larger portion of the PRC populace to Islam, increasing the potential for conversion to a religion that believes in an authority other than the Central Government in Beijing.  Islamic tourists to Xinjiang could bring ideas about Islam and its role in society and government that the PRC government views as destabilizing, further increasing tensions.

Gain:  Uighurs are potentially exposed to more moderate Islamic ideas on a wider scale, rather than radical Islamist ideas that proliferate under or due to government suppression.

Other Comments:  The models presented above can be found with greater detail in Dru Gladney’s 2003 paper “Responses to Chinese Rule in Xinjiang: Patterns of Cooperation and Opposition,” published in the Mongolian Journal of International Affairs (http://www.mongoliajol.info/index.php/MJIA/article/viewFile/122/123).

Recommendation:  None.


Endnotes:

[1]  Katie Hunt and Matt Rivers. “Xinjiang violence: Does China have a terror problem?,” CNN, December 02, 2015. Retrieved from: http://www.cnn.com/2015/12/02/asia/china-xinjiang-uyghurs/

[2]  Ryan Pickrell. “ISIS Vows To ‘Shed Blood Like Rivers’ In First Threat Against China,” Daily Caller, March 1, 2017. Retrieved from: http://dailycaller.com/2017/03/01/isis-vows-to-shed-blood-like-rivers-in-first-threat-against-china/

[3]  Drew Gladney. “Responses to Chinese Rule in Xinjiang: Patterns of Cooperation and Opposition,” The Mongolian Journal of International Affairs. Retrieved from: http://www.mongoliajol.info/index.php/MJIA/article/viewFile/122/123

[4]  “Xinjiang deploys over 10,000 armed police in latest show of force after terror attacks,” South China Morning Post, February 28, 2017. Retrieved from: http://www.scmp.com/news/china/diplomacy-defence/article/2074711/china-stages-another-huge-show-force-xinjiang-wake

[5]  Preeti Bhattacharji. “Uighurs and China’s Xinjiang Region,” Council on Foreign Relations, May 29, 2012. Retrieved from: http://www.cfr.org/china/uighurs-chinas-xinjiang-region/p16870

China (People's Republic of China) Daniel Urchick Minority Populations and Diasporas Option Papers Uighur

70th Anniversary Writing Contest: Options for a New U.S. National Security Act

NSA1947Truman

Background:

On July 26, 1947, U.S. President Harry S. Truman signed the National Security Act of 1947 into law.  The National Security Act of 1947 mandated a major reorganization of the foreign policy and military establishments of the U.S. Government.  The act created many of the institutions that Presidents found useful when formulating and implementing foreign policy, including the National Security Council[1].  As July 26, 2017, marks the 70th anniversary of the signing of this historic document Divergent Options is holding a writing contest.

Contest:

Using our Options Paper template or Assessment Paper template, in 1,000 words or less, provide your assessment or options for how the National Security Act of 1947, or portions thereof, could be re-written to address better the threats, challenges, and opportunities the U.S. faces in the ever-changing national security environment.

Timelines:

Divergent Options will accept entries for 70 days beginning on July 26 and ending on October 4th, 2017.

Awards:

Divergent Options’ Strategic Advisory Board will review all entries and award First Place ($100), Second Place ($50) and Third Place (Divergent Options Coffee Mug) in each of the following award categories:

1.  Best Overall Option Paper

2.  Option Paper Most Able to be Implemented

3.  Most Disruptive Option Paper

All submissions, regardless of whether they win an award or not, will be published.

Submission Procedures:

A.  Review our templates.

B.  Send your 1,000 words or less to submissions@divergentoptions.org between July 26 and October 4th, 2017 and note which award category you wish to be considered for.

References:

–  National Security Act of 1947

–  National Intelligence Council Global Trends Report


Endnotes:

[1]  Milestones 1945-1952, National Security Act of 1947. (n.d.). Retrieved April 23, 2017, from https://history.state.gov/milestones/1945-1952/national-security-act

Contest (General) Option Papers Phil Walter United States

Options to Evolve U.S. Law Enforcement and Public Safety Training

The Viking Cop has served in a law enforcement capacity with multiple organizations within the U.S. Executive Branch.  He can be found on Twitter @TheVikingCop.  The views reflected are his own and do not represent the opinion of any government entities.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The evolution of Law Enforcement and Public Safety (LE/PS) Training within the U.S.

Date Originally Written:  April 7, 2017.

Date Originally Published:  April 24, 2017.

Author and / or Article Point of View:  Author is a graduate of both University and Federal LE/PS training.  Author has two years of sworn and unsworn law enforcement experience.  Author believes a reform of LE/PS training led by institutes of higher learning such as colleges and universities is necessary to meet evolving LE/PS challenges.

Background:  Over the past twenty years the U.S. has seen a major shift in public opinion and media coverage of LE/PS operations.  As a result of this shift, there have been ad hoc changes in LE/PS training on various topics to address a lack of specialized training.  But because LE/PS basic training and advanced training is conducted and designed at a local level, the added training can vary from city to city and state to state.  A look at the basic training of LE/PS is important in the context of how LE/PS organizations are preparing to respond to contemporary changes in U.S. culture and the massive scale of resources and time it takes to train a LE/PS Officer[1].

Current LE/PS basic training varies from state to state with varying hours, types of training, and style of training conducted[2].  This mix of training hours, types, and styles produces a varying level of LE/PS Officer upon graduation.  A LE/PS Officer in one state could lack hundreds of hours of training compared to their peer the next state over when beginning their initial field training.

Significance:  The Bureau of Justice Statistics observed in 2008 that there were sixty-one thousand new LE/PS Officers hired in the United States[3].  Due to the nature of attrition, retirement, and LE/PS budgets, this hiring is only expected to increase over the coming years as a younger generation replaces the “Widening Hole in the Bucket” that is staffing levels in departments nationwide[4].

Option #1:  Establish a system of National Law Enforcement Colleges within university systems throughout the U.S. that not only train and certify LE/PS Officers but that do this as part of a wider degree-granting program.  Option #1 is similar to in-depth and standardized training of LE/PS personnel that countries such as Germany and Sweden have developed.

Risk:  With a rising average number of LE/PS recruits in the U.S. each year, sixty-one thousand hired in 2008[4], a series of colleges would have to have enough capacity to handle one hundred to two hundred thousand trainees across the country at varying years of study if a multiple year degree program is established.  Option #1 could also be viewed as a “Federalization” of LE/PS since the undertaking would inevitably involve the Federal Government for funding and certification.  It has also been noted, albeit with limited research, that university-educated LE/PS Officers experience higher levels of frustration and lower levels of overall job satisfaction[5].

Gain:  Option #1 would increase the minimum education of LE/PS Officers allowing them to be educated in various social science fields that the university systems already employ subject matter experts in.  Option #1 could also offset certain costs of training LE/PS Officers as the program could be run as a self-pay system as any other university program or limited scholarship program such as the U.S. Military Reserve Officer Training Corps program.

Option #2:  Developing and implementing a national standard for basic law enforcement training to be met by currently existing training academies.

Risk:  This would increase the cost of LE/PS training to states that have below minimum standards.  If an extended length of training is chosen it would cause a bottleneck in training new LE/PS Officers that agencies are in need of immediately to boost low staffing numbers.  A national set of minimum standards could lead to simply a change in what is taught during basic training instead of an actual increase in training provided as academies may be inclined to abandon non-mandated training to shorten program time.

Gain:  Concerns with the lack of certain types of training, such as social services and crisis intervention, would be resolved as mandatory training hours could be set for these topics.  LE/PS Officers operating on an inter-agency level (City to County or across State Lines) would have been trained initially to the same set of standards and would be able to better cooperate.

Other Comments:  While the lack of certain academic topics in LE/PS training does exist as a current problem, it must also be understood that in a human-services profession such as LE/PS, that informal training through actual field experience is still the most significant way that adults learn in challenging situations[6].  No amount of academic or basic training will replace the need for actual field experience by the trainee to become competent as a LE/PS Officer.

Recommendation:  None.


Endnotes:

[1]  Stanislas, P. (2014). Introduction: police education and training in context. In P. Stanislas (Ed.), International perspectives on police education and training (pp. 1-20). London: Routledge.

[2]  Reaves, B. (2016). Bureau of Justice Statistics (BJS) – State and Local Law Enforcement Training Academies, 2013Bjs.gov. Retrieved 7 March 2017, from http://www.bjs.gov/index.cfm?ty=pbdetail&iid=5684

[3]  Reaves, B. (2012). Bureau of Justice Statistics (BJS) – Hiring and Retention of State and Local Law Enforcement Officers, 2008 – Statistical TablesBjs.gov. Retrieved 7 March 2017, from http://www.bjs.gov/index.cfm?ty=pbdetail&iid=4514

[4]  Wilson, J., Dalton, E., Scheer, C., & Grammich, C. (2017). Police Recruitment and Retention for the New Millennium (1st ed.). Santa Monica: RAND Corporation. Retrieved from http://www.rand.org/content/dam/rand/pubs/monographs/2010/RAND_MG959.pdf

[5]  Stanislas, P. (2014). The challenges and dilemmas facing university-based police education in Britain. In P. Stanislas (Ed.), International perspectives on police education and training (pp. 57-71). London: Routledge.

[6]  Giovengo, R. (2016). Training law enforcement officers (1st ed.). CRC Press.

Education Law Enforcement & Public Safety Option Papers The Viking Cop Training United States

Islamic State Options: Pivot towards Australia

Phillip Etches is a fourth-year undergraduate student in the Australian National University’s International Security and Middle-Eastern Studies program where he focuses on networked non-state threats.  He can be found on Twitter @CN_Hack.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Possible shift in Islamic State’s (IS) operational focus towards Southeast Asia and the threat to Australian citizens.

Date Originally Written:  February 22, 2017.

Date Originally Published:  April 20, 2017.

Author and / or Article Point of View:  This options paper is written from the perspective of an individual with command seniority within IS, or influence over the strategic-level policymaking of that organisation.

Background:  The overall goal must be the demonstration that IS remains a viable enterprise, whether as a landholding caliphate or a check on the Western threat to the Ummah.  Prior to Western intervention, a “balanced” strategy involved fighting for territory within “near enemy” spaces such as Iraq and Syria while also operating in as many “far enemy” spaces as possible.  Doing so allowed IS to show that it could establish a new caliphate while simultaneously using kinetic and information operations directed at Western Europe, Southeast Asia, and North America to demonstrate to believing people that IS was capable of projecting beyond its immediate territory.

Significance:  IS is at an inflection point where it must alter the balance of its strategy towards a new far enemy, and show that it retains the initiative by beginning to target Australian citizens and interests more aggressively.  Doing so will show that IS can still function despite territorial losses, that it retains the initiative, and inspire hope in those whose confidence has been shaken by IS setbacks in Iraq and Syria.  This pivot to Australia is vital if IS is to retain its control over its perception and reality.

Option #1:  Continue attempting to inspire remote or unaffiliated persons to conduct attacks by way of broadly targeted messaging or manipulation of social/familial ties between IS personnel and individuals in the country.

Risk:  The principal risk of the present course is a lack of impact and credibility.  The persons who have thus far answered IS’s call have been portrayed as alone, insufficiently lethal, or of compromised standards and morals[1].  This portrayal has allowed the Australian government and media to characterize operations in Australia as the products of mental illness or juvenile delinquency, lessening the kinetic and psychological effects of our operations.  Additionally, operational risk comes from institutions and legislation involved in Australia’s internal security, forcing willing persons to mount small, unsophisticated attacks only.  As such, broad messaging will therefore continue inspiring small attacks, but will not generate the psychological effect we desire.

Gain:  The main gain of Option #1 is the higher likelihood of successful – if small – attacks which will show that IS can operate without restrictions on time or location.  A secondary gain is the increased certainty which comes from following a proven course.  While the current approach does little to change the overall strategic situation, it will avoid provoking a change in behaviour on the part of the Australian internal security establishment, lowering the risk of creating unforeseen future operational challenges.

Option #2:  Targeting Australians in Southeast Asia via IS personnel displacing from Iraq and Syria or via cooperation with pre-existing networks in the region.

Risk:  The biggest risk to IS from this approach will be the immediate response, as the relevant network elements will be endangered by any post-operational security crackdown in the countries where they mount attacks.  In addition to likely immediate costs, Option #2 will alter the challenges faced by IS in future, particularly given that Southeast Asia is within Australia’s near abroad.  Should the Australian government be sufficiently provoked, it will use any available multilateral and unilateral means – as it has before – to prevent future operations.  Any networks known to be sympathetic to IS will also come under stronger Australian scrutiny.  As such, the principal benefit of operation against Australians outside the attention of the Australian government will likely be lost after the first satisfactory attack.

Gain:  The most obvious gain of Option #2 is that it responds to the challenges of Option #1.  Targeting Australians in Southeast Asia will address the risks of the current approach by enabling the use of competent pre-existing networks beyond the auspices of Australia-based security organizations.  Additionally, operating against Australians in Southeast Asia will enable IS to harness the fears held by many Australians about the Jihad in Southeast Asia and rekindle the anxiety they felt after the 2002 Bali Bombings.  This impact will be enhanced if notables such as Abu Bakar Bashir are able to lend their support to the attacks as they did with the original Bali Bombings.

Other Comments:  It may appear that the geographical remove between Syria and Southeast Asia, unlike that between Syria and Europe, is too great to feasibly conduct operations at a distance.  However, it should be noted that operations can and have been directed at such distances by IS, and tactics, techniques, and procedures can be devised to ensure smooth operation in the absence of direct control by Caliph Ibrahim.  Furthermore, IS has a number of brothers from Indonesia and Malaysia[2].  Their experience both at home and fighting in Syria will make them capable operatives, and with some preparation they should be able to carry out the requisite planning, targeting, and execution of operations against Australians.

Recommendation:  None.


Endnotes:

[1]  Buggy, K. (2016). Under the Radar: How Might Australia Enhance Its Policies to Prevent ‘Lone Wolf’ and ‘Fixated Person’ Violent Attacks? Canberra, Australia:Australian Defence College’s Centre for Defence and Strategic Studies

[2]  Dodwell, B., Milton, D., & Rassler, D. (2016). The Caliphate’s Global Workforce: An Inside Look At The Islamic State’s Foreign Fighter Paper Trail. West Point, NY:USMA

Australia Islamic State Variants Option Papers Phillip Etches Violent Extremism

Options for U.S. Sanctions Towards Russia for Aggression in Ukraine

Michael Martinez is a graduate student at University of Maryland University College where he is currently obtaining his master’s degree in intelligence management.  He also holds a bachelor’s degree in business management from Coastal Carolina University.  He can be found on Twitter @MichaelMartinez.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  U.S. economic sanctions towards Russia following its aggressive actions in Ukraine.

Date Originally Written:  March 1, 2017.

Date Originally Published:  April 17, 2017.

Author and / or Article Point of View:  This article is written from the standpoint of the U.S. national security community regarding future plans or movement on Russian sanctions.

Background:  In February 2014 the Olympic winter games had just concluded in Sochi.  Russia was in the midst of invading the Crimea region and portions of Eastern Ukraine.  The U.S. placed targeted economic sanctions on Russia as a reaction to its invasion.  While these sanctions have been detrimental to Russia’s economy, President Vladimir Putin is still holding portions of Eastern Ukraine and attempting to annex the Donbas region as Russian territory.  The first round of the sanctions from the U.S. were a response to Russia’s annexation of Crimea, while a second round began as the ceasefire between Ukraine and Russia failed to take hold[1].  The future of Russian aggression towards Ukraine is undetermined at this time.

Significance:  In the U.S., the Trump Administration is taking a significantly more laissez-faire approach to Russia and Russian government officials, including Putin, than President Barack Obama did.  Any change in U.S. policy towards Russia will have significant impacts in Eastern Europe and on North Atlantic Treaty Organization (NATO) members – as matters of economics, trade, and territorial occupation are concerned.  A declining Russian populous and economy, being backed into a corner, can provide for dangerous consequences, especially since its military and nuclear stockpiles are quite viable.

Option #1:  The U.S. continues current economic sanctions until Russia withdrawals its forces from Crimea and the Donetsk region, including other areas of Eastern Ukraine.

Risk:  As the U.S. keeps economic pressure on Russia to withdraw from Ukraine’s sovereign territory, a new Cold War may develop as a stalemate between the U.S. and the Russian plays out.  Russia will hold on to the territory it occupies at this point in time and continue cross border skirmishes into the Donetsk region.

Gain:  If U.S. economic sanctions against Russia were to remain in place, these sanctions  and NATO pressure in the form of expanded presence is put upon the Russian government to rethink its strategy in Ukraine.  If these sanctions continue, the Ruble will sustain its downward trajectory and inflation will continue to rise, especially for consumer goods.  Economic contraction will put pressure on the Russian government to take corrective action and rethink their position to counter public opinion.  In 2015, the Russian economy contracted by 3.7%, while it shrank another 0.7% in 2016[2].

Option #2:  The U.S. lifts economic sanctions against Russia to give the Russian population economic stability in a country that heavily relies on oil and gas exports as the main driver of its economy and much of its wealth.

Risk:  Lifting sanctions may send a signal to the Russian administration that its behavior is warranted, acceptable, and falls in line with global norms.  President Putin may feel emboldened to keep moving his forces west to annex further portions of Ukraine.  Most of Eastern Ukraine could become a war zone, and humanitarian efforts would have to be implemented by the United Nations and other Non-Governmental Organizations if more grave violations of the Minsk (II) Protocol occurred.  Putin’s ultimate plan might involve gaining influence in other former Soviet satellite nations.  As such, a Ukraine-like effort may repeat itself elsewhere.  Lifting sanctions might give Putin a green light for his next conquest.

Gain:  The Russian people may take a friendlier view and role towards the U.S. and allow for more trade.  President Putin may be more open to multilateral trade negotiations.  A new trade agreement may become possible between Russia and the U.S., including countries that have been targeted by Russian aggression such as – Ukraine, Belarus, and the Baltic States.  A restoration and expansion of the Commonwealth of Independent States Free Trade Agreement or similar agreement, would be prudent to economic activity in the region[3].  Of note is that Ukraine is in a position where it now relies on Germany and Western European nations for imports and likely cannot stand on its own.

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  Baer, Daniel. (24, February 2017). Don’t forget the Russian sanctions are Russia’s fault. Foreign Policy. Retrieved March 1, 2017. http://foreignpolicy.com/2017/02/24/dont-forget-the-russia-sanctions-are-russias-fault/

[2]  Kottasova, Ivana. (26, February 2017). What would rolling back U.S. sanctions mean for Russia? CNN Money. Retrieved March 1, 2017 http://money.cnn.com/2017/02/16/news/economy/russia-sanctions-trump/index.html

[3]  “Russia Trade Agreements”. (23, June 2016). Exports.gov. Retrieved March 1, 2017 https://www.export.gov/article?id=Russia-Trade-Agreements

Economic Factors Michael Martinez Option Papers Russia Ukraine United States

U.S. Options for Regime Change in Syria

Dr. Christopher Bolan has served in Jordan, Tunisia, and Egypt and worked as a Middle East foreign policy advisor to Vice Presidents Gore and Cheney.  He presently teaches and researches national security issues at the Strategic Studies Institute at the U.S. Army War College.  He can be found on Twitter @DrChrisBolan.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  Regime change in Syria.

Date Originally Written:  December 9, 2016.

Date Originally Published:  April 13, 2017.

Author and / or Article Point of View:  Author is a retired U.S. military officer whose writings and teaching focus on national security issues related to the Middle East.

Background:  Syrian President Bashar al-Assad’s apparent chemical weapons attack on April 4, 2017 that killed scores of innocent civilians prompted U.S. cruise missile strikes targeting a Syrian airfield from which the attacks were launched.  U.S. President Donald Trump said these strikes were designed primarily to “prevent and deter the spread and use of deadly chemical weapons[1].”  While the decision to strike has been widely supported by leaders of both political parties in Washington D.C., international reaction has been predictably mixed.  Traditional U.S. allies in Europe and the Middle East have been broadly supportive, while supporters of the Assad regime including Russia and Iran have condemned the strikes as a “violation of international law[2].”

Significance:  Beyond the narrow justification of these strikes as being necessary to reinforce an eroding international norm against the use of chemical weapons, this U.S. military intervention has resurfaced questions concerning the ultimate strategy that the Trump Administration is pursuing in Syria.  Before the strikes, senior administration officials including Secretary of State (SecState) Rex Tillerson and U.S. Ambassador to the United Nations Nikki Halley suggested that U.S. policy would abandon even the pretense of President Barack Obama’s objective of ousting Assad from power in Damascus[3].  However, in the aftermath of the strikes, the Trump Administration signaled an apparent about-face as National Security Advisor (NSA) Herbert Raymond “H. R.” McMaster declared that U.S. policy in Syria would “simultaneously” pursue the twin goals of destroying the Islamic State in Iraq and Syria (ISIS) and removing Assad[4].  While the fight against ISIS is making significant progress, the administration has not yet articulated a detailed strategy for pursuing the ouster of Assad.  There are two broad options available:

Option #1:  Coercive Diplomacy.  This option seeks to capitalize on the demonstration of U.S. resolve in the wake of the chemical attacks and missile strikes to push all parties to a negotiated solution that would ultimately result in the removal of Assad.  NSA McMaster and SecState Tillerson have suggested that this might indeed be the Trump Administration’s preferred course of action[5].  Additionally, former U.S. Deputy Secretary of Defense Paul D. Wolfowitz is emblematic of this approach and has made the case that “peace is impossible with Mr. Assad in power” and also called on President Trump to lead a “broad diplomatic effort to end the country’s bloodshed[6].”

Risk:  This diplomatic approach is essentially a reprise of President Obama’s strategy to engage Russia to use its substantial influence in Damascus to coerce Assad into relinquishing his position.  Years of a failed Geneva process along these lines are a strong indication that prospects for success are minimal.  Moreover, Russia is either complicit or has been turning a blind eye to Assad’s brutal repression and flagrant attacks on civilians that undoubtedly constitute war crimes.  This blind eye poses a moral hazard to any negotiated agreement involving Moscow.  The real risks and costs for the U.S. will only manifest themselves when prospects for success are greatest.  Presently, there is simply no viable political opposition able to assume power in a deeply divided Syrian society.  As the tragic histories of Iraq and Afghanistan suggest, a strong international presence underpinned by U.S. combat forces and bolstered by U.S. intelligence and logistics support will be required to avoid the eruption of civil war until broader political reconciliation takes hold.  Finally, the reconstruction costs for Syria alone exceed $200 billion[7] – a portion of which will likely be borne by the U.S. Treasury.

Gain:  Option #1 seeks to make maximum diplomatic advantage of a limited U.S. military strike.  It requires little investment beyond organizing a broad diplomatic effort to press all parties to arrive at a negotiated solution.  It is possible that Assad’s use of chemical weapons will serve as an affront to Russian President Vladimir Putin, who was a primary party along with President Obama to the agreement that removed tons of chemical weapons from Syria and avoided a U.S. military strike in 2013.  SecState Tillerson’s long experience negotiating with Russia could equip him to successfully exploit this opportunity to leverage Russian support for ousting Assad.

Option #2:  Limited Military Escalation.  Long-time advocates of deeper U.S. military engagement have been trumpeting the recent U.S. missile attacks as an opportunity to escalate a U.S. military campaign to unseat Assad.  Options here range from resurrecting an earlier Central Intelligence Agency / Department of Defense program to arm-and-equip carefully vetted Syrian opposition groups, to establishing no-fly zones or safe areas for the protection of civilians, to conducting an air campaign to destroy Assad’s air force.

Risk:  These military options have been repeatedly debated and dismissed by senior U.S. officials because of the risks inherent in these approaches.  The previous program to arm-and-equip Syrian opposition groups ended in abject failure.  A program designed to raise a force of 15,000 fighters at a cost of $500 million netted only a handful of recruits that were quickly captured by Al-Qa’ida-linked elements as soon as they crossed into Syria[8].  Former U.S. Chairman of the Joint Chiefs of Staff General Martin Dempsey noted that no-fly zones and safe areas would require the commitment of “thousands of U.S. ground troops” and would cost billions each month to maintain[9].  Finally, a military campaign taking out Assad’s air force would expose U.S. pilots to an advanced and integrated Syrian air defense system that has recently been upgraded by Russia.   Any such military campaign would almost inevitably result in Russian and Iranian casualties, risking escalation and retaliation against U.S. interests regionally and globally.

Gain:  The potential rewards for this high risk approach would be correspondingly rich if this increased military pressure ultimately yielded a negotiated resolution removing Assad from power.  The successful application of American military power would reassure U.S. allies and potentially bolster U.S. deterrence against potential adversaries including Russia, Iran, North Korea, and China.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Office of the Press Secretary, “Statement by President Trump on Syria,” Washington, DC: The White House, April 6, 2017, available from https://www.whitehouse.gov/the-press-office/2017/04/06/statement-president-trump-syria.

[2]  Gregor Aisch, Yonette Joseph, and Anjali Singhvi, “Which Countries Support and Which Oppose the U.S. Missile Strikes in Syria,” The New York Times, April 9, 2011.

[3]  Steve Holland, “White House backs Haley, Tillerson on Syria’s Assad,” Reuters, March 31, 2017, available from www.reuters.com/article/us-mideast-crisis-syria-usa-idUSKBN1722US

[4]  Mahita Gajanan, “National Security Advisor H.R. McMaster:  U.S. Wants to Eliminate ‘Murderous Regime’ in Syria,” Time, April 10, 2017.

[5]  Ibid and Josh Lederman, “Secretary of State Rex Tillerson Issues Warning About Syria:  ‘We Cannot Let This Happen Again’,” Time, April 11, 2017.

[6]  Paul Wolfowitz, “What Comes After the Syria Strikes: With American credibility restored, Trump should lead a diplomatic effort to replace Assad,” The Wall Street Journal, April 10, 2017.

[7]  David W. Lesch and James Gelvin, “Assad Has Won in Syria.  But Syria Hardly Exists,” The New York Times, January 11, 2017.

[8]  Michael D. Shear, Helene Cooper, and Eric Schmitt, “Obama Administration Ends Effort to Train Syrians to Combat ISIS,” The New York Times, October 9, 2015.

[9]  General Martin E. Dempsey, Letter to Senator Levin on the U.S. Military and the Syrian Conflict, July 19, 2013.  Available at:  http://www.cfr.org/syria/general-dempseys-letter-senator-levin-us-military-syrian-conflict-july-2013/p31198.

 

Chemical, Biological, Radiological, and Nuclear Weapons Civil War Dr. Christopher Bolan Leadership Change Option Papers Syria United States

America First Foreign Policy in the South China Sea

Captain Geoffrey Gage, U.S. Navy, is a Federal Executive Fellow at The Brookings Institution Center for 21st Century Security and Intelligence in Washington, DC.  The views expressed by the author are his own and do not reflect those of the U.S. government, the Department of Defense, or the U.S. Navy.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, organization, or group.


National Security Situation:  People’s Republic of China (PRC) land reclamation and coercive maritime activity in the South China Sea (SCS) contradicts international law and threatens U.S. national interests while a nascent U.S. foreign policy and other strategic challenges limit U.S. options.

Date Originally Written:  February 10, 2017.

Date Originally Published:  April 10, 2017.

Author and / or Article Point of View:  The author believes that current U.S. foreign policy, though limited in detail, provides a starting point for addressing the security situation in the SCS.

Background:  Among the competing claims in the SCS, the PRC considers most of the SCS sovereign territory.  Recent PRC maritime interference, land reclamation and fortification in the SCS constitute the most assertive claims and, despite international condemnation, have achieved de facto control of new territory.  More broadly, in dealing with SCS and other international relations issues, the PRC prefers bi-lateral problem solving in search of “win-win” outcomes, while prizing clout that derives from participation in multi-lateral fora, military exercises, and summit meetings[1].

Nascent U.S. foreign policy under the Trump administration, labeled “America First,” prioritizes defeating the Islamic State of Iraq and Syria and rebuilding the military.  “Embracing diplomacy” is a stated intention while better trade deals for the U.S. are a constant theme[2].  Administration statements and actions have generally supported these priorities, though the President’s fiscal year 2017 budget suggests fewer fiscal resources for diplomacy.  In the near term this adds up to an economy of force: military operations focused in the Middle East, managing security commitments elsewhere in order to rebuild readiness, and forging advantageous trade deals.

Significance:  The security situation in the SCS threatens regional stability and the security of sea lanes.  The SCS is the maritime crossroads for trillions of dollars in trade between globally dispersed producers and consumers.  The SCS is also important for U.S. naval forces operating between the Pacific and Indian Oceans in support of regional alliance commitments and, more generally, maintaining freedom of the seas[3].

The SCS is not a vital national interest for the U.S.  The SCS is not as critical to U.S. national security as the prospect of North Korean nuclear armed intercontinental ballistic missiles.  Nevertheless, the security situation in the SCS is very important to the U.S. because of its alliance commitments and the potential for military conflict, indirect economic harm, and degradation of international norms.

The PRC view of the “South Sea” as a vital national interest explains, though does not excuse, their actions.  In addition to vital trade flows, the SCS offers an extension of PRC military capability.  What’s more, Communist Party of China (CPC) legitimacy derives in part from SCS adventurism.  In advance of this year’s 19th CPC Congress, even the status quo gains in the SCS may be sufficient for the party—and President Xi—to claim success and retain tight control.

The April 2017 U.S.-PRC summit will likely focus on basic relationship building, North Korea and trade.  The SCS security situation, if left unaddressed, could be construed as tacit U.S. acceptance.  A reasonable near-term objective may be to maintain the status quo.  Given emerging “America First” foreign policy priorities, U.S. SCS options are captured in two distinct categories, Indirect and Direct.

Option #1:  Indirect Approach.  Leverage issues outside of the SCS to influence the PRC in the SCS.  For example, tie the conditions of trade agreements to PRC actions in the SCS.  Another option is greater U.S. patience on North Korea in exchange for the PRC’s cooperation in the SCS.  A less fraught military option would be to exclude the PRC from participation in combined exercises such as Rim of the Pacific subject to better behavior in the SCS.  This approach hinges on the U.S. “ask,” ranging from maintenance of the status quo to reversal of the PRC’s SCS island reclamation and fortification.

Risk:  Linking largely disparate issues may confuse U.S. priorities and further complicate relations with the PRC.  Option #1, in the case of North Korea, could be perceived by South Korea as a sell-out for a less important issue, creating acrimony between allies and further destabilizing the situation on the Korean peninsula.  Similarly, if the PRC perceives its position in the SCS as an existential one, it may refuse to “give” on trade agreements, sparking a trade war.

Gain:  Option #1 effectively makes the SCS more important to the U.S. from the PRC’s perspective.  Success of this option depends on limited objectives and reasonable demands.  If executed deftly, these indirect levers to stabilize the situation in the SCS could yield progress across a range of mutually important Asia-Pacific challenges while keeping the issue safely on the back burner.

Option #2:  Direct Approach. Focus efforts in the SCS region.  Sustain the long-standing policy of routine military presence, including U.S. Navy freedom of navigation operations (FONOPS) near the contested land features.  Conducting FONOPs and other military operations in the region is an obvious lever, with the option to adjust the frequency and nature of those measures, including land-based exercises with local allied and partner nations.  Drawing “red lines” against further island reclamation or fortification is a logical consideration given past administration statements.  Targeted economic sanctions on PRC entities supporting SCS activities is another lever.  A novel and riskier measure would be to abandon U.S. neutrality with respect to claims in the SCS and endorse a solution—one that might include certain PRC claims.  Finally, the U.S. could tie maintenance of the One China policy to the security situation in the SCS—a direct measure because Taiwan is an SCS claimant whose nationalist forbearers conceived of the nine-dashed line[4].

Risk:  Option #2 presents an array of risks, not least being a military confrontation that could undermine broader U.S. strategic priorities.  In particular, drawing red lines in the SCS would dramatically increase the risk of confrontation, as would linking the One China policy to SCS issues.  Mitigating the risk of a direct approach is done through incremental steps that are mindful of the broader regional situation.

Gain:  Option #2 is unambiguous and reinforces U.S. commitment and resolve on the key issues of freedom of navigation, territorial integrity and treaty obligations.  The direct approach also contains the issue to the SCS, de-linking the matter from higher-priority issues facing the U.S. and the PRC.

Other Comments:  As the new U.S. administration develops a comprehensive national security strategy, foreign challenges and crises will not wait.  Every “environmental monitoring station,” surface-to-air missile site and high seas harassment in the international waters of the SCS constitutes a “win-lose” in the Sino-American relationship.

Recommendation:  None.


Endnotes:

[1]  Foreign Ministry of PRC. (2017). China’s Policies on Asia-Pacific Security Cooperation (http://www.fmprc.gov.cn/mfa_eng/zxxx_662805)

[2]  Trump, Donald J., President. (2017). America first foreign policy. https://www.whitehouse.gov/america-first-foreign-policy

[3]  Mission of the U.S. Navy. http://www.navy.mil/navydata/organization/org-top.asp

[4]  Fisher, M. (2012, November 26). Here’s the Chinese passport map that’s infuriating much of Asia. Retrieved April 08, 2017, from https://www.washingtonpost.com/news/worldviews/wp/2012/11/26/heres-the-chinese-passport-map-thats-infuriating-much-of-asia/

 

China (People's Republic of China) Geoffrey Gage Option Papers South China Sea Trump (U.S. President) United States

U.S. Options for the People’s Republic of China’s Maritime Militias

Blake Herzinger served in the United States Navy in Singapore, Japan, Italy, and exotic Jacksonville, Florida.  He is presently employed by Booz Allen Hamilton and assists the U.S. Pacific Fleet in implementation and execution of the Southeast Asia Maritime Security Initiative.  His writing has appeared in Proceedings and The Diplomat.  He can be found on Twitter @BDHerzinger.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  People’s Republic of China (PRC) Maritime Militias operating in the East China Sea (ECS) and South China Sea (SCS).

Date Originally Written:  February 21, 2017.

Date Originally Published:  April 6, 2017.

Author and / or Article Point of View:  Author believes in freedom of navigation and maintenance of good order at sea in accordance with customary and written law of the sea.  The article is written from the point of view of U.S. sea services leadership toward countering PRC maritime irregulars at sea.

Background:  The PRC employs irregular militia forces at sea alongside naval and maritime law enforcement units.  By deploying these so-called “blue hulls” manned by un-uniformed (or selectively-uniformed) militiamen, the PRC presses its maritime claims and confronts foreign sea services within a “gray zone[1].”  In keeping with national traditions of People’s War, PRC Maritime Militias seek advantage through asymmetry, while opposing competitors whose rules of engagement are based on international law.  The PRC Maritime Militia participated in several of the most provocative PRC acts in the SCS, including the 2009 USNS Impeccable incident, the seizure of Scarborough Shoal in 2012, and the 2014 China National Offshore Oil Corporation (CNOOC) 981 confrontation with Vietnam that also involved the smaller Vietnam Maritime Militia[2].

Significance:  On its surface, employing irregular forces may be an attractive option for a state facing a more powerful opponent, or for a state interested in “a less provocative means of promoting its strategic goal of regional hegemony” such as the PRC[3].  However, incorporating these irregular forces into a hybrid national strategy has deleterious impacts on the structure of the international legal system, particularly in maritime law and the laws of naval warfare[4].  PRC Maritime Militias’ use of “civilian” fishing vessels to support, and conduct, military operations distorts this legal structure by obfuscating the force’s identity and flaunting established international legal boundaries.

Option #1:  U.S. political and military leaders engage the PRC/People’s Liberation Army (Navy) (PLAN) directly and publicly on the existence and operations of the Maritime Militia, insist upon adherence to internationally-accepted legal identification of vessels and personnel[6], and convey what costs will be imposed on the PRC/PLAN if they do not change their behavior.

As an example, the Commander U.S. Pacific Fleet, Admiral Scott Swift, has voiced his frustration with PLAN unwillingness to acknowledge the existence of the PRC Maritime Militia and its relationships with state law enforcement and military forces[5].  In the event that the PRC declines to engage in dialogue regarding the Maritime Militia, discontinuing PLAN participation in the Rim of the Pacific exercise is the suggested response.

Risk:  Without clearly attaching costs to continued use of militia forces in operations against the USN, Option #1 is unlikely to affect PRC behavior.  Conveying possible imposed costs carries risk of further-degrading relations between the U.S. and PRC, but it is precisely PRC perceptions of their behavior as costless that encourages the behaviors exhibited by the PRC’s Maritime Militia[7].

Gain:  Option #1 is an excellent opportunity for the U.S. to underline its commitment to good order at sea and a rules-based maritime order.  By encouraging the PRC to acknowledge the Maritime Militia and its associated command structure, the U.S. can cut through the ambiguity and civilian camouflage under which the Maritime Militia has operated unchallenged.  In the event that the PRC declines to engage, conveying the possible imposition of costs may serve as a warning that behavior negatively affecting good order at sea will not be tolerated indefinitely.

Option #2:  U.S. Pacific Command’s Joint Interagency Task Force West (JIATF-W) assists the Association of Southeast Asian Nations (ASEAN) in developing and implementing an organic maritime domain awareness (MDA) capability with domestic, and international, interagency sharing and response capability.  For the purposes of this article, MDA will be understood to be a host-nation’s ability to “collect, fuse, analyze and disseminate maritime data, information and intelligence relating to potential threats to [its] security, safety, economy or environment[8].”

Risk:  Close to a score of abandoned information portals and sharing infrastructures have been tried and failed in Southeast Asia, a cautionary tale regarding the risk of wasted resources.  Building upon over 20 years of JIATF-W’s experience should help to mitigate this risk, so long as an MDA solution is developed cooperatively and not simply imposed upon ASEAN.

Gain:  By providing focused and long-term support to an ASEAN-led solution, the U.S. can make progress in an area where MDA has been plagued by reticence, and occasionally inability to share vital information across interagency and national borders.  Shared awareness and cooperation at sea will combat the ability of the PRC Maritime Militia to operate uncontested in the SCS by enabling more effective law enforcement and naval response by affected countries.  Working through existing regional institutions such as Singapore’s Information Fusion Centre would add increased value to Option #2.

Option #3:  Utilize U.S. Coast Guard (USCG) to provide law enforcement and maritime safety training support to states bordering the ECS/SCS interested in creating their own maritime militias.

Risk:  Expanding a concept that is damaging the rules-based order may increase the rate of disintegration of good order at sea.  Any observable indication that the U.S. is encouraging the creation of irregular maritime forces would likely be viewed negatively by the PRC.  Option #3 carries risk of engendering diplomatic or military conflict between the U.S. and PRC, or between the PRC and U.S. partners.

Gain:  Option #3 might provide some level of parity for states facing PRC militia vessels.  Vietnam has already made the decision to pursue development of a maritime militia and others may follow in hopes of countering the PRC’s irregular capability.  USCG involvement in the organizational development and training of militias might provide some limited opportunities to shape their behavior and encourage responsible employment of militia forces.

Other Comments:  Encouragement for the expansion of the Code for Unplanned Encounters at Sea (CUES) is not addressed.  The CUES  was adopted during the 2014 Western Pacific Naval Symposium (WPNS) and provides a basis for communications, maritime safety, and maneuvering guidelines for use by ships and aircraft in unplanned encounters at sea.  CUES is not a legally binding document, but an agreed-upon protocol for managing potentially escalatory encounters in the Pacific[9].  This author believes coast guards adjoining the contested areas of the ECS and SCS will continue to resist CUES adoption in order to maintain operational latitude.  Given the reticence of coast guards to accede to the agreement, drawing PRC Maritime Militia into CUES seems an unrealistic possibility.

Recommendation:  None.


Endnotes:

[1]  The South China Sea’s Third Force: Understanding and Countering China’s Maritime Militia, Hearings on Seapower and Projection Forces in the South China Sea, Before the Subcommittee on Seapower and Projection Forces, 114th Cong., 1 (2016)(Statement of Andrew S. Erickson, U.S. Naval War College). http://docs.house.gov/meetings/AS/AS28/20160921/105309/HHRG-114-AS28-Wstate-EricksonPhDA-20160921.pdf

[2]  Conor M. Kennedy and Andrew S. Erickson, “Model Maritime Militia: Tanmen’s Leading Role in the April 2012 Scarborough Shoal Incident,” CIMSEC, 21 April 2016, http://cimsec.org/model-maritime-militia-tanmens-leading-role-april-2012-scarborough-shoal-incident/24573

[3]  James Kraska and Michael Monti, “The Law of Naval Warfare and China’s Maritime Militia,” International Law Studies 91.450 (2015): 465, http://stockton.usnwc.edu/cgi/viewcontent.cgi

[4]  Ibid.

[5]  Christopher Cavas, “China’s Maritime Militia a Growing Concern,” DefenseNews, November 21, 2016,  http://www.defensenews.com/articles/new-website-will-allow-marines-to-share-training-videos

[6]  The South China Sea’s Third Force: Understanding and Countering China’s Maritime Militia, Hearings on Seapower and Projection Forces in the South China Sea Before the Subcommittee on Seapower and Projection Forces, 114th Cong., 1 (2016)(Statement of Andrew S. Erickson, U.S. Naval War College). http://docs.house.gov/meetings/AS/AS28/20160921/105309/HHRG-114-AS28-Wstate-EricksonPhDA-20160921.pdf

[7]  The Struggle for Law in the South China Sea, Hearings on Seapower and Projection Forces in the South China Sea Before the Subcommittee on Seapower and Projection Forces, 114th Cong., 1 (2016) (Statement of James Kraska, U.S. Naval War College).

[8]  Secretary of the Navy Approves Strategic Plan for Maritime Domain Awareness, U.S. Navy, Last updated 8 October 2015, http://www.navy.mil/submit/display.asp? story_id=91417

[9]  Document: Code for Unplanned Encounters at Sea, USNI News, Last updated 22 August 2016, https://news.usni.org/2014/06/17/document-conduct-unplanned-encounters-sea

Association of Southeast Asian Nations Blake Herzinger China (People's Republic of China) Irregular Forces / Irregular Warfare Maritime Option Papers South China Sea United States

Options for the People’s Republic of China following the Taiwan Strait Crisis of 1996

Captain Robert N. Hein is a career Surface Warfare Officer in the U.S. Navy.  He previously commanded the USS Gettysburg (CG-64) and the USS Nitze (DDG-94).  He can be found on Twitter @the_sailor_dog.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


“Hence to fight and conquer in all your battles is not supreme excellence, supreme excellence consists in breaking the enemy’s resistance without fighting, thus the highest form of generalship is to balk the enemy’s plans.”  -Sun Tzu  

National Security Situation:  The People’s Republic of China (PRC) is vying to establish itself as the Asian Hegemon.  What caused this rapid shift in the PRC’s foreign Policy?  Why, after decades of growth, where the PRC was ascribed the long view, has it rapidly accelerated military growth, reorganization, and a diplomatic and economic expansion across the world stage in a scale not seen since Zheng He’s voyages of the 15th century?

Date Originally Written:  February 2, 2017.

Date Originally Published:  April 3, 2017.

Author and / or Article Point of View:  This article is taken from the point of view of the PRC toward the U.S in the two decades following the third Taiwan Straight crisis of 1996.

Background:  In 1995, Taiwan’s president visited the U.S. to attend his graduate school reunion at Cornell.  His visit, coupled with the U.S. sale of F-16s to Taiwan, incensed the PRC at what they viewed as possible changes in the U.S. and Taiwan view of the One China Policy.  The PRC commenced a series of missile tests near Taiwan.  The U.S. responded by sending two aircraft carriers to the vicinity of the Strait of Taiwan[1].  The PRC realized they could do little to respond to U.S. actions and needed a way to ensure they never experienced this humiliation again.

Significance:  The law of unintended consequences often applies to national security.  While U.S. action in 1996 was a clear demonstration of U.S. resolve, the PRC’s response has been to pursue a series of actions to reduce and possibly prevent the ability of the U.S. to influence events in Asia.

Option #1:  After viewing the U.S. way of war against Serbia, Afghanistan, and Iraq, whereby the U.S. consistently pushes its aircraft carriers close to the coast and launches strike fighters and tomahawk land attack missiles against targets ashore, the PRC must find a way to extend its borders out to sea into the ocean.  This can be accomplished by placing relatively cheap long-range anti-ship missile batteries along the shore, increasing the number of ships and submarines in the People’s Liberation Army Navy and, in a bold stroke, build islands in the South China Sea (SCS), and claim the surrounding waters as historical boundaries of the PRC.

Risk:  There is a real danger that the U.S. will react to the build-up of PRC forces and rebuild its navy to maintain global influence.  Previous U.S. administrations justified naval build ups to counter the Soviet threat however, by keeping activities below the threshold of armed conflict, we believe the U.S. will not be able to convince its public of the need for a large military buildup, especially following the years of conflict the U.S. has recently experience in the Middle East.  While Asian nations could turn to the U.S. out of fear, this can be mitigated through strong economic measures.  Asian nations may also attempt to challenge the PRC in the international courts, but the lack of enforcement measures in the international system removes this a real concern.

Gain:  Option #1 will prevent U.S. access to the waters they need to block the PRC from maneuvering against Taiwan.  Due to the proliferation of short-range fighters, and the lack of anti-surface capability of many U.S. warships, the ability of the U.S. to offer a timely response to a forcible re-unification of Taiwan could be prevented.

Option #2:  When we look back to Sun Tzu, and realize the best course of action is to attack the enemy’s strategy, we must determine what other strategy the enemy could impose.  While Option #1 will be effective in countering the U.S. ability to easily execute its traditional means of bombardment from the sea, another option is available to the U.S.; the long-range containment strategy used against the Soviet Union could possibly be executed with a long-range blockade.  By focusing on key choke points such as the Strait of Hormuz and the Bab Al-Mandeb from the Red Sea, an adversary could block much-needed commodities such as oil and rare earth elements needed in the PRC defense industry.  Just as the PRC invoked the historical nine-dash line to establish autonomy in the SCS, revitalizing the historical one belt one road to connect Asia to Europe and Africa will easily stop any means of isolating or containing the PRC.  By continuing investment throughout the world, especially in economically disenfranchised areas, the PRC can prevent the types of alliances used by the U.S. during the Cold War to isolate the Soviet Union.

Risk:  If the PRC moves out too quickly, it spreads itself too thin internationally, and risks alienating the very countries with whom it hopes to partner.  The drain on resources over time will become increasingly difficult.  The PRC’s ability to be a free rider on U.S. security will winnow as other countries will expect the same from the PRC.

Gain:  The PRC establishes itself as a both a regional hegemon, and a global power.  The PRC asserts influence over the global economy and geopolitics to rival the U.S. in a multi-polar world.  Option #2 removes the ability of the U.S. to polarize the eastern hemisphere against the PRC.

Other Comments:  Through a rapid economic development program centered on an export economy in a globalizing world, the PRC has embarked on a multitude of options, covering the diplomatic, informational, military and economic spectrum.  It has employed both above options, which have caused the world to react, often favorably to the PRC.  The question for the PRC now is how to maintain the momentum, solidify their role in a changing world order, and not show their hand too quickly lest they implode.  The question for the U.S. is whether it will continue to pursue the U.S. way of war that has been studied so ably by the PRC, or pursue other options as it both cooperates and competes with the PRC on a rapidly evolving world stage.

Recommendation:  None.


Endnotes:

[1]  Ross, Robert, International Security, Vol 25, No 2 (Fall 2000) p 87 The 1995-96 Taiwan Strait Confrontation

Bob Hein China (People's Republic of China) Containment Deterrence Option Papers South China Sea Taiwan

South China Sea Options: An Alternative Route

“The Black Swan” is an officer and a strategist in the U.S. Army.  He has deployed to Iraq and Afghanistan.  He has been a company commander, and served at the battalion, brigade, division, and Army Command (ACOM) level staffs.  The opinions expressed are his alone, and do not reflect the official position of the U.S. Army, the Department of Defense, or the U.S. Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, organization, or group.


National Security Situation:  Japan is one of the most stalwart allies of the United States (U.S.) in Asia.  The U.S. guarantees Japanese security and sovereignty.  Japan serves as one of the principal rivals of the People’s Republic of China (PRC) in Asia.  Japan is an island, however, and depends upon seaborne trade routes, especially those that transit through Southeast Asia.  PRC claims of sovereignty over virtually the entire South China Sea (SCS) pose a direct threat to Japanese security.

Date Originally Written:  January 29, 2017.

Date Originally Published:  March 30, 2017.

Author and / or Article Point of View:  This article is written from the point of view of Japan towards PRC claims in the SCS.

Background:  For the greater part of recorded history, Japan has been a rival of the PRC.  All Japanese attempts to dominate the Asian mainland however, have ended in failure.  The defeat of Japan during WWII decisively put an end to Japanese Imperial ambitions.  Since the end of the Allied post-WWII occupation in 1952, Japan has been one of the most stalwart allies of the U.S. in Asia, and a bastion of western values.  Japan is an economic powerhouse, a vibrant democracy, and possesses an extremely formidable military.  For those reasons, as well as historical animosity, Japan is one of, if not the main rival, of the PRC in Asia.

The lifeblood of Japan’s prosperity flows through the Straits of Malacca, and then northeast through the SCS en route to Japan.  The PRC has laid claim to the SCS as sovereign territory throughout modern history, as well as Taiwan, and Japan’s own Senkaku Islands.  Events in the 21st century have reached a culminating point.  While Japan and the U.S. have guaranteed the inviolability of Japan’s claims to the Senkaku Islands, the PRC has gained de facto sovereignty over the SCS.  The PRC has done so by the construction, improvement, and militarization of artificial islands.  The PRC has vowed to defend its claims, and no member of the international community has chosen to challenge them, beyond legal arbitration through the United Nations.  Recent PRC assertiveness has its roots in an impressive regimen of military modernization and diplomatic initiatives colloquially called the “rise of China”.

Significance:  The PRC control of virtually the entire SCS poses a direct threat to Japan.  The PRC could coerce or compel Japan in any number of ways by cutting or hindering maritime traffic to Japan as it transits out of the Straits of Malacca.  In the event of war, Japan would be at a distinct disadvantage for the aforementioned reasons, to say nothing of its close proximity to the PRC.

Option #1:  Japan diverts inbound maritime traffic immediately until such a time as the issue of the SCS reaches an acceptable resolution.  Maritime traffic exiting the Straits of Malacca/Singapore would transit through the Java to Celebes to Philippine Sea route.  Simultaneously, Japan invests in improving Indonesian and Philippine port facilities/infrastructure along the proposed route.

Risk:  Cost and time.  The current route through the SCS is the shortest route and therefore the cheapest.  Option #1 entails a significant increase in the cost of shipping.  Furthermore, it will be a significant diplomatic effort for Japan to induce the Indonesian government to allow transit on this scale through its territorial waters.  Option #1 will require further diplomatic and economic effort to induce the Indonesian and Philippine governments to allow investment in the type of upgrades to their facilities that would be necessary to sustain such traffic.  Also, this option may embolden the PRC and result in a loss of face for Japan, as it will be perceived that the PRC is driving Japan out of the SCS.

Gain:  Safety for shipping bound for Japan.  This option completely skirts all PRC territorial claims.  Option #1 entails the cultivation of alliances with several Southeast Asian nations.  Furthermore, Option #1 establishes a buffer zone by placing multiple nations, and miles of blue water ocean, between the PRC’s navy and Japanese shipping.  In the event of war between the PRC and Japan, this route would be most difficult to interdict.

Option #2:  Japan immediately begins regular freedom of navigation patrols with its maritime self-defense force (M-SDF) through the SCS, with the option to provide armed escorts to critical maritime traffic.  Simultaneously, Japan seeks military cooperation with SCS claimants other than the PRC (e.g. Vietnam, Indonesia, the Philippines) to protect maritime traffic.

Risk:  The regular deployment of M-SDF ships to the SCS would be viewed as an escalation by the PRC, and an infringement on its sovereignty.  The likelihood of a stand-off at sea would be high (especially if this is a coalition of Southeast Asian nations), with the correlating risk of miscalculation in the use of force becoming casus belli.  Additionally, the more M-SDF ships that are deployed away from the home islands are the more ships that are unavailable to defend the Japanese mainland.

Gain:  This option would establish Japan as the leader against PRC encroachment.  The operational experience and partnerships gained would be invaluable.  Most importantly, this option virtually guarantees U.S. support, if Japan is perceived to be burden-sharing, but especially if Japan is threatened or attacked.  Practically, beginning and sustaining such patrols early on gives the PRC the flexibility to adjust to a new status quo without a loss of face.

Other Comments:  It has been well established here, but is a refrain of paramount importance – Japan must have access to maritime shipping to survive.  Japan can rely on U.S. support, but must stand ready to safeguard its own interests.  Both options presented here have cooperation and alliances with other nations as a common theme.  Operationalizing that theme is the best way for Japan to weather events in the SCS.

Recommendation:  None.


Endnotes:

None.

China (People's Republic of China) Japan Maritime Option Papers South China Sea The Black Swan

U.S. Partnership Options in the South China Sea

Brett Wessley is an officer in the U.S. Navy, currently assigned to U.S. Pacific Command.  The contents of this paper reflect his own personal views and are not necessarily endorsed by U.S. Pacific Command, Department of the Navy or Department of Defense.  Connect with him on Twitter @Brett_Wessley.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Conflicting territorial claims in the South China Sea (SCS).

Date Originally Written:  January 21, 2017.

Date Originally Published:  March 27, 2017.

Author and / or Article Point of View:  The author is a U.S. Naval Officer serving on staff duty at U.S. Pacific Command.  The article is written from the point of view of U.S. policymakers weighing options in Southeast Asia and the SCS.

Background:  Philippine President Rodrigo Duterte’s decision to table the Hague’s Permanent Court of Arbitration June 2016 ruling was a strategic setback for the U.S.[1].  While the Hague’s ruling legally invalidated the People’s Republic of China (PRC) “Nine Dash Line” under the U.N. Convention on the Law of the Seas (UNCLOS), Duterte’s increased ties to the PRC and deteriorating relationship with the U.S. have led to a potential “fait accompli” in the SCS.  Instead of pressing their claims through international engagement, the Philippines has decided to engage the PRC solely through bilateral forums, and the status quo of the PRC occupying and building islands in the SCS will continue unopposed by the principal aggrieved party.

Significance:  The SCS represents a strategic point of friction between the PRC and the international community, particularly with the U.S.  While territorial disputes in the Senkaku Islands and Taiwan involve major military powers and treaty alliances with the U.S., the international environment in the SCS is more permissive to incremental PRC actions to acquire territory (aka “salami slicing”)[2].  The Philippines is the only regional treaty ally to the U.S., and Duterte’s sidelining of the Hague’s ruling imperils regional neighbors like Vietnam, Malaysia and Indonesia – all of whom have territorial disputes with the PRC’s Nine Dash Line.  The danger for the U.S. is that the PRC may militarize its expansive holdings in the SCS and expand the People’s Liberation Army’s defensive perimeter to the south, thus reinforcing the PRC’s counter-intervention capabilities.

Option #1:  The U.S. repairs relations with Duterte and restore the alliance with the Philippines.

Risk:  Duterte has pushed numerous controversial policies within the Philippines during his short tenure as President, namely the extrajudicial killings of drug-related criminals[3].  Duterte’s rhetoric has been alienating and crude, particularly when involving the U.S. and the previous Obama Administration.  Duterte’s strong feelings about the U.S. are deeply rooted within his personal life and Philippine history, and this bias may be insurmountable through diplomacy.  Furthermore, the PRC has offered Duterte significant economic development and loans, all of which were aimed at dissuading him from aggressively pursuing the Hague’s ruling and improving relations with the U.S.

Even if the U.S. was successful in repairing the relationship with Duterte and the Philippines, doing so may create a perception that the U.S. will accept undermining the rule of law in return for strategic concessions.  This messaging is contrary to the U.S.’ position on the SCS and territorial disputes, in addition to open governance and a rules-based international system.  The greatest risk is that in persuading Duterte to move forward with the Philippine’s legal case against the PRC, the U.S. may be forced to abandon the international principles driving its foreign policy.

Gain:  Improved relations with Duterte and the Philippines would restore the U.S.’ foothold in the SCS for promoting a rules-based international system.  The Philippines is a treaty ally and historical partner of the U.S., and it is unlikely that a closer relationship could be formed with other SCS nations.  Additionally, the Philippines successful legal case against the PRC provides legitimacy to its territorial claims – namely against the illegal PRC seizures of several reefs and fishing grounds in the SCS[4].  Although the weakness of the Philippine Navy and Coast Guard has prevented aggressive patrols of its territorial waters, partnership with the U.S. would provide avenues for equipment and training, in addition to opportunities for intelligence sharing and improved maritime domain awareness.

Option #2:  The U.S. pivots diplomatic and military engagement to Vietnam in the SCS.

Risk:  Although the PRC more recently fought Vietnam during the Sino-Vietnamese War of 1979, the bitter history of U.S. involvement in the Vietnam War will complicate relations between the U.S. and Vietnam.  The nominally communist government of Vietnam, and its rejection of democratic governance in favor of one party rule, will likely be domestically unpopular in the U.S. compared to partnership with the Philippines.  Additionally, Vietnam’s historical partnership with Russia may impede meaningful intelligence sharing with the U.S.

Gain:  When compared to the other SCS claimants competing with the PRC, Vietnam’s investment in maritime defensive capabilities is outstanding.  The legacy of Soviet sea-denial strategies has led to Vietnamese investment in coastal defense cruise missiles, integrated air defense systems, submarines, and patrol craft to defend its SCS territories.  Vietnam has militarized its holdings in the SCS in ways the Philippines and other claimants have been unable or unwilling to do. Vietnam’s geography near the major PRC naval bases on Hainan Island, and its holdings throughout the Spratley Islands, would put PRC military assets at asymmetric risk in any regional conflict [5].

If the U.S. was able to gain basing rights from Vietnam, its ability to conduct Freedom of Navigation Operations would be assisted by a Vietnamese Navy and Coast Guard capable of maintaining a presence in contested waters.  As a military partner to the U.S., the deterrent value of Vietnamese military capabilities in the SCS would be a credible improvement over the status quo.  U.S. pursuit of imposing cost on aggressive PRC expansion in the SCS would be uniquely complimented by Vietnamese military capabilities.

Other Comments:  It is important that the U.S. maintains a regional ally in the SCS with territorial holdings.  As an outside power, the U.S.’ goal of maintaining freedom of navigation in international waters can only be supported by partnership with a legitimate claimant.

Recommendation:  None.


Endnotes:

[1]  Ben Blanchard and Reuters, “Duterte says U.S. has lost, aligns Philippines with China,” CNN Philippines, October 21, 2017.  http://cnnphilippines.com/news/2016/10/20/duterte-cuts-us-ties-aligns-with-china.html

[2]  Robert Haddick, “America Has No Answer to China’s Salami-Slicing,” War on the Rocks, February 06, 2014.  https://warontherocks.com/2014/02/america-has-no-answer-to-chinas-salami-slicing/

[3]  James Hookway, “Rodrigo Duterte Ushers Manila Into a New Era,” The Wallstreet Journal, January 16, 2017.  https://www.wsj.com/articles/outsider-ushers-manila-into-new-era-1484560813

[4]  Jaime Laude, “China takes Philippine atoll,” The Philippine Star, March 02, 2016.  http://www.philstar.com/headlines/2016/03/02/1558682/china-takes-philippine-atoll

[5]  Shang-su Wu, “The Development of Vietnam’s Sea-Denial Strategy,” The Naval War College Review, Winter 2017. https://www.usnwc.edu/getattachment/8756f6bf-78d0-4955-b1c6-ce8ee678f5c0/The-Development-of-Vietnams-Sea-Denial-Strategy.aspx

Allies & Partners Brett Wessley China (People's Republic of China) Option Papers Philippines South China Sea United States Vietnam

Options for the Philippines in the South China Sea

Joshua Urness is an officer in the United States Army who has served both in combat and strategic studies roles.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Sovereign Rights of Economic Exclusion Zones (EEZ)[1] in the South China Sea (SCS) and the legitimacy of the international system to enforce them.

Date Originally Written:  January 18, 2017.

Date Originally Published:  March 23, 2017.

Author and / or Article Point of View:  The author is an active duty officer in the U.S. Army.  This article is written from the point of view of the U.S. towards the Philippines, with a desire to ensure the legitimacy of the international system.

Background:  The People’s Republic of China (PRC) is occupying and developing islands in the SCS based on the historical claim of its nine-dashed line.  These occupations have resulted in the direct challenge of the Philippine EEZ, an internationally recognized right of sovereignty, which fully includes the disputed Spratly Islands (Mischief Reef).  In 2016, the United Nations Convention on the Law of the Sea (UNCLOS) ruled that the Spratly Islands are technically rocks, and upheld that they are wholly within the Filipino EEZ.  Therefore, the PRC is in a “state of unlawful occupation[2].”  Countries especially impacted by the PRC’s expansion in the SCS, Malaysia, Philippines, and Vietnam, do not currently possess the military or political capability to challenge the PRC’s actions independently.

Significance:  The stability of security and diplomatic relations in the SCS is important because of the economic trade routes which pass through the waterway, and the potential value of natural resources in the region.  The PRC’s willingness to ignore the UNCLOS ruling on the sovereignty of the Filipino EEZ is an affront to the legitimacy and credibility of the international system and the security status quo.  Further unchecked aggression by the PRC could embolden other states, creating further instability in other parts of the world.  The PRC’s disregard for the ruling, along with their military modernization and investment in power projection capabilities, will enable them to continue to challenge the sovereignty of EEZs throughout the first island chain.  Because the international system cannot enforce its decision, and the Philippines cannot enforce its own EEZ, the credibility of both international and state authorities will be questioned.

Option #1:  The U.S. facilitates Filipino acquisition of low-cost defensive capabilities which will enable them to enforce their own EEZ.  Examples of low-cost defensive capabilities include anti-ship missiles such as the RBS-16 which has a 100-200 nm range, coast guard equipment, and sensors.

Risk:  If the U.S. is not directly involved in the continued procurement and operations of the weapons given to the Filipinos, there may be an increased risk of mistakes or miscalculations being made by untrained and inexperienced Filipino weapons operators.  This includes the integration of sensors and shooters into an organized system in which commanders, with the authority to decide whether or not to fire a system, have enough information and time to make a good decision.  Because of the potential presence of Filipino Islamist or communist insurgents in areas likely to be chosen for weapon system employment, the security of the weapon sites must be emphasized.  If weapons are stolen or obtained by such actors with malign interests, this could destabilize the regions crucial shipping lanes and local maritime economies.  Additionally, inability or lack of political will on the part of the Philippines to use the capability to protect its citizens, or enforce EEZ claims, may perpetuate internal destabilization of the state.  Also, given the PRC’s positioning of military forces on these islands, the provision of weapons to the Philippines risks war over sea lanes through which 25% of global trade passes.

Gain:  Enforcement of the EEZ would enhance the legitimacy of the international system, even if the Filipinos themselves enforced it, as opposed to an internationally sanctioned coalition.  Option #1 would change the cost/risk calculation for the burgeoning PRC navy that may result in a deterrent effect.  Such a capability may also enable the Filipino government to protect its fishermen and economic interests in the EEZ from harassment from the PRC’s maritime militia.  This option would allow the Filipinos to demonstrate resolve, garnering regional and internal credibility, if they decisively utilize these capabilities to deter or defend.  Land based anti-ship missiles are easily maneuverable and concealable, therefore adding to the survivability and resilience of a force that could be in place for a long time.

Option #2:  A U.S.-led coalition defense strategy composed of states surrounding the SCS that is supported by U.S. foreign military funding centered on facilitating procurement, training and information sharing.

Risk:  A U.S. led coalition of SCS states could polarize the region and lead to a less effective Association of Southeast Asia Nations (ASEAN).  This coalition may also stimulate a regional arms race that would be expensive over time for the U.S., despite the somewhat low-cost of capabilities involved.  The cost of building partner capacity could also be expensive over time where countries such as Malaysia and Indonesia, not accustomed to working with the U.S., would require courtship.  Direct U.S. involvement and partnership in mission command and the integration of sensors and shooters into an organized system would require increases in the forward presence of U.S. forces.  This would expose the U.S. to a higher diplomatic commitment than previously held.  This higher level of presence would be necessary to mitigate the risk of mistakes in the use of the capability, as well as the security and posture of the systems.

Gain:  The primary advantages of a U.S.-led coalition are two-fold; it would ensure the credibility of the international system to assist in the enforcement of edicts (though the U.S. is not a signatory of UNCLOS, it does have a vested interest in the stability of the international system), and it would build a broader foundation of deterrence against further PRC expansion in the SCS.  If the U.S. used a strategy similar to the one for which the RAND Corporation advocates, in their report titled Employing Land-Based Anti-Ship Missiles in the Western Pacific[3], coalition states could work towards building the capacity for a “far blockade” of the first island chain.  This would significantly increase the PRC’s naval risk when operating within firing range of any coalition state, challenging the cost imposition and aggression paradigm, while also building capacity and knowledge that may be useful in future conflict.  Similarly, the U.S. could use such partnerships to develop its own capacity and institutional knowledge in land-based maritime denial systems.

Other Comments:  None.

Recommendation:  None.


Endnotes:  

[1]  China and the Philippines have both signed and ratified the UNCLOS. Part five of the convention, article 55 through 75, cover economic exclusion zones. UNCLOS Part V, Article 56, which can be found at http://www.un.org/depts/los/convention_agreements/texts/unclos/unclos_e.pdf, states that; ” In the exclusive economic zone, the coastal State has:

(a) sovereign rights for the purpose of exploring and exploiting, conserving and managing the natural resources, whether living or non-living, of the waters superjacent to the seabed and of the seabed and its subsoil, and with regard to other activities for the economic exploitation and exploration of the zone, such as the production of energy from the water, currents and winds;

(b) Jurisdiction as provided for in the relevant provisions of this Convention with regard to:

(i) The establishment and use of artificial islands, installations and structures;

(ii) Marine scientific research;

(iii) The protection and preservation of the marine environment;

[2]  Graham, E. (2016, August 18). The Hague Tribunal’s South China Sea Ruling: Empty Provocation or Slow-Burning Influence? Retrieved January 07, 2017, from http://www.cfr.org/councilofcouncils/global_memos/p38227

[3]  Kelly, T., Atler, A., Nichols, T., & Thrall, L. (2013). Employing Land-Based Anti-Ship Missiles in the Western Pacific. Retrieved January 07, 2017, from http://www.rand.org/pubs/technical_reports/TR1321.html

Allies & Partners China (People's Republic of China) Joshua Urness Maritime Option Papers Philippines South China Sea

U.S. Options Towards a Rising People’s Republic of China

Captain Brian T. Molloy has served in the U.S. Army in Afghanistan and various posts around the U.S.  He presently works as a Project Manager at the U.S. Army Corps of Engineers in Pittsburgh, PA.  The opinions expressed in this article are his alone and do not reflect the official position of the U.S. Army, the Department of Defense, or the U.S. Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  U.S. options towards the People’s Republic of China (PRC) as it continues to rise and increase its influence in the region surrounding the South China Sea (SCS).

Date Originally Written:  January, 26, 2017.

Date Originally Published:  March 20, 2017.

Author and / or Article Point of View:  Author is an active duty U.S. Army Officer.  Author believes in the use of force as a last resort and where possible, diplomacy should be the primary lever in influencing foreign powers.

Background:  The U.S. and the PRC are currently playing out a classic dyadic relationship according to power transition theory[1].  This power transition theory is playing out in the SCS with the rising PRC asserting itself militarily and the declining U.S. attempting to reassert control of the region by addressing such military action with “balancing” actions.  Recently U.S. balancing actions have utilized the military instrument of power with the Pacific Pivot[2] and freedom of navigation missions as the most visible.  This U.S. response is playing directly into the beginning stages of a conflict spiral that so often follows with a power transition[3].  The idea of a military deterrent is often floated as the logical alternative to war.  In this case, however, both of the major powers are already a nuclear power with a nuclear deterrent in place.  This nuclear deterrent works to ensure that a direct conflict between the two would be unlikely, however, as we saw in the Cold War, this deterrent does not keep the powers from fighting through proxy wars.  The options presented in this article assume rising influence of the PRC and a declining influence of the U.S., both militarily and economically, in the region.  The SCS has become a potential flash point between the two powers as the PRC uses it’s military to claim land that is also claimed by longtime U.S. Allies in the region.

Significance:  In an increasingly multi-polar global environment, regional powers such as the PRC are becoming a larger threat to U.S. interests throughout the world.  The potential for conflict in the SCS represents the opportunity for the U.S. to either assert influence in the region or cede that influence to a rising PRC.  Control of the SCS is essentially a trade-driven power move by the PRC towards its neighbors.  As such, trade could be the primary focus of the response from the U.S.towards the PRC vice a more dangerous military confrontation.

Option #1:  The U.S. and the PRC seek a strong bi-lateral trade agreement to replace the Trans Pacific Partnership (TPP) and the U.S. leverages negotiations on this trade agreement to provide security guarantees to allies in the SCS region.

With the downfall of the TPP the option to enter into a strong bi-lateral trade deal with the PRC is now open.  Negotiating this deal requires nuance and the ability to intertwine defense and trade into an agreement that is both beneficial to all economically, but also sets limits on military actions seen to be provocative to the U.S. and its Allies in the region.  Precedent for this sort of diplomatic economic deterrent action can be seen in post WWII Western Europe with the European Steel and Coal Community (ECSC)[4].  When complete, Option #1 would be an economic deterrent to conflict in the region.  This economic deterrent will utilize trade agreements to ensure the U.S. and the PRC are entwined economically to the point that a military conflict, even a proxy conflict, would be too costly to both sides.  This economic deterrent could be the action that needs to be taken in order rebalance power in the region.

Risk:  The largest risk in entertaining this approach is that it opens the U.S. to the risk of an economic catastrophe if the approach fails.  This risk would likely be unpalatable to the U.S. public and would have to be crafted carefully.  Additionally, under the current administration, a trade deal similar to this could be difficult due to the ongoing rhetoric coming from the White House.  Finally, this approach risks leaving long-time U.S. Allies no way to dispute their claims in the SCS.

Gain:  This agreement gains the lessened risk of a conflict between the U.S. and the PRC and also has the potential for large economic growth for both sides.  A mutually beneficial trade agreement between two of the largest economies in the world has the potential to remove the risk of conflict and simultaneously improve quality of life domestically.

Option #2:  The U.S. can use its trade power to balance PRC influence in the region through encouraging the Association of Southeast Asian Nations (ASEAN) to trade as a bloc.  This is essentially an Asian version of the European Union which can build multilateral trade agreements and also leverage economic sanctions to assert power in the region.  Building ASEAN to be able to handle this would require a more inclusive membership of some of the more powerful Asian countries, Japan, and the Republic of Korea among them.  This effort would require a radical overhaul of the ASEAN bloc but would benefit much smaller countries as they try to address the influence of the PRC.

Risk:  The U.S., particularly under the current administration, is not a proponent of supranational organizations.  In order for Option #2 to work the U.S. must have a stake in the game.  Additionally, the U.S. risks losing influence in the region to the newly formed ASEAN economic power.  There is the possibility that the newly formed ASEAN could forge close ties with the PRC and other trading partners and leave the U.S. out.  Finally, the SCS is fraught with competing claims not only between the PRC and ASEAN members, but among ASEAN members themselves.  Those conflicts must be worked out before the ASEAN bloc could effectively manage the PRC.

Gain:  This option allows the U.S. to leverage the comparative power of an ASEAN bloc of mostly friendly countries to impose sanctions on the PRC on its behalf.  In this way the U.S. is pushing regional allies take care of their own backyard while still maintaining influence in the region.  The U.S. also benefits as it is able to trade effectively with a large number of Asian countries without entering into a free trade agreement like the TPP.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Garnett, J. (2010). The Causes of War and the Conditions of Peace, in John Baylis et al, Strategy in the Contemporary World: An Introduction to Strategic Studies’ (3rd Edition OUP 2010), (pp. 19–42). Oxford, UK: Oxford University Press; 3rd Edition

[2]  Panetta, L. E., & Obama, B. (2012). Sustaining U.S. global leadership: priorities for 21st century defense. (pp. 2). Washington, D.C.: Dept. of Defense.

[3]  Cashman, G. & Robinson L. (2007). An Introduction to the Causes of War. Patterns of Interstate Conflict from World War I to Iraq. (pp. 1–25). Lanham, MD: Rowman & Littlefield Publishers Inc

[4]  Alter, K, & Steinberg, D. (2007). The Theory and Reality of the European Coal and Steel Community.  Buffet Center for International and Comparative Studies, working paper No. 07-001

Association of Southeast Asian Nations Brian T. Molloy China (People's Republic of China) Economic Factors Option Papers South China Sea United States

South China Sea Options: The Road to Taiwan

“The Black Swan” is an officer and a strategist in the U.S. Army.  He has deployed to Iraq and Afghanistan.  He has been a company commander, and served at the battalion, brigade, division, and Army Command (ACOM) level staffs.  The opinions expressed are his alone, and do not reflect the official position of the U.S. Army, the Department of Defense, or the U.S. Government.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, organization, or group.


National Security Situation:  The Republic of China (Taiwan) exists in a singular position in world affairs.  Taiwan is viewed as a breakaway province by the communist People’s Republic of China (PRC), who controls the Chinese mainland.  However, Taiwan possesses its own government, economy, and institutions, and its nominal independence has been assured by the United States (U.S.) since 1949.  However, the PRC views any move toward actual independence as casus belli under its “One China” policy, which has been in place for decades.  Recognition or even acknowledgement of Taiwanese positions is a veritable geopolitical and diplomatic taboo.

The recent election of Donald Trump as president of the United States (POTUS) potentially undermines the previous order that has been in place since the Nixon Administration.  Campaigning as a change agent, and one to defy convention, President Trump has suggested the U.S. rethink the “One China” policy.  POTUS’ reception of overtures from Taiwan and hard rhetoric towards the PRC brings the question of Taiwan’s status and future to the forefront of geopolitics once again.

Date Originally Written:  January 28, 2017.

Date Originally Published:  March 16, 2017.

Author and / or Article Point of View:  This article is written from the point of view of Taiwan towards PRC claims in the South China Sea (SCS).

Background:  The communist victory during the Chinese Civil War caused the Nationalist government under Chiang Kai-Shek, with 2 million of its supporters, to flee from the Chinese mainland to the island of Taiwan.  The gradual transition of the island to a democratic form of government, its industrialized, capitalist economy, and its reliance on western benefactors for defense established it as a bulwark of western influence in Asia.  As a result of Cold War rivalries and competing ideologies, the independence of Taiwan has been assured in all but name for more than 65 years by the U.S.  A series of crises, most recently in 1996, demonstrated the inability of the PRC to project military force against Taiwan, and the willingness of the U.S. to ensure Taiwan’s independence.  Today, though the PRC is internationally recognized as the government of China, and the “One China” policy is a globally accepted norm, Taiwan still maintains de facto independence.

Events since the onset of the 21st century have caused the balance of power to shift ever more in favor towards the PRC.  Impressive military expansion and diplomatic initiatives on the part of the PRC have emboldened it to challenge U.S. hegemony in Asia, and defy United Nations (UN) mandates.  The most overt of these initiatives has been the PRC’s assertion of sovereignty over the SCS, and the seeming unwillingness of the international community to overtly challenge PRC claims, beyond referring them to legal arbitration.  The emerging policies of the newly elected POTUS may further exacerbate the situation in the SCS, even as they may provide opportunities to assure the continued independence of Taiwan.

Significance:  Taiwan is a democracy, with a dynamic capitalist economy.  It has diplomatic and military ties to the U.S., and other countries, through arms sales and informal partnerships.  It is strategically positioned along major oceanic trade routes from Southwest Asia to Japan and South Korea.  The issue of Taiwanese independence is a global flash point due to PRC adherence to the “One China” policy.  If the U.S. were to abandon Taiwan, it would effectively terminate the notional independence of the island, and end any hopes of preventing the PRC from becoming the regional hegemon.

Option #1:  Taiwan rejects all PRC claims to the SCS, beyond its exclusive economic zone (EEZ), and supports the rulings of the UN Permanent Court of Arbitration, with the goal of gaining international support, especially from the new U.S. administration.

Risk:  The PRC maintains sovereignty over all Chinese affairs.  Such an act would undoubtedly result in a forceful response from the PRC.  The PRC may move militarily to isolate Taiwan and/or attempt to force a change in government through any means necessary.  Depending on the perceived international response, the PRC may resort to war in order to conquer Taiwan.

Gain:  Taiwan must break its diplomatic isolation if it is to survive as an independent state.  This means currying favor with the UN, regional powers such as Japan and South Korea, and other regional nations such as Vietnam and the Philippines.  Moreover, given the new POTUS’ perceived willingness to break from the “One China” policy, there is a chance to induce greater commitment from the U.S. by ensuring Taiwan’s policies match those of the U.S.

Option #2:  Taiwan maintains the status quo and adheres to the “One China” policy, even in the face of tough U.S. rhetoric.

Risk:  If the PRC’s ambitions are not curbed, the status quo will no longer be enough for PRC leaders.  The creation and subsequent defense of artificial islands in the SCS is a relatively low risk activity.  If the response of the international community is found wanting, then it will only embolden the PRC to seek bigger game.  The ultimate conquest of Taiwan, while by no means an easy task, is a logical step in fulfilling the PRC’s regional ambitions.  Conversely, standing with the PRC may infuriate the new POTUS, and result in the withdrawal of U.S. support.

Gain:  The PRC has successfully integrated other economic and governmental systems into its own system before, under the “One Party, Two Systems” policy.  While this led to a loss of political freedom for Macau and Hong Kong, the two former enclaves still maintain their capitalist systems, and enjoy very high standards of living.  Furthermore, Taiwan is culturally and economically closer to the PRC than to any other nation.

Other Comments:  Any conflict between the PRC and Taiwan would be devastating to the island.  The PRC is simply too large and too close.  However, Taiwan has been nominally independent for more than 65 years.  Its people are the descendants of the generations that fought the communists, and stood firm during the Cold War, events that are still in living memory.  Independence from the mainland is the legacy of the island, and is worth fighting for.

Recommendation:  None.


Endnotes:

None.

China (People's Republic of China) Option Papers South China Sea Taiwan The Black Swan

Options for Singapore in the South China Sea

Blake Herzinger served in the United States Navy in Singapore, Japan, Italy, and exotic Jacksonville, Florida.  He is presently employed by Booz Allen Hamilton and assists the U.S. Pacific Fleet in implementation and execution of the Southeast Asia Maritime Security Initiative.  His writing has appeared in Proceedings and The Diplomat.  He can be found on Twitter @BDHerzinger. Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Singapore’s outlook on the South China Sea (SCS) dispute.

Date Originally Written:  January 13, 2017.

Date Originally Published:  March 13, 2017.

Author and / or Article Point of View:  Author believes in freedom of navigation and maintenance of good order at sea in accordance with the customary and written law of the sea.  This article is written from the point of view of Singapore toward the SCS dispute.

Background:  Conflicting territorial claims, as well as opposing interpretations of entitlements provided by the United Nations Convention on the Law of the Sea (UNCLOS), have heightened tensions throughout the SCS.  The maritime order protected by decades of U.S. Navy engagement is being actively challenged by the People’s Republic of China (PRC), which seeks a reorganization of the order without U.S. primacy.  Singapore sits astride the most critical sea-lane in Asia leading into the partially-enclosed SCS, but is not itself a claimant state in the myriad of disputes.  Singapore does have a vested interest in the peaceful and successful rise of its leading trade partner, the PRC, as well as a critical interest in continued deep engagement in the Pacific by its closest defense partner, the U.S.  Although Singapore’s population is nearly 75% ethnic Chinese, the microstate has made every effort to chart an independent, pragmatic course in foreign policy.  However, the PRC has recently increased pressure on Singapore to stay out of the debate on the SCS[1].

Significance:  Freedom of the seas is an “economically existential issue” for Singapore[2].  The rules-based order underpinned by freedom of navigation, and adherence to the UNCLOS, provided decades of economic growth and success in the region, particularly for Singapore.  However, the PRC’s desire to force a reorganization of the maritime order is directly resulting in erosion of accepted international maritime law and the PRC’s resultant conflicts with the U.S. and Association of Southeast Asian Nations (ASEAN) casts a shadow of doubt over the economic future of the region.  For Singapore, the outcome of the SCS dispute(s) may determine its entire economic future.

Option #1:  Singapore continues advocacy for freedom of navigation and pursuit of friendly relations with the U.S. and the PRC, while maintaining a policy of non-alignment.

Risk:  An increasingly powerful PRC constricts the diplomatic space for middle powers trapped between itself and the U.S., as evidenced in the PRC’s behavior toward Singapore over the past year.  The seizure of Singaporean Armed Forces Terrex vehicles in Hong Kong, recent inflammatory language published in China’s Global Times, and ominous warnings by the PRC that smaller states “need not and should not take sides among big countries,” are overt signaling to Singapore to avoid any position contrary to Chinese interests in the SCS[3][4][5].  More plainly, Singapore will suffer consequences if it is seen to side with the U.S.  Despite efforts to balance diplomatically, Singapore’s reliance on freedom of navigation will inevitably lead to confrontation regarding PRC activities in the SCS and, without a Great Power ally, Singapore may be left vulnerable to PRC pressure.

Gain:  In 51 years of statehood Singapore has achieved both the strongest economy in Southeast Asia and the most advanced military.  In this option’s best-case scenario, Singapore would continue to reap the benefits of partnership with both the PRC and the U.S. without either side trying to force the microstate to the sidelines, or into opposition with the other.

Option #2:  Singapore directs support for the PRC’s positions in the SCS.  Singapore could decouple itself from its defense relationship with the U.S. and effectively capitulate to Chinese demands.

Risk:  The opacity of the PRC’s goals for the SCS is the largest risk.  If the PRC succeeds in becoming the dominant power in the area, will freedom of navigation and free trade be protected, or restricted?  Unless Singapore knows the answer to this question, the existential risk posed to Singapore’s future would be catastrophic in scale.  Even if the PRC encourages free trade, by aligning itself with the PRC Singapore stands to lose its reputation for independence, undermining its trusted position as an honest broker and neutral place of business.

Domestic repercussions would be equally damaging.  Singapore’s population may be predominantly Chinese, but it is a multiethnic society with codified policies of racial equality, with the stated ideal that citizens see themselves as Singaporean rather than identifying by their ethic group.  Minority groups would almost certainly interpret a swing toward the PRC as the end of the meticulously guarded Singaporean identity standing as a bulwark against the racial discord that spurred race riots in Singapore’s infancy[6].

As a small, predominantly Chinese state between two large Muslim states historically suspicious of its defense policies, Singapore would also be inviting new friction with Malaysia and Indonesia by appearing to swing toward the PRC.  Furthermore, Singapore would likely lose high-level military training opportunities with the U.S., as well as unilateral training opportunities its forces enjoy on U.S. soil.

Siding with the PRC would significantly degrade the ASEAN structure by departing from the official non-alignment of the organization.  This would be a significant victory for Beijing, which has previously succeeded in driving wedges through ASEAN, but not with a country as vital to the group as Singapore.

Gain:  In the short-term, the PRC would likely reward Singapore for its obedience, possibly in the form of cessation of public castigation, as well as increased economic cooperation.  Should the PRC’s goals include regulation and control of the SCS, Singapore might find itself a beneficiary of PRC largesse as a state that did not block its ambitions.

Option #3:  Singapore begins actively participating in freedom of navigation operations, either unilaterally or multilaterally.

Risk:  Option #3 is the most likely to elicit retaliatory measures from the PRC, where the government would almost certainly interpret the action as siding with the U.S..

Gain:  Option #3 would first and foremost provide reinforcement to the freedom of navigation upon which Singapore itself depends.  Additionally, it could serve to combat the Chinese narrative of U.S. containment, instead highlighting the fact that the PRC’s unilateral actions have taken place “against the rights and freedoms of the international community [7].”

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  United States Central Intelligence Agency (2017). The World Factbook – Singapore. Retrieved 15 January, 2017, from https://www.cia.gov/library/publications/the-world-factbook/ geos/sn.html

[2]  Sim, W. (2015, March 5). Freedom of navigation vital to S’pore. The Straits Times. Retrieved from http://www.straitstimes.com/singapore/freedom-of-navigation-key-to-spore-shanmugam

[3]  Ping, C.K. (2016, November 25). China comments on Singapore armored vehicles. The Straits Times. Retrieved from http://www.thejakartapost.com/seasia/ 2016/11/25/ china-comments-on-singapore-armored-vehicles-and-equipment-seized.html

[4]  Loh, S. (2016). Full Text of Ambassador Stanley Loh’s Letter to Global Times Editor-In-Chief Hu Xijin, in response to an article by Global Times (Chinese) dated 21 September 2016. Retrieved from Singapore Ministry of Foreign Affairs website: https://www.mfa.gov.sg/content/mfa/media_centre/press_room/ pr/2016/ 201609/full-text-of-ambassador-stanley-loh-s-letter-to-global-times-edi.html

[5]  The State Council Information Office of the People’s Republic of China. (2017). China’s Policies on Asia-Pacific Security Cooperation. Retrieved from http://news.xinhuanet.com/english/china/2017-01/11/c_135973695.htm

[6]  Han, J (n.d.). Communal riots of 1964. In Singapore Infopedia. Retrieved from http://eresources.nlb.gov.sg/infopedia/articles/SIP_45_2005-01-06.html

[7]  The Struggle for Law in the South China Sea: Hearings before the Seapower and Projection Subcommittee on Seapower and Projection Forces, House of Representatives, 114th Cong. 11 (2016) (Testimony of James Kraska).

Blake Herzinger China (People's Republic of China) Maritime Option Papers Singapore South China Sea

Anti-Access / Area Denial Options in the South China Sea

Ryan Kort is a Strategic Plans and Policy Officer (Functional Area 59) in the U.S. Army.  He currently serves as the Chief of the Strategy Branch at U.S. Army Africa / Southern European Task Force in Vicenza Italy.  He is on Twitter @kort_ryan36.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The People’s Republic of China (PRC) creation of islands and militarization of reclaimed islands in the South China Sea (SCS).

Date Originally Written:  February 9, 2017.

Date Originally Published:  March 9, 2017.

Author and / or Article Point of View:   This article, written from the point of view of a U.S. national security staffer, aims to provide both a collective security and an Anti-Access / Area Denial (A2/AD) deterrent option to the U.S. National Security Advisor.

Background:   The PRC adopted a policy of island building over shallow shoals in the SCS.  The PRC forcibly evicted and continues to harass commercial and naval vessels from other SCS claimants such as the Philippines, Vietnam, and Malaysia through use of fisherman ‘militias’ as naval proxies and other means of gray-zone or ‘hybrid’ warfare[1].  The PRC continues the rapid transformation of many of these semi-submerged reefs into islands replete with hard surface runways for strike aircraft and long-range air defense and fires (both tube and missile) capabilities, which pose an A2/AD threat to any actors the PRC may seek to keep out of its claimed ‘9 dash line’ area[2].  

Significance:  Other nations that border the SCS view the PRC’s actions as destabilizing, illegitimate, and threatening to their important national security and economic interests.  Several reclaimed islands are within the Exclusive Economic Zones recognized by the United Nations Convention on the Law of the Seas[3].  The SCS is a critical economic transit route, which approximately 30 percent of all annual maritime trade passes through, including $1.2 Trillion worth of goods destined for U.S. markets[4].  In times of crisis, the People’s Liberation Army, Navy and Airforce could disrupt the free movement of commerce through the area and coerce other nations in the region to recognize PRC dominion over the SCS.

Option #1:  Utilize diplomatic efforts to contain the PRC through the creation of a collective security organization, similar to the now defunct Southeast Asian Treaty Organization also known as SEATO.  This treaty organization would provide a deterrent option aimed at containing PRC adventurism and change PRC strategic calculation on future island building.  

Risk:  The PRC will view this diplomatic effort to isolate their nation as overt containment and respond in a variety of ways with multiple means[5].  At the greatest risk will be those nations the PRC deems vulnerable to coercion that it could peel away from the organization and undermine U.S. legitimacy.  Additionally, this option risks immediate failure if those partners critical to the success of the collective security organization do not join- specifically Australia, the Philippines, Singapore, and Indonesia.  This option also may become obsolete if the PRC completes the construction and garrisoning of the islands it needs to assert complete dominance over the SCS before an alliance to balance against it is in place[6].  

Gain:  The U.S. checks the rise of a regional and potential global peer competitor.  The U.S. stands to gain increased security cooperation and economic ties with the nations in the collective security organization.   

Option #2:  Utilizing a multi-domain concept, the U.S. and select allies create an A2AD challenge for the PRC along both the ‘first’ and ‘second’ island chains in order to negate some of the operational and tactical advantages of PRC bases in the region.  The entire coastline of the PRC is vulnerable to area denial.  A strong foundation of U.S. Army maneuver, fires, and sustainment capabilities would enable the U.S. Navy and U.S. Air Force to operate more effectively within the region, while presenting the additional dilemma of embarked U.S. Marine Expeditionary Forces capable of striking critical facilities.  An archipelagic defense through deterrence by denial would need expanded access to existing bases in Japan, with new footprints in the Philippines, Malaysia and Indonesia[7].  The U.S. could employ a mixture of permanent or rotational forces in the region to demonstrate U.S. capability and resolve.  Additionally, the U.S. must have sufficient forces in the region capable of blockading PRC transit through the Strait of Malacca if required.

Risk:  The key risk associated with this option is vertical and horizontal escalation.  A minor incident could intensify quickly and impact other theaters in the U.S. Pacific Command area of responsibility, such as Korea.  Another risk is loss of or initial refusal to allow access to bases in the nations mentioned earlier, which would unhinge this option.  Additionally, resourcing this A2/AD effort with sufficient forces would commit limited U.S. resources, such as air defense and long-range joint fires, to this single problem set.

Gain:  The U.S. deters conflict through placing PRC assets at risk in both the SCS and across the majority of the Chinese seaboard.  Additionally, this option presents the PRC with a dilemma if it should attempt to utilize hybrid or militia forces due to the increased presence of U.S. and allied forces capable of deterring such ‘hybrid’ aggression at the tactical and operational level.     

Comments:  None.

Recommendation:  None.  


Endnotes:

[1]  De Luce, Dan and McLeary, Paul, In South China Sea, a Tougher U.S. Stance, Foreign Policy, 02 October, 2015, accessed 09 February, 2017  http://foreignpolicy.com/2015/10/02/in-south-china-sea-a-tougher-u-s-stance/

[2]   Kennedy, Connor and Erickson, Andrew, (21 April 2016). Model Maritime Militia- Tanmen’s leading role in the Scarborough Shoal Incident,  Center for International Maritime Security (CIMSEC), accessed 06 January, 2017, http://www.andrewerickson.com/2016/04/model-maritime-militia-tanmens-leading-role-in-the-april-2012-scarborough-shoal-incident/

[3]  Office of the Secretary of Defense, Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China, 2016;  page 7

[4]  Corr, Anders, How the US can help the Philippines Counter China’s occupation of Mischief Reef, Forbes Magazine Online, 28 January 2017, accessed 09 February 2017. http://www.forbes.com/sites/anderscorr/2017/01/28/is-war-against-china-justified/#5066ccc774fb

[5]  Lieberthal, Kenneth and Jisi, Wang, Addressing U.S- China Strategic Distrust, March 2012, Brookings Institute.  Washington’s security ties with other nations in the region and other actions viewed by China as efforts to constrain China.

[6]  Office of the Secretary of Defense, Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China, 2016;  Page i

[7]  Krepinevich, Andrew, Foreign Affairs, Volume 94, Number 2,  How to Deter China- The Case for Archipelagic Defense, pp 78-86, March/April 2015  

A2AD (Anti Access and Area Denial) Allies & Partners China (People's Republic of China) Deterrence Option Papers Ryan Kort South China Sea United States

South China Sea: Continuous U.S. Presence or a new Law of the Sea Treaty 

David Mattingly serves on the board of directors for the Naval Intelligence Professionals and is also a member of the Military Writers Guild.  The views reflected are his own and do not represents the United States Government of any of its agencies.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United Nations Convention for the Law of Sea (UNCLOS III) has failed to adequately define a nation’s territorial waters and to create a body which can enforce its judgements on nations involved in arbitration.

Date Originally Written:  February 7, 2017.

Date Originally Published:  March 6, 2017.

Author and / or Article Point of View:  David Mattingly is retired from the U.S. Navy and has sailed with U.S. Navy Carrier Task Groups in the South China Sea (SCS).  He holds a Masters of Arts in National Security Studies where he studied the geopolitics of the SCS and authored “The South China Sea Geopolitics: Controversy and Confrontation.”

Background:  Over the centuries, a few countries with strong navies controlled the world’s oceans.  The outcome of many conflicts fought on land often had a strong maritime element.  Dutch jurist Hugo Grotius first addressed the Law of Sea in his 1609 treatise Mare Liberum in which he established the idea of the freedom of the seas[1].  After  World War II and the emergence of the United Nations, the first Convention of the Law of the Sea (UNCLOS) concluded with four treaties being signed: Convention on the Territorial Sea and the Contiguous Zone (CTS); Convention on the High Seas (CHS); Convention on Fishing and Conservation of the Living Resources of the High Seas (CFCLR); and Convention on the Continental Shelf (CCS); as well as the Optional Protocol of Signature concerning the Compulsory Settlement of Disputes (OPSD)[2].  UNCLOS II convened in Malta to discuss territorial seas and fishery limits, however, the convention ended without agreeing upon a new treaty[3].  Today, UNCLOS III has been accepted by 167 nations and the European Union, however, although the U.S. has agreed in principle to the convention, it has not been ratified by the U.S.[4].  In the last attempt for ratification in 2012, it failed due to the “breadth and ambiguity” of the treaty and because it was not in the “national interest of the United States” to give sovereignty to an international body.  Ratification was overwhelmingly supported by the Department of Defense and the U.S. shipping industry[5][6].

Traditionally, a nation’s territorial boundary was established as a three-mile belt along its coastline based on the distance that a cannon could shoot a projectile.  All waters beyond the three-mile limit were considered international territory.

Today, the SCS is a possible flash point for confrontation over unresolved issues of the UNCLOS III between the Peoples Republic of China (PRC), its neighboring states which have joined to form the Association of Southeast Asian Nations (ASEAN), and the U.S.  The islands in the SCS remained largely uninhabited until the mid-1970s when the PRC began to lay claim to a number islands and shoals which were claimed during the reign of Emperor Yongle of the Ming Dynasty in 1405 and later claimed by the PRC in what has come to be known as the “Nine-dash line[7].”  A map which was produced after World War II extended the PRC’s territorial waters claim deep into the SCS.  France challenged the PRC’s claim in 1931 by claiming the Parcel Islands and the Spratley Islands as territory of French-Indo China which then passed to the government of Vietnam after the Franco-Indo China War ended in 1954[8].

To understand UNCLOS III, it is important to first understand the definitions of terms such as the differences between an island and a rock.  The PRC began an aggressive land reclamation program where soil was dredged from the ocean bottom to create islands, which have standing under UNCLOS III, unlike rocks and shoals which are not recognized.  The islands created by the PRC can support military garrisons, home porting of both military and fishing ships, and extend the PRC’s territorial limits under the “archipelagos concept[9].”  Within UNCLOS III, this concept furthers a nation’s territorial rights by considering the seas between the mainland and the islands claimed by a nation as a connecting, rather than separating, element.  The PRC could therefore declare an emergency and suspend the “right of innocent passage” for its self-protection.

Significance:  Merchant shipping between Asia, the Middle East, and the Americas transverse the SCS and a PRC declaration of emergency which suspended the “right of innocent passage” would have major impact in global shipping.

Option #1:  The U.S. and coalition naval forces create a continuous presence in the SCS and actively challenge PRC naval activities and construction of and on islands and rocks in dispute.

Risk:  The PRC has openly harassed and attacked ships and aircraft of the U.S. and ASEAN member nations.  The PRC has established the SCS as its home waters and had several years to construct military garrisons on the islands which it created.  It is possible that the Peoples Liberation Army Navy (PLAN) has placed surface to air missiles on the larger islands.  Additionally, the PLAN has aggressively modernized its ships and aircraft to include launching its first aircraft carrier.  As such, Option #1 may increase the possibility of a naval confrontation between the U.S. and the PRC.

Gain:  A naval coalition could provide protection for fishing and merchant shipping in the SCS and shape the narrative that the international community will not idly allow the PRC to control one of the most important sea lines of commerce.

Option #2   The U.S. and other nations could call for UNCLOS IV.  As evidenced by recent events in the SCS, UNCLOS III left many gray areas that are open for arbitration and the decisions lack the power of enforcement.  UNCLOS IV would address these gray areas and establish an enforcement framework.

Risk:  Major powers agreeing to a new UNCLOS could perceive that they have lost sovereign rights.  The UN lacks the ability to enforce treaties unless the major powers are onboard thus the text of a new UNCLOS would have to be carefully worded.

Gain:  In creating an agreement that is recognized by the international community, confrontation between the U.S., the PRC, and ASEAN may be avoided.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Harrison, James. July 5, 2007. Evolution of the law of the sea: developments in law -making in the wake of the 1982 Law of the Sea Convention.

[2]  Treves, Tullio. 1958 Geneva Conventions on the Law of the Sea. United Nations.  http://legal.un.org/avl/ha/gclos/gclos.html

[3]  Second United Nations Convention on the Law of the Sea 17 March – 26 April 1960 Geneva, Switzerland. , January 8, 2017. Washington School of Law, American University. http://wcl.american.libguides.com/c.php?

[4]  The Convention of the Law of Sea. U.S. Navy Judge Advocate Corps. http://www.jag.navy.mil/organization/code_10_law_of_the_sea.htm

[5]  Patrick, Stewart M, June 10, 2012. (Almost) Everyone Agrees: The U.S. Should Ratify the Law of the Sea Treaty. The Atlantic. https://www.theatlantic.com/international/archive/2012/06/-almost-everyone-agrees-the-us-should-ratify-the-law-of-the-sea-treaty/258301/

[6]  Senators Portman and Ayotte Sink Law of the Sea. July 16, 2012. Portman Senate Office, Washington, DC.

[7]  Tsirbas, Marina. , June 2, 2016. What Does the Nine-Dash Line Actually Mean? The Diplomat. http://thediplomat.com/2016/06/what-does-the-nine-dash-line-actually-mean/

[8]  Bautista, Lowell B. 2011.  Philippine Territorial Boundaries: Internal tensions, colonial baggage, ambivalent conformity.  University of Wollongong. New South Wales, http://jati-dseas.um.edu.my/filebank/published_article/3162/035 053%20Lowell%20B.%20Bautista-
 Philippine%20Territorial,%20JATI%20VOL16,%202011-%20new.pdf

[9]  Katchen, Martin H. 1976. The Spratly Islands and the Law of the Sea: “Dangerous ground” for Asian Peace. Presented at the Association of Asian Studies, Pacific Area Conference.  June.  Revised and published in the Asian Survey. 

China (People's Republic of China) David Mattingly Maritime Option Papers South China Sea Treaties and Agreements United States

Options to Arm Volunteer Territorial Defense Battalions in Ukraine

Daniel Urchick is a defense and foreign policy analyst and a Young Professionals in Foreign Policy East Europe and Eurasia Fellow.  Daniel tweets at @DanielUrchick.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Ukrainian-Separatist conflict in the Donbas.

Date Originally Written:  February 20, 2017.

Date Originally Published:  March 2, 2017.

Author and / or Article Point of View:  This article is written from the perspective of a Ukrainian National Security Advisor, offering options on the possible utilization of the pro-Ukrainian government territorial defense battalions, supplementing the regular military and Ukrainian Government’s efforts to either defeat the separatists in the Donbas region, or create a more favorable situation on the ground for the next round of peace talks.

Background:  The Ukrainian military appears to have begun what has been characterized as a “creeping offensive [1]” to the north of Donetsk City in the Donetsk People’s Republic (DNR).  Ukrainian Military forces have made limited advances into the neutral space between government and separatist-controlled territory, known as the “gray zone,” to capture several contested villages such as Novoluhanske north of the city of Horvlika.  It is estimated that about 5,000 Russian troops remain in the Donbas in various capacities along with about 40,000 pro-Russian separatists.  The Ukrainian Military has an estimated 60,000 soldiers along the line of contact with an additional unofficial estimate of 10,000-11,000 “territorial defense battalion” personnel along the front and dispersed around the country.  There are currently 40 territorial defense battalions operating in Ukraine today[2].

Most of the territorial defense battalions were formed by wealthy business oligarchs who provide the majority of the funding and limited supplies.  As a result, most men in any given battalion are likely more loyal to the oligarch that formed the organization than to the State.  Most battalions are integrated into the Ukrainian Military to some degree.  Some remain completely outside the official Ukrainian Military structure.  Still others are in the process of being more fully integrated into the Ukrainian Military structure.  Non-integrated defense battalions do not receive sufficient materiel and logistical support from the military thus they cannot adequately defend against or attack the heavily armed separatists.  Integrated battalions fair little better in their armament and have been provided second tier light armor assets.

Significance:  The arming of territorial defense battalions is an important question aimed at winning the conflict with the Separatists in the Donbas, or at the least, producing a more favorable situation on the ground in future peace negotiations.  The battalions are an important source of manpower with high morale that could be better utilized.  Providing better equipment to the battalions could radically impact the domestic political situation in the Ukraine.  Thus, the right answer to the question of arming the battalions is important to both the defense and political communities in Ukraine, but also to every Western nation supporting Ukraine.

Option #1:  Supply territorial defense battalions full access to the Ukrainian Military’s arsenal of modern heavy armored equipment and other advanced weapon systems.

Risk:  Territorial defense battalions may still not fully submit to the authority of the Ukrainian Military and remain more loyal to their oligarch founders, increasing warlordism.  Battalions with low discipline may also choose to upgrade their equipment in an unauthorized manner, endangering their safety and the safety of friendly forces around them.  The obligation to maintain, fund, and supply armored assets fall on the Ukrainian State which has faced budget constraints since the September 2015 sovereign debt restructuring deal.  Providing territorial defense battalions with heavy armor assets could give Russia, the DNR and LNR pretext for an overt arms race and security dilemma, leading to a breakdown in the relative stability of the Minsk II Agreement.

Gain:  If used in a defensive capacity, the fully equipped territorial defense battalions could become a highly capable reinforcement to the normal line of contact against any possible separatist (counter)offensives, raising the level of deterrence.  As a credible deterrent force, the battalions will allow the military to mass its regular forces for local superiority should it choose to go on a larger offensive.  Supplying the battalions with better equipment is a popular political move.  Option #1 would reinforce the coalition government of President Poroshenko, which has right-wing elements, who have been the most supportive of past armament plans.  Territorial defense battalions are incentivized to remain operating within the Ukrainian military force structure and supporting the government that has now adequately supported them.  Equipment interoperability is maintained throughout Ukrainian forces operating along the line of contact, easing logistical problems that have plagued the military.

Option #2:  Continue to restrict the supply of modern heavy armor assets and other advanced vehicle systems to the territorial defense battalions.

Risk:  The territorial defense battalions, as an important pool of military manpower that can be utilized along the line of contact for both defensive and offensive operations, is deprived of equipment that would be critical to their survival in such operations.  The Poroshenko Government risks increased public dissent by going against public support for arming these battalions.  President Poroshenko also risks further splintering his coalition and pushing the right-wing elements of parliament further away from cooperation.  The battalions will not have an important incentive to remain operating within an official force structure, as their perception of being cannon fodder grows.

Gain:  Right-wing affiliated territorial defense battalions, or battalions with particularly strong loyalty to an oligarch who could be potentially hostile to the Poroshenko regime in the future, are denied heavy weaponry.  Battalions that have low morale, or are facing discipline or disbandment, will not be able to defect to the Separatist-controlled territory with important heavy weapon stocks.  The Ukrainian government does not have to provide funding and supplies for an expensive military equipment program during a time of fiscal constraint.  The restriction helps prevent the flow of weapons onto the black market from these battalions low on funds, morale or discipline.  The DNR and LNR, as well as Russia, are not given a pretext for breaking off the Minsk Agreements entirely or for launching a preemptive offensive.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Webb, Isaac. (2017, January 26). “Ukrainian forces creep into war’s gray zone,” KyivPost, retrieved from: http://www.pressreader.com/ukraine/kyiv-post/20170127/281500750970900

[2]  Pejic, Igor. (2016, October 05). “Kiev’s Volunteer Battalions in the Donbass Conflict,” South Front, retrieved from: https://southfront.org/kievs-volunteer-battalions-in-the-donbass-conflict/

Daniel Urchick Irregular Forces / Irregular Warfare Option Papers Russia Ukraine

Government of Iraq Options for Islamic State Detainees

Loren Schofield is a retired U.S. Army Special Forces Non-Commissioned Officer with 16+ years’ experience in Special Operations and Unconventional Warfare.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  With the renewed offensive against the Islamic State (IS) by the Government of Iraq (GoI), what should be done with captured IS fighters and how can the GoI prevent future incursions?

Date Originally Written:  February 20, 2017.

Date Originally Published:  February 27, 2017.

Author and / or Article Point of View:  This article is written from the point of view of the GoI as they consider what to do with captured IS fighters.

Background:  Mosul is the last major stronghold in Iraq for IS.  This past week the GoI launched an offensive to take back the western side of Mosul which will prove to be much tougher than retaking the eastern half of the city.  Non-Governmental Organizations (NGO) warn that there could be up to 650,000 civilians trapped in territory still controlled by IS[1].  The offensive started just as graphic videos appeared on social media showing men in Iraqi Security Force (ISF) uniforms beating and killing unarmed people on the streets of Mosul[2].

Significance:  The manner in which the ISF treats captured IS fighters, as well as civilian non-combatants, will have long-term effects for the GoI.  How IS fighters and civilian non-combatants are handled post-capture will affect the rebuilding of Iraq, the GoI’s reputation within the international community, and will be watched by the GoI’s enemies.

Option #1:  The GoI and ISF treat all captured IS fighters and civilian non-combatants in accordance with the Geneva Convention and other applicable laws related to human rights and armed conflict.

Risk:  Option #1 will force the GoI and ISF leadership to take a firm hand with their personnel who are caught violating the Geneva Convention and other applicable laws related to human rights and armed conflict.  Option #1 forces the GoI to take a very unpopular position (unpopular with Iraq’s own people as well as the ISF) which could risk GoI political positions during the next elections.  Punishment of ISF who mistreat captured IS fighters and civilian non-combatants could even cause some of the ISF to mutiny thus splitting the force when cohesion is needed.

Gain:  By adhering to the Geneva Convention and other applicable laws related to human rights and armed conflict it puts the GoI and ISF on the moral high ground and shows the world that even in this difficult situation, the GoI and ISF place a priority on human rights and international law.  This will encourage NGO’s and other organizations that provide aid to come in and help the Iraqis rebuild their country.  Option #1 prevents members of the coalition from potentially removing their forces at the time the ISF is most in need should ISF mistreatment of captured IS fighters become publicly known and politically sensitive.  Option #1 will set a precedent and show the Iraqi people who were stuck in territory controlled by IS that they will be treated humanely once freed.

Option #2:  The Supreme Court of Iraq classifies IS as an invading force, tries every IS member on Iraqi soil in absentia, finds them guilty of crimes against humanity or a similar charge, and sentences them to death.  The GoI announces this verdict through all manner of media, to include leaflet drops over IS territory.  The GoI makes it clear that IS fighters will not be captured.  In essence, the GoI uses IS propaganda videos and the understanding of how IS trains and brainwashes their own fighters against them.

Risk:  With IS fighters knowing that surrender is not an option they will dig in and fight harder.  Even though there are many IS fighters who already plan to do this, there will always be a percentage that might potentially surrender.  With Option #2’s declaration those IS fighters who would surrender has been turned to zero.  The fighting will now be more dangerous and more brutal and cause more ISF fatalities.  The fighting will take longer, cause more civilian casualties, and cause worse damage to existing infrastructure.

Gain:  Option #2’s psychological element is as important as the actual military operation to destroy IS.  This psychological element will weaken IS by using the same type of fear that they are known for against them.  If a route to Syria is left open, some IS fighters may attempt to flee instead of face certain death (probably the same percentage of fighters will consider this as would consider surrendering).  Option #2 will also prevent long-term and expensive trials where detainee status (combatant, prisoner of war, criminal, insurgent etc.) may be used by lawyers to delay or extend trials.  The strategy of not capturing IS fighters as they are considered an invading force by the Supreme Court of Iraq will send a message to unfriendly State or non-state actors and may act as a deterrent.  If Option #2’s death sentence is only used on actual IS fighters, and not against the civilian non-combatants who were forced to support IS, the military and political leadership will likely see mass approval from Iraqi citizens.

Other Comments:  While the legalities of the Supreme Court of Iraq trying every IS fighter in absentia may be questionable, it allows coalition forces who want to support the GoI to continue in their support.  It may be a gray area, but sometimes gray is good enough.

Recommendation:  None.


Endnotes:

[1]  Graham-Harrison, Emma, Fazel Hawramy, and Matthew Taylor. “Iraq Launches West Mosul Offensive as Torture Videos Emerge.” The Guardian, February 19, 2017. http://www.theguardian.com/world/2017/feb/19/torture-videos-cast-shadow-over-iraqi-forces-west-mosul-offensive

[2]  Graham-Harrison, Emma. “Iraqi PM Announces West Mosul Attack as Images of Security Forces’ Brutality Emerge.” The Guardian, February 19, 2017. http://www.theguardian.com/world/2017/feb/19/violent-videos-threaten-iraqi-campaign-mosul.

Detention Iraq Islamic State Variants Loren Schofield Option Papers Psychological Factors

Options for Mexico with the Trump Administration

Vincent Dueñas is a recent graduate of the Johns Hopkins School of Advanced International Studies, a U.S. Army Major, and an Associate Member of the Military Writers Guild.  This Mexico vignette was first written to fulfill a requirement in his degree program.  The views reflected are his own and do not represent the opinion of the United States Government or any of its agencies.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Mexican President Enrique Peña Nieto faces a potentially combative relationship with the United States (U.S.), anemic economic growth, and increasing security concerns from Transnational Criminal Organizations (TCOs).

Date Originally Written:  December 21, 2016.

Date Originally Published:  February 9, 2017.

Author and / or Article Point of View:  This article is written from the perspective of the National Security Advisor for Mexican President Peña Nieto, who is offering options for Mexico, in light of incomplete domestic reforms and emergent challenges from the U.S.

Background:  President Peña Nieto’s “Pacto por México” was an agreement aimed at unifying the country’s three major parties in strengthening the Mexican state, improving political and economic democratization, and expanding social rights.  This agreement resulted in the successful enactment of constitutional reforms, but implementation has stalled due to opposition and unfavorable global conditions[1][2].  President Peña Nieto won the presidency as a member of the historically powerful, centrist Institutional Revolutionary Party (PRI).  His election revived the PRI’s control after a 12-year tenure under the right of center National Action Party (PAN).  The PAN and the left of center Party of the Democratic Revolution (PRD) have recently undermined the implementation of the President’s reforms for their own political gain prior to the 2018 election.

Significance:  Current U.S. overtures calling for the funding of a border wall by Mexico and the renegotiation of the North American Free Trade Agreement (NAFTA) pose a significant challenge to Mexico’s economic and national security dynamics.  This dramatic shift in relationship with the U.S., Mexico’s largest trading partner, may detrimentally impact Mexico and create a dangerous security issue.  Although we have a large capable military, our forces are committed to fighting TCOs and we are not prepared to engage in a direct conflict with the U.S.  As a nation, Mexico has actively sought to participate fully in the global liberal world order and a failure to counterbalance U.S. overtures threatens to destabilize our economy and amplify the worsening TCO problem.

Option #1:  Continue the “Pacto por México” and engage in limited unilateral diplomatic confrontation with the U.S.

Risk:  The risk in continuing the “Pacto por México” rests mainly in the inability for the country to implement these reforms at this critical juncture.  President Peña Nieto’s legacy will be incomplete as the PAN and PRD sabotage the progress on reforms in order to gain political advantage.  In responding reactively to the U.S., President Peña Nieto risks being seen as weak and our government will continue to lose legitimacy.  Progress in combating TCOs will continue to fall short as necessary judicial reforms will fail to materialize.

Gain:  The greatest gain from this approach would be the preservation of the status quo, drawing the least ire from the U.S.  It would minimize potential economic blowback and allow maximum possibility for favorable concessions from the U.S. during any renegotiation over NAFTA.  Additionally, it provides the most assured means of avoiding repercussions against vital security cooperation and assistance funding and collaboration with the U.S. military and its security agencies.

Option #2:  Get out in front of the U.S.’ overtures and reframe the challenge of the U.S. through a new PRI-led domestic campaign of “Dialogues” that would represent the next phase of “Pacto por Mexico” and reinvigorate public support for the reforms.  Acknowledging that the “Pacto” has faced difficulties, Mexican society can be rallied together by the PRI through a communications campaign that frames Mexico as a parent-like figure to the U.S., who is suffering from drugs and self-destructive behavior.  This campaign can connect directly with Mexican citizens’ familial inclinations through a perspective that describes a parent who is caring for a fellow family member with understanding.  Simultaneously, a provisional dialogue with TCOs should be initiated to seek a reduction in violence on the basis of pride and the threat that U.S. actions pose to Mexican society writ large.  Lastly, we should initiate and lead a multilateral hemispheric effort to economically and diplomatically counterbalance the U.S. by reinvigorating the concept of the Free Trade Agreement for the Americas.

Risk:  The risks are many, but the dialogue with TCOs poses the greatest risk, as the perception of government collusion with criminals could become a scandal that could undo the party.  The suspension of remittances and security cooperation and assistance funding, such as the Mérida Initiative, would be extremely costly.  This approach would also signal a clear departure from a collaborative approach with the U.S. and commit Mexico to dependency exclusively on other markets, such as China and the countries in Latin America, which historically have not looked favorably towards Mexico.

Gain:  This would increase Mexico’s leverage against the U.S. by spearheading a hemispheric economic block.  A deliberate campaign of domestic and international action could consolidate the PRI’s authority within the country as the leader that will protect Mexican citizens from hostile U.S. intentions and lead a hemispheric coalition to confront discordant U.S. policies.  Riding the hopefulness of the Colombian peace process, a successful truce with TCOs could bring about an era of peace and stability that would allow judicial reforms to be implemented, which could eventually tackle corruption.  President Peña Nieto can garner attention, legitimacy, and credibility by speaking objectively and unemotionally as a counterbalance to the U.S. approach.  This could also pay out in dividends as other regions of the world may begin to look to Mexico as a primary partner in the hemisphere.

Other Comments:  The U.S.’ redefinition of its role as guarantor of the international post-World War 2 order provides the opportunity for other states to become more authoritative in international affairs.  China, for example, has begun challenging the U.S.’ will to engage in a military confrontation in the South China Sea.  Brazil, Canada, Colombia and Mexico are the hemisphere’s most sizeable economic and military powers after the U.S.  Brazil is experiencing political upheaval and is incapable of significant international action.  Canada is too close of an ally to the U.S. and most likely would be unwilling to challenge them directly.  Colombia is undergoing a peace process and is also a major ally of the U.S., which reduces their willingness to challenge the U.S. directly.  Mexico therefore stands as the only country with the ability and freedom to assert itself against the U.S. in the hemisphere.

Recommendation:  None.


Endnotes:

[1]  Sada, Andres. “Explainer: What is the Pacto por Mexico?” Americas Society/Council of the Americas. March 11,2013. Retrieved January 26, 2017, from http://www.as-coa.org/articles/explainer-what-pacto-por-méxico.

[2]  U.S. Congressional Research Service. Mexico: Background and U.S. Relations (CRS-2016-FDT-0759; December 5, 2016), by Clare Ribando Seelke. Text in ProQuest Congressional Research Digital Collection. Retrieved January 26, 2017.

Mexico Option Papers Vincent Dueñas

U.S. Options for Israel: Accept or Reject Settlement Activities

Brian Christopher Darling has served in the United States Army in Iraq, Afghanistan, and Qatar.  He has master’s degrees in Liberal Studies and Public Service Leadership from Rutgers University and Thomas Edison State University, respectively.  Mr. Darling is presently employed at Joint Force Headquarters, New Jersey National Guard.  He can be found on twitter @briancdarling and has written for NCO Journal.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The United Nations (UN) Security Council adopted Resolution 2334 on December 23rd, 2016.  In addition to demanding the Palestinian leadership take steps to end violence, this resolution called for an end to the Israeli settlements in the West Bank and Gaza.

Date Originally Written:  January 26, 2017.

Date Originally Published:  February 6, 2017.

Author and / or Article Point of View:  Author is a member of the U.S. military.  Author believes that U.S. involvement in Israeli politics should be limited.  The U.S. and Israel have traditionally enjoyed a strong, informal alliance.  Despite the ongoing friction between the Jewish State and its Arab neighbors and the UN, there is no benefit to the U.S. to inject itself into the situation.  The author’s MA studies focused on war and politics in the Middle East and Asia and the importance of intergovernmental networking to maintain the current global balance of power.

Background:  On December 23, 2016, the UN adopted Security Council Resolution 2334.  The adoption of this resolution, and the abstention from the vote by the U.S., involves a number of operational environment variables, to include regional and global relationships, economics, information, technology, and military capabilities.

Significance:  The abstention by the U.S. during the vote broke with long-standing policy regarding support for Israel, but was in keeping with the Obama administration’s actions towards the Jewish State.  Under Prime Minister Netanyahu, Israeli politics have moved further to the right, making a two-state solution less feasible.

Option #1:  The incoming administration could reaffirm U.S. support for Israel, continuing to disregard the settlement activities that led to the adoption of the resolution.

Risk:  By continuing to accept Israeli settlement of occupied territory, the U.S. would further alienate itself from the international community, returning to the unilateral international relations policies of the Bush administration.  Option #1 would have an adverse effect on U.S. attempts at coalition building to pursue its interests in the Middle East.  The U.S. needs the support of the international community and of intergovernmental organizations like the UN, the International Monetary Fund, and the World Bank in order to facilitate the resolution of ongoing conflicts in Afghanistan and in the Middle East.

Gain:  Under Option #1, the U.S. would, in Israel, maintain an ally in the Middle East, and demonstrate strength in the face of its adversaries.  The informal U.S.-Israeli alliance is beneficial to the U.S., as Israel is considered the only democracy in the Middle East, and economic ties between the two states run deep.  After reaffirming U.S. support for Israel, the U.S. could use this reaffirmation as leverage with Israel to request further assistance in the resolution of other conflicts in the Middle East, to include those ongoing in Syria and Iraq.

Option #2:  The U.S. accepts UN Security Council Resolution 2334, affirming that Israel has no legal basis for its ongoing settlement activity.

Risk:  The U.S. risks losing Israeli support, in the Jewish State and domestically.  Further, the abstention of the U.S. from the 2334 vote and the continued unfavorable treatment of Israel by the UN threaten to further delegitimize the UN in the eyes of the American people.

Gain:  Accepting UN 2334 without any further activity would demonstrate the U.S.’ commitment to operating as an integral part of the liberal international system.  Having abstained from the vote, the U.S. appears to support the UN.  However, in the eyes of U.S. citizens, the vote itself further discredited the UN and garnered public support for the Jewish State.  Further, regardless of UN involvement, the economic relationship between the U.S. and Israel would likely continue, regardless of the U.S. stance on the resolution.  If the U.S. does nothing, maintaining the policy of noninvolvement or abstention, Israel will remain strong, and will continue to maintain a military hedge against Iran and its proxies.

Other Comments:  Israel continues to deal with unfavorable perceptions in the UN due to its settlement activity, and with periodic harassment from a rogue’s gallery of terrorist organizations.  The only real threat to Israel comes not from Palestine, but from Iran and its proxies.  The military capability of the Jewish state keeps the Iranians at bay, and it is widely assumed that Israel has its own nuclear deterrent capability.  If the U.S. does nothing regarding the UN resolution, Israel will remain strong, and will continue to maintain a military edge against Iran and its proxies.

Although the U.S. was the first nation to recognize the Jewish State, Israel no longer needs the U.S. in order to support its activities.  The U.S. abstention from the Security Council vote demonstrates U.S. commitment to the liberal international order and to the rule of law as Israeli settlement activity is founded on claims of legitimacy that are dubious at best.  At the bottom line, the ultimate interest of the U.S. and of Israel is not the continued legitimacy of the UN, but the continued existence of their respective sovereignty, in the current climate of global politics, the U.S. and Israel will remain relevant long after the UN.

Recommendation:  None.


Endnotes:

None.

Brian Christopher Darling Israel Option Papers Palestine United States

Israel Options: Continue Expansion or Recognize Palestine

Adam Yefet is pursuing a Master’s degree in International of Affairs at George Washington University’s Elliott School of International Affairs, based in Washington D.C.  He can be found on Twitter at @yefet4USA.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Israel-Palestinian Conflict.

Date Originally Written:  January 13, 2016.

Date Originally Published:  February 2, 2017.

Author and / or Article Point of View:  Author is pursuing a Master’s degree in International Affairs at George Washington University and has written on Middle East affairs for Gulf State Analytics.  He writes as an international observer.

Background:  On December 23, 2016 the United Nations (UN) passed a non-binding resolution censuring Israel for activities in the Palestinian Territories, occupied since the 1967 Six-Day War.  The United States’ abstention on UN Security Council Resolution 2334 demonstrated the rift between the current U.S. and Israeli administrations.  While the Obama administration has been a useful political foil for Israeli Prime Minister Benjamin Netanyahu’s coalition, Obama’s policies allowed Netanyahu to hold back from the most egregious moves supported by his cabinet.  Netanyahu may have difficulty balancing his policy and his coalition with an ideologically friendlier U.S. administration

The Palestinian Territories are governed by the relatively secular group Fatah in the West Bank and Islamist group Hamas in Gaza.  Several attempts by the two parties to unify and collaborate in the last decade have failed.  In the meantime, Hamas in Gaza has engaged in three significant conflicts with Israel.  There are few signs of hope for united Palestinian leadership.  Israel maintains tight control over whom and what can enter and exit the territories.  There is a continued cycle of Palestinian terror attacks and Israeli reprisals.

The expansion of Israeli settlements into West Bank territory, considered to be part of the biblical Jewish state, seeks to annex the land permanently to Israel and interfere with the creation of a Palestinian state.  The settlement enterprise has yielded limited results in terms of changing the demographic landscape to prevent a two-state solution but it has incurred a high cost to Israel’s relationship with the Palestinians and the international community at large[1].

Meanwhile, the Arab world’s focus has shifted from Israel to the Saudi-Iran conflict.  The 2002 Arab Peace Initiative (API) parameters, reaffirmed in 2016, provide significant diplomatic incentives for Israeli action but Israeli leadership has largely ignored it.  Palestinian leadership rejected peace deals in the 1990s and 2000s.  Prime Minister Netanyahu’s coalitions since 2009 have included key ministers publicly opposed to a two-state solution[2].

Significance:  Peace between Israel and Palestine, and Palestinian statehood, is a multigenerational goal for the international community.  However, the two sides have not found their way to a peace agreement for many reasons, any of which is most important depending on who you ask.  The conflict is deadly for Palestinians and Israelis and has the potential to escalate the Middle East into war or reshape the regional order with a peace deal.  The options analyzed here are along the lines of those presented by significant figures in Israeli politics.

Option #1:  Israel continues the expansion of settlements in disputed areas of the West Bank.

Risk:  If Israel pursues expansion even more aggressively with the tacit, or vocal, support from the new U.S. administration, it will further alienate the international community including Israel’s few strong allies in the West and provoke further hostility from adversaries, neutral parties, and non-state political movements.

The API and its subsequent reaffirmations, as well as covert cooperation in the Syrian theater between Israel and Saudi Arabia, suggest a growing acceptance of Israel in the region and the potential for practical alliances.  Following Option #1, Israel will risk losing the geopolitical moment of opportunity to secure diplomatic, economic, and military relationships with its neighbors.

Israel expanding settlements risks undermining and antagonizing Palestinian leadership in the West Bank, which has cooperated with Israel, and empowering Hamas in Gaza, which has actively fought Israel and won concessions.  The last year has seen dozens of individual attacks by Palestinians, mainly in the occupied territories and around settlements.

Gain:  Proponents of expanding settlements maintain that the expansion of settlements is dedicated to ensuring a secure and defensible border for Israel in the face of its international threats.  It also sends a message to Palestinian leadership that time is running out to secure a Palestinian state.  Settlement expansion seeks to ensure the establishment of the state on biblical and historical lines and there is a strong domestic constituency in Israel, and non-state foreign support, for that cause.  Prime Minister Netanyahu and others in his cabinet also find domestic support for policies in defiance of the UN and U.S. policy.  With the advent of an ideologically friendlier administration in Washington D.C., Prime Minister Netanyahu may feel fresh license to continue and expand those policies.

Option #2:  Israel unilaterally recognizes a Palestinian state along 1967 lines with land swaps.

Risk:  Israel’s difficult unilateral withdrawal from Gaza in 2005 under Prime Minister Ariel Sharon was met with Hamas claiming victory and launching attacks against Fatah and against Israel.  A repeat of that scenario could plunge the conflict into disastrous war between the Palestinian groups themselves for control, and with Israel.  Unilaterally recognizing a Palestinian state without a functioning, unified partner government in Palestine could be tragic for both sides.

Option #2 risks the dissolution of the governing coalition if members opposed to a two-state solution left because Netanyahu would be breaking a key election promise that there would not be a Palestinian state on his watch, though he backtracked after the election due to U.S. pressure[3].  Without enough members of Knesset (parliament) in support, the Knesset would be dissolved and require new elections, essentially a referendum on the move.  Prime Minister Netanyahu carries substantial credibility on security issues like no other Israeli politician, but elections can be unpredictable and are a significant political risk.

Another risk is physical violence and political chaos.  Israeli Prime Minister Yitzchak Rabin was assassinated in 1995 by an anti-two-state solution Israeli settler upset by the progress towards a Palestinian state.

Gain:  If successful, Israel would spark a shift in the regional order in the Middle East, open relations across the Arab world, and diplomatically isolate Iran, Israel’s key adversary.  International allies would warm to Israel while seeking to support the new state.  There is a strong constituency in the Israeli security community that supports this option[4].  Palestine’s governing parties would be forced to work with the deal or deny themselves a state, a move that would result in a significant loss of diplomatic credibility and fit Israel’s claims of Palestinian intransigence.

Other Comments:  Any peace deal would require significant international financial and security support to succeed.  The withdrawal of Israeli troops from the territories and the management of security inside the territories after withdrawal would be challenging for both sides.  Non-state actors in the territories would have many opportunities to undermine peace and would quickly test both sides’ patience, but especially Israel’s.

Recommendation:  None.


Endnotes:

[1]  Arieli, S. (2016, June 27). Look at the Figures: Israel’s Settlement Enterprise Has Failed. Retrieved January 16, 2017, from http://www.haaretz.com/wwwMobileSite/opinion/.premium-1.727398

[2]  Sharon, J. (2016, December 30). Analysis: Will The Trump Era Be Bennett’s Finest Hour? Retrieved January 16, 2017, from http://www.jpost.com/Israel-News/Politics-And-Diplomacy/ANALYSIS-Will-the-Trump-era-be-Bennetts-finest-hour-476964

[3]  Lubell, M. (2015, March 16). Netanyahu Says No Palestinian State As Long As He’s Prime Minister. Retrieved January 17, 2017, from http://www.reuters.com/article/us-israel-election-idUSKBN0MC1I820150316

[4]  Gross, J.A. (Jan 15, 2017). Former Defense Leaders Take Aim at Bennett’s Annexation Plan. Retrieved January 22, 2017, from http://www.timesofisrael.com/former-defense-leaders-take-aim-at-bennetts-annexation-plan/

Adam Yefet Israel Option Papers Palestine

One State & Two State Options in Israel & Palestine

Ted Martin has a keen interest in Arab and Israeli affairs and has traveled to Iraq and Afghanistan.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Israeli settlement activity and United Nations (UN) resolution 2334 (2016).

Date Originally Written:  January 13, 2017.

Date Originally Published:  January 30, 2017.

Author and / or Article Point of View:  Author has studied the problem of settlements since the late 1990s and spent time in Iraq and Afghanistan.  The point of view expressed is advice to an Israeli decision maker from a third-party.

Background:  The outgoing U.S. Presidential administration abstained from voting for or against UN resolution 2334(2016) that condemned Israeli settlements in the West bank.  Abstaining was unusual behavior for the U.S., as typically the U.S. votes against such resolutions[1].  The Israelis removed all settlements from Gaza before leaving in 2005 but continue to keep and expand them in the West bank and Jerusalem[2].  The last moratorium on settlement expansion was in 2010 and tied to another failed attempt at a peace deal with the Palestinians[3].

Significance:  The UN resolution has angered the Israeli government and may embolden those Palestinian elements that use violence, like Hamas, to justify attacks on Israel.  However, Hamas will likely attack Israel regardless of a UN resolution.  The incoming U.S. administration is expected to adopt a friendlier attitude towards Israel, but world opinion is not liable to change.  Continuing demographic pressure within Israel, a resurgent Iran, and threats from the Islamic State in Iraq and Syria (ISIS), would argue for Israel to attempt to end the settlement dispute and focus on other issues that may be more pressing[4].  Solving this issue soon will allow Israel to focus international attention on its enemies instead of its internal problems.

Option #1:  Create a one state solution by making Arab and Palestinians living within the West bank and Jerusalem Israeli citizens.  Resume negotiations with the Palestinian authority on the basis of integration to the state of Israel.

Risk:  Israel will no longer be a state of Jewish character but rather a secular state.  The current Netanyahu government is allied with many conservative elements and would probably not survive the transition[5].  A moderate or leftist government collation is the only one that could make the proposal possible, which does not currently exist.  The Palestinian Authority government may not agree to transition from separate government to a political party and lose much of its funding and prestige.

Gain:  There is an increasing demographic tension within Israel as the Arabs and Palestinians already living within the borders of the state, 21% of the population as of 2016[6], are becoming a growing minority.  By incorporating the Arabs and Palestinians into the state of Israel the goals of the moderate majority can become mainstream and eliminate many problems currently developing between extremists elements at both ends.  The moderate Israeli parties can use the moderate Arab and Palestinian parties as a wedge against the more extreme elements.  Only 18% of the Arab population in Israel rejects the idea of integration with Israel[7].  Through Option #1, the delicate issue of allowing Palestinian refugees to return to property they once owned or be compensated for that property, known as the right of return, could potentially be addressed.  The right of return has historically been a negotiation point where both sides take intractable positions.  Palestinian Authority President Abbas has flipped on the right of return several times, which may provide room for negotiation[8].  Palestinian refugees who accept the state of Israel to return may address this issue.  Considerably more work would be required on this proposal to move it beyond a concept.  However, small amounts of returning Palestinians might be worth quite a lot of international goodwill.

Option #2:  Decide to return to the negotiating table for a two state solution for the West bank but negotiate for Jerusalem and leave Gaza for a separate deal.

Risk:  The two-state solution enjoys some support by Jewish Israelis, but is starkly divided along party lines with only a total of 43% supporting it[9].  If adopted, it would tear Netanyahu’s coalition apart.  The military is becoming more religious, and the longer this deal takes, the more likely soldiers will refuse orders to forcibly move settlements[10].  The international community may decry this solution as not complete enough.  The Palestinians may refuse to take part in meaningful negations as they did in 2009 and 2010 after the last settlement freeze[11].

Gain:  A two-state solution for the west bank recognizes the Palestinian Authority and allows the state of Israel to push problems within the Palestinian state to the Palestinian Authority to deal with and potentially to require the Palestinian Authority to “fix” Gaza.  Making a deal in the West Bank now may work, only 5% of Israel’s population lives in the West Bank and of that percentage only half live in settlements that may be affected[12].  This option also allows Israel to create a clearly defined border between the state of Palestine and itself that may help prevent illegal entry.  This option has been the “default” option for several years.

Other Comments:  There is some indication that both sides, even the entire Middle East, have given up on solving this problem for now and decided to focus on the threat of Iran and ISIS [13].  This situation leaves external policy makers precious few levers to lean on to force both sides to work together.  If the Arab world is too preoccupied to force the Palestinian Authority to deal with Israel then another power may be able to provide positive reinforcement like money or prestige to the Palestinian Authority to make a deal.  A further motivating factor would be the desire to solve this problem to focus on other problems, which may interest both parties.

Recommendations:  None.


Endnotes:

[1]  DeYoung, K. (2016, December 28). How the U.S. came to abstain on a U.N. resolution condemning Israeli settlements. The Washington Post. Retrieved from: https://www.washingtonpost.com/world/national-security/how-the-us-came-to-abstain-on-a-un-resolution-condemning-israeli-settlements/2016/12/28/fed102ee-cd38-11e6-b8a2-8c2a61b0436f_story.html

[2], [3], [12]  Rosen, S.J. (2012). Israeli settlements, American pressure, and peace. Jewish Political Studies Review 24(1/2) pp 32-45.

[4], [9], [10] [13]  Harel, A. (2016 July/August). Israel’s evolving military. Foreign Affairs 95(4).

[5], [6], [7]  Ghanem, A. (2016 July/August). Israeli’s second-class citizens. Foreign Affairs 95(4).

[8]  Rudoren, J. (2012, November 4). Palestinian’s remark, seen as a concession, stirs uproar. The New York Times. Retrieved from: http://www.nytimes.com/2012/11/05/world/middleeast/in-palestine-abbas-spurs-right-of-return-uproar.html

[9]  Lipka, M. (2016, March 9). Among Israeli Arabs and Jews, limited optimism about a two-state solution. Pew Research Center. Retrieved on January 10, 2017 from: http://www.pewresearch.org/fact-tank/2016/03/09/among-israeli-arabs-and-jews-limited-optimism-about-a-two-state-solution/

[11]  Kramer, M. (2016 July/August). Israel and the post American middle east. Foreign Affairs 95(4).

Israel Option Papers Palestine Ted Martin

Options for the Baltic States in an Uncertain Security Environment

Jeremiah Cushman is a senior analyst at Military Periscope, where he writes about weapons.  He holds an M.A. in European and Eurasian Studies from the George Washington University.  He can be found on Twitter @jdcushman.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Baltic States of Estonia, Latvia and Lithuania face an uncertain security environment due to Russian belligerence and concerns about the willingness of their North Atlantic Treaty Organization (NATO) allies to come to their defense.  There is unease about allied reactions should Moscow undertake hybrid warfare actions in the Baltic States.  This is further exacerbated by questions about the U.S. commitment to Baltic security under the Trump administration.

Date Originally Written:  January 17, 2017.

Date Originally Published:  January 26, 2017.

Author and / or Article Point of View:  This article is written from the perspective of the three Baltic States facing the potential threat of an unpredictable Russia and concerns about the backing of their primary security guarantor, the United States.  While the three countries are not as unified as they are often portrayed, this article focuses on collective efforts that can be made to enhance their security.  The author’s M.A. studies focused on the Baltic States and European security and he has continued to keep an eye on the region.

Background:  Estonia, Latvia and Lithuania regained their independence in 1991 with the dissolution of the Soviet Union.  Since this dissolution, relations with Russia have been rocky.  Points of contention include the treatment of large ethnic Russian minorities in Estonia and Latvia and the determination of the Baltic States to integrate with Europe, including  NATO and the European Union (E.U.).  (All three formally joined both bodies in 2004.)  Since Russia invaded Ukraine in 2014 and annexed Crimea, using the rights of ethnic Russians as part of its justification, the Baltic States have become increasingly concerned about the Russian threat.  All of the Baltic States have been increasing defense spending and strengthening their defense capabilities. Lithuania has reinstated conscription.  (Estonia has maintained mandatory military service since regaining independence, and Latvia has, so far, indicated it sees no need to reinstate conscription).

In addition, the Baltic States have been pressing their allies in NATO and the E.U. to increase defense expenditures and commit to the collective defense of the three countries.  The election of Donald Trump in the United States in November 2016 has created uncertainty because of the president-elect’s campaign statements deriding NATO and seeking friendlier relations with Russia.  The potential to lose the U.S. as their most important ally threatens to leave the Baltic States vulnerable.

Significance:  The Baltic States’ small size, integration in European alliances, recent history as part of the Russian sphere of influence, and ethnic Russian minorities have made them a target for Moscow.  As relatively weak, geographically vulnerable countries on NATO’s periphery, the Baltic States are seen as ideal targets for Russian efforts to challenge the cohesion of European institutions, especially NATO.  The opportunity to “right” some of the perceived wrongs of the dissolution of the Soviet Union is a bonus.  Due to Russia’s desire to project its power into the Baltics and NATO’s requirement to defend the Baltics, the region is considered a possible flashpoint for a conventional conflict between the West and Russia.

Option #1:  The Baltic States focus on further strengthening trilateral cooperation between themselves.

Risk:  The Baltic States have limited resources. Focusing on trilateral efforts between themselves may come at the expense of activities that would boost ties with more powerful allies, such as Britain, Germany and Poland.  Even enhanced trilateral cooperation may not be sufficient to deter or combat major threats emanating from Russia.

Gain:  The stronger the three Baltic States are together, the better the deterrent to Russia.  Enhancing joint military equipment procurement beyond small items such as ammunition could reduce equipment, logistics, and support costs, while improving interoperability between Baltic military forces.  Better integration of Baltic military forces would enhance their ability to deter Russia and fight a delaying action while NATO mobilizes.  By preparing strong defenses, the Baltic States can also reduce potential allied concerns about coming to their aid.

The Baltic States, while cooperating closely in some ways, each have their own viewpoints that have hindered cooperation in other areas.  The recent acquisition of armored vehicles was one missed opportunity.  Instead of coordinating a purchase, thus reducing procurement and joint logistics costs, each Baltic State procured their own models.  Estonia purchased used CV90s from the Netherlands, while Latvia bought used CVR(T)s from the U.K., and Lithuania new Boxer armored vehicles from Germany.  Cost and regional ties appear to have taken priority over trilateral considerations.  On the other hand, a joint air defense system acquisition is currently being discussed.

Option #2:  Upgrade regional defense ties.

Risk:  The Baltic States relying on regional powers, such as EU partners Sweden and Finland or NATO allies, could fail to deter Moscow or effectively respond to Russian aggression.  This failure might be because of external and domestic pressures, differing interests, or divergent threat assessments.  In the worst case of a Russian invasion, some allies may find it more expedient to keep their distance than become involved in a bloody conflict.  The costs of rotating forces to the Baltics or otherwise maintaining readiness for such operations may be hard for regional allies to sustain over the longer term.

Gain:  The significantly greater combat capabilities that can be brought to bear in combination with regional allies can provide more deterrence than those available among the Baltic States alone.  Regional support using both NATO and E.U. mechanisms can bolster Baltic efforts.  Sustained political support can also enhance Baltic deterrence.

Option #3:  The Baltic States seek rapprochement with Russia.

Risk:  Moscow is not interested in anything but compliant, supplicant states.  Reaching some sort of deal with Russia would likely result in a narrowing of policy options, some loss of sovereignty, and negative economic effects.  Democracy would likely be curtailed and concessions would have to be made to ethnic Russian populations.

Gain:  By preemptively reaching a deal with Russia, the Baltic States might hope to gain a better position than if it were decided without them in Washington and Moscow.  Such rapprochement could also reduce the chances of conflict, at least for the short-term.

Other Comments:  It should be noted that having enjoyed independence for only 25 years, the Baltic States are unlikely to surrender it easily.  Acknowledging the limitations of their small defense institutions, all three militaries support volunteer defense associations and maintain significant reserves.  From their perspective, any conflict on their territory will be conventional only in the initial stages.  Domestic forces will quickly turn to insurgent tactics, following the example of the Forest Brothers fighting the Soviet Union during and after World War II[1].

Recommendation:  None.


Endnotes:

[1]  Ruin, Pahl, “The Forest Brothers — Heroes and Villains of the Partisan War in Lithuania,” Baltic Worlds (Stockholm, Sweden), Oct. 25, 2016. The author also highly recommends the documentary “The Invisible Front,” which is available on Netflix.

Baltics Estonia Jeremiah Cushman Latvia Lithuania North Atlantic Treaty Organization Option Papers

Options to Increase Arab Middle East Stability Through Economic Investment

Nathan Field is an Arabic speaker and a commentator on Middle East politics whose perspective differs from others in that it is based primarily on experience in the private sector in the Arab world, including two years as part of the management team on a U.S. one billion dollar engineering project in Saudi Arabia and five years building up and then selling a translation company called Industry Arabic.  Follow him on Twitter at @nathanrfield1 and read his other articles and expert interviews at Real World Arabic.


National Security Situation:  The unprecedented instability in the Arab Middle East consists of three major inter-related problems: the surge in disgruntled people attempting to migrate to the European Union (EU), the decades long but newly accelerating growing appeal of Islamic extremism, and the collapse of a once hopeful Arab Spring reform process.

Date Originally Written:  December 8, 2016.

Date Originally Published:  January 19, 2017.

Author and / or Article Point of View:  This article is written from the perspective of possible approaches to the Arab Middle East that might be taken by the incoming Trump administration.

Background:  The three aforementioned security issues are a logical symptom of the socio-economic weakness of the majority of Arab countries, with the exception of a few highly resource-endowed countries such as Qatar and the UAE that have relatively small populations.  In a ruthlessly competitive global economy, the economic pie is only large enough to provide status, purpose, and meaning to about 20% of the populations.  The other 80% of the population in countries like Egypt and Tunisia are not necessarily poor.  In fact, in many cases they may even have a university education.  But what this often means is that in practice, they are educated enough to know what is out there, yet also to sense that they have little chance of crossing into the 20%.  For this 80%, contrary to the views of many Washington D.C.-based foreign policy research organizations, elections offer little hope because they do not address the economic status quo.  This 80% is precisely the demographic that is at risk to embrace violent extremist ideologies and to seek to flee to the EU as economic migrants.

Significance:  Understanding the economic roots of the instability in the Arab Middle East is critical to formulating long-term solutions.  Traditional research into the instability in the Arab Middle East has minimized the role of economics.  In research, economics and politics are often compartmentalized and treated as two separate problems while in fact they are one and the same.

Many commentators on the Arab Middle East make the mistake of overlooking that democracy and universal human rights are at the very top of the Maslow Hierarchy of needs as matters of self-actualization and esteem.  Democracy and universal human rights can only come when there is enough of the far more important economic development so that a critical mass of the population can obtain purpose, meaning and basic status economically.  Only when that is achieved is it possible to obtain desirable democracy.

Option #1:  A significant new U.S. focus on promoting Lower Tech Entrepreneurship and Small Businesses, not Tech Startups.

Since 2011, the U.S. government has allowed the concept of entrepreneurship promotion to somehow come to exclusively mean Tech Startups.  The problem with Tech Startups is that by definition they seek to use technology to eliminate human labor.  Moreover, the types of people in countries like Egypt and Tunisia who are capable of being competitive in Tech Startups are generally from high socio-economic backgrounds.  Instead, the focus should be on promoting Lower-Tech and more labor intensive Small Businesses and Medium Businesses[1] in order provide opportunity to a greater percentage of the population.   

Risk:  The only risk is that the programs might not be effective.  Some funds may be wasted, but otherwise the consequences will be minimal on the basis that there was nothing to lose.

Gain:  If the programs succeed, they will create significant new jobs for those from the populations that need it most.  Yet even if they do not succeed 100%, they still send the message that there is hope and something to work for back home and may inspire economic migrants to return home. 

Option #2:  Increased emphasis on vocational education combined with targeted industrial development.

The dominant Arab Middle East education paradigm wrongly assumes a linear connection between the quantity of degree holders and new jobs thus economic growth has proven a disaster.  This education paradigm is only producing more disgruntled degree holders with higher expectations that are unlikely to be met.  As part of Option #2 the U.S. would strongly support the growth of vocational education combined with targeted industrial development[2].

The Philippines serves as a classic example of what is possible in targeted economic development.  The country went from having no presence in the call center industry in  1997 to being the global leader in 2012[3].  With greater vocational capabilities, Arab Middle Eastern countries will be in a better position to explore the development of new industrial activity and provide reasonable employment opportunities to the lower 80% of the population.  The Moroccan aviation industry serves as a Middle Eastern success story, showing how state-centric leadership plus strong vocation programs can lead to significant new economic status[4].   As a result of Morocco’s policy, over 50,000 very good jobs for Moroccan nationals were created.

Risk:  The biggest risk is that if Option #2 does not work then some money and effort will be wasted.

Gain:  The programs work.  Yet they still “gain” even if they do not work.  Spending new money to prop up some of these programs is still a huge gain, because it at least sends the message that there is something new in the works.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Field, N. (2016, May 19). Not Just Tech: Entrepreneurship in the Middle East. Retrieved January 10, 2017, from https://timep.org/commentary/not-just-tech-entrepreneurship-in-the-middle-east/

[2]  Field, N. (2016, July 11). Stop Sending So Many Young People to University. Retrieved January 10, 2017, from http://www.al-fanarmedia.org/2016/07/stop-sending-so-many-young-people-to-university/

[3]  Lee, D. (2015, February 1). The Philippines has become the call-center capital of the world. Retrieved January 10, 2017, from http://www.latimes.com/business/la-fi-philippines-economy-20150202-story.html

[4]  Larmandieu, V. (2015, February 12). Morocco’s aviation industry spreads its wings. Retrieved January 10, 2017, from http://www.cnn.com/2015/02/12/africa/morocco-aviation-industry-spreads-wings/

Economic Factors Middle East Nathan Field Option Papers

Syria Options: U.S. Grand Strategy

Mark Safranski is a Senior Analyst for Wikistrat, LLC.  His writing on strategy and national security have appeared in Small Wars Journal, Pragati, War on the Rocks  as well as in recent books like Warlords, inc., Blood Sacrifices:Violent Non-State Actors and Dark Magico-Religious Activities and The Clausewitz Roundtable.  He is the founder and publisher of zenpundit.com.


National Security Situation:  The Syrian Civil War.

Date Originally Written:  December 23, 2016.

Date Originally Published:  January 16, 2017.

Author and / or Article Point of View:  An analyst considering U.S.  national interest in terms of grand strategy.

Background:  Aleppo has fallen and with it the last shreds of credibility of President Obama’s policy on Syria.  None of Obama’s policy goals for Syria since the Arab Spring revolt were achieved.  In Syria, the Assad regime has crushed western-backed opposition fighters with direct Russian and Iranian military ground support; the Islamic State in Iraq and Syria (ISIS) still controls swaths of Syrian territory[1] and North Atlantic Treaty Organization (NATO) ally Turkey has conspired with Iran and Russia to exclude the U.S. and UN[2] from Syrian settlement talks.

Significance:  While Syria itself is of little strategic value to the U.S. beyond secondary implications for Israeli security, the utter failure of the Obama administration has brought U.S. diplomatic prestige to a nadir reminiscent of the Iranian hostage crisis or the fall of Saigon.  Worse, defeat in Syria occurred in a broader context of successful Russian aggression in Ukraine, uncontested Russian meddling in an U.S. presidential election, and perceptions of U.S. strategic concessions to Tehran in the Iran nuclear deal (Joint Comprehensive Plan of Action or JCPOA[3]).  Should the next administration want to accomplish more than Obama, it is vital that they  1) address Syria within the context of increased Russian-U.S. competition and 2) seize the initiative in restoring the influence of U.S. leadership with substantive and symbolic policy changes in regard to Syria and Russia.

Option #1:  Salvage Syria primarily in terms of a comprehensive re-ordering of U.S.-Russian relations to reduce threats to international stability from inter- and intra- state conflict.  Henry Kissinger’s concept of “linkage[4]” should be revived as a guiding principle rather than treating all points of international conflict or cooperation with Moscow as unrelated and occupying separate boxes.  Russian misbehavior needs to be met with appropriate countermeasures.  If U.S.  diplomats are assaulted by Federal Security Service (FSB) thugs, Russian diplomats in the U.S. are restricted to their embassies.  If U.S.  elections are hacked, Russia’s large number of intelligence officers under diplomatic cover in the U.S. are promptly expelled.  If “little green men” appear in friendly states, the U.S. instigates tough banking, economic or security aid pressure on Moscow.  Likewise, instead of trading public insults, the U.S. under Option #1 should negotiate frankly over Russian concerns and be prepared to build on points of cooperation and make concessions on a reciprocal basis.  If the U.S. could strike deals with Brezhnev we can do so with Putin.

Risk:  The U.S. begins from a position of weakness in regional conflicts, having little direct leverage over events on the ground in Syria or eastern Ukraine, which is why U.S. policy must shift to focus on systemic and strategic levels.  U.S. bureaucratic and political stakeholders have simultaneously pursued incompatible goals (i.e. overthrow Assad, stop ISIS, keep Syria intact, support rebels, fight terrorism, non-intervention) and will strongly resist a genuine strategy that forces choices.  Demonstrations of political will may be required by the new administration to convince partners and adversaries now skeptical of U.S. resolve or capability.

Gain:  Russian-U.S. relations could eventually shift to a “new detente” that replaces a high level of friction and peripheral aggression to if not friendly, at least business-like engagement.  Regional conflicts and attendant humanitarian crises could be moderated or settled in a stable diplomatic framework.  Progress on issues of mutual security concern such as Islamist terrorism could be made.  Trust in U.S. leadership could be regained.

Option #2:  A second strategy would be to address Syria narrowly with the objective of a settlement that cuts U.S. losses and attempts to return to as much of the status quo ante as possible – a weak state governed by Assad with minimal ability to threaten neighbors, guarantees for minorities, no ISIS or Islamist terror group in control of territory, and a removal of foreign military forces.

Risk:  While preferential to the current situation, Option #2 could be perceived as a U.S. retreat due to dropping longstanding unrealistic policy goals (i.e. regime change, Syria becoming a liberal democracy) in return for real increases in regional security and stability.  Domestic opposition in the U.S. from neoconservative and liberal interventionists is apt to be fierce.  The effort may fail and Syria could see a large-scale military build-up of Russian and Iranian military forces, threatening Israel.

Gain:  A diplomatic end to the conflict in Syria would have multiple benefits, not least for Syrian civilians who bear the brunt of the costs of civil war.  Preventing permanent state failure in Syria would be a strategic win against the spread of ISIS and similar radical Islamist Sunni terror groups.  The flow of refugees to Europe would markedly decline and those abroad in states like Turkey or Jordan could begin to return to Syria.  Finally, Syria would not become a major military outpost for Russia or Iran.

Other Comments:  It is most important that the new administration not begin by leaping into any particular foreign policy problem, including Syria, but start with a grand strategic end of improving U.S. global position and capacity, which in turn increases U.S. ability to uphold a stable, rules-based, international order. 

Recommendation:  None.


Endnotes:

[1]  Euan McKirdy and Angela Dewan, “Reports: ISIS retakes ancient Syrian city of Palmyra”, CNN, December 12, 2016.  http://www.cnn.com/2016/12/12/middleeast/palmyra-syria-isis-russia/index.html

[2]  Ben Hubbard and David E. Sanger, “Russia, Iran and Turkey Meet for Syria Talks, Excluding U.S.” New York Times, December 20 2016.  http://www.nytimes.com/2016/12/20/world/middleeast/russia-iran-and-turkey-meet-for-syria-talks-excluding-us.html

[3]  United States Department of State, “Joint Comprehensive Plan of Action,” January 17, 2016.  https://www.state.gov/e/eb/tfs/spi/iran/jcpoa/ 

[4] Makinda, S. M., “The Role of Linkage Diplomacy in US‐Soviet Relations,” December, 1987.  http://onlinelibrary.wiley.com/doi/10.1111/j.1467-8497.1987.tb00148.x/abstract

 

Mark Safranski Option Papers Policy and Strategy Russia Syria United States

Syria Options: Refugee Preparation & Resettlement

Chelsea Daymon is currently pursuing a Ph.D. in the Department of Communication and is a Presidential Fellow in the Transcultural Conflict and Violence Initiative (TCV) at Georgia State University.  She is also the Executive Producer of The Loopcast, a weekly show that focuses on issues facing national security, international affairs, and information security.  She holds an M.A. in Near and Middle Eastern studies from University of London’s School of Oriental and African Studies (SOAS), an honorary M.A. from Cambridge University (UK), and a B.A. in Oriental Studies from Cambridge University (UK).  She can be found on Twitter @cldaymon.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  The Syrian refugee crisis.

Date Originally Written:  December 18, 2016.

Date Originally Published:  January 12, 2017.

Author and / or Article Point of View:  Author is an active security researcher and academic.

Background:  The Syrian Civil War has devastated millions of lives, families, and the infrastructure of the country.  The world has witnessed countless atrocities, death, destruction, and a refugee crisis of mammoth proportions.  As of December 4, 2016, The United Nations High Commissioner for Refugees (UNHCR) estimates over 4.8 million Syrians have sought refuge outside of the country[1].  When considering the horrendous reports coming out of Aleppo on December 13, 2016, deliberating on strategies for when peace returns to the country may seem ridiculous[2].  Yet, there will be a time when the conflict ends and some will want to return home. Those who arrive will find a country in complete devastation where, more than likely, their previous occupational skills will not be required until reconstruction is complete.

Significance:  Historically, civil wars coupled with insurgencies have created an unfavorable mix when considering resettlement.  Syria’s porous borders allow transnational actors, who are not members of the local populace, the ability to easily enter and leave while organizing and committing attacks, adding to already unstable conditions[3].  Additionally, individuals returning to a region recently involved in a bloody conflict will arrive with deep emotional scars in need of healing.  Finally, a country with a potential lack of options can likewise produce unrest and discontent in its population.  Syria will benefit in the long-run and stability in the region will improve if Syrian citizens and the international community form a reconstruction plan that breeds healing, stability, and security.

Option 1:  Education and training should be provided to refugees, promoting skill development in engineering, security, urban development, governance, healthcare (this should include not only physical health but mental health services to deal with traumatic stress), and education, which are all fields necessary to revitalize, sustain, heal, and cultivate a country’s future.  As UNICEF notes, “education has crucial linkages to a society’s social, economic and political spheres” not only for children but adults as well[4].  This education and training should be conducted in nations that offer first-class educational systems, providing quality teaching and imparting sound skill advancements to refugees.

Risk:  The risks of Option #1 are economic and uncertain.  Countries must allocate funds to enable such training, which could prove burdensome.  However, the international community could work together to facilitate this. On the other hand, the future of Syria could rest in the hands of the Assad regime, or an even worse dictator, meaning that the international community would be sending highly skilled individuals to an adversarial government, presenting both a security risk and a humanitarian conundrum.

Gain:  The gains would be multifaceted.  Firstly, there is the potential for a positive outcome for a country that has undergone complete devastation.  These skills would enable progress towards creating infrastructure, rebuilding the country, maintaining security, the promotion of individual well-being, as well as educating the next generation of Syrians.  In time, this would foster economic growth.

During the Cold War, Pakistani military personnel obtained training and education in the United States (U.S.), which encouraged favorable collaboration and views of the West during a pivotal time in a battle against Communism[5].  Similarly, providing education to Syrian refugees, particularly in Western countries, could advance positive sentiments and potential cooperation between a new Syrian government and Western nations.  These are crucial elements needed for U.S. and international interests, as well as security in a region which has proven unstable.

Option 2:  Provide greater opportunities for Syrian refugees to seek asylum in stable nations, especially the U.S.

Risk:  The risk of Option #2 is security-related as some fear a scenario whereby a Syrian refugee commits or facilitates an act of violence in the country in which they obtain asylum.  However, when considering the U.S. vetting process for refugees, including multiple interviews, biometric security checks by the intelligence community, medical checks, and cultural orientation, all of which take on average 24 months to undergo; the likelihood of security issues arising from refugees diminishes[6].  However, there is always the possibility of some risk, as with all national security decisions.

Gain:  The gains of Option #2 would be receiving individuals from a country which had a decent education system before the war, with a 95% literacy rate for 15-24-year-olds and compulsory education to the age of 15[7].   If granted asylum in the U.S., Syrian refugees would foster a continuity of diversity which breeds economic growth and is a foundation of American values.  Despite the controversy surrounding the issue, the Manhattan Institute found that both low-skilled and high-skilled immigrants added to increases in U.S. economic growth[8].  Finally, welcoming refugees into the U.S. could advance U.S. strategic interests with the European Union by providing a display of goodwill to countries already inundated with refugees themselves.  Furthermore, it could offer leverage with regional negotiators in regards to the future of Syria[9].

Other Comments:  None.

Recommendation:  None


Endnotes:

[1]  Syrian Emergency. (2016, December 4). Retrieved from http://data.unhcr.org/syrianrefugees/regional.php#_ga=1.176014178.178231959.1481466649

[2]  Shaheen, K. (2016, December 13). Children trapped in building under attack in Aleppo , doctor tells UN. The Guardian. Retrieved from https://www.theguardian.com/world/2016/dec/13/red-cross-urgent-plea-to-save-civilians-aleppo-syria and Cumming-Bruce, N. & Barnard, A. (2016, December 13). ‘A complete meltdown of humanity’: Civilians die in fight for eastern Aleppo. The New York Times. Retrieved from http://www.nytimes.com/2016/12/13/world/middleeast/syria-aleppo-civilians.html

[3]  Staniland, P. (2005-06) Defeating Transnational Insurgencies: The best offense is a good fence. The Washington Quarterly. Winter, 29(1), pp.21-40.

[4]  UNICEF, Education and peacebuilding. (2012, August 2). Retrieved from https://www.unicef.org/education/bege_65480.html

[5]  Moyar, M. (2016). Aid for Elites: Building Partner Nations and Ending Poverty Through Human Capital. Cambridge University Press.

[6]  Pope, A. (2015, November 20). Infographic: The screening process for refugee entry into the United States. The White House Blog. Retrieved from https://www.whitehouse.gov/blog/2015/11/20/infographic-screening-process-refugee-entry-united-states and Altman, A. (2015, November 17). This is how the Syrian refugee screening process works. Time. Retrieved from http://time.com/4116619/syrian-refugees-screening-process/

[7]  Global Education Cluster (2015, March 16). Retrieved from http://educationcluster.net/syria-4-years/ and Education System Syria. Ep nuffic, The organization for Internationalization in Education. Retrieved from https://www.epnuffic.nl/en/publications/find-a-publication/education-system-syria.pdf

[8]  Furchtgott-Roth, D. (2014) Does immigration increase economic growth? Economic Policies for the 21st Century, No.2. Retriever from http://www.manhattan-institute.org/pdf/e21_02.pdf

[9]  Long, K. (2015, December 16). Why America could ― and should ― admit more Syrian refugees. The Century Foundation. Retrieved from https://tcf.org/content/report/why-america-could-and-should-admit-more-syrian-refugees/

Aid / Development / Humanitarian Assistance / Disaster Relief Chelsea Daymon Civil War Option Papers Refugees Syria

Egyptian Syriana: A Gulf-Funded Russian Roulette

Murad A. Al-Asqalani is an open-source intelligence analyst based in Cairo, Egypt.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Political opportunity for the current Egyptian administration in the war in Syria.

Date Originally Written:  December 11, 2016.

Date Originally Published:  January 9, 2017.

Author and / or Article Point of View:  The article is written from the point of view of the As’Sissi administration (TAA) of Government of Egypt (GoE) towards the war in Syria.

Background:  In 1958, Egypt and Syria formed the first Arab alliance in the region.  Although the United Arab Republic was short-lived, and despite its demise in 1961, political and security relationships between the two countries have continued.  The armies of both countries launched a surprise attack against Israel in 1973 to reclaim the Sinai and Golan Heights, which were occupied after a pre-emptive war launched by Israel in 1967.  However, after the unilateral decision by Egyptian President Anwar Sadat to make peace with Israel, Syrian President Hafiz Al-Assad pursued a policy of sustained agitation propaganda against the Sadat and the Mubarak administrations.  This policy was maintained by his son and successor, current Syrian President Bashar Al-Assad, then it was followed by a policy of encouraging public opinion subversion through agent provocateurs peddling pro-Syria narratives in Egyptian state media, after the Egyptian uprising of 2011.  On several occasions, Egyptian Intelligence Community officials claimed that several Egyptian Islamist terrorists received support from Syrian and Iranian intelligence services to carry out attacks against Egyptian officials and interests.

Following years of political instability, former Army Field Marshal As’Sissi rose to the helm of power in Egypt, leading an administration that seeks to project ‘soft power’ in the near-abroad.  The war in Syria offers TAA an opportunity to redraw the map of regional alliances and to maneuver around several national security threats that currently have no viable solutions.  These threats include tracking battle-hardened Jihadis returning from Syria, a fragile national economy reliant on tourism, Suez Canal revenues to secure foreign currency, and Iranian aggression.

In the wake of the Egyptian atypical coup of 2013, the GoE turned to Gulf countries for economic aid packages, and turned to Putin’s Russia for military cooperation.  The GoE also strengthened its political and military cooperation with the French government, which openly opposes the Assad regime in Syria.  After the bombing of a Russian commercial airliner over the Sinai by operatives of the so-called Islamic State (IS), and after disagreements with Gulf countries regarding a final solution in Syria, as well as the war in Yemen, TAA supported two conflicting draft resolutions in the security council, and declared its support for a ‘Syrian national army’ (SNA).  TAA stated that SNA was best suited to stabilize war-torn Syria.  TAA envisions SNA as a replacement for the now-defunct and disgraced Syrian Arab Army (SAA) with the SNA being a melting pot to assimilate all ethnicities and all emergent armed groups in Syria after a process of national reconciliation.

Many observers translated this position as ‘support for Assad,’ which perhaps may prove to be wrong.  In other words, since the Government of Syria (GoS) has been undermined by Russian and Iranian meddling, the SAA is in disarray after huge losses coupled with nationwide defection and desertion, and since the social fabric of Syria as a nation-state was torn along ethnic and religious fault lines, TAA is not betting on the survival of Assad per se, but is rather trying to sell a model for nation building.

Significance:  TAA is interested in maintaining a secular GoS, improving security cooperation, maintaining a fragile alliance with Russia, and in engineering a political rapprochement with Iran.  It is also interested in protecting certain Egyptian economic interests, mainly tourism and Suez Canal revenues, as well as newly discovered, deepwater natural gas fields in the Mediterranean Sea.  Given these parameters, the options available to TAA are:

Option #1:  Support a ‘Syrian National Army’

Risk:  By declaring support to an SNA, TAA risks economic divestment by Saudi Arabia, the stigma of supporting Assad and SAA (both accused of committing war crimes), and the ethical predicament of siding with foreign troops and foreign religious militias – Russian special operations forces, Iranian Islamic Revolutionary Guard Corps, Hezbollah, Shiite mercenaries, etc – deployed against the Syrian people.

Gain:  By proposing the SNA narrative, TAA aims to save the failed model of a secular Arab republic in Syria, and to improve cooperation with its security services.  It offers the parties most invested in the conflict, namely Russia and Iran, an exit strategy to stop supporting Assad after the war ends.  In return, it expects a share in post-war reconstruction and military rebuilding contracts, wishes to strengthen its position with Russia, and hopes to use Iranian ambitions for regional hegemony to counter political and economic pressures from Saudi Arabia.  It is also interested in inclusion in any future plans for developing and operating natural gas pipelines, deepwater natural gas fields in the Mediterranean, as well as regional natural gas production and collection hubs.  Blocking access of Gulf countries to a Mediterranean port ensures that tankers will continue to sail through the Suez Canal to ship oil and liquified natural gas (LNG) to Europe.

Option #2:  Support the ‘Syrian Revolution’

Risk:  The ‘Syrian Revolution’ narrative, in which opposition forces fight to topple GoS, is no longer relevant after the dimensions of the proxy war in Syria were revealed.  By supporting this narrative, TAA will undermine itself, and delegitimize its rise to power.  It will upset Russia while siding with Gulf countries against Iran in an almost-lost proxy war.  TAA will also risk becoming a supporter of terrorism, after most of the so-called revolutionary factions in Syria have demonstrated to be mostly Sunni Islamist extremists.  It will risk impact to its economic interests, such as tourism and Suez Canal revenues, as well as investments in the energy sector.  It will risk direct involvement in the conflict, should Gulf countries decide to intervene militarily.  It should be noted that former President Muhammad Morsi’s reference to a possible Egyptian military intervention in Syria was one of the main triggers of the 2013 atypical coup against him, and his Qatar and Turkey-backed Muslim Brotherhood government.

Gain:  By supporting the ‘Syrian Revolution’ narrative, TAA stands to secure more Saudi and perhaps Qatari direct investments and petroleum aid packages.

Other Comments:  TAA’s regional calculus involves Israel, Turkey, and Qatar. Israel’s red line is supplying Hezbollah with advanced weapons, and it maintains a fruitful security cooperation with GoE tackling the IS insurgency in the Sinai.  Therefore, TAA limits Egyptian arms sales to GoS to light weapons and ammunition.  TAA is currently engaged in a media war against Qatar and Turkey for their pan Islamic aspirations, which TAA considers a threat to Egyptian sovereignty.

Recommendation:  None.


Endnotes:

None.

Civil War Egypt Murad A. Al-Asqalani Option Papers Syria

Syria Options: Russian Naval Activity in the Eastern Mediterranean Sea

Captain Robert N. Hein is a career Surface Warfare Officer in the U.S. Navy.  He previously commanded the USS Gettysburg (CG-64) and the USS Nitze (DDG-94).  He can be found on Twitter @the_sailor_dog.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  A resurgent Russia is operating extensively in the Eastern Mediterranean Sea in support of Syria, undermining U.S. efforts to protect the people of Aleppo, and U.S. efforts against the Islamic State of Iraq and Syria (ISIS).

Date Originally Written:  December 9, 2016.

Date Originally Published:  January 5, 2017.

Author and / or Article Point of View:  Bob Hein, a career Naval Officer, believes a resurgent Russia may be at a tipping point in its ability to continue operations on a global scale.  However, Russia’s current actions continue to affect world order.  His views in no way reflect those of the U.S. government, the Department of Defense, or the U.S. Navy.  He also likes to play blackjack, smoke cigars, and drink scotch.

Background:  In a show of strategic nostalgia, and in an attempt to reassert itself on the global stage, Russia has stationed its fleet, to include the carrier Kuznetsov, in the Eastern Mediterranean Sea.  The Kuznetsov is present under the auspices of supporting a faltering Syrian Regime, while thwarting U.S. efforts against both ISIS and U.S. support to anti-Assad forces.  Russia has turned the Eastern Mediterranean Sea into “a dangerous place[1].”

Significance:  If we are indeed in a return to great power competition, then a resurgent Russia operating off the coast of Syria, at best, undermines U.S. influence from the Eastern Mediterranean Sea through the Middle East, to include key maritime choke points such as the Suez Canal and the Strait of Gibraltar.  At worst Russia’s activities at sea provide an opportunity for a miscalculation that could lead to war.

Option #1:  The U.S. Navy provides a force to serve in the Mediterranean Sea as a credible deterrent to Russian expansionism.  Prior to the fall of the Berlin Wall, the  U.S. maintained a credible deterrent force in the Mediterranean Sea.  In addition to large numbers of ground forces based in Germany, the U.S. Navy provided a near continuous Aircraft Carrier Strike Group (CSG) presence.  That presence deterred Soviet aggression through its ability to deny the Soviets their objectives, and if necessary, provide a level of punishment that would make Soviet expansionism futile.  This strategy resulted in an undeniable victory for the U.S. in the Cold War.

Risk:  The risk is medium for Option #1 as it is primarily resource driven, both in hardware and dollars.  The U.S. Navy of the Cold War consisted of almost 600 ships and one major threat.  In the decades since, more threats have emerged in addition to a resurgent Russia.  These emerging threats include a rising China, a nuclear North Korea, a volatile Iran, and violent extremist organizations that have swept across the Middle East and North Africa.  Placing a CSG in the Mediterranean Sea would require either moving ships away from other priority missions such as strikes on ISIS or an aggressive build rate of ships which could not be supported by either current industrial capacity or the current U.S. Navy budget.  There is also an increased risk of miscalculation.  Russia is not the Soviet Union and memories of the Soviet fall will continue to ferment for the foreseeable future.

Gain:  Medium.  If Option #1 is successfully undertaken, the results would be a reassurance of our allies globally, an affirmation of U.S. global power and influence, and the ability to influence events in Syria that fully support U.S. interest and intent.

Option #2:  Ignore the Russians.  Like a high school baseball all-star seeking out prior glory, the Russians are mortgaging their future to bring back the glory days.  The deployment of their carrier the Kuznetzov did little more than gain derision as it steamed trailing a thick black cloud across to the Mediterranean Sea[2].  The Kuznetzov ultimately did little more than demonstrate the ailing Russian fleet and the two aircraft crashes[3] did little to demonstrate Russian ability to project power from the sea.  Furthermore, Russia is draining its reserve fund to fund government operations to include its military expansionism.  Additionally, Russia has been bleeding economically due to Western sanctions and the low-cost of oil[4].  Once Russia’s reserve fund runs out their options are limited.  Russia can choose to either operate and stop modernization their military, or modernize their military and stop operating.  History has shown that Russia will attempt to keep operating and slow its rate of modernization and this will push maintenance costs up.  Russia’s last foray into deploying vessels on the cheap resulted in the loss of a ballistic missile submarine Kursk.

Risk:  High.  If the U.S. were to ignore the Russians and miscalculate their ability to operate in an austere environment then the U.S. runs the risk of demonstrating an inability to operate on the global stage.   U.S. inaction and miscalculation will solidify that Russia has the influence and ability they claim thus bolstering Russian credibility globally.  The political risk is high and the risk to the people of Syria is high.

Gain:  High.  Similar to holding on 17 in blackjack and waiting for the dealer to bust, the U.S. takes minimal risk while Russia busts.  The U.S., with minimal effort and minimal cost, watches while Russia overextends itself, wipes out its cash reserves, and struggles to maintain its ability to even minimally influence its neighbors.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  British warship docks in Israel amid rising tensions in Mediterranean Audrey Horowitz-Eric Cortellessa-Nina Lamparski-Elie Leshem-Avi Issacharoff-JTA Ahren-Ralf ISERMANN-Times staff-Cathryn Prince-Rich Tenorio-Rebecca Stoil-Nicholas Riccardi-Steve North-Sue Surkes – http://www.timesofisrael.com/british-warship-docks-in-israel-at-time-of-rising-tensions-in-mediterranean/

[2]  Farmer, B. (2016)  Belching smoke through the Channel, Russian aircraft carrier so unreliable it sails with its own breakdown tug. http://www.telegraph.co.uk/news/2016/10/21/russian-carrier-plagued-by-technical-problems/

[3]  Lockie A. (2016)  Russia has just given up on trying to launch strikes from its rickety aircraft carrier – http://www.businessinsider.com/russia-gave-up-airstrikes-kuznetsov-aircraft-carrier-2016-12

[4]  Readhead, H. (2016). Russia is rapidly running out of cash. http://metro.co.uk/2016/09/08/russia-could-run-out-of-money-by-the-end-of-this-year-economists-predict-6115802/

Bob Hein Maritime Option Papers Russia Syria United States

Syria Options: Safe Zone

Carlo Valle has served in United States Marine Corps and the United States Army.  A graduate of History at Concordia University (Montreal) he is presently pursuing a Masters in Geopolitics and International Relations at the Catholic University of Paris.  He can be found on Twitter @cvalle0625.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Civil war, humanitarian, and international crisis in Syria.

Date Originally Written:  December 4, 2016.

Date Originally Published:  January 2, 2017.

Author and / or Article Point of View:  Author is a former enlisted member of the United States military and a constructivist who believes that international relations are influenced by more than just power and anarchy but also by the construction of identity.  The article is written from the point of view of the U.S. towards the Syrian Civil War.

Background:  The Syrian Civil War has moved into its fifth year.  A combination of intertwined and conflicting interests has created a stalemate for all sides thus prolonging human suffering.  Attempting to break the stalemate, Russia and Syrian President Bashar al-Assad’s air forces are bombing civilian targets in rebel-controlled areas, despite claims of targeting only the Islamic State of Iraq and the Levant (ISIL) and Al-Nusra-held areas.

Significance:  The conflict has sparked a mass exodus of refugees fleeing the fighting.  This mass exodus has overwhelmed neighboring countries and Europe.  To ease this refugee burden and human suffering, some have proposed establishing safe zones.

Option #1:  Establish a safe zone.  A safe zone is a de-militarized area intended to provide safety to non-combatants.

Risk:  For Syria and Russia to respect a safe zone it must protect non-combatants and remain neutral.  If Syrian opposition forces use the safe zone as a place from which to mount operations Syria and Russia could then justify attacking the safe zone [1].  If the safe zone is attacked by Syria and Russia, and U.S. and Coalition troops protecting the safe zone are killed or wounded, the U.S. risks war with Syria or Russia [2].  Additionally, if U.S. and Coalition troops discover Syrian opposition forces in the safe zone hostilities could erupt.  These hostilities could be used by ISIL or Al-Nusra to recruit new fighters and be a political embarrassment for the U.S. and the Coalition.

Establishing a safe zone will require a sizable neutral military presence that can deter attack and dissuade the Syrian opposition attempting to occupy the safe zone [3].  The military personnel protecting the safe zone must have clear rules of engagement and the overall safe zone mission will require a conditions-based arrival and exit strategy.  Just as important as establishing a safe zone is knowing when and how to extract oneself.  This goes beyond fear of media or political accusations of “being stuck in a quagmire” or “appeasement.”  Instead, the concern is based in judging whether the safe zone is becoming an obstacle to peace or worsening the situation.

Gain:  Establishing a safe zone will protect non-combatants thereby reducing the number of refugees overwhelming Syria’s Mid-East neighbors and Europe.  In the long-term, refugees that are unable to return to their homeland may destabilize the region by being unable to integrate into their host-nation’s society or by falling into the trap of radicalism[4].  Similar situations have happened in the 20th century with the Palestinian refugee crisis and Afghan refugees in Pakistan.

Option #2:  Forgoing a safe zone.

Risk:  Not establishing a safe zone runs the long-term risks of regional instability or a new wave of radicalism that could be a problem for decades.  According to Stephen Walt, the U.S. has no interests in Syria to justify any involvement[5].  However, the Syrian Civil War has brought social and economic strain upon Syria’s neighbors and Europe.  In the Middle East, U.S. regional partners could turn their backs on the U.S. if they feel that the U.S. is not acting in their interests i.e. taking actions to stem the flow of refugees.  U.S. relationships in the Middle East are already strained due to the Joint Comprehensive Plan of Action with Iran.  In Europe, refugee migration has ushered a wave of anti-European Union populism that questions the very international system of cooperation the U.S. has benefitted from since the end of World War II.  Were this questioning of the international system to fracture Europe, it would not be able to counter Russian aggression.

Gain:  The biggest advantage to forgoing the safe zone is the ability to keep other options open. U.S. and Coalition forces could be better used elsewhere, likely focusing on near-peer competitors such as Russia or China.  U.S. and Coalition forces could be employed in the Baltic States, or in the Pacific Rim to counter Russian aggression and China’s rise.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  Joseph, E. P., & Stacey, J. A. (2016). A Safe Zone for Syria: Kerry’s Last Chance. Foreign Affairs. Accessed from https://www.foreignaffairs.com/articles/syria/2016-10-05/safe-zone-syria

[2]  Bier, D. J. (2016). Safe Zones Won’t Save Syrians. National Interest. Accessed from http://nationalinterest.org/feature/safe-zones-wont-save-syrians-17979

[3]  Stout, M. (2015). [W]Archives: When “Safe Zones” Fail. War on the Rocks. Accessed from http://warontherocks.com/2015/07/warchives-when-safe-zones-fail/

[4]  Kristoff, N. (2016). Obama’s Worst Mistake [Op-Ed]. The New York Times. Accessed from http://nyti.ms/2aCJ54F

[5]  Walt, S. M. (2016). The Great Myth About U.S. Intervention in Syria. Foreign Policy. Accessed from http://foreignpolicy.com/2016/10/24/the-great-myth-about-u-s-intervention-in-syria-iraq-afghanistan-rwanda/

Carlo Valle Civil War Islamic State Variants No-Fly or Safe Zone Option Papers Russia Syria United States

Syria Options: Involving China as a Major Broker in Syria Peace Talks

Evanna Hu is a countering violent extremism expert and technologist, having lived and worked in Europe, the Middle East, Africa and Afghanistan.  She is presently a partner at Omelas, a US and EU firm at the intersection of technology and CVE/CT and has consulted and facilitated for various U.S. government agencies.  She can be found at evannahu.com and occasionally tweets @evannahu.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Since the start of the ongoing Syrian Civil War, Russia, Iran, and the anti-Islamic State of Iraq and the Levant (ISIL) coalition led by the U.S. are viewed as the most prominent external powerbrokers, backing either the Bashar al-Assad regime or the many rebel coalitions on the ground.  Indeed, Syria has become the proxy battleground for the powers of the world who are caught in between ambitions of regional hegemony and balance of power.  China’s role in the country, however, has been murky and underreported.  Yet, due to China’s escalating presence in Syria, its seat on the UN Security Council, and most importantly, the definitive shift Syria represents in China’s foreign policy, it is worth paying close attention to its rising influence and its broader significance.

Date Originally Written:  December 9, 2016.

Date Originally Published:  December 29, 2016.

Author and / or Article Point of View:  As a technologist in countering-violent extremism working in Europe, the Middle East, and Africa, the author took China’s role in Syria much more seriously in spring 2014, when a sudden surge in jihadist propaganda on the plight of the Uighurs flooded websites and social media[1].  A year later, ISIL named China as a part of the enemy coalition and ramped up its recruitment of Chinese Muslims[2][3].  The author, from her facilitation background, believes that inclusivity of actors is the first critical step to solving a complex issue.  This article is written from the perspective of U.S. national security.

Background:  China’s involvement in Syria can be broken down into three phases.  From the five decades leading up to 2013, China’s foreign policy was guided by “the principle of non-interference in internal affairs” of other countries[4].  China made profits selling weapons, including biological, to the Assad government, but China firmly believed that the Syrian Civil War was a Syrian problem.  Based on this belief, China vetoed every Western resolution relating to Syria in the UN Security Council[5].  However, between 2013-2015, China began reconsidering its hands-off political policy.  Thousands of Uighurs joined Jabhat Fateh al-Sham, formerly the al-Nusra Front, and at least 113 joined ISIL[6][7].  China started to see an increase in violence in Xinjiang, a result, it claims, of returnee fighters[8].  Moreover, as China became more concerned with the “U.S. hegemony in the region,” it coordinated military operations in Syria with Russia and continued to sell weapons to Assad. 

In December 2015, China passed a groundbreaking antiterrorism law.  For the first time, the national military can be stationed in other countries, beginning with a permanent base in Djibouti, leading to a break with China’s traditional non-interference principle[9].  The new policy centers around a counterbalance “for a fair and just world order,” according to the state-run news agency, Xinhua[10].  In Syria, the new principle has manifested itself in further cooperation with Russian military operations, expansion of the security delegation at the Chinese Embassy in Damascus, and high-level military-political discussions with Assad rather than going through Russian counterparts[11].  More telling of China’s involvement is the fact that starting in August 2016, it is sending military advisors to Assad to “improve personnel training and training Syrian soldiers how to use Chinese made weapons[12].  In the long-run, an Eastern-facing Syria is a key component to China’s grand strategy of the new Silk Road Initiative, history’s largest infrastructure project.  The terminus hub of the ancient Silk Road, Damascus, serves as both symbolic and literal representation of China’s ambition to be, once again, a world leader[13].

Significance:  Historically, Syria is the turning point and is setting the precedent for China’s future involvement in global affairs beyond the first island chain.  China’s decision-making process leading to the reversal of its foreign policy should be further examined, while its future movements need to be examined as clues to its (re)actions and policies not only about Syria and the Middle East, but also elsewhere in the world.  China’s “proactive diplomacy” (zhudong shi waijiao) is in direct competition with U.S. interests in the Middle East and globally.

Option #1:  Increase China’s role in the peace talks taking place to end the Syrian Civil War.  While China has been a participant in peace talks including the Vienna talks, it has not been given a considerable voice on Syria-related matters.

Risk:  Option #1 validates and formalizes China’s role on the world stage, which the U.S. needs to be careful about, as this could be seen as a U.S. admission that China is a superpower.

Gain:  With China’s increased role in the peace talks taking place to end the Syrian Civil War,  a potential compromise is easier, as China, much like the U.S., still wants a political solution rather than an extensive military campaign.  As a significant seller of weapons to Assad,  China has Assad’s ears, but at the same time, the short-term profit China gains from these weapons sales is outweighed by the grand strategy of the Silk Road initiative.  Presently, China has the leverage to push Assad towards a political compromise.  In the sense that China can help catalyze the process to a peaceful end, giving China a voice at the table has a relatively low opportunity cost.  Furthermore, by keeping China close, the U.S. can reap insights as to how it would act in the future in various foreign policy scenarios.

Option #2:  Maintain China’s current passive participation in the peace talks taking place to end the Syrian Civil War.

Risk:  Refusing China to be a main player in the Syrian peace talks can have disastrous consequences. Firstly, it confirms to China, along with Russia and Iran, that the U.S. wants hegemony in the region, leading to a potential confrontation not unlike the Cold War.  This potential confrontation could spur China to further arm Assad.  Not only would the further arming of Assad discredit the U.S. as more civilians die and the humanitarian disaster further deteriorates, but it also lengthens the Syrian Civil War for much longer than the U.S. public will tolerate.  The longer the U.S. is involved in the Syrian Civil War, the more resources are drawn away from other foreign and domestic issues.

Gain:  Option #2 shows the rest of the world that China is in fact not a force beyond the first island chain nor a superpower.  Option #2 leaves China the burden to demonstrate that its prowess can match its ambition.

Other Comments:  China has made Syria into a proxy dance with the U.S.  With the incoming administration, it will be interesting to watch how the carefully choreographed dance of the past will pass the test of time.  But make no mistake, China has embraced a new era of proactive diplomacy.  It has the domestic stability and monetary resources to carry out its wishes, against U.S. national interests.

Recommendation:  None.


Endnotes:

[1]  Philipp, Josh. “Al-Qaeda Calls for Caliphate in China’s Xinjiang”. October 26, 2014. The Epoch Times. http://www.theepochtimes.com/n3/1043863-al-qaeda-calls-for-caliphate-in-chinas-xinjiang/

[2]  ISIS/ Daesh. Al-Hayat Media Center. Dabiq. Issue No. 4.

[3]  Wong, Edward & Wu, Adam. “ISIS Extends Recruitment Efforts to China with New Chant”. December 8, 2016. The New York Times. www.nytimes.com/2015/12/09/world/asia/isis-china-recruitment-chant-mandarin.html

[4]  The Chinese Embassy in Nigeria. “Two Stories of Confucius: an Eye into China’s Principle of ‘Non-interference in Internal Affairs’”. August 7, 2012. Daily Trust. http://www.fmprc.gov.cn/zflt/eng/zfgx/rwjl/t958839.htm

[5]  Volodzko, David. “China’s Role in the Syria Crisis Revisited”. September 28, 2015. The Diplomat. http://thediplomat.com/2015/09/chinas-role-in-the-syria-crisis-revisited/

[6]  Ali, Mohanad Hage. “China’s Proxy War in Syria: Revealing the Role of Uighur Fighters”. March 2, 2016. Al- Arabiya. https://english.alarabiya.net/en/perspective/analysis/2016/03/02/China-s-proxy-war-in-Syria-Revealing-the-role-of-Uighur-fighters-.html

[7]  Rosenblatt, Nate. All Jihad is Local: What ISIS’ Files Tell Us about Its Fighters. New America Foundation. July 2016. https://na-production.s3.amazonaws.com/documents/ISIS-Files.pdf

[8]  Xinhua News Agency. “Syria’ FM Highlights Relations with China”. December 8, 2016. http://news.xinhuanet.com/english/2016-12/08/c_135888529.htm

[9]  Blanchard, Ben. “China Passes Controversial Counter-terrorism Law”. December 28, 2015. Reuters. http://www.reuters.com/article/us-china-security-idUSKBN0UA07220151228

[10]  Xinhua News Agency. “Interview: Russia-China Partnership Crucial in Helping Maintain World Order: Russian Analyst”. November 5, 2016. http://news.xinhuanet.com/english/2016-11/05/c_135808251.htm

[11]  Xinhua News Agency. “Syria’ FM Highlights Relations with China”. December 8, 2016. http://news.xinhuanet.com/english/2016-12/08/c_135888529.htm

[12]  The Telegraph. “China Steps Up Military Cooperation with Assad”. August 11, 2016. http://www.telegraph.co.uk/news/2016/08/18/china-steps-up-military-cooperation-with-assad-as-top-admiral-vi/

[13]  Lin, Christina. “Syria in China’s New Silk Road Initiative”. China Brief. The Jamestown Foundation. Vol.10; issue 8. April 16, 2010. https://jamestown.org/program/syria-in-chinas-new-silk-road-strategy/

China (People's Republic of China) Civil War Evanna Hu Option Papers Syria

Syria Options: No Fly Zone & Syrians Rebuilding Syria Program

Abu Sisu and Seshat are intelligence analysts currently working in the field of homeland security.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Civil war, humanitarian, and international crisis in Syria.

Date Originally Written:  November 30, 2016.

Date Originally Published:  December 26, 2016.

Authors and / or Article Point of View:  Abu Sisu has more than 20 years of experience as a military and homeland security intelligence analyst.  Seshat is an intelligence analyst with over six years of experience living in the Middle East and focuses on local solutions to local problems.   

Background:  The complex and protracted nature of the conflict in Syria has continued for almost six years with no side achieving a definitive political or military victory.  While estimates vary, between 250,000 to 500,000 Syrians have died since 2011 and around eleven million were displaced from their homes, with almost five million having fled Syria[1].  The Syrian Arab Air Force (SyAAF) has intentionally targeted civilians since the civil war began.  In September 2015 the Russian military began assisting Syrian President Bashar al Assad’s regime through airstrikes against rebel held territory which inflicted thousands of civilian casualties.

Significance:  The widespread targeting of civilians violates international law and has fueled the largest refugee and displacement crisis since World War II, further destabilizing the region[2].

Option #1:  A U.S.-led Coalition imposes a no-fly zone in Syria.  A no-fly zone is airspace designated as off limits to flight-related activities[3].  The SyAAF depopulates territory as a way to eliminate support for opposition groups.  A U.S.-led Coalition could restrict SyAAF movement thus protecting critical areas in Syria.  As with earlier no-fly zones in Iraq (Operation Southern Watch/Focus) and Bosnia (Operation Deny Flight), U.S. and Coalition forces would likely be authorized to attack other targets—anti-aircraft assets for example—that threaten the mission.  On October 24th, 2016 Secretary of the U.S. Air Force Deborah Lee James said she was confident that it would be possible to impose a no-fly zone in Syria[4].  Mike Pence, the U.S. Vice President-Elect, announced his support for a no-fly zone during the Vice-Presidential debate on October 4th, 2016[5].

Risk:  Russian government activity supports the Assad regime and a no-fly zone may be interpreted as an attempt to undermine Russian national security goals.  If the U.S. cannot reach an agreement with the Russians on the implementation of a no-fly zone, the U.S. can expect the Russians to respond in one or more of the following ways:

Rejecting cooperation on Middle East issues.  Russian support is important for maintaining the Iran nuclear deal—the Joint Comprehensive Plan of Action—and for concluding a peace agreement to the Syrian Civil War.  If Russia withdrew or chose to undermine efforts related to the Iran nuclear deal or the Syrian Civil War, it is likely that neither situation would achieve an acceptable resolution.

Escalating pressure on North Atlantic Treaty Organization (NATO) Members or U.S. Allies and Partners.  Russia has threatened to cut off natural gas supplies to Europe in the past and made aggressive military moves in the Baltics as a warning to Finland and Sweden to reject NATO membership[6][7].

Direct military confrontation between Russian forces currently supporting the Assad regime and U.S.-led Coalition forces in the region.  With both Russian and U.S.-led Coalition aircraft flying in Syrian airspace, the possibility exists for conflict between the two, either accidentally or when attempting to evade or enforce the no-fly zone.  Additionally, Russian forces deployed anti-aircraft missiles to Syria and, as of October 6th, 2016 declared that any Coalition airstrikes against territory held by the Syrian government would be interpreted as a “clear threat” to Russian forces[8].

Gain:  A no-fly zone could eliminate the threat to civilians from the SyAAF.  Displaced persons would have more options to relocate within Syria rather than making a perilous journey to other countries.  A no-fly zone would reduce the capabilities of the Assad regime which has relied on airpower to counter attacks by opposition forces.  A reduction in Syria’s ability to use airpower may serve as another incentive for the Assad regime to seek a negotiated settlement to the conflict.

Option #2:  A pilot program that provides Syrian refugees with the training and skills to rebuild Syria in the aftermath of the conflict—Syrians Rebuilding Syria (SRS).  SRS will solicit the assistance of volunteer engineers and architects—specifically those involved with the post-conflict reconstruction and development in Bosnia and Herzegovina and Lebanon—to train refugees.  The aim is to equip teams of refugees with the appropriate vocational training in architecture, city planning and development, brick laying, constructing roads, installing or repairing electrical grids, operating heavy construction machinery, and implementing sewage and drainage systems among other things.

Risk:  As the intensity of the Syrian Civil War increases the refugee flow the SRS will require increased funding to train them.  The accumulated costs of the SRS program in the short-term are unlikely to yield a tangible return on investment (ROI) and success will be difficult to measure.  Without a way to demonstrate ROI, the U.S. Congress may hesitate to appropriate continued funding for SRS.  Additionally, the success of the program depends on the outcome of the Syrian Civil War.  If Assad is not defeated, graduates of SRS may be viewed as American-trained spies, whose goal is to infiltrate and undermine the regime. Further, without a specific plan as to where the SRS-trained refugees will return to in Syria, or who they will meet once they arrive, the trainees will likely face unpredictable conditions with no guarantee of success.

Gain:  A militarily agnostic option that trains refugees to rebuild Syria could prove to be a strategically effective tool of U.S. soft power.  SRS would not burden the U.S. with nation building, but instead provide Syrians with the necessary tools to rebuild their own country.  These factors would likely assist in countering anti-Americanism, particularly among Syrians, and serve as a model for effective non-military assistance in future conflicts. Additionally, as the conflict is prolonged, graduates of SRS will likely become more attractive refugees to other countries in the region due to their employability.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  CNN, L. S.-S., Jomana Karadsheh and Euan McKirdy. (n.d.). Activists count civilian toll of Russian airstrikes in Syria. Retrieved November 10, 2016, from http://www.cnn.com/2016/09/30/middleeast/un-aleppo-condemnation/index.html

[2]  United Nations. (2016, March 15). Syria conflict at 5 years: The biggest refugee and displacement crisis of our time demands a huge surge in solidarity. Retrieved December 02, 2016, from http://www.unhcr.org/en-us/news/press/2016/3/56e6e3249/syria-conflict-5-years-biggest-refugee-displacement-crisis-time-demands.html

[3]  Hinote, C. (2015, May 05). How No-Fly Zones Work. Retrieved November 23, 2016, from http://blogs.cfr.org/davidson/2015/05/05/how-no-fly-zones-work/

[4]  OMelveny, S. (n.d.). SecAF: US Could Create Syria No-Fly Zone While Fighting ISIS [Text]. Retrieved November 10, 2016, from http://www.military.com/daily-news/2016/10/24/secaf-us-could-create-syria-no-fly-zone-while-fighting-isis.html

[5]  Syria Draws a Rare Source of Accord in Debate Between Kaine and Pence – The New York Times. (n.d.). Retrieved November 10, 2016, from http://www.nytimes.com/2016/10/06/us/syria-vice-presidential-debate.html?_r=1

[6]  Russia Gazprom risks another gas standoff with Ukraine – Business Insider. (n.d.). Retrieved November 11, 2016, from http://www.businessinsider.com/russia-gazprom-risks-another-gas-standoff-with-ukraine-2015-2?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+businessinsider+(Business+Insider)

[7]  Russia Issues Fresh Threats Against Unaligned Nordic States. (n.d.). Retrieved November 11, 2016, from http://www.defensenews.com/story/defense/international/2016/05/05/russia-issues-fresh-threats-against-unaligned-nordic-states/83959852/

[8]  Oliphant, R. (2016, October 06). Russia warns it will shoot down alliance jets over Syria if US launches air strikes against Assad. Retrieved December 04, 2016, from http://www.telegraph.co.uk/news/2016/10/06/russian-air-defence-missiles-would-respond-if-us-launches-air-st/

Abu Sisu Aid / Development / Humanitarian Assistance / Disaster Relief Civil War No-Fly or Safe Zone Option Papers Refugees Russia Seshat Syria

Syria Options: Military & Political Pressure

Dr. Christopher Bolan has served in Jordan, Tunisia, and Egypt and worked as a Middle East foreign policy advisor to Vice Presidents Gore and Cheney.  He presently teaches and researches national security issues at the U.S. Army War College.  He can be found on Twitter @DrChrisBolan.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  The Syrian Civil War.

Date Originally Written:  December 9, 2016.

Date Originally Published:  December 22, 2016.

Author and / or Article Point of View:  The author is a retired military member whose writings and teaching focus on national security issues related to the Middle East.

Background:  The civil war in Syria was sparked by Syrian President Bashar al-Assad’s brutal campaign of repression in reaction to what were initially peaceful protests.  The humanitarian costs of this civil war have been staggering: hundreds of thousands dead, over 11 million Syrians internally displaced or living in make-shift refugee camps in Turkey, Lebanon, or Jordan, and more than 300,000 seeking refuge in Europe.  Islamist terrorist groups including the Islamic State, Al-Qa’ida, and others have seized huge swaths of territory and greatly expanded their resource base and capabilities.  Meanwhile, both Russia and Iran have exploited this opportunity to expand their regional influence by offering extensive military support to Assad.  As of this writing, Syrian forces backed by Russian aircraft appear poised to regain control of Aleppo–potentially a key turning point establishing a military balance of power heavily favorable to Assad and his supporters.

Significance:  From the beginning of this crisis, national security professionals have disagreed over the relative importance of these developments for U.S. interests[1].  However, the most immediate impact on U.S. interests derives from prospects that: (1) ungoverned spaces and chaos in Syria will serve as a continued base for jihadi terrorists willing to attack targets in Europe and the U.S.; and (2) continued refugees flows could destabilize U.S. regional allies in neighboring Lebanon, Jordan, and Iraq.  Only an end to the civil war though a negotiated political transition can accomplish both of these objectives.

Option #1:  The first option relies on applying military pressure to create an internal balance of power that incentivizes Assad to negotiate a transition of power.  U.S. actions thus far have attempted to accomplish this by training and equipping Syrian opposition groups.  This project has been an abject failure as one program costing nearly half a billion dollars only yielded a few dozen trained fighters who were quickly routed once they entered Syria[2].  Several additional military options include the establishment of no-fly zones or safe areas as advocated by former Secretary of State Clinton, Secretary of Defense Panetta, and Director of Central Intelligence General Petraeus which would provide safe-havens for these groups to be supplied, trained, and equipped.  Still others have suggested that an American air campaign targeting Syrian military forces could sufficiently weaken Assad to help restore a balance of power more conducive to negotiations.

Risk:  These military options have been repeatedly debated and dismissed by the Obama administration because of the risks inherent in these approaches.  Then Chairman of the Joint Chiefs of Staff U.S. Army General Dempsey in a 2013 letter to the Senate Armed Services Committee estimated that these operations would cost billions of dollars per month, pose a significant threat to U.S. aircraft and pilots threatened by Syria’s extensive air defense system, require the commitment of “thousands of U.S. ground troops”, and “could inadvertently empower extremists” in the event state institutions collapsed[3].  This approach also inherently raises the specter of direct confrontation between U.S. and Russian or Iranian forces.  Even if direct confrontation were to be avoided, Russia and Iran would almost certainly seek to match or exceed U.S. commitments, creating pressures toward continual escalation.  Beyond Syria, Moscow and Tehran would almost certainly seek to punish any U.S. successes in Syria by ramping up pressures in Ukraine, Europe, or elsewhere in the Middle East.  Finally, the recent successes of Syrian, Russian and Iranian forces in restoring government control of Aleppo mean that reversing this momentum will require a monumental and sustained U.S. military investment over time with minimal prospects for success.

Gain:  The potential rewards of this high risk approach would be correspondingly rich.  Beyond securing an end to the civil war, the U.S. would earn increased credibility and renewed influence with the Syrian opposition and their Arab Gulf partners.  Globally the U.S. would have demonstrated an ability to reverse the tide of expanding Russian and Iranian influence in the region.

Option #2:  The second option would be to seize the opportunity provided by recent Syrian advances on Aleppo to renew a push for a political settlement ending the civil war as advocated recently by retired U.S. Diplomat Peter Galbraith[4].  This would require that the U.S. use its influence to convince both the opposition groups and the Arab Gulf states supporting them to abandon an immediate insistence that Assad relinquish his power in Damascus.  It would also likely require the participation of Iran to ensure its support to this deal.

Risk:  Here too prospects for success are not great as the history of the negotiations in Geneva attests.  Moreover, this approach essentially rewards the brutality of the Assad regime and will bolster Russian and Iranian influence in the region.

Gain:  This approach avoids the many risks associated with the military approaches discussed in Option #1.  Additionally, only a political transition in Damascus acceptable to a vast majority of Syrians can address the sense of grievance and discontent fueling the rise of radical terrorist groups.  As terrorism expert Dan Byman recently wrote, “As long as these wars rage, the problems they generate will not stay confined to the Middle East[5].”

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  For a wonderful example, see this debate between two foreign policy heavyweights:  Zbigniew Brzezenki, “Syria:  Intervention Will Only Make It Worse,” Time, May 8, 2013 and John McCain, “Syria: Intervention Is In Our Interest,” Time, May 8, 2013.

[2]  Michael D. Shear, Helene Cooper, and Eric Schmitt, “Obama Administration Ends Efforts to Train Syrians to Combat ISIS,” The New York Times, October 9, 2015.

[3]  General Martin E. Dempsey, Letter to Senator Levin on the U.S. Military and the Syrian Conflict, July 19, 2013.  Available at:  http://www.cfr.org/syria/general-dempseys-letter-senator-levin-us-military-syrian-conflict-july-2013/p31198.

[4]  Peter W. Galbraith, “How the War Ends in Syria,” The New York Times, December 6, 2016.

[5]  Daniel L. Byman, “How War Drives Terrorism,” The Brookings Institution, June 23, 2016.  Available at: https://www.brookings.edu/blog/markaz/2016/06/23/how-war-drives-terrorism/.

Civil War Dr. Christopher Bolan Option Papers Syria United States

Syria Options: No Fly Zone & Remove Assad

Barefoot Boomer is a U.S. Army officer and has served in both the Infantry and Armor.  He is currently a Strategic Planner serving in Texas.  He can be found on Twitter at @BarefootBoomer.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, organization, or group.


National Security Situation:  Civil war, humanitarian, and international crisis in Syria.

Date Originally Written:  November 23, 2016.

Date Originally Published:  December 19, 2016.

Author and / or Article Point of View:  Barefoot Boomer is a Strategic Planner with the U.S. Army and has previously served in the Operation Inherent Resolve Coalition Headquarters which leads the U.S. effort against the Islamic State in Iraq and Syria (ISIS).

Background:  Since the civil war in Syria began in 2011 there has been no limit to the suffering of the Syrian civilian population.  Not only has the violence caused regional instability and the largest refugee crisis in recent history, but the cost in civilian lives has grown exponentially, the siege of Aleppo being a prime example.  Thousands of civilians have been under siege in Aleppo for over two years, victims of Syrian and Russian aerial attacks.  Civilian targets, including hospitals and neighborhoods, have been bombed killing many.  Aid convoys attempting to relieve the siege have also been attacked by Syrian President Bashar al-Assad and his Russian supporters.

Significance:  Nature abhors a vacuum.  So does U.S. foreign policy, hence the reason why the U.S. seeming inaction in Syria is mind-boggling to some.  Disturbing images of dead civilians, including heartbreaking pictures of young children, have provoked calls for the international community to “do something.”  The lawlessness and indiscriminate targeting of civilians as well as the huge flood of refugees streaming out of Syria has turned a civil war into an international crisis.  As the U.S. is the leader of the anti-ISIS Coalition, and would be the main executor of, and bear the brunt of any operation, it is prudent to understand the U.S. position as well as implications.  Any intervention by the U.S. and her allies is also significant to regional neighbors and actors, such as Syria and Russia.

Option #1:  Establish a no-fly zone in part of Syria.  A no-fly zone is airspace designated as off-limits to flight-related activities[1].

Risk:  There are numerous risks involved in establishing a no-fly zone to protect Syrian civilians and refugees fleeing the ongoing fighting.  Militarily, attempting to set up a no-fly zone that could reasonably protect civilians would be a tremendous task.  The U.S. and her allies would have to use air power to establish air superiority to protect the area from Syrian and Russian air attacks.  This would mean conducting actions to suppress air defenses and destroy Syrian and Russian aircraft, either in the air or possibly on the ground.  It would also have to include hundreds, if not thousands, of U.S. ground troops to support air operations.  The logistics involved would also be incredibly complex.  The political risks are just as daunting.  Seizing sovereign Syrian territory in order to establish a no-fly zone with U.S. troops would be a de facto invasion, which would anger Assad’s main ally, Russia.  The threat of U.S. and Russia confronting each other would rise exponentially, just as the U.S. Chairman of the Joint Chiefs of Staff, United States Marine Corps General Joseph F. Dunford Jr has insinuated[2].

Gain:  There would be little gain from establishing a no-fly zone in Syria.  Not only would the immediate risks outweigh any perceived gains in the long-term but it would not necessarily help those people still trapped inside Aleppo or other population centers.

Option #2:  Remove Assad.

Risk:  Ultimately, the underlying cause of civilian deaths and suffering in Syria is the Syrian regime itself, led by President Bashar al-Assad.  If the U.S. and its’ Coalition of willing allies decided, under the auspices of a Responsibility to Protect[3] Syrian civilians, to attempt to address the underlying cause, they would become directly involved in the civil war and remove Assad from power.  The risks in doing so are enormous, not only to the U.S. and the Coalition, but to the Syrian people they would be attempting to help.  It would take hundreds of thousands of Coalition troops to do regime change similar to what the U.S. did in Iraq in 2003.  The U.S. public has little stomach for another Middle East regime changing war or the spending of blood and treasure that comes with it.

Gain:  Removing Assad would most assuredly lift the siege of Aleppo and relieve the horror civilians are experiencing on the ground but it would not necessarily stop the sectarian strife and political upheaval that are at the heart of the civil war.  If nothing else U.S. involvement would increase tensions with not only Russia and other regional actors but would embroil U.S. forces in another possibly decade-long occupation and stability operation.  More civilians, not less, may be caught up in the post-Assad violence that would certainly hamper efforts at rebuilding.

Other Comments:  Any decision made regarding involvement in Syria must come down to risk.  How much risk are the U.S. and her allies willing to take to ensure the safety of the Syrian people, and how much is there to gain from that risk.  Also, with a new U.S. President assuming office in January 2017, there is uncertainty about whether U.S. Syrian policy will stay the same or radically change.  Ultimately, weighing the spending of blood and treasure to establish a no-fly zone in Syria must be bounded within the confines of U.S. national security interests.

Recommendation:  None.


Endnotes:

[1]  Hinote, C. (2015, May 05). How No-Fly Zones Work. Retrieved November 23, 2016, from http://blogs.cfr.org/davidson/2015/05/05/how-no-fly-zones-work/

[2]  Dunford tells Wicker controlling airspace in Syria means war with Russia. (2016, September 25). Retrieved November 19, 2016, from https://www.c-span.org/video/?c4621738/dunford-tells-wicker-controlling-airspace-syria-means-war-russia-mccain-throws-tantrum-dunford

[3]  Office of The Special Adviser on The Prevention of Genocide. (n.d.). Retrieved November 19, 2016, from http://www.un.org/en/preventgenocide/adviser/responsibility.shtml

Barefoot Boomer Civil War Islamic State Variants Leadership Change No-Fly or Safe Zone Option Papers Russia Syria United States

Red Team Options for Syria: The Fall of Raqqa, Syria from an Islamic State Perspective

Vincent Dueñas is a Master of International Public Policy candidate and Strategic Studies concentrator at the Johns Hopkins School of Advanced International Studies and a U.S. Army Major.  The views reflected are his own and do not represent the opinion of the United States Government or any of its agencies.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


isw-map-20161208

Source: Institute for the Study of War

National Security Situation:  Fall of Raqqa, Syria.

Date Originally Written:  December 9, 2016.

Date Originally Published:  December 15, 2016.

Author and / or Article Point of View:  The article is a red team exercise, written from the point of view of a senior planner in the Islamic State who is tasked with recommending strategy options, assuming that Mosul, Iraq will fall and that Raqqa will be next.

Background:  The ultimate goal is and remains the establishment of a powerful caliphate that can govern and impose Shari’a.  This will be done by reinforcing the legitimacy and authenticity of the Caliphate.  The likely fall of Mosul in Iraq necessitates a reexamination of the core tenets of our current campaign plan in order to ensure the Caliphate’s continued existence in Syria.  We are experiencing significant losses in personnel and manpower in Mosul, Raqqa, and al-Bab, as the enemy fighters push aggressively into our territory [1] (See Map Above).  To date we are estimated to have lost over 15% of our land holdings since 2015[2].  We initially did three things well to establish the Caliphate: 1. Tapped into Sunni Muslim grievances, 2. Established functioning local governance that benefited true faith Sunni Muslims and 3. Launched spectacular terror campaigns against Western targets, using sophisticated media campaigns.

Significance:  We are now at a critical point on the battlefield where we must decide on how best to consolidate and reorganize in order to prevent total annihilation and be able to continue waging jihad and protect the Caliphate.

Option #1:  Maintain a primarily conventional warfare strategy with a widespread harsh punishment strategy against civilians in our controlled territories.

Risk:  The primary risk in Option #1 stems from maintaining a conventional warfare strategy that would lead to a siege of Raqqa and a potentially catastrophic military defeat of our forces.  This would discredit our claim to the Caliphate and potentially risk the life of our leader Abu Bakr al-Baghdadi.

A secondary risk stemming from the continued use of widespread harsh punishment against the civilian population in our territories is the potential for local populations to turn against the Caliphate and provide information and support to the invading enemy.

A tertiary risk is encouraging the continued support of the great powers, Russia and the U.S., because of their perceived progress.  Currently the great powers are only committed to air power and very few ground forces because their populations only tacitly support military action.

Maintaining our current conventional and punishment strategy almost ensures a direct confrontation against all of our forces, which could potentially overwhelm us.

Gain:  The greatest gain to undertaking Option #1 is that if we were to begin defeating the enemy forces, backed by the great powers, we would fulfill the legitimacy that we initially claimed when we overwhelmed eastern Syria and western Iraq.  Success in conventional warfare would increase the belief in al-Baghdadi’s Caliphate worldwide and a continued widespread harsh punishment strategy would fulfill the implementation of Shari’a without concession.

Option #2:  Transition to an insurgency warfare strategy with a targeted punishment strategy against civilians in our controlled territories.

Risk:  The primary risk in Option #2 stems from the transition to an insurgency, which jeopardizes the legitimacy of al-Baghdadi’s Caliphate by disappearing into the shadows when the stated goal was to spread Shari’a actively.  Our current gains in international messaging and reach could be greatly diminished if it is believed that the Islamic State had been defeated and dissolved.

Gain:  The most obvious gain in Option #2 would be the continued existence of the Islamic State.  Al-Baghdadi and the Caliphate would be preserved and could reorganize to continue the jihad.  The first prerequisite for a successful insurgency is the ability to identify totally with the cause and the population attracted to it[3].  The Islamic State and the Caliphate identify completely with the cause of Shari’a and the entire majority of the population that seeks Sunni Muslim rule, thus stands most poised to overtake groups like al-Qaida and convert all Muslims sects to our path.

The likely fall of Raqqa would still occur, but would not wipe out the majority of our forces as we blend into the populations of cities like Palmyra and the border regions between Abu Kamal, Syria and Al Qu’im, Iraq.  These areas can remain under our firm grip as a weak Syrian government would be unable to extend governance effectively.

Shifting to an insurgency strategy would mean expanded guerrilla tactics against Syrian government forces and rebel forces in order to ensure a disruption of any sense of control, with the possibility of exhausting great power support.  Even more beneficial would be the increased ability for the Islamic State to act subversively to pit Russia against the U.S. through guerrilla attacks masquerading as either Assad forces or anti-Assad forces. An insurgency would sow continued instability throughout the country and prevent any direct confrontational military engagements.

The transition to a targeted punishment strategy would begin to spare Sunni Muslims thus removing a strong distaste that has emerged over our tactics.  Among other Muslims and non-believers, a more judicious use of punishment would encourage compliance and submission to Shari’a and more easily allow us to collect resources through taxes.

An insurgency would also allow us to successfully exploit the historic grievances of our targeted areas.  These Sunni Muslims have witnessed the indiscriminate killing of Sunnis at the hands of Hezbollah and the Assad government who are Shia.  The Islamic State offers the retribution that they seek and through a more judicial hand we can attract broader support.

Other Comments:  An important capability that has not been discussed, but which we have perfected, is our unique capacity to operate on the internet.  Our continued existence can be supported and expanded by using more sophisticated internet-protocol masking software that will allow us to continue publishing propaganda and maintain social media presence to actively recruit foreign fighters and encourage lone wolf attacks.

Recommendation:  None.


Endnotes:

[1]  Gutowski, Alexandra. (2016, December 8). ISIS Sanctuary: December 8, 2016. Retrieved from http://www.understandingwar.org/backgrounder/isis-sanctuary-map-december-8-2016.

[2]  Islamic State and the crisis in Iraq and Syria. (2016, November 2). Retrieved from http://www.bbc.com/news/world-middle-east-27838034.

[3]  Galula, David. (1964). Counterinsurgency Warfare: Theory and Practice. New York: Praeger.

 

Islamic State Variants Option Papers Red Team Syria Vincent Dueñas Violent Extremism

Options for Turkey in Syria

0383a3a3-3bf1-43e7-9545-7e3061b1e1b5-719-00000076c421e606_tmp

Chris Townsend is an active duty U.S. Army officer with 20 years of service.  He is a Middle East and North Africa Foreign Area Officer.  He can be found on Twitter @FAO_Chris and has written for the Journal of Defense Resources Management, Small Wars Journal, Armchair General, and the Strategy Bridge.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Turkey’s options regarding the civil war, humanitarian, and international crisis in Syria.

Date Originally Written:  November 23, 2016.

Date Originally Published:  December 12, 2016.

Author and / or Article Point of View:  Author is an active duty military officer currently focused on Multinational Logistics for a Geographic Combatant Command.  This article explores Turkey’s options in the Syrian Conflict.  The author’s opinions of Turkey’s options in Syria have been informed by his experiences as a Foreign Area Officer and benefitted from articles published by World Politics Review, Politico, The Middle East Institute, The Atlantic Council, and Stratfor.

Background:  Following the 2011 Arab Spring uprisings, protests in Syria resulted in a security crackdown that devolved into outright civil war between Alawi leaders and loyalists and the largely Sunni resistance.  Refugee flows from conflict areas have created problems for all neighboring countries.  Al-Qaida and the Islamic State have been actively involved in the resistance, while Lebanese Hezbollah has supported the Syrian ruling regime.  Russia has intervened on behalf of the Syrian government, while the United States has provided training and equipment to resistance fighters.  Kurdish militias in Northern Syria have largely supported opposition forces.  The complex and dynamic array of forces presents significant challenges politically and militarily for Turkey.

Significance:  The ongoing sectarian struggle in Syria presents significant security challenges for Turkey.  The presence of international and indigenous military forces in Syria as well as heavy refugee flows fleeing the fighting all represent a threat to the security and stability of the Turkish state.

Option #1:  Containment.  Turkey can close its border and protect its airspace until the situation in Syria is resolved.

Risk:  Refugee flows will create problems at the border and a potential humanitarian crisis that would draw condemnation from the global community.  Kurdish militias will be able to link up and may represent a perceived threat to Turkish security.

Gain:  Refugees are kept out of Turkey.  Turkish military involvement is limited to border security and airspace defense.  Turkey provides a neutral space for negotiations between belligerents and reaps potential diplomatic gains.

Option #2:  Syrian Buffer Zone.  Turkey pushes ground and air forces south to secure Northern Syria from Azaz in the West to Jarabulus in the East.

screen-shot-2016-11-26-at-3-23-10-pm

Risk:  Turkish troops exposed to increased conflict from Syrian Forces.  Potential clashes with Kurdish and Russian military elements could escalate conflict.  Actions could be seen as the invasion of a sovereign nation and will likely be met with condemnation and potential sanctions.  No-fly zone activities to support the buffer zone may be challenged by Russia or Syria with ramifications for interdiction.  Turkish resources are insufficient to sustain such an effort and would require external support for extended operations.

Gain:  Provides a safe space for refugees without allowing them into Turkey.  Prevents Kurdish elements in the East and West from linking up.  Provides a learning opportunity to Turkish Forces by deploying troops and equipment into combat with a minimal logistics tail.

Option #3:  Support to Syrian proxy Jaysh Halab (Army of Aleppo).  Turkey provides training and equipment with support from Saudi Arabia to its proxy in Syria to maintain a Turkish footprint without Turkish presence and prevent Kurdish elements from combining into a larger force on Turkey’s southern border.

Risk:  Exposure to culpability for actions of the proxy force if war crimes are committed against Syrian or Kurdish soldiers or civilians.  Lack of vetting capability exposes the proxy to infiltration by other elements.  Little clarity of intent as forces are engaging both Kurdish and Syrian forces.

Gain:  Proxy inhibits Kurdish momentum towards unification of forces.  Increased relations with Saudi Arabia help to further offset Iranian influence in the region.  Turkey poised to establish proxy as peacekeeping force if hostilities cease, maintaining influence in Syria and positive control of border interests.

Other Comments:  Turkey seems to be currently pursuing all three options simultaneously.  A border wall is under construction.  Turkish forces are operating in Syria. Jaysh Halab is receiving support but its early activities seem to be anti-Kurd instead of anti-Syrian Government.  The Turkish presence in Northern Iraq serves as a hedge that will largely funnel retreating Islamic State forces west into Raqqah, Syria.  The Turkish or proxy forces to the North of Raqqah provide pressure and limit options for the Islamic State as threats emerge from the East and South.  Turkey represents a potential spoiler for U.S. efforts to clear Raqqah as their involvement creates political hazards by limiting U.S. options and increasing the risk of rejection by Kurdish partners.

Recommendation:  None.


Endnotes:

None.

Chris Townsend Civil War Islamic State Variants Option Papers Syria Turkey