Charting A Course PDF
Charting A Course PDF
Charting A Course PDF
• iv •
Contents
Foreword . . . . . . . . . . . . vii 9
Asia Pacific . . . . . . . . . . 171
Acknowledgments . . . . . . . xiii James J. Przystup and
Phillip C. Saunders
1
American Grand Strategy . . . . 1 10
R.D. Hooker, Jr. The North Atlantic Treaty
Organization and Europe . . . 203
2 Charles L. Barry and
The Future of Conflict . . . . . 17 Julian Lindley-French
T.X. Hammes
11
3 Russia . . . . . . . . . . . . . 225
U.S. Defense Policy Peter B. Zwack
and Strategy . . . . . . . . . . . 37
F.G. Hoffman 12
The Middle East . . . . . . . . 249
4 Denise Natali
The American Defense Budget
2017–2020 . . . . . . . . . . . . 61 13
Michael J. Meese South Asia . . . . . . . . . . . 267
Thomas F. Lynch III
5
National Security Reform . . . . 83 14
Christopher J. Lamb Africa . . . . . . . . . . . . . 297
Hilary Matfess
6
Weapons of 15
Mass Destruction . . . . . . . 101 Latin America . . . . . . . . . 315
John P. Caves, Jr. Craig A. Deare
7 16
Countering Terrorism . . . . . 133 Central Asia . . . . . . . . . . 337
R. Kim Cragin Theresa Sabonis-Helf
8 17
Cyber Policy . . . . . . . . . . 149 The High North . . . . . . . . 355
Janice M. Hamby and David Auerswald
Thomas C. Wingfield
Contributors . . . . . . . . . . 377
• v •
Foreword
• vii •
Foreword
• viii •
Foreword
• ix •
Foreword
• x •
Foreword
• xi •
Acknowledgments
• xiii •
1
American Grand Strategy
R.D. Hooker, Jr.
Senior policymakers are often asked, “Does the United States have a grand
strategy?” This chapter argues that a clearly definable American grand
strategy exists and is set on firm foundations such as economic strength,
nuclear deterrence, alliances and partnerships, and full-spectrum dominance
in all warfighting domains. U.S. grand strategy is tied directly to enduring
core interests that do not change over time, though the means employed to
secure them are constantly evolving as technology and our national security
institutions evolve.
• 1 •
Hooker
U.S. grand strategy shows great persistence over time, orienting on those
things deemed most important—those interests for which virtually any
administration will spend, legislate, threaten, or fight to defend.
At the conclusion of more than a decade of counterinsurgency opera-
tions, the United States finds itself repeating a familiar historical pattern.
In the fiscal retrenchment that accompanies the end of every conflict (ex-
acerbated by the economic collapse of 2008 and the Budget Control Act
of 2011), military forces (particularly land forces) are being drawn down.3
Most U.S. ground and air forces have been repositioned to the continental
United States, while defense spending (absent remedial legislation) will
decline over the next 10 years by approximately 10 percent per year.
At the same time, emerging nontraditional threats such as cyber attacks,
weapons of mass destruction (whether chemical, biological, or radiolog-
ical) wielded by nonstate actors, and international terrorism now crowd
the security agenda. Increasingly, other threats such as narco-trafficking,
illegal immigration, environmental degradation, shifting and unstable de-
mographics, organized crime, and even climate change are also cast as
national security threats. What does this portend for U.S. grand strategy?
• 2 •
American Grand Strategy
• 3 •
Hooker
• 4 •
American Grand Strategy
still a major nuclear and conventional power, may seem unthinkable. Yet
failure to honor our treaty obligations to NATO would mean the virtual
collapse not only of the Alliance but also of our security relationships
around the world. Such a loss of global reach and influence would negate
U.S. grand strategy altogether. For that reason, however much against
its will, the United States will in all likelihood confront Russia should a
NATO member be attacked or directly threatened.
The unfolding collapse of Iraq and Syria may fall somewhere in be-
tween. Across the United States and in both political parties, there re-
mains a strong aversion to reintroducing a large ground presence into
the Middle East. A direct threat to the homeland has not yet emerged
(though “lone-wolf attacks” are mounting), and the prospect of lending
military and material aid to the Shia regime in Baghdad, itself both sup-
ported and at least partially controlled by Tehran, is unpalatable. On the
other hand, major human rights violations and the prospect of spillover
and accelerating destabilization of the region could compel strong ac-
tion against the Islamic State in Iraq and the Levant (ISIL) and its Sunni
confederates. Should ISIL successfully establish a safe haven and launch
major attacks against Europe and the United States, decisive U.S. and
coalition military action would probably follow. Major disruption to the
free flow of oil through the Arabian Gulf and attendant economic shocks
could also compel a powerful military response.
These and similar examples raise the question of whether the Unit-
ed States consciously pursues an imperial or hegemonic grand strategy.
Many scholars, both domestic and foreign, explicitly or implicitly assert
that it does.13 On the one hand, the United States, along with other great
powers, seeks to provide for its own security by maximizing its power
relative to potential and actual adversaries, within limits imposed by its
domestic politics. Its political and military leaders are constrained in at-
tempting to balance what Aron called an ethics of responsibility—the
pragmatic reality of an international politics that cannot and does not
ignore the role of force—and an ethics of conviction, which is norma-
tive and classically liberal in seeking accommodation and an absence of
conflict where possible.14 It is thus true that U.S. power, and particularly
military power, is often employed to secure and advance American inter-
ests. On the other hand, U.S. interventions are marked by an absence of
territorial aggrandizement or forced extraction of natural resources. Typ-
ically, huge sums are spent on development and infrastructure improve-
ments. On its own or when asked (as in the Balkans, Somalia, Haiti,
Panama, and Iraq), the United States usually withdraws and goes home.
Even close allies remain free to opt out of military ventures, as seen in the
invasion of Iraq in 2003 and in Libya in 2011.
• 5 •
Hooker
The net effect has been to bring into being, largely if not entirely
through America’s own efforts, a rules-based international and economic
order that has widely benefited much of the world:
• 6 •
American Grand Strategy
• 7 •
Hooker
U.S. grand strategy since 1945 has been based first and foremost on
nuclear deterrence. The ability to deter other nuclear powers dominated
strategic thought at least through the end of the Cold War. This meant a
survivable nuclear arsenal able to deliver sufficient damage great enough
to render any first strike by an adversary unimaginable. Originally, early
technology meant bombers attacking cities with nuclear bombs. Even-
tually this gave way to land- and sea-launched ballistic missiles, whose
improved accuracy allowed for targeting of enemy nuclear systems di-
rectly. The modern triad of strategic bombers, intercontinental ballistic
missiles, and nuclear ballistic submarines dates from this time. Though
smaller than during the Cold War, the U.S. strategic nuclear arsenal to-
day is survivable, redundant, and accurate, providing an absolute nucle-
ar deterrent against any adversary.25
For the purposes of statecraft and strategy-making, deterrence is best
understood in simple terms. Deterrence is the art of instilling in the mind
of one’s adversary the belief that the costs of a contemplated course of
action outweigh the benefits. Here, both capability and credibility are
essential. The capability to deliver the threat must exist, or at least the
enemy must think so. But one’s willingness to deliver the threat must also
be seen and believed. Ambiguity, not certainty, is allowed if the threat-
ened costs are high; rational decisionmakers are deterred if the price of
miscalculation is unacceptably severe, as with nuclear weapons. But if
the threatened costs are not seen as unacceptably high, or if there is gen-
uine doubt as to whether the threat will be delivered, deterrence can fail.
This key dynamic explains why deterrence, especially the conven-
tional kind, so often falls short. In Korea, Vietnam, the Gulf War, Iraq,
and Afghanistan, U.S. military power was immeasurably superior. In
each case, our opponent was not deterred. Why? In each, the U.S. use
of nuclear weapons was correctly discounted. In each, our opponents
calculated, again correctly, that we would not bring the full weight of
American power to bear. And in each, our adversaries assessed our will-
ingness to accept casualties and to persist over the long term as low. In
short, we lacked the credibility to effectively deter. Military fiascos such
as the bombing of the Marine barracks in Lebanon and the “Black Hawk
Down” debacle in Somalia, which were followed by precipitate with-
drawal, encouraged potential enemies to believe that high casualties to
U.S. forces might cause America to quit.
Finally, the tendency to regard deterrence as a mission rather than an
effect should be squarely addressed. Military forces cannot train to deter.
They can only prepare to fight. If perceived as superior to one’s adver-
sary, and if directed by credible leaders, then effective deterrence can
be achieved. The mere existence of forces is not enough. They must be
• 8 •
American Grand Strategy
Effective grand strategy must recognize this simple truth: It is far better
to avoid a war than to fight one. But avoiding war cannot rest on good
intentions. Hard military power and the will to use it are the coins of
the realm.
In the conventional realm, the first principle is to meet the threat as
far from the homeland as possible. Thus, since the end of World War
II, the United States has established bases, positioned forces, and stock-
piled weapons and munitions around the globe, buttressed by econom-
ic and development assistance, exercises, formal treaties, coalitions of
the willing, and alliances.27 (Counterproliferation may also be viewed
in this light.) While U.S. ground forces have largely come home, Amer-
ica’s network of overseas bases, airfields, and alliances as well as for-
ward-deployed air and naval forces is still extensive. The Nation’s ability
to project power globally and sustain its forces almost indefinitely re-
mains unmatched. U.S. satellites survey the globe and monitor adversary
communications continuously.
Next, the United States prefers to meet serious threats using different
tools at once, in theory reserving military force for last and relying on
intelligence, diplomacy, forward presence, and its economic power to
forestall, deflect, or defuse security challenges.28 Still, U.S. military pow-
er is awesome. Its strength across the warfighting domains, supported
by an unmatched ability to project and sustain military forces far from
the homeland, remains far ahead of the rest of the world.29 Whenev-
er possible, the United States prefers to address threats in tandem with
allies, partners, or like-minded states, working through internation-
al organizations such as the United Nations or NATO and conducting
preconflict engagement and “shaping” operations on a large scale. Yet
• 9 •
Hooker
when vital interests are engaged, the United States will act unilaterally if
necessary.30 Preemption to disrupt or prevent imminent threats falls well
within America’s grand strategic calculus.31 Prevention—the use of force
to defeat threats before they become imminent—has, on the other hand,
far less provenance.
As the preponderant global power, the United States attempts to
shape the international security environment to prevent or ward off se-
curity challenges where it can.32 When it cannot, and when significant
or vital interests are engaged, military force often comes into play. Since
the end of World War II, the United States has used military force many
times, with varying degrees of success, to protect, secure, or advance
its security interests.33 When military force was used, the record of suc-
cess or failure is illustrative when viewed in light of the grand strategic
framework described above. In the previous century, the United States
experienced clear success when the threats to vital interests were un-
ambiguous; when the response enjoyed strong support from the public
and Congress; when overwhelming force was applied; when strong allies
participated; and when the strategic objective was well understood.34
Both World War I and II, the Cold War, and the Gulf War are examples.
In cases where the direct threat to U.S. vital interests was less clear, over-
whelming force was not applied, public and congressional support was
not strong or sustained, and the strategic objective was unclear, defeat
or stalemate ensued. Korea, Vietnam, Beirut, Somalia, Iraq, and Afghan-
istan are the relevant examples here. In some cases (the Dominican Re-
public, Grenada, Panama, Haiti, Kosovo), the desiderata listed above did
not fully apply, but weak opposition and overmatching force led to early
success, forestalling loss of public support or stagnation of the conflict.35
These historical lessons are compelling. American political leaders
have not always recognized these principles and have certainly not always
applied them. Their apparent jettisoning by both Republican and Dem-
ocratic administrations following the Gulf War has come with a heavy
price. America’s successes in war, and in deterring war, have resulted at
least as much from an industrial and technological superiority, employed
en masse by competent political and military institutions, as from any
other factor.36 This superiority is best translated into battlefield and cam-
paign success by synergistically applying land, sea, air, space, and cyber
power to achieve decisive objectives that see through and beyond the end
of combat operations. Single-Service or one-dimensional applications of
force have repeatedly failed of their promise to deliver strategic victory.
Relatedly, political leaders and strategists should be mindful of strategic
culture, that mélange of history, tradition, custom, world view, economy,
sociology, political systems, and mores that largely shapes how and why
• 10 •
American Grand Strategy
nations fight. There may be no agreed upon American theory of war, but
an “American way of war” surely obtains, based on concepts of joint and
combined warfare, mass, firepower, technology, strong popular support,
and a focus on decisive and clear-cut outcomes.37 “Good wars” have his-
torically followed this pattern. “Bad wars” have not. While the analogy
can be taken too far, it captures central truths that should inform our
strategic calculations.38 Strategic culture is real and powerful, whether or
not it is acknowledged.39
• 11 •
Hooker
• 12 •
American Grand Strategy
Notes
1
Defining grand strategy is admittedly onerous. Colin Gray defines it as the “purpose-
ful employment of all instruments of power available to a security community.” Robert
J. Art excludes nonmilitary instruments from grand strategy, while Christopher Layne
simply calls it “the process by which the state matches ends and means in the pursuit
of security.” Sir Hew Strachan sees grand strategy as forward looking, aspirational, and
oriented on preventing or managing great power decline. Edward Luttwak is particularly
opaque: “Grand strategy may be seen as a confluence of the military interactions that
flow up and down level by level . . . with the varied external relations that form strategy’s
horizontal dimension at its highest level.” See Colin Gray, War, Peace and International
Relations: An Introduction to Strategic History (Abingdon, United Kingdom: Routledge,
2007), 283; Robert J. Art, “A Defensible Defense,” International Security 15, no. 4 (Spring
1991), 7; Christophe Layne, “Rethinking American Grand Strategy: Hegemony or Balance
of Power in the 21st Century,” World Policy Journal 15, no. 2 (November 1998), 8; Hew
Strachan, “Strategy and Contingency,” International Affairs 87, no. 6 (2011), 1281–1296;
and Edward Luttwak, Strategy (Cambridge: Harvard University Press), 179.
2
Strategy is more properly limited to “the deployment and use of armed forces to
attain a given political objective.” See Michael Howard, “The Forgotten Dimensions of
Strategy,” Foreign Affairs (Summer 1979), 975.
3
Active Army forces, according to Pentagon sources, will fall to 420,000, the lowest
level since before World War II. See Quadrennial Defense Review 2014 (Washington, DC:
Department of Defense, 2013), ix.
4
As one example of this tendency toward incoherence, Paul Doherty discusses the
importance of “walkabout communities” as part of a “new grand strategic construct” in “A
New U.S. Grand Strategy,” Foreign Policy, January 9, 2013.
5
This trend is driven in part by a desire to access defense budgets to fund programs
not traditionally considered as defense-related. Stanley Hoffman put it succinctly as far
back as 1987: “There has been a trend towards indefinite extension of U.S. interests.
‘National security’ is considered to be everywhere and constantly at stake.” See Janus and
Minerva: Essays in the Theory and Practice of International Politics (Boulder, CO: Westview
Press, 1987), 316.
6
Raymond Aron, Peace and War (Paris: Calmann-Levy, 1962), 28.
7
As recently as 2002, William C. Wohlforth argued that “the balancing imperative . . .
will not soon dominate great powers’ strategic choices in today’s novel unipolar system.”
In fact, although the United States remains unquestionably the preponderant world
power, great powers such as Russia, Iran, and China often combine to limit or deflect
U.S. strategic choices in a classic balance of power formulation. See “U.S. Strategy in a
Unipolar World,” in America Unrivaled: The Future of the Balance of Power, ed. G. John
Ikenberry (Ithaca, NY: Cornell University Press, 2002), 117.
8
The official Department of Defense definition of weapons of mass destruction includes
nuclear, biological, chemical, and radiological weapons only. The term is used more
• 13 •
Hooker
broadly here to include events such as the Oklahoma City bombing and the 9/11 attacks
on the World Trade Center and Pentagon, as well as potential cyber events that could
cause large-scale loss of life. See Seth Carus, Defining Weapons of Mass Destruction, Center
for the Study of Weapons of Mass Destruction Occasional Paper 8 (Washington, DC:
NDU Press, January 2012).
9
Quadrennial Defense Review 2014 lists “respect for universal values at home and
around the world” as one of four “core national interests,” 11.
10
See R.D. Hooker, Jr., “U.S. Policy Choices During the Rwandan Genocide,” unpub-
lished paper, National War College, 2003.
11
In addition to troop deployments to Abkhazia and South Ossetia, “breakaway”
regions that remain part of sovereign Georgian territory, Russia maintains 5,000 troops in-
side Armenia to ensure that neighboring Azerbaijan does not reclaim Nagorno-Karabakh,
sovereign Azerbaijan territory occupied by ethnic Armenians.
12
Latvia, Lithuania, and Estonia are 100 percent dependent on Russian natural gas
and have large ethnic Russian populations. Without the North Atlantic Treaty Organiza-
tion (NATO), their continued independence is probably unlikely. See Theresa Sabo-
nis-Helf, “Energy Security: Strategic Questions and Emerging Trends,” presentation to
NATO national representatives, National Defense University, April 11, 2014.
13
Andrew Bacevich is a leading critic of American “imperialism.” See American
Empire: The Realities and Consequences of U.S. Diplomacy (Cambridge: Harvard University
Press, 2002).
14
Kenneth Thompson, Masters of International Thought (Baton Rouge: Louisiana State
University Press, 1980), 153.
15
Layne, 15.
16
“The United States leads a global alliance system of more than 60 partner states that
collectively account for almost 80 percent of global [gross domestic product] and more
than 80 percent of global military spending between them.” See Michael E. O’Hanlon,
Budgeting for Hard Power: Defense and Security Spending Under Barack Obama (Washington,
DC: Brookings Institution, 2009), 24.
17
The General Accounting Office reports that 16.2 million males aged 18 to 25 are
registered for Selective Service. However, only one in four are eligible for military service,
severely limiting the pool of prospective recruits. The rest are disqualified for obesity,
other physical issues, lack of a high school diploma, or criminal records. See the prepared
statement of Curtis Gilroy, Director for Accessions Policy, Office of the Undersecretary of
Defense for Personnel and Readiness, before the House Armed Services Subcommittee,
“Recruiting, Retention, and End Strength Overview,” March 9, 2009.
18
The U.S. industrial base remains a world leader, second only to China as of 2014,
according to the United Nations Statistics Division. Ship-building remains a strong
industry: “Currently there are 117 shipyards in the United States, spread across 26 states,
that are classified as active shipbuilders.” See “The Economic Importance of the U.S.
Shipbuilding and Repairing Industry,” Maritime Administration, May 30, 2013, 3. U.S.
steel production has declined as a percentage of global market share since 1947, when
the United States produced 60 percent of the world’s steel, but remains a world leader.
The United States produced 87 million tons of steel in 2013, ranking fourth in the world.
(This contrasts with 40 million tons dedicated to military production in 1943, the year
of greatest manufacturing output in World War II.) See World Steel Statistics Data 2013,
World Steel Association, January 23, 2014; and Alan Gropman, ed., The Big L: American
Logistics in World War II (Washington, DC: NDU Press, 1997), 137. For a contrary view,
see Michael E. O’Hanlon, The National Security Industrial Base: A Crucial Asset of the United
States Whose Future May Be in Jeopardy (Washington, DC: Brookings Institution, 2011).
• 14 •
American Grand Strategy
19
Currently, 36 percent of the Navy’s operational assets are classed as “globally
deployed,” including 2 of the Navy’s 11 fleet carriers, with a third based in Japan. At
least two Amphibious Ready Groups with embarked Marines are also always at sea. See
Admiral Jonathan Greenert, USN, testimony before the House Armed Services Committee
on the Fiscal Year 2015 Navy Posture, March 12, 2014.
20
Thom Shanker and Steve Erlanger, “Blunt U.S. Warning Reveals Deep Strains in
NATO,” New York Times, June 10, 2011.
21
“Soft power is not about influence or persuasion—it attracts.” See Harry R. Yarger,
Strategy and the National Security Professional (London: Praeger, 2008), 74.
22
See Joseph Nye, Soft Power: The Means to Succeed in World Politics (New York: Public
Affairs, 2004).
23
Chris Schnaubelt, “The Illusions and Delusions of Smart Power,” in Towards a
Comprehensive Approach: Integrating Civilian and Military Concepts of Strategy (Rome, Italy:
NATO Defense College Forum Paper, March 2011), 24.
24
Effective civil-military relations is also a sine qua non of successful strategy. Despite
much hyperbolic academic criticism, the United States is well equipped in this sphere.
See R.J. Hooker, Jr., “Soldiers of the State: Reconsidering American Civil-Military Rela-
tions,” Parameters (Winter 2003/2004).
25
The most recent arms control agreement with Russia, signed by President Obama
and Russian President Dmitrii Medvedev on April 8, 2010, agreed to reduce the number
of active nuclear weapons from 2,200 to 1,550.
26
Wallace J. Thies, “A Twenty-First Century Army,” Parameters (Spring 1991), 68.
27
The Department of Defense maintains prepositioned stocks both ashore and afloat
in strategic locations worldwide to support the deployment of forces for contingency
operations. Key sites are Japan, Korea, Italy, Qatar, Kuwait, and Diego Garcia.
28
Quadrennial Defense Review 2014, 11.
29
For example, in seapower alone the U.S. lead is staggering. The U.S. Navy operates
10 large aircraft carriers, all nuclear powered; no other country has even one. The United
States has 57 nuclear-powered attack and cruise-missile submarines—again, more than
the rest of the world combined. Seventy-nine Aegis-equipped surface combatants carry
roughly 8,000 vertical-launch missile cells, outmatching the next 20 largest navies. All
told, the displacement of the U.S. battle fleet exceeds the next 13 navies combined, of
which 11 are allies or partners. Cited in Secretary of Defense Robert Gates’s prepared
remarks to the Navy League, National Harbor, MD, May 3, 2010. The U.S. Marine Corps
alone is larger and more capable than the ground and air forces of all but a few nations.
See The Military Balance (London: International Institute for Strategic Studies, March
2014).
30
“The United States will use military force, unilaterally if necessary, when our core
interests demand it—when our people are threatened; when our livelihoods are at stake;
when the security of our allies is in danger.” See President Barack Obama, Commence-
ment Address at the United States Military Academy, May 28, 2014.
31
The National Security Strategy of the United States (Washington, DC: The White
House, September 17, 2002), 15.
32
For a more detailed discussion of American preponderance and its strategic impli-
cations, see Layne, 9.
33
The list of large-scale combat or “peace enforcement” actions alone is extensive
and includes Korea (1950), Lebanon (1958), the Dominican Republic (1965), Vietnam
(1955–1975), Beirut (1981), Grenada (1981), Panama (1989), the Gulf War (1991),
Somalia (1992), Bosnia (1996), Kosovo (1999), Afghanistan (2001), and Iraq (2003).
• 15 •
Hooker
On average, the United States has deployed a division or larger force every 6 years since
1950.
34
Both Secretary of Defense Caspar Weinberger and Chairman of the Joint Chiefs
General Colin Powell promoted similar views on when and how to use force, espousing
a conservative “last resort” philosophy stressing overwhelming force and clear objectives
and emphasizing decisive results. Weinberger explained his in a speech titled “The Uses
of Military Power,” delivered before the National Press Club in Washington, DC, on
November 28, 1984.
35
Max Boot attempted to argue in 2002 that “small wars” fought for less precise
objectives could advance important, if not vital, interests and represented something of a
future trend. On the whole, such thinking has been discredited by Iraq and Afghanistan.
See Boot, Savage Wars of Peace (New York: Basic Books, 2002).
36
“By and large, the virtues of American civilization have not been the military virtues
and this has been reflected in American military performance.” See Samuel P. Huntington,
“Playing to Win,” The National Interest (Spring 1986), 10.
37
Russell Weigley is the principal exponent of this view. For a contrasting view, see
Antulio Echevarria II, Toward an American Way of War (Carlisle Barracks, PA: Strategic
Studies Institute, March 2004).
38
“We make war the way we make wealth.” See Alvin Toffler and Heidi Toffler, War
and Anti-War: Survival at the Dawn of the 21st Century (New York: Little, Brown and Com-
pany, 1993), 2.
39
See R.D. Hooker, Jr., “The Strange Voyage: A Short Précis on Strategy,” Parameters
(Winter/Spring 2013), 62.
40
“I believe the most pressing threat facing our country is the threat from cyber
attacks. The daily occurrences of attacks are damaging on a variety of levels and they
are not only persistent and dangerous, the likelihood of serious damage to our national
security is very real.” See Lieutenant General Mike Flynn, USA, Director of the Defense
Intelligence Agency, statement before the Senate Armed Services Committee, U.S. Senate,
April 18, 2013.
41
The international treaty banning landmines in 1999 and the International Criminal
Court, established in 2002, are apposite examples. The United States is not a party to
either.
42
As the only state able to project and sustain military forces globally, the United
States retains this status today; the rise of China will not see an equivalent capability
for years to come. See Andrew J. Nathan and Andrew Scobell, China’s Search for Security
(New York: Columbia University Press, 2012), 312–315.
43
Theorists sometimes cite the maxim that “everybody’s strategy depends on everyone
else’s.” This must be the case for weaker or comparable powers. In its current position of
preponderance, though its power has definite limits, the United States seeks whenever
possible to impose its strategy on adversaries, and not to be imposed upon. All states
would behave so if they could. See Kenneth Waltz, Man, the State and War (New York:
Columbia University Press, 1954), 201.
44
For example, Regional Command–East in Afghanistan in 2010 included a Senior
Civilian Representative from the U.S. Agency for International Development, of equal
rank to the division commander and empowered to co-sign his operational orders. She
was supported by more than 100 civilian staff.
45
Strachan, 1285.
46
Cited in Hal Brands, What Good Is Grand Strategy? Power and Purpose in American
Statecraft from Harry S. Truman to George W. Bush (Ithaca: Cornell University Press, 2014),
100.
• 16 •
2
The Future of Conflict
T.X. Hammes
• 17 •
Hammes
State Actors
Among state actors, China has taken the lead in developing methods to
neutralize U.S. strengths. It has either demonstrated or is developing a
wide range of capabilities that the Pentagon has characterized as being in
the antiaccess/area-denial (A2/AD) arena.4 Many of these A2/AD systems
are already proliferating among large and medium states. Moreover, as
these capabilities become cheaper, smarter, and more numerous, we can
be sure they will migrate to smaller states.
In addition, we will likely see an increase in the number of nucle-
ar powers since nuclear weapons provide a guarantee against externally
driven regime change. Once a regional power gets a nuclear weapon,
its neighbors will seek the same capability as a matter of self-preserva-
tion. Thus proliferation is likely. While proliferation is not a desirable
outcome, it should be noted that the presence of nuclear weapons has
tamped down the level and intensity of conflicts and confrontations be-
tween nuclear-armed states. However, these confrontations have taken
place between relatively stable states (the Soviet Union–China, India-Pa-
kistan, and the United States–Soviet Union). The prospect of politically
unstable states developing nuclear weapons remains a great concern. As
unstable states acquire nuclear weapons, we have to plan for not only the
potential collapse of a nuclear state but also the potential for a civil war
with nuclear weapons.
• 18 •
The Future of Conflict
States will also employ surrogates to keep their own forces off the
battlefield. We have seen Iran use Hizballah and Pakistan use the Taliban
to pursue their strategic interests without committing their own forces to
the conflicts. More recently, the Russians made extensive use of so-called
little green men as surrogates in Ukraine. Contractors are another form
of surrogate that states have used in numerous conflicts for a variety of
reasons. Even criminal organizations have been employed to execute a
range of activities from cyber to propaganda to kinetic attacks. This trend
will continue. In summation, states will use a wide variety of methods
and resources to neutralize conventional U.S. military power to achieve
their strategic goals.
Nonstate Actors
Nonstate actors fall into three major categories: insurgents, terrorists/
super-empowered small groups, and transnational criminal organiza-
tions. The United States has extensive experience in conflict with each
type, yet each provides a unique challenge based on the political, eco-
nomic, and social conditions of the conflict. Each has also been steadily
evolving and has been greatly empowered by the information revolution.
The first category, insurgents, will be driven by different goals than
in the past. Such efforts will still be about self-governance but now will
add a desire to change borders. Since World War II, insurgencies have
been primarily driven by a desire to throw off an imperial power. Once
the colonial powers had withdrawn, the driving force became deter-
mining which local group would control the new nation. The People’s
Movement for the Liberation of Angola’s long war against the National
Union for the Total Independence of Angola is a prime example. After a
multi-decade conflict, the People’s Movement won. It now rules over a
nation with essentially the same boundaries as existed when the country
was a Portuguese colony. More recently, insurgents are fighting to re-
draw boundaries to align with social/cultural/religious boundaries that
preceded the colonial era. This has been accomplished in places such as
the former Yugoslavia and Sudan. Somalia, while not de jure separated,
is de facto three separate political entities today. In the Middle East, the
Islamic State in Iraq and the Levant (ISIL) is fighting hard to redraw
boundaries and has plans to change boundaries far beyond. The Baluch
and Kurds fight to create new states without regard to existing borders.
The mismatch between the borders drawn by imperial powers and those
needed to create functioning states is most acute in the Middle East and
Africa and will increasingly be sources of conflict. It will reinforce other
• 19 •
Hammes
• 20 •
The Future of Conflict
Texas, show that a terrorist can create mass casualties and catastrophic
damage using material we keep in our cities. The easiest way for a ter-
rorist to create mass casualties is to “bring the detonator.” It is difficult, if
not impossible, to acquire and transport massive amounts of explosives
or chemicals. It is much easier to detonate or release materials already in
place. Terrorists will also benefit from new technology that will provide
easier, cheaper ways to deliver the detonator to a wide variety of targets.
Criminal organizations across the globe will continue to challenge
governments for control of territory. These organizations take various
forms—from street gangs to drug cartels to transnational criminal net-
works—and will deal in a variety of commodities, from guns to drugs
to people to counterfeits. With the exception of first-generation street
gangs, these criminal organizations have a common motivation: profit.
While some commentators dismiss them as a law enforcement problem,
criminal organizations have demonstrated the ability to ally with both
insurgents (Colombia) and terrorists as well as to seize and rule territory
within a state (Mexico). Thus they can have an impact on the security
of the United States, and our response may well go beyond law enforce-
ment.
Hybrid Warfare
As if these challenges were not enough, we will also see the merging
of state and nonstate actors in hybrid war. With Russia’s occupation of
Crimea and eastern Ukraine, the concept of hybrid warfare became a
major topic of discussion. Unfortunately, it also led to major confusion
on what hybrid warfare is. In 2007, Frank Hoffman provided a clear
definition:
• 21 •
Hammes
In short, the military cannot focus on a single aspect of war but must
be prepared to meet the full range of challenges at the same time in the
same battlespace. Recent events in the Middle East and Eastern Europe
have led to much discussion about hybrid war, gray zone conflict, and
ambiguous actions. The discussion has done little to clarify the chal-
lenges the Department of Defense (DOD) faces. If one uses Hoffman’s
definition, the military aspects of each of these concepts are covered.
In fact, hybrid warfare is not new. The participants on all sides in the
Napoleonic and world wars used mixes of conventional operations, ir-
regular operations, terrorism, and crime to achieve their goals. But while
not new, the hybrid warfare concept as expressed by Hoffman is useful;
it highlights for policymakers the range of challenges that must be met
simultaneously in most conflicts.
Electronic Miniaturization
We have watched electronic miniaturization transform almost every as-
pect of our lives. The cell phone combines the functions of dozens of
stand-alone systems at a fraction of the weight and volume. Miniaturiza-
tion is revolutionizing command and control and intelligence, surveil-
lance, and reconnaissance systems as well as bringing smart technology
to smaller weapons systems. Today even cheap miniature drones are ca-
pable of limited autonomous navigation and target selection.
Additive Manufacturing
Additive manufacturing (AM) is over 30 years old. It has been a useful
tool for rapid prototyping to allow designers to see their final product
in three dimensions. It also sparked a collection of hobbyists who were
making a range of plastic items. However, in the last few years, AM, also
known as three-dimensional (3D) printing, has exploded. It has gone
from an interesting hobby to an industry producing a range of products
• 22 •
The Future of Conflict
Nanotechnology
Nanotechnology is science, engineering, and technology conducted at
the nanoscale, which is about 1 to 100 nanometers. For comparison, a
sheet of newspaper is about 100,000 nanometers thick. It was only in
1981 that nanotechnology was established.9 At the nanoscale, materials
act very differently and thus provide opportunities in chemistry, biology,
physics, material science, and engineering.
For the purpose of this discussion, nanotechnology is advancing in
two areas of particular interest: energetics and materials. As early as
2002, nano-energetics (explosives) could generate twice the power of
conventional explosives.10 Since research in this field is now close hold,
it is difficult to say what progress has been made since then. Even if twice
the power is as good as it gets, a 100-percent increase in destructive
power of the same size weapon is a massive increase. Continued major
improvements in the power of explosives steadily reduce the delivery
system requirements—and thus favor the smaller state. If they come in
to commercial use, they will also be available to nonstate actors.
The second area of interest is that of nanomaterials. This field has
not advanced as far as nano-energetics, but numerous firms are apply-
ing nanomaterials to batteries and increasing their storage capacity.11 In
fact, a recent accidental discovery may triple battery power storage and
increase battery life by a factor of four.12 At the University of Califor-
nia, San Diego, researchers have found a cheap way to coat products
with a super-thin, nonmetal material that manipulates radar waves and
thus may lead to inexpensive stealth coatings for missiles and aircraft.13
Various experiments have demonstrated that the use of nanomaterials
can greatly improve the strength of a given weight of material. These
improvements in energy storage, materials, and explosives will lead to
• 23 •
Hammes
Artificial Intelligence
Two areas of artificial intelligence are of particular importance in the evo-
lution of small, smart, and cheap weapons: navigation and target identi-
fication. In fact, widely available systems have attained limited autonomy
based on these capabilities. The U.S. Global Positioning System (GPS)
has proven satisfactory for basic autonomous drone applications such as
the Marine Corps KMAX logistics helo-drone in Afghanistan.20 Howev-
er, GPS will be insufficient for operations in narrow outdoor or indoor
environments, dense urban areas, and areas in which it is jammed. Aca-
demic21 and commercial22 institutions are working hard to overcome the
limitations of GPS to provide truly autonomous navigation for drones.
Inertial and visual navigation are advancing rapidly and are already
cheap enough to use in small agricultural drones.23 The commercial ap-
• 24 •
The Future of Conflict
Drones
Drone usage has spread widely. Most discussions of drones have focused
on large, highly capable, and expensive drones such as the Predator or
the Navy’s X-47B. Too little discussion has considered the impact of
small drones in all combat domains. While small drones can carry only a
limited payload, this limitation can be overcome with three approaches.
First is to think in terms of “bringing the detonator.” The second is the
use of explosively formed penetrators (EFPs).25 The third is to employ
swarms of small drones to magnify impact.
In “bringing the detonator,” the objective is to simply detonate the
large supply of explosive material provided at the target site by aircraft,
vehicles, fuel, chemical facilities, and ammunition dumps. Against these
targets (such as a parked airliner’s wing root), even a few ounces of explo-
sives delivered directly could initiate a much larger secondary explosion.
EFPs, weighing as little as a few ounces to a few pounds, will allow
even small drones to damage or destroy armored and protected targets.
In Iraq, coalition forces found EFPs in a variety of sizes, some powerful
enough to destroy an Abrams tank. Others were small enough to fit in
the hand—or on a small drone.26 And of course nano-explosives can at
least double the destructive power of the weapons. The primary limita-
tion on EFP production was the requirement for the high-quality curved
copper disks that form the penetrator when the charge is detonated. It
required a skilled machinist with high-quality machine tools. Today, ad-
ditive manufacturing can print copper.27 Anyone with a 3D printer capa-
ble of using copper will be able to print an EFP disk. Thus we can expect
small- and medium-sized drones to pack a significant punch against pro-
tected targets. The improvised explosive device (IED) of the future will
be not merely “improvised” but also intelligent, inexpensive, long-range,
and active hunters.
• 25 •
Hammes
One can argue that such long-range autonomous drones will be dif-
ficult for nonstate actors to obtain for the next few years. That may be
true. But today Aerovel sells the Flexrotor drone that has a maximum
range of 3,400 kilometers (km).28 For shorter range missions, there is a
variety of commercially available cheap drones that are already capable
of hitting U.S. facilities such as Bagram, Afghanistan, or Taji, Iraq, when
launched from within 20 to 40 km of the target. Given the Taliban’s
demonstrated ability to move within a few kilometers of Bagram, could
we keep the airfield open against a threat like this? Would the benefits of
doing so outweigh the costs?
The U.S. military is actively exploring the use of swarms for both
naval and air applications.29 While these programs are vague about how
many drones they envision being able to employ, recent dramatic cost
reductions in each of the needed technologies will increase the num-
ber by orders of magnitude. Researchers are using old 3D techniques to
print a complex drone in a single day, then adding an Android phone
to produce a $2,500 autonomous drone.30 Thus, a small factory with
only 100 3D printers using Joseph DiSimone’s process could potentially
produce 10,000 drones a day. The limitation is no longer the printing
but the assembly and shipment of products. How do we protect our air
bases, headquarters, maintenance facilities, and supply centers in theater
against potentially thousands of autonomous drones? Even if we could
protect such fixed sites, how would we protect our vehicles, in particular
soft-skinned vehicles such as fuel and ammunition trucks, when they
are moving?
Nor will cheap drones be limited to the air. In 2010, Rutgers Uni-
versity launched an underwater “glider” drone that crossed the Atlantic
Ocean unrefueled.31 Such drones are being used globally and cost about
$100,000.32 The U.S. Navy recently launched its own underwater glider
that harvests energy from the ocean thermocline. It can patrol for weeks,
surfacing only as needed to report and receive new instructions.33 In
short, small sea platforms have demonstrated the capability of achiev-
ing intercontinental range while producing very little in the way of sig-
natures. Michigan Technological University plans to reduce the cost of
oceanic gliders to about $10,000.34 These could be employed as self-de-
ploying torpedoes or smart naval mines.35 Current versions are launched
by hand from small boats. They could be modified for launch from war-
ships, commercial ships, or even the shore.
The convergence of new technologies discussed above may allow
these small, smart, and cheap weapons based on land, sea, or air to dom-
inate combat in these domains. Over time, the technology has become
cheaper, more reliable, and more widely employed. We are seeing this
• 26 •
The Future of Conflict
Strategic Implications
Technological convergence will evolve over the next decade or two. It
will have direct strategic impact on the United States in four principle
ways: the loss of immunity to attack, the tactical dominance of defense,
the return of mass, and a requirement to mobilize.
• 27 •
Hammes
so? If not, will those states accept risk to commercial assets to support
U.S. actions?
Immunity from air attack is also gone. The Services must develop
those defenses and then ensure they can cover the entire deployment
and employment chains. Technological convergence means there are
powerful, autonomous, stealthy sea and air drones in our immediate fu-
ture. Defending against this threat is possible, but it will be expensive.
• 28 •
The Future of Conflict
Return of Mobilization
After the fall of the Soviet Union, the United States abandoned the con-
cept of mobilization. A primary driver was the fact that the U.S. defense
industry simply lacked the surge capability to rapidly equip a mobilized
population. Mobilization in World War II was possible because industry
could rapidly convert from civilian to military production. By 1990, the
complexity of modern military weapons systems and limited capacity
to produce them made rapid mobilization difficult if not impossible. As
Richard Danzig has noted, modern manufacturing has been changing
this situation.41 Additive manufacturing may radically change it. AM is
inherently flexible since the product depends only on the materials the
machine can use, the design of the machine, and the software that is
loaded. Thus, as AM assumes a greater role in industry, the possibility of
industrial mobilization will re-emerge. However, successful mobilization
• 29 •
Hammes
is not only about producing the weapons. The Pentagon must also be
prepared to enlist and train new personnel, build them into coherent
units, and then move those units and the weapons to an overseas bat-
tlefield. Eliot Cohen has noted that successful mobilization will require
significant peacetime planning, but the Pentagon is not even thinking
about the issue.42
Policy Implications
This diffusion of military power has implications for U.S. strategy, force
structure, investment, and force posture. Scholars have proposed a range
of U.S. grand strategies from restraint to aggressive interventionism.43
Obviously, the strategy selected will drive our force design and our force
posture. However, that strategy will itself have to deal with myriad risks
posed by the diffusion of power and the kinds of threats we now face.
Fundamental assumptions about traditional military power, including
the viability of projecting force from the United States, become question-
able when almost any enemy can strike selectively from in theater to the
United States. While these attacks may not be militarily significant, they
will be part of the political debate.
We may be entering an era in which small states and even nonstate
actors will attempt to deter the United States through denial or pun-
ishment. They could achieve denial by interrupting the deployment
chain, either by attacking intermediate staging bases or by tactical A2/
AD. While the United States is developing methods for defeating A2
systems, we have made little or no progress on area-denial systems such
as IEDs or even land and sea mines. Tomorrow’s IEDs and mines will be
mobile hunters with at least limited autonomy—and they will be avail-
able to any opponent with access to the Internet and a receiving address.
In 2014, the mothers and friends of a battalion of Ukrainian soldiers
purchased drones to provide the battalion with an aerial observation and
spotting capability.44
Adversaries might also adopt punishment as a way to deter or termi-
nate U.S. involvement in a region. Would U.S. leaders risk even limited
attacks on U.S. aircraft, military or civilian, anywhere on the ground to
intervene in Syria? Would other nations provide flight transit or port
rights if it meant their homelands would be subject to attacks on civil-
ian aircraft or facilities? How much additional combat power would the
United States have to dedicate to protecting both our lines of commu-
nications and allied infrastructure and population? Would our political
willingness to engage decrease due to increased human and fiscal costs?
• 30 •
The Future of Conflict
Would our traditional allies stay aligned with us if our ability to sustain
our access to key regions were imperiled or substantively reduced?
As a power projection nation, our deployment options may become
more limited. We have to think through the implications of forward bas-
ing in theater versus basing in the United States and deploying only for
a crisis. Our enemies and allies see the increasing density of A2/AD sys-
tems globally. It is essential we modify our planning accordingly. Warga-
ming must examine the operational impacts of fighting a variety of ene-
mies with long-range sea and air precision strike. China will not be the
only power to own such systems. Just as importantly, wargaming must
explore the political implications when an enemy can threaten other na-
tions that support our deployment chain. (Japan, for example, is crucial
to any effort to help defend South Korea and could easily be targeted
by the North Korean regime in time of war.) Accordingly, we must seek
methods to attack an opponent’s strategy rather than simply destroying
its forces.
We need wide-ranging research and supporting analysis as well as
wargames to address key questions. Deputy Secretary of Defense Robert
Work’s memorandum on wargaming is a very strong first step.45 Con-
tinuing research is required to answer a wide range of questions:
• 31 •
Hammes
• 32 •
The Future of Conflict
Summary
The underlying nature of war will not change, but the number and vari-
ety of conflicts will likely continue to increase. Certainly the convergence
of new technologies will alter the character of conflict over time, but no
matter what technology is employed to abet intelligence collection and
human decisionmaking, policymakers will not have a clear understand-
ing about what is happening or what to do about it. In fact, it is almost
certain that the best experts on the subject will disagree on both aspects.
Every administration has had to deal with these “wicked” problems. For-
tunately, there is a growing body of literature articulating various ap-
proaches to do so.46
Technological convergence is already changing the character of war.
It is markedly altering the relative power among states and between state
and nonstate actors. The phenomenon of small states possessing the mil-
itary capabilities and perhaps capacities of large states is a new develop-
ment that will create new challenges. Some of these challenges undercut
key pillars and assumptions of our current defense strategy. However,
they will not change the fact that conflict is driven by the interaction of
the participants’ social, economic, and political structures.47 Policymak-
ers must drive the Pentagon to actively explore the implications of the
changing character of war. Secretary of Defense Ashton Carter’s Strategic
Capabilities Office is a great start.48 Furthermore, it must honestly test
legacy systems against emerging capabilities in free-play exercises. But
understanding the impact of technology must be grounded in the reality
that conflict will remain a political competition driven by human inge-
nuity tied to the societies in conflict. If anything is certain, it is that war
will continue to be dominated by this element above all others.
Notes
1
While academics sometimes see warfare disappearing, a chaotic international envi-
ronment gives little credence to this perspective. See Steven Pinker, The Better Angels of
Our Nature (New York: Viking Press, 2011); Frank G. Hoffman and Ryan Neuhard, “No
• 33 •
Hammes
Wake for Ares,” Proceedings 141, no. 12 (December 2015), available at <www.usni.org/
magazines/proceedings/2015-12/no-wake-ares>.
2
Horst W.J. Rittel and Melvin M. Webber, “Dilemmas in a General Theory of Plan-
ning,” Policy Sciences 4 (1973), 162, available at <www.uctc.net/mwebber/Rittel+Web-
ber+Dilemmas+General_Theory_of_Planning.pdf>.
3
Carl von Clausewitz, On War, ed. and trans. Michael Howard and Peter Paret (Princ-
eton: Princeton University Press, 1976), 88.
4
Department of Defense (DOD), Annual Report to Congress Military and Security
Developments Involving the People’s Republic of China 2016 (Washington, DC: DOD, April
26, 2015), i–ii, available at <www.defense.gov/Portals/1/Documents/pubs/2016%20
China%20Military%20Pwer%20Report.pdf>.
5
Centers for Disease Control and Prevention, National Center for Statistics, “Acci-
dents or Unintentional Injuries,” available at <www.cdc.gov/nchs/fastats/accidental-injury.
htm>.
6
Frank G. Hoffman, Conflict in the 21st Century: The Rise of Hybrid Wars (Washing-
ton, DC: Potomac Institute for Policy Studies, December 2007), 8, available at <www.
potomacinstitute.org/images/stories/publications/potomac_hybridwar_0108.pdf>.
7
Eddie Krassenstein, “CloudDDM—Factory with 100 (Eventually 1,000) 3D Printers
and Just 3 Employees Opens at UPS’s Worldwide Hub,” 3D Printer and 3D Printing
News, May 4, 2015, available at <http://3dprint.com/62642/cloudddm-ups/>.
8
Joseph DeSimone, “What If 3D printing Was 100x Faster?” TED Talks, May 19,
2015, available at <www.ted.com/talks/joe_desimone_what_if_3d_printing_was_25x_
faster?language=en>.
9
“What Is Nanotechnology?” Nano.gov, available at <www.nano.gov/nanotech-101/
what/definition>.
10
Andrzej W. Miziolek, “Nanoenergetics: An Emerging Technology Area of National
Importance,” AMPTIAC Quarterly 6, no. 1 (Spring 2002), 45, available at <http://ammti-
ac.alionscience.com/pdf/AMPQ6_1ART06.pdf>.
11
Wendy Koch, “Tiny Batteries Could Revolutionize Green Energy,” National Geo-
graphic, November 2014, available at <http://news.nationalgeographic.com/news/ener-
gy/2014/11/141117-nanotechnology-for-better-batteries/>.
12
“Tiny Balls of Fire,” The Economist, August 15, 2015, available at <www.economist.
com/news/science-and-technology/21660963-nanotechnological-accident-may-length-
en-battery-lives-tiny-balls-fire>.
13
Li Yi Hsu, Thomas Lepetit, and Boubacar Kante, “Extremely Thin Dielectric Meta-
surface for Carpet Cloaking,” Progress in Electromagnetic Research 152 (2015), 33–40,
available at <www.jpier.org/PIER/pier152/03.15032005.pdf>.
14
Christian Davenport, “Fearing Hostilities in Space, Pentagon Fortifies Satellites,”
Washington Post, May 10, 2016, 1.
15
Tekla S. Perry, “Start-Up Profile: Skybox Imaging. The Satellite-imaging Company
Plans to Bring Remote Sensing to the Mass Market,” IEEE Spectrum, May 1, 2013, avail-
able at <http://spectrum.ieee.org/at-work/innovation/startup-profile-skybox-imaging>.
16
“Book a Spot Online to Put Your Satellite into Space,” Popular Mechanics, August 10,
2015, available at <www.popularmechanics.com/space/rockets/news/a16810/heres-the-
worlds-first-online-rocket-launch-scheduler>.
17
“Project Loon,” MIT Technology Review, available at <www.technologyreview.com/
featuredstory/534986/project-loon>.
• 34 •
The Future of Conflict
18
“Global Observer High Altitude Long Endurance UAV, United States of America,”
AirForce-Technology.com, available at <www.airforce-technology.com/projects/globalob-
serverunmann>.
19
Jonathan Vanian, “Behind the Scenes with Facebook’s New Solar-Powered Internet
Drone and Laser Technology,” Fortune, July 30, 2015, available at <http://fortune.
com/2015/07/30/facebooks-solar-power-drone-internet-earth>.
20
James K. Sanborn, “Beacon Improves UAV’s Cargo-Delivery Accuracy,” Marine Corps
Times, July 8, 2012, available at <http://archive.marinecorpstimes.com/article/20120708/
NEWS/207080314/Beacon-improves-UAV-s-cargo-delivery-accuracy>.
21“Vision-Based
Control and Navigation of Small, Lightweight UAVs,” Congress Center,
Hamburg, Germany, available at <www.seas.upenn.edu/~loiannog/workshopIRO-
S2015uav>.
22
“Drones at CES 2015 Showcase UAV Technology’s Bright Future,” Dronelife.com,
January 14, 2015, available at <http://dronelife.com/2015/01/14/drones-ces-2015-show-
case-uav-technologys-bright-future>.
23
“Crop Falcon—UAV for Autonomous Crop Monitoring and Operations,” February
16, 2015, available at <https://www.youtube.com/watch?v=m1wyWNhvV8Y>.
24
“Surveillance and Tracking of People,” available at <https://www.youtube.com/
watch?v=tgULkozh32U>.
25
“Future Weapons: Explosively Formed Penetrator (EFP),” Future Weapons TV, June
24, 2011, available at <https://www.youtube.com/watch?v=Pbf7WEVzKcQ>.
26
Bill Roggio, “Troops Find IED Factory in Sadr City,” The Long War Journal, October
30, 2008, available at <www.longwarjournal.org/archives/2008/10/iraqi_troops_find_
ef.php>.
27
Eddie Krassenstein, “Plus-MFg’s +1000k Multi Material Metal 3D Printer Shows Its
Power,” 3D Printer and 3D Printing News, available at <http://3dprint.com/87236/plus-
mfg-3d-metal-printer>.
28
“Affordable, Reliable Long-Range Imaging,” Aerovelco.com, available at <http://aerov-
elco.com/production/wp-content/uploads/2015/10/Aerovel_SingleSheet_1l_digital.pdf>.
29
See Kris Osborn, “Air Force Developing Swarms of Mini-Drones,” DefenseTech.
org, May 27, 2015, available at <http://defensetech.org/2015/05/27/air-force-developing-
swarms-of-mini-drones/>; David Smalley, “LOCUST: Autonomous Swarming UAVs Fly
into the Future,” Office of Naval Research, available at <www.onr.navy.mil/Media-Center/
Press-Releases/2015/LOCUST-low-cost-UAV-swarm-ONR.aspx>.
30
Jordan Golson, “A Military-Grade Drone That Can Be Printed Anywhere,” Wired.
com, September 16, 2014, available at <www.wired.com/2014/09/military-grade-drone-
can-printed-anywhere>.
31
Ari Daniel Shapiro, “Remotely Piloted Underwater Glider Crosses the Atlantic,”
IEEE Spectrum, available at <http://spectrum.ieee.org/robotics/industrial-robots/remote-
ly-piloted-underwater-glider-crosses-the-atlantic>.
32
Alix Willimex, “Autonomous Submarine Drones: Cheap, Endless Patrolling,”
CIMSEC.org, June 5, 2014, available at <http://cimsec.org/autonomous-sub-
arine-drones-cheap-endless-patrolling/>.
33
Mark Thompson, “The Navy’s Amazing Ocean-Powered Underwater Drone,” Time,
December 22, 2013, available at <http://swampland.time.com/2013/12/22/navy-under-
water-drone/>.
34
Daniel Kelly, “Michigan Tech’s ROUGHIE Gliders Will Follow Their Own Path,” The
Environmental Monitor, June 17, 2014, available at <www.fondriest.com/news/michigan-
techs-roughie-gliders-will-follow-path.htm>.
• 35 •
Hammes
35
Timothy McGeehan and Douglas Wahl, “Flash Mob in the Shipping Lane!” Proceed-
ings 142, no. 1 (January 2016).
36
“Welcome to the World of Drones,” The Economist, September 25, 2015, available
at <www.economist.com/news/science-and-technology/21666118-miniature-pilotless-air-
craft-are-verge-becoming-commonplace-welcome>.
37
Despite the fact there had been no attacks or even threat of attacks on Syrian ports,
London’s Maritime Insurance Market added Syria to a list of high-risk ports and raised
rates. To date, there have still been no attacks on Syrian ports, but traffic is down more
than 50 percent. It is impossible to tell what the impact of a ship hitting a mine would
be, but one can assume it would be more than the mere threat of potential action has had
in Syria.
38
See Chinese Military Aviation, “UAV/UCAV,” available at <http://chinese-mili-
tary-aviation.blogspot.com/p/uav.html>.
39
See Aerovironment, “Proceed with Certainty,” video presentation, available at
<www.avinc.com/downloads/Switchblade_Datasheet_032712.pdf>.
40
Robert O. Work, “The Third U.S. Offset Strategy and its Implications for Partners
and Allies,” as delivered at the Willard Hotel, Washington, DC, January 28, 2015, avail-
able at <www.defense.gov/News/Speeches/Speech-View/Article/606641/the-third-us-off-
set-strategy-and-its-implications-for-partners-and-allies>.
41
Richard Danzig, Driving in the Dark: The Propositions About Prediction and National
Security (Washington, DC: Center for New American Security, October 2011), available at
<www.cnas.org/files/documents/publications/CNAS_Prediction_Danzig.pdf>.
42
Eliot A. Cohen, “Global Challenges, U.S. National Security Strategy, and Defense
Organization,” testimony before the Senate Armed Services Committee, October 22,
2015, available at <www.armed-services.senate.gov/imo/media/doc/Cohen_10-22-15.
pdf>.
43
Frank G. Hoffman, “Forward Partnership: A Sustainable U.S. Strategy,” Or-
bis 57, no. 1 (Winter 2013), 20–40, available at <http://dx.doi.org/10.1016/j.or-
bis.2012.10.003>.
44
“Poor Man’s Drone Warfare in Eastern Ukraine,” Vocativ, August 28, 2104, available
at <https://www.youtube.com/watch?v=MHo7x2Vcjjg>.
45
Robert O. Work, “Wargaming and Innovation,” memorandum, February 9, 2015,
available at <https://news.usni.org/2015/03/18/document-memo-to-pentagon-leader-
ship-on-wargaming>.
46
This Google Scholar page lists some of the growing body of recent academic
literature on the subject: <https://scholar.google.com/scholar?q=wicked+problems+liter-
ature&hl=en&as_sdt=0&as_vis=1&oi=scholart&sa=X&ved=0ahUKEwjv7v2AoNLMAh-
VBcz4KHQ_jCSYQgQMIGjAA>.
47
Clausewitz, 6.
48
Ashton Carter, “Remarks Previewing the FY 2017 Defense Budget,” February 2,
2016, available at <www.defense.gov/News/Speeches/Speech-View/Article/648466/re-
marks-previewing-the-fy-2017-defense-budget>.
• 36 •
3
U.S. Defense Policy and Strategy
F.G. Hoffman
To guide the development of the Armed Forces, the new team at the Pentagon
will need an updated force design mechanism to size and shape that force. This
chapter offers options and guidance for two major components of U.S. defense
policy: alternative force design constructs and design principles. These force
constructs are not the strategy itself, but they are the requisite building blocks and
guidance that defense policymakers use to shape the desired force and explain
that force in its requests for the funding required from the American people.
T he need for a well-crafted U.S. defense strategy has never been great-
er since the end of the Cold War.1 Today the United States confronts
revisionist powers in three different regions (Russia in Europe, China in
Asia, and Iran in the Middle East) that impinge on its vital interests and
close allies. North Korea remains in a class by itself, an isolated but dan-
gerous threat to two U.S. allies. In different ways, each of these powers
is undermining and seeking to alter a U.S.-led, rules-based international
system that enabled a lengthy era of stability and shared economic pros-
perity. The scale of the challenge they pose substantially exceeds that of
the failed states and violent extremist organizations that have occupied
policy during the past 15 years.
Any new administration will face a host of challenges, arguably with
instruments and tools that, at least initially, are not well suited to the
complex tasks at hand.2 Currently our defense enterprise is facing an
expanding mission range and increasingly constrained resources. Our
present strategy hinges on sustaining deterrence but without the same
degree of military dominance enjoyed in the past and with an admitted
declining margin of technological superiority, producing appreciably in-
creased risk.3 As Andrew Krepinevich has noted, “All other factors being
equal, the decline in resources projected to be devoted to defense rela-
tive to those being invested by the revisionist powers suggest the United
• 37 •
Hoffman
• 38 •
U.S. Defense Policy and Strategy
them. These force constructs are not the strategy itself, but they are the
requisite building blocks and guidance that defense policymakers use
to shape the desired force and explain that force in its requests for the
funding required from the American people.11
• 39 •
Hoffman
• 40 •
U.S. Defense Policy and Strategy
demand for U.S. forces is increasing, and the potential exists for longer
duration conflicts.26 Our policy and force design should recognize and
strive to resolve this demand signal.
• 41 •
Hoffman
While there is some value in defining a much larger military force that
would allow the United States to be everywhere and fulfill all possible
missions, there is greater value in helping the next team of defense pol-
icymakers with clear priorities about where to apply funding resources.
Resource constraints, uncertainty, and risk are the constants of strategic
planning, and we cannot escape them. Thus the option set of strategy/
force designs examined here range from the Budget Control Acts levels
of around $500 billion to just above $600 billion per year.
The following portion of this chapter evaluates the Obama administra-
tion’s strategy and force levels against three alternative defense strategies
and force design constructs. The outlines of each strategy are detailed
and assessed, a summary of which is presented in table 1. Illustrative
force structure mixes for each of the options are presented in table 2.27
• 42 •
U.S. Defense Policy and Strategy
• 43 •
Hoffman
• 44 •
U.S. Defense Policy and Strategy
• 45 •
Hoffman
• 46 •
U.S. Defense Policy and Strategy
Principles
A new administration should consider a number of key principles in its
force design and development efforts. These principles are not an exclu-
sive list but offer guidance to steer the U.S. military as it adapts to the
rapidly changing strategic environment.
Embrace Uncertainty
The ability of U.S. strategists to predict the time, place, and character
of wars has been “uniformly dismal.”46 When one considers general
principles about force planning, one cannot escape the conclusions of
Colin Gray:
• 47 •
Hoffman
• 48 •
U.S. Defense Policy and Strategy
• 49 •
Hoffman
Recommendations
In order to better shape and size the force of the future, a number of
recommendations are offered.
• 50 •
U.S. Defense Policy and Strategy
• 51 •
Hoffman
• 52 •
U.S. Defense Policy and Strategy
Conclusion
The future is always terra incognita to defense planners; uncertainty
about the specifics of time, place, and adversary are the eternal constants
of security planning.83 Certitude is a chimera, but risk must be prudently
prepared for; it cannot be ignored or wished away. We have only history
and educated thinking to guide our forecasts.
We cannot assert certainty or gamble America’s future security entire-
ly on a single dimension or domain of warfare. Our opponents have a say
in the character, frequency, and intensity of tomorrow’s wars.84 Future
policymakers should not be simplifying potential opponents’ strategic
calculus and allow them to dedicate their preparations for fighting the
U.S. Armed Forces with only a singular approach. This is why strategic
balance is so valuable.85 As our leaders have noted, we cannot invest
in silver bullets.86 In short, some analytical humility is in order as we
• 53 •
Hoffman
Notes
1
Andrew F. Krepinevich, statement before the Senate Armed Services Committee,
“Hearing on Defense Strategy,” October 28, 2015.
2
Michèle Flournoy, Nine Lessons for Navigating National Security (Washington, DC:
Center for a New American Security, February 2016), 3.
3
Eric Heginbotham and Jacob Heim, “Deterring Without Dominance: Discouraging
Chinese Adventurism Under Austerity,” The Washington Quarterly 38, no. 1 (Spring 2015),
185–199.
4
Krepinevich.
5
David Ochmanek et al., America’s Security Deficit: Addressing the Imbalance Between
Strategy and Resources in a Turbulent World (Santa Monica, CA: RAND, 2015).
6
Clark A. Murdock, Kelley Sayler, and Ryan A. Crotty, The Defense Budget’s Double
Whammy: A Drawdown and Hollowing Out from Within (Washington, DC: Center for Strate-
gic and International Studies, October 2012).
7
Arnold Punaro, statement before the Senate Armed Services Committee, November
17, 2015, available at <www.ndia.org/Documents/Punaro_SASC_Written_Statement.
pdf>.
8
Robert Work, “The Third Offset Strategy,” prepared remarks at the Ronald Reagan
Defense Forum, November 17, 2015, available at <www.defense.gov/News/Speeches/
Speech-View/Article/628246/reagan-defense-forum-the-third-offset-strategy>; Frank Ken-
dall, Under Secretary of Defense Acquisition, Technology and Logistics, testimony before
the House Armed Services Committee, January 28, 2015.
9
Clark A. Murdock and Mark F. Cancian, Alternative Defense Strategies (Washington,
DC: Center for Strategic and International Studies, 2016); Clark A. Murdock, Ryan A.
Crotty, and Angela Weaver, Building the 2021 Affordable Military (Washington, DC: Center
for Strategic and International Studies, July 2014).
10
Michael J. Meese, Strategy and Force Planning in a Time of Austerity, INSS Strategic
Forum 287 (Washington, DC: NDU Press, May 2014).
• 54 •
U.S. Defense Policy and Strategy
11
Mackubin T. Owens, “Force Planning: The Crossroads of Strategy and the Political
Process,” Orbis 59, no. 3 (Summer 2015), 411–437.
12
Lorna S. Jaffe, The Development of the Base Force, 1989–1992 (Washington, DC:
Joint Chiefs of Staff Joint History Office, 1992); Les Aspin, Report of the Bottom-Up Review
(Washington, DC: Department of Defense, October 1993).
13
Eric V. Larson, David T. Orletsky, and Kristin J. Leuschner, Defense Planning in a
Decade of Change (Santa Monica, CA: RAND, 2001).
14
For a history, see Steven Metz, ed., The Two MTW Construct: An Alternative Strategy
Project (Carlisle Barracks, PA: Strategic Studies Institute, 2001).
15
Transforming Defense: National Security in the 21st Century, Report of the National
Defense Panel (Arlington, VA: National Defense Panel, December 1997), 23.
16
Seeking a National Strategy: A Concert for Preserving Security and Promoting Freedom,
Phase II (Arlington, VA: The United States Commission on National Security/21st Century,
April 15, 2000), 14–15.
17
Michèle A. Flournoy, ed., Quadrennial Defense Review 2001: Strategy-Driven Choices
for America’s Security (Washington, DC: NDU Press, 2001).
18
National Military Strategy of the United States of America 2004: A Strategy for Today,
A Vision for Tomorrow (Washington, DC: The Joint Staff, March 2005); National Defense
Strategy of the United States of America (Washington, DC: Office of the Secretary of De-
fense, March 2005).
19
Kathleen Hicks and Sam Brannen, “Force Planning in the 2010 QDR,” Joint Force
Quarterly 59 (4th Quarter 2010), 136–142.
20
The Quadrennial Defense Review Report 2010 (Washington, DC: Department of
Defense, February 2010), 41–42.
21
Sustaining U.S. Global Leadership: Priorities for 21st Century Defense (Washington, DC:
Department of Defense, January 2012).
22
Ibid., 4; emphasis in original.
23
The Department of Defense defined its sizing mechanism as follows: “If deterrence
fails at any given time, U.S. forces will be capable of defeating a regional adversary in a
large-scale multi-phased campaign, and denying the objectives of—or imposing unac-
ceptable costs on—a second aggressor in another region.” See Quadrennial Defense Review
2014 (Washington, DC: Department of Defense, March 2014).
24
Richard D. Hooker, Jr., American Landpower and the Two-War Construct, Land War-
fare Paper 106 (Arlington, VA: Association of the U.S. Army, May 2015), 2–3.
25
Russia fields an active army of roughly 300,000, supported by over 500,000 re-
servists. Iran’s military forces total 475,000 active-duty members, and their mobilization
capacity would double that. See IISS Military Balance 2014 (London: Routledge, 2014),
180–191, 215–217, 230–240, 254–256, 318–322.
26
Frank G. Hoffman and Ryan Neuhard, “No Wake for Ares,” Proceedings 141, no. 12
(December 2015). For an opposing argument, see Christopher Preble and John Mueller,
eds., A Dangerous World? Threat Perception and U.S. National Security (Washington, DC:
CATO Institute, 2014).
27
For an update on current force structure and plans, see Mark F. Cancian, U.S.
Military Forces in FY 2017: Stable Plans, Disruptive Threats, and Strategic Inflection Point
(Washington, DC: Center for Strategic and International Studies, May 2016).
28
Michael E. O’Hanlon, The Future of Land Warfare (Washington, DC: Brookings
Institution, 2014), 175.
• 55 •
Hoffman
29
Frank G. Hoffman, “Thinking About Future Conflict: Preparing for the Full Spec-
trum,” Marine Corps Gazette 98, no. 11 (November 2014).
30
Linda Robinson, The Future of Special Operations. Beyond Kill and Capture, Special
Report No. 66 (New York: Council on Foreign Relations, April 2013); James Thomas and
Chris Dougherty, Beyond the Ramparts: The Future of U.S. Special Operations Forces (Wash-
ington, DC: Center for Strategic and Budgetary Assessments, 2013).
31
David Maxwell, “Unconventional Warfare Does Not Belong to Special Forces,” War
on the Rocks, August 12, 2013.
32
Cancian, 45.
33
Frank G. Hoffman, “Forward Partnership: A Sustainable American Strategy,” Orbis
57, no. 4 (Winter 2013), 19–37.
34
Abraham Denmark and James Mulvenon, eds., Contested Commons: The Future of
American Power in a Multipolar World (Washington, DC: Center for a New American Secu-
rity, 2010); Patrick Cronin et al., Cooperation from Strength: The United States, China, and
the South China Sea (Washington, DC: Center for a New American Security, 2012).
35
Mark E. Redden and Michael P. Hughes, Global Commons and Domain Interrelation-
ships: Time for a New Conceptual Framework? INSS Strategic Forum 259 (Washington, DC:
NDU Press, October 2010).
36
Bryan Clark, statement before the House Armed Services Subcommittee on Sea-
power and Power Projection in Presence, Deterrence, and Warfighting, April 15, 2015.
37
On the merits of this, see Jerry Hendrix, Retreat from Range: The Rise and Fall of Car-
rier Aviation (Washington, DC: Center for a New American Security, October 2016). For
a robust defense of the carrier in the 21st century, see Seth Cropsey, Bryan McGrath, and
Timothy Walton, Sharpening the Spear: The Carrier, the Joint Force, and High-End Conflict
(Washington, DC: Hudson Institute, October 2016).
38
Bryan Clark, The Emerging Era in Undersea Warfare (Washington, DC: Center for
Strategic and Budgetary Assessments, January 2015).
39
Dakota L. Wood, ed., 2016 Index of U.S. Military Strength (Washington, DC: Heritage
Foundation, 2016); Dakota L. Wood, “Alternative Approaches to Defense Strategy and
Force Structure,” testimony before the Senate Armed Services Committee, October 29,
2015.
40
Michael Green, Kathleen Hicks, and Mark F. Cancian, Asia Pacific Rebalance 2025:
Capabilities, Presence and Partnership (Washington, DC: Center for Strategic and Interna-
tional Studies, 2016), 131.
41
2014 Quadrennial Defense Review, ix.
42
Ibid.
43
For force estimates, see Hooker, 6.
44
Thomas Donnelly et al., To Rebuild America’s Military (Washington, DC: American
Enterprise Institute, 2015); Solutions 2016 (Washington, DC: Heritage Foundation, 2016).
45
Colin S. Gray, Always Strategic: Jointly Essential Landpower (Carlisle Barracks, PA:
Strategic Studies Institute, February 2015).
46
Charles Heller and William Stofft, America’s First Battles, 1776–1965 (Lawrence:
University Press of Kansas, 1986), xii.
47
Colin S. Gray, “The 21st Century Security Environment and the Future of War,”
Parameters (Winter 2008/2009), 14–24.
48
Ibid., 16.
49
See the Chairman’s risk assessment in the 2014 Quadrennial Defense Review, 60–65.
• 56 •
U.S. Defense Policy and Strategy
50
The National Military Strategy of the United States of America 2015 (Washington, DC:
The Joint Staff, June 2015), i.
51
The Army for the Future (Arlington, VA: National Commission on the Future of the
Army, 2016), 52.
52
Timothy M. Bonds, Michael Johnson, and Paul S. Steinberg, Limiting Regret: Building
the Army We Will Need (Santa Monica, CA: RAND, 2015).
53
Andrew F. Krepinevich, Jr., “How to Deter China,” Foreign Affairs (March/April
2015).
54
David E. Johnson, “The Challenges of the ‘Now’ and Their Implications for the U.S.
Army” (Santa Monica, CA: RAND, 2016), 10.
55
Complex Warfighting, Future Land Operations Concept (Canberra: Australian Army,
2004).
56
Robert M. Gates, statement before the Senate Armed Services Committee, October
21, 2015, 7.
57
Nathan Freier, Defining and Operationalizing Balance in Defense Strategy (Washington,
DC: Center for Strategic and International Studies, 2009).
58
Mackubin T. Owens, “A Balanced Force Structure to Achieve a Liberal World Or-
der,” Orbis 50, no. 2 (Spring 2006), 307–325.
59
Frank G. Hoffman, “What the QDR Should Say about Landpower,” Parameters 43,
no. 4 (Winter 2013/2014), 7–14.
60
T.X. Hammes, “Cheap Technology Will Challenge U.S. Tactical Dominance,” Joint
Force Quarterly 81 (2nd Quarter, April 2016), 76–85.
61
Rhys McCormick, The Army Modernization Challenge: A Historical Perspective (Wash-
ington, DC: Center for Strategic and International Studies, March 2016).
62
Shawn Brimley, While We Can: Arresting the Erosion of America’s Military Edge (Wash-
ington, DC: Center for a New American Security, December 2015).
63
David Deptula, “Revisiting the Roles and Missions of the Armed Forces,” testimony
before the Senate Armed Services Committee, November 5, 2015, 2.
64
Paul K. Davis, Lessons from RAND’s Work on Planning Under Uncertainty for National
Security (Santa Monica, CA: RAND, 2012).
65
For ideas, see Robert H. Scales, The Past and Present as Prologue: Future Warfare
Through the Lens of Contemporary Conflicts (Washington, DC: Center for a New American
Security, 2009); Paul Scharre, Uncertain Ground: Emerging Challenges in Land Warfare
(Washington, DC: Center for a New American Security, 2015).
66
On allied contributions, see Gary Schmitt, ed., A Hard Look at Hard Power: Assessing
the Defense Capabilities of Key U.S. Allies and Security Partners (Carlisle Barracks, PA: U.S.
Army War College, July 2015).
67
Eric Labs, An Analysis of the Navy’s Fiscal Year 2016 Shipbuilding Plan (Washington,
DC: Congressional Budget Office, October 29, 2015); Eric Labs, “A Fiscal Pearl Harbor,”
Proceedings 142, no. 2 (February 2016). See also Ronald O’Rourke, Navy Force Structure
and Shipbuilding Plans: Background and Issues for Congress, RL32665 (Washington, DC:
Congressional Research Service, May 23, 2016), as well as his research on the submarine
production challenge: O’Rourke, Navy Virginia (SSN-774) Class Attack Submarine Pro-
curement: Background and Issues for Congress, RL32418 (Washington, DC: Congressional
Research Service, May 20, 2016).
68
Eric Labs, Preserving the Navy’s Forward Presence with a Smaller Fleet (Washington,
DC: Congressional Budget Office, March 2015).
• 57 •
Hoffman
69
Eric Heginbotham et al., The U.S.-China Military Scorecard: Forces, Geography, and
the Evolving Balance of Power, 1996–2017 (Santa Monica, CA: RAND, 2015); Roger Cliff,
China’s Military Power (New York: Cambridge University Press, 2016), 72–102.
70
Heginbotham, 347–348.
71
Cancian, 22.
72
Donald Chisholm, “The Risk of Optimism in the Conduct of War,” Parameters 33,
no. 4 (Winter 2003–2004), 114–131.
73
Eliot Cohen, testimony before the Senate Armed Services Committee, October
22, 2015; David Barno and Nora Bensahel, “Preparing for the Next Big War,” War on the
Rocks, January 26, 2016.
74
Aaron Mehta, “Is the Pentagon’s Budget About to Be Nuked?” Defense News, Febru-
ary 8, 2016, 12–17.
75
Todd Harrison and Evan B. Montgomery, The Cost of U.S. Nuclear Forces: From BCA
to Bow Wave and Beyond (Washington, DC: Center for Strategic and Budgetary Assess-
ments, August 4, 2015); Ronald O’Rourke, Navy Ohio Replacement (SSBN[X]) Ballistic
Missile Submarine Program: Background and Issues for Congress, R41129 (Washington, DC:
Congressional Research Service, May 20, 2016).
76
As suggested by former Secretary of Defense Chuck Hagel and former Vice Chief
of the Joint Staff General James Cartwright in Global Zero U.S. Nuclear Policy Commission
Report, Modernizing U.S. Nuclear Strategy, Force Structure and Posture (Washington, DC:
Global Zero, May 2012), 7.
77
Aaron Mehta, “Former SecDef Perry, U.S. on the ‘Brink’ of New Nuclear Arms
Race,” Defense News, December 3, 2015, available at <www.defensenews.com/story/
defense/policy-budget/2015/12/03/former-secdef-perry-us-brink-new-nuclear-arms-
race/76721640/>.
78
Arnold Punaro, The Commission on the National Guard and Reserves (Washington,
DC: Commission on the National Guard and Reserves, January 31, 2008).
79
Hoffman, “What the QDR Should Say about Landpower,” 13. See also Report on
the Role of the Army (Washington, DC: National Commission on the Force Structure of
the Army, January 28, 2015). For further analysis, see Joshua Klimas et al., Assessing the
Army’s Active-Reserve Component Force Mix (Santa Monica, CA: RAND, 2014).
80
David Barno and Nora Bensahel, “Beyond the Army Commission: Unifying the
Army’s Components,” War on the Rocks, February 9, 2016.
81
Mark Gunzinger, Shaping America’s Future Military: Toward a New Force Planning
Construct (Washington, DC: Center for Strategic and Budgetary Assessment, 2013).
82
Michèle A. Flournoy, “The Urgent Need for Defense Reform,” testimony before the
Senate Armed Services Committee, December 8, 2015, 3–4.
83
Colin S. Gray, Defense Planning for National Security: Navigation Aids for the Mystery
Tour (Carlisle Barracks, PA: Strategic Studies Institute, March 2014).
84
H.R. McMaster, “Continuity and Change: The Army Operating Concept and Clear
Thinking about Future War,” Military Review (March–April 2015), 6–14.
85
Mackubin T. Owens on strategic pluralism in Derek S. Reveron, Nikolas K.
Gvosdev, and Mackubin T. Owens, eds., U.S. Foreign Policy and Defense Strategy: The
Evolution of an Incidental Superpower (Washington, DC: Georgetown University Press,
2016), 55.
86
Robert O. Work, “The Third U.S. Offset Strategy and Its Implications for Partners
and Allies,” remarks as delivered at the Willard Hotel, Washington, DC, January 28,
• 58 •
U.S. Defense Policy and Strategy
• 59 •
4
The American Defense Budget 2017–2020
Michael J. Meese
The continued sluggish recovery from the Great Recession of 2008–2009, the
reduction in U.S. employment, and the significant and growing Federal deficit
places increasing pressure on defense spending and threatens future U.S. national
security. The new administration must recognize the importance of and advocate
for policies to improve economic growth, responsibly address America’s fiscal
challenges, and rationalize defense spending. At over $550 billion, defense
spending is the largest discretionary part of the budget, representing 15 percent
of total Federal spending. The Pentagon should continue to address military
compensation reform, tackle the expansion of headquarters staffs, choose research
and development over procurement, and strenuously argue for entitlement
reform and increased fiscal responsibility. This approach can make significant
improvements in defense spending that will enhance U.S. national security.
T he American defense budget for 2017 to 2020 will be one of the first
and most important issues that the new administration must address.
Realistic economic and budgetary policies must be developed and imple-
mented to replace the shortsighted and piecemeal approach that has dom-
inated Federal and defense budgetary decisionmaking for the past several
years. By taking specific steps regarding the defense budget, the new ad-
ministration can maximize the military contribution to national security.
To understand the challenges facing defense budgeting, this chapter
first examines the problems in the underlying economy, including the
implications of the national debt and deficit. It then discusses Federal
spending, including briefly reviewing the patchwork of solutions over
the past decade that has delayed and exacerbated budgetary problems.
With this context established, it identifies the necessary approach to-
ward Federal budgeting in general and defense budgets in particular.
Finally, the chapter discusses areas in which defense spending should be
reformed and improved.
• 61 •
Meese
• 62 •
The American Defense Budget 2017–2020
25
Spending
24
Tax Revenues
Deficits during Future
23
recession Deficits
22
2016
Percent of GDP
21
2.9%
2021
20
2016 3.9%
19 2.9%
18
17
Surplus 2016–2026
16
CBO Estimates
15
14
1970
1972
1974
1976
1978
1980
1982
1984
1986
1988
1990
1992
1994
1996
1998
2000
2002
2004
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
2026
Source: Bureau of Economic Analysis, St. Louis Federal Reserve
military leaders must recognize the importance of and must advocate for
policies to improve economic growth and responsibly address American
fiscal challenges.
• 63 •
Meese
Mandatory/ Discretionary
Entitlements (72%) Int’l (28%)
Defense 1%
Interest 15%
7%
Domestic
12%
Social Security
23%
Health Care
Income (incl. Medicare)
Security 28%
13%
ties. The best way to more effectively provide for the Nation’s defense
may not be a new weapons system or military unit, but rather support of
comprehensive, long-term entitlement and budget reform.
Budgeting by Crisis
The Federal Government has a comprehensive process for planning,
programming, budgeting, authorizing, appropriating, and executing
the Federal budget. The problem is that for the past several years, the
normal political and budgetary process has failed because of extreme
polarization in Congress and inability to compromise except in crises.
Understanding this history is important so that the next administration
can learn from it and avoid perpetuating budgeting by crisis in 2017 and
beyond.
Most recently in August 2011, the Nation was only days away from
exceeding the debt limit and, absent congressional action, could have
potentially failed to meet obligations to pay entitlement recipients, Fed-
eral workers, holders of U.S. debt, and Federal contractors. Congress
reached a last-minute compromise by raising the debt ceiling and pass-
ing the 2011 Budget Control Act. That act bought time by appointing
a bipartisan Joint Committee on Deficit Reduction (the so-called Super
• 64 •
The American Defense Budget 2017–2020
Committee) that was supposed to solve the budget impasse and provide
a clear, rational way forward. In the absence of a solution by the Su-
per Committee, a process known as sequestration would automatically
implement dramatic and severe reductions of discretionary outlays to
achieve a specified amount of savings.
Even with the threat of automatic sequestration budget cuts, the Su-
per Committee could not achieve compromise. In September 2013 se-
questration was imposed, which slashed $109 billion from discretionary
spending, with half coming from defense spending and the other half
coming from non-defense spending (entitlement spending was exempt
from cuts). Other than military salaries, every defense and non-defense
account was reduced across the board, leading to the involuntary fur-
lough of government workers, curtailment of contracts, and other un-
planned reductions. The next crisis began on October 1, 2013, when
Congress failed to approve the fiscal year 2014 budget and the Feder-
al Government “shut down” for 16 days. To avoid another government
shutdown, Senator Patty Murray (D-WA) and Representative Paul Ryan
(R-WI) negotiated the Murray-Ryan budget plan, which forestalled any
crises through the 2014 election year but did so by granting $63 billion
in sequester relief through the end of fiscal year 2015.5
With the risk of sequestration reemerging in 2016, the official Depart-
ment of Defense Quadrennial Defense Review concluded:
• 65 •
Meese
questration.7 After a new budget deal was struck, both domestic and
defense spending were increased for fiscal year 2016, postponing and
increasing the budgetary problem for the next President and Congress.
This budget-by-crisis approach in use since 2011 reflects a dysfunc-
tional Washington environment that has preoccupied defense budgetary
decisionmaking and distracted officials from using the budget process
to make difficult but necessary choices for the good of the Nation. One
of the most important attributes that the next President should bring to
Federal spending is a clear articulation of national priorities and lead-
ership to work with Congress to develop and execute a coherent, long-
term budget strategy to accomplish those priorities. Certainly compro-
mise will be necessary on some issues, but in the absence of leadership
to solve fundamental problems, the resulting budgetary chicanery will
continue to undermine American economic strength and hamper na-
tional security.
Budget Solutions
Budget problems are completely within the Federal Government’s power
to solve. The solutions will entail some kind of realistic long-term entitle-
ment reform, a reduction in discretionary spending, an increase in total
tax revenue raised, or any combination of the three to cause the lines in
figure 1 to move closer together rather than spread farther apart. In 2010
the National Commission on Fiscal Responsibility and Reform, chaired
by former Senator Alan Simpson (R-WY) and former White House Chief
of Staff Erskine Bowles, developed a plan that would reduce the Fed-
eral deficit by nearly $4 trillion in 10 years, reducing the deficit to 2.3
percent of GDP.8 More recently former Senator Pete Domenici (R-NM)
and former Office of Management and Budget Director Alice Rivlin with
the Bi-Partisan Policy Center have proposed a similar plan. Importantly,
both of these plans, and any that would likely be successful, encourage
incentives for increased employment and economic growth, which are
essential to any long-term solution. With regard to revenues, most bipar-
tisan plans maintain or reduce tax rates while eliminating “tax expendi-
tures” (also known as loopholes) so that the ultimate result is more tax
revenues through greater productive output and less manipulation of the
tax code to favor specific actions, industries, or sectors of the economy.
• 66 •
The American Defense Budget 2017–2020
10
1968, 9.1%
9
Defense Outlays as Percent of GDP
8
1986, 6%
7
2010, 4.7%
6
4
1979, 4.5%
3
2
2001, 2.9% 2016, 3.3%
1
2021, 2.7%
0
1960
1964
1968
1972
1976
1980
1984
1988
1992
1996
2000
2004
2008
2012
2016
2020
Source: Office of the Under Secretary of Defense (Comptroller), National Defense
Budget Estimates for FY 2017 (Washington, DC: Department of Defense, March 2016)
A first step for the next administration to address the defense budget is
to understand both the level and composition of U.S. defense spending
and how these have changed over the past 15 years.
Overall Spending
To some extent, the size of the defense budget depends on one’s per-
spective because all of the following facts are true. The current defense
budget:
• 67 •
Meese
$800
2010, $740
1986, $572
$700
2017 Constant Outlays (USD billions)
1968, $587
2004, $576
$600
$500
2016, $586
$400
2017, $553
$300
1978, $393 1998, $396 2021, $537
$200
$100
$0
1960
1964
1968
1972
1976
1980
1984
1988
1992
1996
2000
2004
2008
2012
2016
2020
Source: National Defense Budget Estimates for FY 2017
• 68 •
The American Defense Budget 2017–2020
$300
Air Force
$275
Army
Constant 2017 TOA (USD billions)
$250
Navy
$225
Defense Wide
$200 (HQ, Commands, Agencies)
$175
$150
$125
$100
$75
$50
$25
$0
1990
1992
1994
1996
1998
2000
2002
2004
2006
2008
2010
2012
2014
2016
2018
2020
Source: National Defense Budget Estimates for FY 2017
• 69 •
Meese
• 70 •
The American Defense Budget 2017–2020
$110,000
$100,000
$90,000
Constant 2017 Dollars
$80,000
$70,000
$60,000
$50,000
$40,000
$30,000
Total Military Spending per Servicemember
$20,000
Military Pay per Servicemember
$10,000
$0
1986
1988
1990
1992
1994
1996
1998
2000
2002
2004
2006
2008
2010
2012
2014
2016
Source: National Defense Budget Estimates for FY 2017
• 71 •
Meese
• 72 •
The American Defense Budget 2017–2020
Recommended Improvements
Given this understanding of the fiscal realities that confront the Nation,
the next administration will need to take four specific steps with re-
gard to the defense budget for 2016–2020. First, the defense budget
for 2016 to 2020 must include ways to “bend the curve” on military
personnel spending but must do so without breaking faith with those
serving, who are truly deserving. In the absence of such reforms, the
only solution that military leaders would have left is to further cut the
number of Servicemembers in uniform. Fortunately in 2015, DOD took
a step toward military compensation reform with the first major change
in military retirement since World War II.17 This reform included adding
a government contribution to a 401(k)-like defined contribution plan,
and reducing military retirement benefits by 20 percent. Ultimately the
change will save about $2 billion per year.18 Further reforms, such as
the one for military retirement, should be coordinated with across-the-
board entitlement reform from other parts of the Federal budget so that
financial sacrifices necessary for the Nation’s long-term fiscal stability
and economic growth are borne by American citizens generally and not
just placed on the shoulders of those who serve.
Making these adjustments in benefits will require courage and lead-
ership, which has already been expressed by senior military leaders. The
Sergeant Major of the Marine Corps, Michael Barrett, testified to Con-
gress, “In my 33 years, we’ve never had a better quality of life. . . . We’ve
never had it so good. If we don’t get a hold of slowing the growth [of
personnel spending], we will become an entitlement-based, a healthcare
provider–based Corps and not a war-fighting organization.”19 Barrett was
arguing the point made in figure 7 that the costs are simply too high and
that if they are not contained, funds will be redirected from equipment
and training that are essential to combat readiness. The next administra-
tion would likely find that military leaders would welcome reasonable
reforms of military entitlements to curb cost growth, especially in con-
junction with other Federal entitlement reforms.
Rising personnel costs affect all Services but are especially prominent
in the Army. Although the Army is downsizing, it still has the most uni-
formed personnel; in fiscal year 2017, military personnel costs represent
• 73 •
Meese
Procurement
28% $123 Limited Flexibility
$100 Procurement RDT&E 6%
26%
Procurement No Flexibility
12%
$80
Operation &
Operation &
Maint. 30%
$60 Maint. 35%
Operation &
Maint. 32%
$40
$0
Navy Air Force Army
45 percent of its budget (see figure 8). This share is of a smaller budget
and is about 50 percent more than the Navy’s share of personnel costs
(which includes the Marine Corps) and double that of the Air Force.
Consequently, when there is a further call for flexibility within budgets,
especially after reductions in spending for overseas contingency opera-
tions, the Army has severely limited budgetary options.
Second, the next administration should increase efficiency and return
more resources to operational units by using the defense budget process
as a forcing mechanism to discipline and reduce the size of headquar-
ters. Understandably, in the midst of fighting multiple wars, the military
forms additional structures, organizations, and headquarters, frequently
in an ad hoc way. Many of these are effective, such as the Rapid Equip-
ping Force, which was created during the wars in Afghanistan and Iraq
to harness “current and emerging technologies to provide immediate
challenges of U.S. Army forces deployed globally.”20 However, these in-
novations were often in addition to, rather than instead of, the existing
institutional structure. Now is the time to reduce the previous structures
and to right-size defense institutions proportional to the force that they
are supporting.
One of the most critical areas to examine has been the growth of head-
quarters staff over the past 15 years. Each headquarters in the Pentagon
has increased significantly since 9/11 (see table 1).21 These increases are
only for civilian and military positions and do not include contractor
• 74 •
The American Defense Budget 2017–2020
• 75 •
Meese
$150
$140
$130
Constant 2017 TOA (USD billions)
$120
$110
$100
$90
$80
$70
$60
$50
$40
$30
Procurement
$20
Research, Development, Testing & Evaluation
$10
$0
1960
1964
1968
1972
1976
1980
1984
1988
1992
1996
2000
2004
2008
2012
2016
2020
Source: National Defense Budget Estimates for FY 2017
• 76 •
The American Defense Budget 2017–2020
• 77 •
Meese
• 78 •
The American Defense Budget 2017–2020
Conclusion
The next administration has an opportunity to set an aggressive agenda
for the Pentagon as it continues to engage globally, sustain the all-vol-
unteer force, prepare for the future, and confront increasing budgetary
pressure. To be successful, defense leaders must understand the reasons
for the current economic and fiscal crises and the accumulated effects
of 15 years of war on the Services, on the level and composition of the
defense budget, and on the military establishment as a whole. The cur-
rent strategy of muddling through from one budget crisis to the next is
inefficient, counterproductive, and unsustainable. In response to these
conditions, the next administration should continue to address mili-
tary compensation reform, tackle the expansion of headquarters staffs,
choose research and development over procurement, and strenuously ar-
gue for entitlement reform and increased fiscal responsibility. The power
to make these changes lies entirely with the leadership in Washington.
The next administration should seize that power and use it to make the
improvements in defense spending to enhance U.S. national security.
Dr. Steven Bloom, Colonel S. Jamie Gayton, USA, and Dr. R.D. Hooker, Jr.,
provided extremely helpful comments on a previous version of this chapter.
Notes
1
Bureau of Labor Statistics, “The Employment Situation—November 2015,” USDL-
15-2292, December 4, 2015, available at <www.bls.gov/news.release/archives/emp-
sit_12042015.pdf>.
2
Calculations based on data from Economic Report of the President (EROP) (Washing-
ton, DC: Council of Economic Advisors, 2016), tables B-17 for fiscal years 1970–2017;
The Budget and Economic Outlook, 2016 to 2026 (Washington, DC: Congressional Budget
Office, January 2016), table 1.
3
See EROP, 2016, table B-18. The 2017 national debt is projected to be $20.1 trillion,
which is 104.4 percent of gross domestic product. Of this total, $14.8 trillion (73.3 per-
cent of gross domestic product) is debt held by the public, and the balance is the portion
of debt that is held by government agencies (such as trust funds).
4
Geoff Colvin, “Adm. Mike Mullen: Debt is Still Biggest Threat to U.S. Security,”
Fortune, May 10, 2012.
5
U.S. House of Representatives, Committee on the Budget, “Murray and Ryan Intro-
duce Bipartisan Budget-Conference Agreement,” press release, December 10, 2013.
6
Quadrennial Defense Review 2014 (Washington, DC: Department of Defense, March
4, 2014), 53.
7
Steven Mufson, “Obama Uses Veto for Only Fifth Time, Rejecting Defense Authori-
zation Bill,” Washington Post, October 22, 2015.
• 79 •
Meese
8
National Commission on Fiscal Responsibility and Reform, The Moment of Truth
(Washington, DC: The White House, December 2010).
9
Barack Obama, “State of the Union Address,” Washington, DC, January 12, 2016,
available at <www.whitehouse.gov/sotu>.
10
Personnel statistics are from Office of the Undersecretary of Defense, National
Defense Budget Estimates for FY 2016 (Washington, DC: Department of Defense, March
2015), table 7-5. Draft estimates are from Bernard Rostker, I Want You: The Evolution of the
All-Volunteer Force (Santa Monica, CA: RAND, 2006), 44.
11
Moreover, by comparison, the U.S. population in 2001 was 42 percent larger than
it was in 1968. Data on historical size of the military are from Department of Defense,
Selected Manpower Statistics, FY 2005 (Washington, DC: Defense Manpower Data Center,
2005).
12
In 2006, after Secretary Donald Rumsfeld resigned, President George W. Bush
approved an increase in Army and Marine Corps end strength. See Donald Rumsfeld,
Known and Unknown: A Memoir (New York: Sentinel, 2011), 715.
13
Moshe Schwartz and Joyprada Swain, Department of Defense Contractors in Afghani-
stan and Iraq: Background and Analysis, R40764 (Washington, DC: Congressional Research
Service, May 13, 2011).
14
Defense Science Board, Task Force on Contractor Logistics in Support of Contingency
Operations (Washington, DC: Department of Defense, June 2014), 10.
15
As of March 15, 2015, the U.S. contractor deaths in Iraq and Afghanistan were
1,620 and 1,592, respectively. In comparison, U.S. Servicemember deaths were 4,483 in
Iraq and 2,353 in Afghanistan. See Sara Thannhauser and Christoff Luehrs, “The Human
and Financial Costs of Operations in Afghanistan and Iraq,” in Lessons Encountered: Learn-
ing from the Long War, ed. Richard D. Hooker, Jr., and Joseph J. Collins (Washington, DC:
NDU Press, September 2015).
16
Government Accountability Office (GAO), Continued Management Attention Needed
to Enhance Use and Review of DOD’s Inventory of Contracted Services, GAO-13-491 (Wash-
ington, DC: GAO, May 2013), 14–15. It is important to note that $203,565 is the fully
burdened cost of the full-time equivalent (including payments made to the contractor,
which includes recruiting, training, taxes, retirement costs, and other expenses; it is not
just the salary paid to the individual).
17
The Department of Defense (DOD) proposed the change in retirement based on the
Military Compensation and Retirement Modernization Commission and was included
in the 2016 National Defense Authorization Act. The military retirement system has not
substantively changed since World War II. There was one change in 1986—a proposal for
“Redux” retirement was passed that would have saved DOD significant retirement costs—
but that was essentially repealed in 1999, before it could save DOD personnel costs.
18
The new retirement plan has many additional details and is outlined in Report of
the Military Compensation and Retirement Modernization Commission (Washington, DC:
Department of Defense, January 2015). The $2 billion in forecasted savings is in Tom
Vandenbrook, “Defense Secretary Ash Carter’s Historic Personnel Changes Irk Generals,”
USA Today, December 27, 2015.
19
Michael Barrett, quoted in “Sgt. Maj. of the Marine Corps Barrett: Less Pay Raises
Discipline,” Marine Corps Times, April 9, 2014.
20
“Rapid Equipping Force,” available at <www.ref.army.mil/>.
21
Table 1 is based on GAO, DOD Needs to Reassess Personnel Requirements for the Office
of Secretary of Defense, Joint Staff, and Military Service Secretariats, GAO-15-10 (Washing-
ton, DC: GAO, January 2015), 10–17.
22
Ibid., 52.
• 80 •
The American Defense Budget 2017–2020
23
GAO, DOD Needs to Periodically Review and Improve Visibility of Combatant Com-
mand’s Resources, GAO-13-293 (Washington, DC: GAO, May 2013).
24
Office of the Assistant Secretary of Defense for Readiness and Force Management,
Defense Manpower Requirements Report, FY 2015 (Washington, DC: Department of De-
fense, June 2014), 18.
25
The number of current flag officers is from Defense Manpower Requirements Report,
Fiscal Year 2015 (Washington, DC: Department of Defense, 2014), 73; Selected Manpower
Statistics, Fiscal Year 2001 (Washington, DC: Department of Defense, 2001). The reduc-
tion in the size of the military is from National Defense Budget Estimates for FY 2016.
26
See Ash Carter, “Remarks on ‘Goldwater-Nichols at 30: An Agenda for Updat-
ing,’” April 5, 2016, available at <www.defense.gov/News/Speeches/Speech-View/Arti-
cle/713736/>.
27
The best listing of DOD officials is Department of Defense Key Officials, September
1947–May 2015 (Washington, DC: Historical Office of the Office of the Secretary of
Defense, 2015).
28
Office of the Under Secretary of Defense (Comptroller), Program Acquisition Cost by
Weapon System (Washington, DC: Department of Defense, February 2016).
• 81 •
5
National Security Reform
Christopher J. Lamb
National security reform is more necessary now than ever, but some critics have
exaggerated the costs and scope of the required changes. Actually, the system’s
most egregious limitations can be inexpensively fixed in three straightforward
steps. These reforms would be politically and bureaucratically challenging and
require knowledgeable and determined leadership, but they are not expensive,
hopelessly complicated, or overly broad in scope or scale.
• 83 •
Lamb
• 84 •
National Security Reform
“There is still no effective, consistent mechanism that brings a whole interagency team to focus
on a particular foreign policy issue.”
—Ambassador Ryan Crocker, 2009
“Executive authority below the President is necessary to ensure the effectiveness of contingency
relief and reconstruction operations. The role of executive authority—and the lack thereof—over
interagency coordination lies at the heart of the failures in the Iraq reconstruction program.”2
—Stuart Bowen
Special Inspector General for Iraq, 2009
“The issue to date . . . is that below the President there is no one person, head of a department,
or head of an agency who has been tasked with or is responsible for the strategic direction
and integration of all elements of national power, so the United States can properly execute
a strategy for Iraq. . . . Nobody has the authority and influence needed across the whole U.S.
Government. . . . We need some new constructs.”3
—General Richard Myers, USAF (Ret.)
Former Chairman of the Joint Chiefs of Staff, 2009
“I think that if we look at ourselves hard in the mirror, you can’t do something as difficult as
Afghanistan without one person in charge. And we still don’t have that.”4
—General Stanley A. McChrystal, USA (Ret.), 2015
“[We] know personally most of those involved in leading the long wars in Iraq and Afghanistan.
They are to a person—whether military officers or civilian officials—diligent and dedicated
patriots. . . . However, when officials and officers in the field did not get along, the deficiencies
of the system allowed their disputes to bring in-country progress to a halt. What is needed is an
overall system that will make cooperation and integration the norm, not the exception.”5
—Admiral Dennis Blair, USN (Ret.), Ambassador Ronald E. Neumann, and
Admiral Eric Olson, USN (Ret.), 2014
1
David Ignatius, “Abizaid’s Long View,” Washington Post, March 16, 2007.
2
Hard Lessons: The Iraq Reconstruction Experience (Washington, DC: Special Inspector General for Iraq
Reconstruction, 2009), 14.
3
Richard B. Myers with Malcolm McConnell, Eyes on the Horizon: Serving on the Front Lines of National Security
(New York: Threshold, 2009).
4
Stanley A. McChrystal, interview by Joseph J. Collins and Frank G. Hoffman, April 2, 2015.
5
Dennis Blair, Ronald Neumann, and Eric Olson, “Fixing Fragile States,” National Interest, August 27, 2014.
• 85 •
Lamb
• 86 •
National Security Reform
would be involved and that the chain of command to those forces went
through the Secretary of Defense, and thus DOD should be in charge of
the entire interagency effort.15
Actually, Goldwater-Nichols gives the President other options because
it includes the caveat “unless otherwise directed by the President.”16
However, for the President to insert anyone else in the military chain of
command, or delegate decision authority over other departments and
agency activities, other legal requirements must be met:
• 87 •
Lamb
Collaborative Cabinet
Legislation allowing the President to empower selected subordinates to
direct executive branch activities is the key prerequisite for successful
national security reform.20 However, it is not sufficient. Structural ad-
justments in authorities must be accompanied by less visible but equally
important elements of organizational performance.21 When senior lead-
ers in the private sector impose hasty reforms without sufficient support
and follow-up, the usual result is failure. A President imposing mission
managers on his Cabinet officials and National Security Council (NSC)
staff without supporting measures would also fail.22 To succeed, the Pres-
ident will have to personally lead a concerted effort to shape leadership
attitudes and behavior, staff skills, and the organizational culture of the
NSC staff.
• 88 •
National Security Reform
• 89 •
Lamb
• Mission managers will manage the problem “end to end.” The mis-
sion manager will assess the evolution of his or her mission; develop
policy; propose and execute a strategy for dealing with the issue;
conduct or oversee all requisite planning for associated operations;
oversee implementation of policy, strategy, and plans; and evaluate
progress, solving problems as they arise and adjusting as necessary.
When mission managers discover an impediment to progress, I ex-
pect them to intervene selectively but decisively to ensure mission
success. They will drill down to whatever level of detail is necessary
to identify the origin of suboptimal performance and remove it, and
I will encourage their doing so within the bounds of the procedures
outlined below.
• Mission managers may impact your equities. If this occurs, you have
two remedies: one advantage of mission managers is that they are
singularly focused on and held accountable for outcomes. The dis-
advantage is that their mission focus inclines them to ignore other
legitimate concerns. They may take actions that complicate other
national security objectives or that complicate your ability to man-
age your departments and agencies to best effect. We will prevent
that from happening in two ways.
• 90 •
National Security Reform
• 91 •
Lamb
• 92 •
National Security Reform
to orchestrate the multiple lines of effort they require. In this respect the
President faces precisely the same dilemma that the chairman and chief
executive officer of Xerox was dealing with when the chairman observed:
• 93 •
Lamb
• 94 •
National Security Reform
an honest broker, ensuring that the mission manager, who is working the
issue full-time, and the Cabinet officials and their concerns are honestly
summarized for the President.
However, the new model of National Security Advisor also would have
system-wide duties and a system-wide perspective. The advisor would
have to ensure mission managers are set up for success and assess and
keep track of their progress. Finally, with the help of the NSC staff, they
would have to identify areas where mission managers are in conflict with
one another. All this would require a system-wide perspective. Instead
of concentrating on a handful of top Presidential priorities, the new Na-
tional Security Advisor would be responsible for ensuring the system as
a whole was working well and addressing the full range of critical issues.
This new model of National Security Advisor is much more practical.
Currently our expectations of National Security Advisors are altogether
unrealistic. We want them to be master administrators who advance the
multilayered interagency committee process in a timely, transparent, and
comprehensive fashion. But we also want them to be foreign policy and
national security maestros who combine a comprehensive appreciation
of the international system and security environment with a wide range
of subject matter expertise across an incredible array of multifarious,
complex problems that enables them to discreetly offer sagacious advice
when circumstances, or the President, demand it. Furthermore, we insist
that advisors have an exceptionally close and well-recognized personal
relationship with the President, essentially serving as the President’s alter
ego on national security.
National Security Advisors are criticized for not meeting these naive
expectations.34 National Security Advisor General James Jones, USMC
(Ret.), is a case in point. He was relentlessly attacked as inadequate de-
spite a successful career as a Service chief and the North Atlantic Treaty
Organization’s Supreme Allied Commander Europe. Leaks to the press
complained that he did not work himself into a state of utter exhaustion.
He was accused of being “too measured and low-key to keep pace with
the hard chargers working late hours in the West Wing”35 and of falling
behind “a White House on a manic dash to get a lot of top-tier issues
dealt with.”36 He was resented for biking at lunchtime, leaving after a
12-hour day instead of working late into the night,37 for missing key
meetings and, at the same time, not being by the President’s side all day
long.38
Jones was also criticized for managing collaboration rather than en-
suring his voice dominated debate on key issues. People complained
about Jones for “speaking up less in debates than [Secretary of State
Hillary] Clinton and not pushing as hard for decisions.”39 He was not
• 95 •
Lamb
• 96 •
National Security Reform
Conclusion
The 9/11 Commission’s report did a good job of identifying the major
limitations of the current national security system. It argued that “the
agencies are like a set of specialists in a hospital, each ordering tests,
looking for symptoms, and prescribing medications. What is missing
is the attending physician who makes sure they work as a team.”46 The
report explained this deficiency could not be rectified without adjusting
the authorities of Cabinet officials. However, the report did not recom-
mend circumscribing the authorities of Cabinet officials. Instead, the
commission, which only adopted recommendations with unanimous
support, advised in favor of creating the National Counterterrorism
Center, a new organization that would conduct planning but not make
policy or direct operations. As the Project on National Security Reform
noted, this recommendation was clearly inadequate to solve the problem
the commission identified:
• 97 •
Lamb
The author was the study director for the Project on National Security
Reform and its major report, Forging a New Shield (November 2008). He
would like to thank Jim Kurtz of the Institute for Defense Analyses for
multiple reviews of this chapter.
Notes
1
Douglas Stuart, “Constructing the Iron Cage: The 1947 National Security Act,” in
Affairs of the State: The Interagency and National Security, ed. Gabriel Marcella (Carlisle
Barracks, PA: Strategic Studies Institute, 2008), 53. See also Forging a New Shield (Wash-
ington, DC: Project on National Security Reform, November 2008).
2
Ike Skelton, comments to the press, September 30, 2010, available at <http://armed-
services.house.gov/pdfs/HR6249/SkeltonStatement.pdf>.
3
Christopher J. Lamb and Joseph C. Bond, National Security Reform and the 2016
Election, INSS Strategic Forum 293 (Washington, DC: NDU Press, April 2016).
4
A survey of over 250 books, articles, and studies on interagency cooperation in the
U.S. Government found only one report that concluded that interagency cooperation is
successful. See Christopher J. Lamb et al., “National Security Reform and the Security
Environment,” in Global Strategic Assessment 2009: America’s Security Role in a Changing
World, ed. Patrick M. Cronin (Washington, DC: NDU Press, 2009), 412–413. See also
Lamb and Bond.
5
Lamb and Bond.
6
Christopher J. Lamb and Edward Marks, Chief of Mission Authority as a Model for
National Security Integration, INSS Strategic Perspectives 2 (Washington, DC: NDU Press,
December 2010).
7
Richard Holbrooke, “The Machine That Fails,” Foreign Affairs, January 1, 1971,
available at <http://foreignpolicy.com/2010/12/14/the-machine-that-fails/>.
8
Harold Seidman, Politics, Position, and Power: The Dynamics of Federal Organization,
5th ed. (New York: Oxford University Press, 1980), 219, 224.
9
Lamb and Bond, 2. The ineffectiveness of interagency committees was well ex-
plained in Henry Jackson, Organizing for National Security: Inquiry of the Subcommittee on
National Policy Machinery, Senator Henry M. Jackson, Chairman, for the Committee on Gov-
ernment Operations, United States Senate, 3 vols. (Washington, DC: Government Printing
Office, 1961).
10
Cited in Forging a New Shield, 260.
11
Ibid.
12
Lamb and Marks.
• 98 •
National Security Reform
13
The term mission manager has gained some currency, and so it is used here. But as
some reviewers have noted, mission director would be a more appropriate title given the
authorities recommended for the position.
14
Title 10 U.S. Code, Section 162(b), available at <www.law.cornell.edu/uscode/
text/10/162>.
15
Douglas J. Feith, War and Decision: Inside the Pentagon at the Dawn of the War on
Terrorism (New York: Harper, 2008), 316.
16
Title 10 U.S. Code, Section 162(b).
17
Lamb and Marks, 20.
18
Ibid., 18.
19
Ibid., 20ff. For an extended argument on this topic see Gordon Lederman, “Na-
tional Security Reform for the Twenty-first Century: A New National Security Act and
Reflections on Legislation’s Role in Organizational Change,” Journal of National Security
Law and Policy 3, no. 2 (February 2010).
20
Project for National Security Reform argued such legislation would need to be
accompanied by new Select Committees on National Security in the Senate and House of
Representatives with jurisdiction over all interagency operations and activities.
21
James R. Locher III, statement before the Senate Armed Services Committee, “30
Years of Goldwater-Nichols Reform,” November 10, 2015. Frank Ostroff makes the same
point in The Horizontal Organization: What the Organization of the Future Looks Like and
How It Delivers Value to Customers (New York: Oxford University Press, 1999), 12.
22
Ostroff, 12–13. Ostroff argues that employing cross-functional teams “without any
sense of how to ensure that the teams are working in an integrated way that advances the
performance of the entire entity, is nothing short of irresponsible.”
23
Ibid., 178.
24
Author conversations with a staff officer from U.S. Northern Command about his
strategy research project at the Army War College.
25
Conversation with a senior official in a Washington, DC–based think tank that
conducted an after-action report on the failed reforms for the U.S. Marine Corps.
26
As Ostroff states, “Performance trumps ideology,” and he provides much evidence
from both the private and public sectors. Ostroff, 159.
27
This is consistent with the organizational principle of “requisite variety.” “If a
business unit or team is to be successful in dealing with the challenges of a complex task,
it is vital that it be allowed to possess sufficient internal complexity.” See Gareth Morgan,
Images of Organization (Thousand Oaks, CA: Sage, 1997), 113.
28
There are several in-depth case studies of high-performing interagency national
security teams. See Christopher J. Lamb and Evan Munsing, Secret Weapon: High-Value
Target Teams as an Organizational Innovation, INSS Strategic Perspectives 4 (Washington,
DC: NDU Press, March 2011); Evan Munsing and Christopher J. Lamb, Joint Interagency
Task Force–South: The Best Known, Least Understood Interagency Success, INSS Strategic Per-
spectives 5 (Washington, DC: NDU Press, June 2011); Fletcher Schoen and Christopher
J. Lamb, Deception, Disinformation, and Strategic Communications: How One Interagency
Group Made a Major Difference, INSS Strategic Perspectives 11 (Washington, DC: NDU
Press, May 2012); and Christopher J. Lamb with Sarah Arkin and Sally Scudder, The
Bosnian Train and Equip Program: A Lesson in Interagency Integration of Hard and Soft Power,
INSS Strategic Perspectives 15 (Washington, DC: NDU Press, March 2014).
29
Numerous examples of this point are offered in Forging a New Shield and its 107
supporting case studies. Forging a New Shield, 160.
• 99 •
Lamb
30
The Goldwater-Nichols Department of Defense Reorganization Act of 1986 has
such a right of appeal in Section 151, d, 1.
31
Frank G. Hoffman and G. Alexander Crowther, “Strategic Assessment and Adapta-
tion: The Surges in Iraq and Afghanistan,” in Lessons Encountered: Learning from the Long
War, ed. Richard D. Hooker, Jr., and Joseph J. Collins (Washington, DC: NDU Press,
2015).
32
Quoted in Ostroff, 131, 188.
33
For simplicity’s sake we will refer to the Assistant to the President for National
Security Affairs as the National Security Advisor.
34
See the discussion of complaints leveled against Condoleezza Rice in Christopher J.
Lamb with Megan Franco, “National-Level Coordination and Implementation,” in Lessons
Encountered: Learning from the Long War, 188, 198ff, 212ff.
35
Karen DeYoung, “National Security Adviser Jones Says He’s an ‘Outsider’ in Frenetic
White House,” Washington Post, May 7, 2009.
36
Steve Clemons, “Can James Jones Survive a Second Round of Attacks and ‘Longer
Knives’?” The Washington Note, June 12, 2009.
37
Helene Cooper, “Obama to Speak from Egypt in Address to Muslim World,” New
York Times, May 8, 2009.
38
Ben Smith and Jonathan Martin, “Reporters Jonesin’ for NSC Profiles,” Politico, May
8, 2009.
39
Mark Landler, “Her Rival Now Her Boss, Clinton Settles into New Role,” New York
Times, May 1, 2009.
40
Joe Klein, “Sizing Up Obama’s First 100 Days,” Time, April 23, 2009.
41
David Ignatius, “General James Jones’s Outlook as Barack Obama’s National Securi-
ty Adviser,” Washington Post, April 30, 2009.
42
Klein.
43
Ibid.
44
Cooper.
45
Clemons.
46
9/11 Commission Report. Interestingly, McChrystal uses the same analogy in his
recent book on teams. Stanley A. McChrystal, Tantum Collins, and David Silverman,
Team of Teams: New Rules of Engagement for a Complex World (New York: Portfolio, 2015),
101–103.
47
Forging a New Shield.
• 100 •
6
Weapons of Mass Destruction
John P. Caves, Jr.
The next U.S. administration faces four pressing WMD challenges. First,
the prospects of a direct clash between the United States and a nuclear-
armed adversary that could escalate to the nuclear level are likely to grow.
Second, the scope of North Korea’s nuclear, chemical, and suspected biological
weapons programs likely will require resources for countering weapons of
mass destruction that exceed those currently available. Third, longstanding
international efforts to prohibit chemical and biological weapons are threatened
by the reemergence of chemical weapons use and potentially by rapid advances
in the life sciences. Finally, concern that the 2015 Joint Comprehensive Plan of
Action may only postpone—rather than prevent—Iran’s acquisition of nuclear
weapons will perpetuate tensions and proliferation pressures in the region.
• 101 •
Caves
Challenges
The next U.S. administration will face numerous challenges in address-
ing the threats arising from WMD, both large and small, but the four
challenges discussed below are expected to be most pressing.
• 102 •
Weapons of Mass Destruction
• 103 •
Caves
• 104 •
Weapons of Mass Destruction
• 105 •
Caves
ventional forces has deteriorated along with its economy,31 but Pyong-
yang has managed to build a small and growing nuclear arsenal and a
ballistic missile force of increasing range with which to deliver those
weapons.32 The greater risk of conflict now is seen as arising from an es-
calatory spiral initiated by a North Korean provocation or the possibility
of serious unrest in the North that necessitates outside intervention to
address a humanitarian crisis, secure WMD, and/or respond to a related
attack against an external actor.33 Given North Korea’s huge investment
in its nuclear weapons program and the frequency and virulence of its
nuclear threats, it is only prudent to anticipate that it may respond to
such developments with nuclear weapons use.
• 106 •
Weapons of Mass Destruction
• 107 •
Caves
• 108 •
Weapons of Mass Destruction
• 109 •
Caves
• 110 •
Weapons of Mass Destruction
• 111 •
Caves
Recommendations
The foregoing WMD challenges are serious but surmountable. To meet
them, the next U.S. administration should:
• 112 •
Weapons of Mass Destruction
• 113 •
Caves
• 114 •
Weapons of Mass Destruction
the demise of the Bashar al-Asad regime, members of the regime deemed
responsible for CW use should still be pursued and prosecuted. As con-
cerns ISIL, the United States must continue to pursue aggressively its
comprehensive defeat, including denying it the sanctuary and facilities of
the territory it now controls in Iraq and Syria, which likely contribute to
its ability to produce CW. In the meantime, priority should be accorded
to efforts to understand and disrupt ISIL’s WMD activities, deter use, and
prevent proliferation to affiliate groups.84
Determine why Syria and ISIL have resorted to proscribed chemical
weapons. Do they see these weapons as having unique military advan-
tages, such as the ability to reach opponents within structures that pro-
tect them from bullets and high explosives? Is it because chemical weap-
ons terrorize target populations into fleeing territory that they are trying
to seize? Is it because widely available TICs are cost-effective alternatives
to conventional weapons, such as improvised barrel bombs are to mil-
itary-grade bombs? Understanding their motivations can inform future
efforts to dissuade and deter CW proliferation and use.
• 115 •
Caves
• 116 •
Weapons of Mass Destruction
the United Kingdom, and Singapore. China also could bring resources
to bear on this problem. China inescapably will play a major role in any
conflict or crisis in North Korea, possibly with forces on the ground. Chi-
na has its own interest in ensuring that a crisis does not lead to the use
or loss of North Korean WMD, lest it also become a victim of or at least
be seen as culpable in such an eventuality. Still, the obstacles to eliciting
China’s cooperation in matters concerning the possible collapse or defeat
of its North Korean ally are obvious.91 But the need remains, and the
situation is changing as North Korea’s behavior creates more problems
for China and as China bids for influence in South Korea. Efforts should
continue to engage China in discussions about how it can contribute to
preventing the use or loss of North Korean WMD.92
Implement the reassignment of the DOD CWMD mission to U.S.
Special Operations Command (USSOCOM). In 2005, DOD established
CWMD as a distinct military mission and assigned U.S. Strategic Com-
mand responsibility for synchronizing CWMD efforts across the depart-
ment.93 USSTRATCOM made strides toward increasing military focus on
CWMD, including instituting semiannual CWMD Global Synchroniza-
tion Conferences and preparing CWMD Concept Plan 8099. Yet with
an unusually diverse set of missions—also including strategic deter-
rence; intelligence, surveillance and reconnaissance; space; and cyber—
USSTRATCOM could not devote as much effort to the CWMD mission
as it required. The reassignment of CWMD to another command able to
give the mission greater attention should enable stronger leadership, im-
proved planning, and more effective advocacy. USSOCOM is best suited
of the combatant commands to assume the mission given its global scope,
special authorities, existing CWMD roles, and interest in the mission.94
• 117 •
Caves
• 118 •
Weapons of Mass Destruction
Conclusion
Weapons of mass destruction pose diverse, complex, and enduring chal-
lenges for U.S. and international security. The challenges no longer are
predominately about preventing proliferation; they are again increasingly
about deterring and responding to the use of WMD. To surmount the
most pressing WMD challenges it will face, the next U.S. administration
will need to invest in the skills and capabilities required to deter and
manage escalation risks in conventional conflicts with nuclear-armed ad-
versaries, especially Russia and China. It will need to expand the resourc-
es and improve the organization required to meet the countering WMD
problem posed by North Korea. To hold the line against a resurgence in
the proliferation and use of chemical and biological weapons, it will need
to hold accountable those who violate international norms and laws in
these areas and to invest in acquiring a greater understanding of new and
emerging threats and opportunities and how to defeat and exploit them,
respectively. Finally, to contain regional proliferation pressures in the af-
termath of the Iran nuclear agreement, the next U.S. administration will
need to reassure regional partners that together we can keep an aggressive
Iran in check while incentivizing Tehran to adopt a more responsible and
moderate position in the region and around the world.
The author is indebted to the following individuals for their reviews and
insightful comments on earlier drafts of this chapter: Paul Amato, Paul
Bernstein, Seth Carus, Diane DiEuliis, James Finch, Nima Gerami, Hunter
Hustus, Ralph Kerr, Susan Koch, Charles Lutes, Vincent Manzo, Amanda
Moodie, Robert Peters, Shane Smith, Patrick Terrell, and Ling Yung
• 119 •
Caves
Notes
1
National Security Strategy (Washington, DC: The White House, February 2015), 2,
available at <www.whitehouse.gov/sites/default/files/docs/2015_national_security_strat-
egy.pdf>. Additionally, the National Military Strategic identifies maintaining a secure and
effective nuclear deterrent and countering weapons of mass destruction (WMD) among
the Joint Force Prioritized Missions. See National Military Strategy of the United States of
America 2015 (Washington, DC: The Joint Staff, 2015), 11, available at <www.jcs.mil/
Portals/36/Documents/Publications/2015_National_Military_Strategy.pdf>.
2
The 2010 Nuclear Posture Review states, “changes in the nuclear threat environment
have altered the hierarchy of our nuclear concerns and strategic objectives. In coming
years, we must give top priority to discouraging additional countries from acquiring
nuclear weapons capabilities and stopping terrorist groups from acquiring nuclear bombs
or the materials to build them. At the same time, we must continue to maintain stable
strategic relationships with Russia and China and counter threats posed by any emerging
nuclear-armed states, thereby protecting the United States and our allies and partners
against nuclear threats or intimidation, and reducing any incentives they might have to
seek their own nuclear deterrents.” See Nuclear Posture Review Report (Washington, DC:
Department of Defense, April 2010), v, available at <www.defense.gov/Portals/1/features/
defenseReviews/NPR/2010_Nuclear_Posture_Review_Report.pdf>. This chapter, in
contrast, argues that subsequent developments have altered the Nuclear Posture Review’s
assessment and have elevated the importance of deterring limited nuclear weapons by
state adversaries.
3
For example, see Keir A. Lieber and Daryl G. Press, “The Nukes We Need: Pre-
serving the American Deterrent,” Foreign Affairs, November 1, 2009, available at <www.
foreignaffairs.com/articles/2009-11-01/nukes-we-need>.
4
For example, see Christopher Harress, “South China Sea Dispute: Japan Spots
Armed Chinese Ships Patrolling Senkaku Islands,” International Business Times, December
22, 2015, available at <www.ibtimes.com/south-china-sea-dispute-japan-spots-armed-
chinese-ships-patrolling-senkaku-islands-2236290>.
5
For example, see Gerry Mullaney and David Barboza, “Vietnam Squares Off with
China in Disputed Seas,” New York Times, May 7, 2014, available at <www.nytimes.
com/2014/05/08/world/asia/philippines-detains-crew-of-chinese-fishing-vessel.html?_
r=0>.
6
For example, see Derek Watkins, “What China Has Been Building in the South
China Sea,” New York Times, October 27, 2015, available at <www.nytimes.com/interac-
tive/2015/07/30/world/asia/what-china-has-been-building-in-the-south-china-sea.html>.
7
For example, Jethro Mullen, “North Korea Warns U.S. It’s Ready to Use Nu-
clear Weapons ‘Any Time,’” CNN.com, September 15, 2015, available at <www.cnn.
com/2015/09/15/asia/north-korea-nuclear-program/>. North Korean military provoca-
tions are examined in Ken E. Gause, North Korea’s Provocation and Escalation Calculus:
Dealing with the Kim Jong-un Regime (Arlington, VA: Center for Naval Analyses, August
2015), 4–14, available at <www.cna.org/CNA_files/PDF/COP-2015-U-011060.pdf>.
8
For concise discussions of Russia’s and China’s challenge to U.S. dominance, see
“Why America’s Military Is Losing Its Edge,” The Economist, June 11, 2015, available
at <www.economist.com/blogs/economist-explains/2015/06/economist-explains-9>;
“The Great Game: America’s Dominance Is Being Challenged,” The Economist, October
17, 2015, available at <www.economist.com/news/leaders/21674699-american-domi-
nance-being-challenged-new-game>.
9
Antiaccess/area-denial capabilities include such systems as advanced integrated air
defense systems, medium-to-intermediate range ballistic and cruise missiles, modern
attack submarines, antisatellite systems, and cyber warfare capabilities. While there is no
official Department of Defense (DOD) definition of the term, at least as reflected in Joint
• 120 •
Weapons of Mass Destruction
Publication 1-02, Department of Defense Dictionary of Military and Associated Terms, see, for
example, Nathan Freier, “The Emerging Anti-Access/Area-Denial Challenge,” Center for
Strategic and International Studies, Washington, DC, May 17, 2012, available at <https://
csis.org/publication/emerging-anti-accessarea-denial-challenge>.
10
Regarding China’s improving military capabilities vis-à-vis the United States, see
Eric Heginbotham et al., U.S.-China Military Scorecard: Forces, Geography, and the Evolving
Balance of Power, 1996–2017 (Santa Monica, CA: RAND, 2015), available at <www.rand.
org/content/dam/rand/pubs/research_reports/RR300/RR392/RAND_RR392.pdf>. On Rus-
sia’s military improvements, see Stephen J. Blank, “Imperial Ambitions: Russia’s Military
Buildup,” World Affairs, May/June 2015, available at <www.worldaffairsjournal.org/article/
imperial-ambitions-russia%E2%80%99s-military-buildup>.
11
See, for example, Elbridge Colby, “America Must Prepare for Limited War,” The Na-
tional Interest, November–December 2015, available at <http://nationalinterest.org/print/
feature/america-must-prepare-limited-war-14104>.
12
Indeed, strikes against the Chinese mainland are associated with what used to
be known as the U.S. AirSea Battle concept of operations for conflict with China, as
described in Jan Van Tol, AirSea Battle: A Point-of-Departure Operational Concept (Wash-
ington, DC: Center for Strategic and Budgetary Assessments, 2010), available at <http://
csbaonline.org/publications/2010/05/airsea-battle-concept/>. It also is one of the aspects
of the concept critiqued in T.X. Hammes, “Sorry, Air Sea Battle is No Strategy,” War on
the Rocks, August 7, 2013, available at <http://nationalinterest.org/commentary/sorry-air-
sea-battle-no-strategy-8846>. In January 2015 the AirSea Battle concept was renamed
the Joint Concept for Access and Maneuver in the Global Commons. See memorandum
from Lieutenant General David L. Goldstein, director, Joint Staff, “Subject: Joint Concept
for Access and Maneuver in the Global Commons,” DSJM 0009-14, January 8, 2015,
available in redacted form at <http://news.usni.org/2015/01/20/document-air-sea-battle-
name-change-memo>.
13
Phillip C. Saunders, “China’s Nuclear Forces and Strategy,” testimony before the
U.S.-China Economic and Security Review Commission Hearing on “Developments in
China’s Cyber and Nuclear Capabilities,” March 26, 2012, 4–5, available at <www.uscc.
gov/sites/default/files/3.26.12saunders.pdf>.
14
Nikolai N. Sokov, “Why Russia Calls a Limited Nuclear Strike ‘De-escalation,’” Bul-
letin of the Atomic Scientists, March 13, 2014, available at <http://thebulletin.org/why-rus-
sia-calls-limited-nuclear-strike-de-escalation>.
15
“The Russian Federation reserves the right to use nuclear weapons in response to
use against it and (or) its allies of nuclear and other weapons of mass destruction, as well
as in the case of aggression against the Russian Federation with the use of conventional
weapons, when under threat [to] the very existence of the state.” See Military Doctrine
of the Russian Federation, 2014, Section II, paragraph 27, available at <www.scribd.com/
doc/251695098/Russia-s-2014-Military-Doctrine#scribd>. Russia’s reliance on nuclear
weapons to offset the conventional military superiority that the United States and its
North Atlantic Treaty Organization (NATO) Allies now enjoy is not unlike the United
States and NATO’s reliance on nuclear weapons during the Cold War to counter the
assessed conventional military superiority of the Soviet Union and its Warsaw Pact allies.
Until circumscribed in 2010, it was also U.S. policy to reserve the right to use nuclear
weapons against those who might employ chemical and biological as well as nuclear
weapons against the United States and its allies. Current U.S. policy is to “only consid-
er the use of nuclear weapons in extreme circumstances to defend the vital interests of
the United States or its allies and partners” and to “not use or threaten to use nuclear
weapons against non-nuclear weapons states that are party to the NPT and in compli-
ance with their nuclear nonproliferation obligations.” See Nuclear Posture Review Report,
vii–ix. Despite the broad areas of overlap between current Russian policy and the earlier
U.S. one, there are important differences. Russia in recent years has explicitly threat-
• 121 •
Caves
ened other nations with nuclear weapons in evident attempts to intimidate and coerce
them (see following note), whereas the United States and its NATO Allies have issued
no comparable threats and indeed have been generally reluctant to discuss the use of
nuclear weapons at all. Russia also identifies NATO as its main external danger (Military
Doctrine of the Russian Federation), and has been unwilling to negotiate mutual reduc-
tions in nonstrategic nuclear weapons; see Amy E. Woolf, Nonstrategic Nuclear Weap-
ons, RL32572 (Washington, DC: Congressional Research Service, February 23, 2015),
34–37, available at <www.fas.org/sgp/crs/nuke/RL32572.pdf>. In contrast, NATO policy
emphasizes that it considers no country to be its adversary, that it views the circumstanc-
es that would merit nuclear weapons use as extremely remote, and that it contemplates
reducing the number of the Alliance’s nonstrategic nuclear weapons. See Deterrence and
Defence Posture Review (Brussels: NATO, May 20, 2012), available at <www.nato.int/cps/
en/natolive/official_texts_87597.htm>. Russia’s caveat that it would use nuclear weapons
against conventional aggression only when such aggression threatens the very existence
of the Russian state also may be less reassuring than it sounds given that some observers
believe that the Putin regime equates its regime survival with the survival of the state. As
such, any conventional aggression that imperils the Putin regime, which may include its
impending defeat in a regional war of its own making if such defeat undermined popular
Russian support for the regime, could justify the regime’s resort to nuclear weapons. See
Kroenig, The Renewed Russian Nuclear Threat and NATO Nuclear Deterrence Posture, Issue
Brief (Washington, DC: Atlantic Council, February 2016), 2; Paul Bernstein and Deborah
Ball, “Putin’s Russia and U.S. Defense Strategy,” workshop report on same subject held at
National Defense University, August 19–20, 2015, 5, available at <http://inss.ndu.edu/
Portals/82/Documents/conference-reports/Putins-Russia-and-US-Defense-Strategy.pdf>.
16
For example, see “NATO Chief Says Russian Nuclear Threats Are ‘Deeply Troubling
and Dangerous,’” The Guardian, May 27, 2015, available at <www.theguardian.com/
world/2015/may/28/nato-chief-says-russian-nuclear-threats-are-deeply-troubling-and-
dangerous>; Adam Withnall, “Russia Threatens Denmark with Nuclear Weapons If It
Tries to Join NATO Defence Shield,” Independent (London), March 22, 2015, available at
<www.independent.co.uk/news/world/europe/russia-threatens-denmark-with-nuclear-
weapons-if-it-tries-to-join-nato-defence-shield-10125529.html>.
17
Russia possesses approximately 2,000 nonstrategic nuclear weapons, spanning
antiballistic missile, short-range ballistic missile, ground-launched cruise missile,
and a variety of naval systems. All Russian nonstrategic nuclear weapons reported-
ly are in storage. See Hans S. Kristensen and Robert S. Morris, “U.S. Nuclear Forces,
2015,” 115, available at <http://bos.sagepub.com/content/71/2/107.full.pdf+html>;
“Russia Nuclear Forces, 2015,” 1–2, available at <http://bos.sagepub.com/content/
early/2015/04/13/0096340215581363.full.pdf+html>. While the Bulletin of the Atomic
Scientists reflects all of Russia’s nonstrategic nuclear weapons in storage, the Congressional
Research Service notes that the status of nonstrategic nuclear weapons in Russia is un-
certain. It notes that some estimates put the number of active Russian nuclear warheads
assigned to nonstrategic delivery vehicles at 2,000. See Woolf, Nonstrategic Nuclear
Weapons, 12.
18
“Iskander Tactical Ballistic Missile System, Russia,” Army-Technology.com, available
at <www.army-technology.com/projects/iksander-system/iksander-system2.html>.
19
For a discussion of the problems that Russia’s modern integrated air defense sys-
tems pose for fourth-generation aircraft, see David Majumdar, “American F-22s and B-2s
Bombers vs. Russia’s S-300 in Syria: Who Wins?” The National Interest, September 22,
2015, available at <http://nationalinterest.org/blog/the-buzz/american-f-22s-b-2-bombers-
vs-russias-s-300-syria-who-wins-13905>.
20
Current NATO dual-capable aircraft are scheduled for retirement in the 2020s;
see Rachel Oswald, “U.S. Tactical Nuclear Arms Mission Could Shift Among NATO
Jets,” Nuclear Threat Initiative, March 26, 2014, available at <www.nti.org/gsn/article/
aircraft-could-be-given-nato-tactical-nuclear-arms-mission/>. The U.S. National Nuclear
• 122 •
Weapons of Mass Destruction
Security Administration (NNSA) aims to have the first production unit of the refurbished
B61 gravity bomb ready by the end of fiscal year 2020. See NNSA, “Life Extension
Programs,” December 23, 2015, available at <http://nnsa.energy.gov/ourmission/manag-
ingthestockpile/lifeextensionprograms>.
21
Treaty between the United States of America and the Union of Soviet Socialist
Republics on the Elimination of Their Intermediate-Range and Shorter-Range Missiles,
signed at Washington, DC, December 8, 1987, Articles I, II, available at <www.state.gov/t/
avc/trty/102360.htm#text>.
22
“Iskander Tactical Ballistic Missile System, Russia.”
23
Rod Lyon, “The Great Nuclear Guessing Game: Has Russia Violated the INF Trea-
ty?” The National Interest, September 25, 2015, available at <www.nationalinterest.org/
blog/the-buzz/the-great-nuclear-guessing-game-has-russia-violated-the-inf-13936>.
24
Interfax, interview with Rose Gottemoeller, U.S. Under Secretary of State for Arms
Control and International Security, June 23, 2015, available at <www.interfax.com/inter-
view.asp?id=600960>.
25
Amy F. Woolf, Russian Compliance with the Intermediate Range Nuclear Forces (INF)
Treaty: Background and Issues for Congress, R43832 (Washington, DC: Congressional Re-
search Service, October 13, 2015), 5–8, 16–18, available at <www.fas.org/sgp/crs/nuke/
R43832.pdf>.
26
Annual Report to Congress on Military and Security Developments Involving the People’s
Republic of China 2015 (Washington, DC: Office of the Secretary of Defense, 2015),
34–35, available at <www.defense.gov/Portals/1/Documents/pubs/2015_China_Mili-
tary_Power_Report.pdf>.
27
Annual Report to Congress on Military and Security Developments Involving the People’s
Republic of China 2016 (Washington, DC: Office of the Secretary of Defense, 2016), 25,
available at <www.defense.gov/Portals/1/Documents/pubs/2016%20China%20Mili-
tary%20Power%20Report.pdf>.
28
Annual Report to Congress on Military and Security Developments Involving the People’s
Republic of China 2015, 32.
29
Saunders, 1.
30
For example, see Daniel Blumenthal and Michael Mazza, “Why China May Want
More Nuclear Weapons,” American Enterprise Institute, Washington, DC, April 6, 2011,
available at <www.aei.org/publication/why-china-may-want-more-nuclear-weapons/>.
31
See, for example, Institute for International Security Studies (IISS), North Korean
Security Challenges: A Net Assessment (London: IISS, July 21, 2011), chapters 3, 5, 6,
available at <www.iiss.org/en/publications/strategic%20dossiers/issues/north-korean-secu-
rity-challenges-4a8d>; Military and Security Developments Involving the Democratic Republic
of Korea (Washington, DC: Office of the Secretary of Defense, 2015), 9, 10, 13, 14, 21,
available at <www.defense.gov/Portals/1/Documents/pubs/Military_and_Security_De-
velopments_Involving_the_Democratic_Peoples_Republic_of_Korea_2015.PDF>; Van
Jackson, “Preparing for the Next Korean War,” The Diplomat, August 24, 2015, available
at <http://thediplomat.com/2015/08/preparing-for-the-next-korean-war/>.
32
Shane Smith, North Korea’s Evolving Nuclear Strategy, North Korea Nuclear Futures
Series (Baltimore, MD: U.S.-Korea Institute at SAIS, August 2015), 7, available at
<http://38north.org/2015/08/nukefuture082415/>.
33
For a discussion of the risks of a limited conflict with North Korea, see Jackson. For
a discussion of the risks of a collapse of the North Korean regime, see Robert D. Kaplan
and Abraham M. Denmark, “The Long Good-Bye: The Future of North Korea,” World
Affairs, May/June 2011, available at <www.worldaffairsjournal.org/article/long-goodbye-
future-north-korea>.
• 123 •
Caves
34
The 2014 Strategy for Countering WMD defines countering WMD as “efforts against
actors of concern to curtail the conceptualization, development, possession, prolifer-
ation, use and effects of WMD, related expertise, materials, technologies, and means
of delivery.” See Strategy for Countering Weapons of Mass Destruction (Washington, DC:
Department of Defense, June 2014), 17, available at <http://archive.defense.gov/pubs/
DoD_Strategy_for_Countering_Weapons_of_Mass_Destruction_dated_June_2014.
pdf>. This is a separate DOD mission from the nuclear one, wherein a safe, secure, and
effective nuclear deterrent force is maintained to deter strategic attacks against the United
States and to assure its allies; see U.S. Strategic Command Web site, “About/Missions &
Priorities,” available at <www.stratcom.mil/mission/>. Another way to state the difference
between the missions is that countering WMD is what we do about other’s WMD, while
the nuclear mission is what we do with our own nuclear forces. Clearly there is some
overlap in that U.S. nuclear forces primarily deter others’ use of their nuclear weapons
against the United States and its allies. U.S. Strategic Command currently has responsibil-
ity for both of these DOD missions.
35
Smith. The estimate of the number of nuclear weapons that North Korea possesses
varies with assumptions about how much fissile material it has produced and the designs
of its weapons.
36
James R. Clapper, “Worldwide Threat Assessment of the U.S. Intelligence Commu-
nity,” Statement for the Record before the Senate Armed Services Community, February
26, 2015, 6, available at <www.dni.gov/index.php/newsroom/testimonies/209-congres-
sional-testimonies-2015/1174-statement-for-the-record-worldwide-threat-assessment-of-
the-u-s-ic-before-the-sasc>.
37
2014 Defense White Paper (Seoul: Ministry of National Defense, 2014), 32, available at
<www.mnd.go.kr/user/mnd_eng/upload/pblictn/PBLICTNEBOOK_201506161156164570.
pdf>. The U.S. Department of State also judges that Pyongyang may still consider the
use of biological weapons as an option, even though it is a state party to the Biological
Weapons Convention (BWC). The State Department further notes that North Korea has a
longstanding biological weapons (BW) capability and biotechnology infrastructure that
could support a BW program, although the United States does not possess definitive
information to support a finding of North Korean noncompliance with the BWC. See
2015 Report on Adherence to and Compliance with Arms Control, Nonproliferation, and
Disarmament Agreements and Commitments (Washington, DC: Department of State, June
5, 2015, Part III, “North Korea,” available at <www.state.gov/t/avc/rls/rpt/2015/243224.
htm#North%20Korea>.
38
Bruce Bennett has estimated the existence of 200 or so WMD sites in North Korea.
See Bruce W. Bennett, Preparing for the Possibility of a North Korean Collapse (Santa Monica,
CA: RAND, 2013), 99, available at <www.rand.org/content/dam/rand/pubs/research_re-
ports/RR300/RR331/RAND_RR331.pdf>.
39
For an expanded discussion of the challenges of WMD elimination operations in
North Korea and ways of responding to them, see Robert J. Peters, The WMD Challenges
Posed by a Collapse of North Korea (Baltimore, MD: U.S.-Korea Institute at SAIS, April 14,
2015), available at <http://38north.org/2015/04/rpeters041415/>; Scott Daulton and
Bill Shavce, “The Challenge of Countering Weapons of Mass Destruction on the Korean
Peninsula,” Military Review, November–December 2014, available at <http://usacac.army.
mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_20141231_art011.pdf>.
40
It is worth noting that U.S. forces’ capability to fight through large-scale chemical
and biological attacks is a matter of conjecture, based on simulations and noncombat
testing, since U.S. forces have not encountered any such attacks since World War I.
41
For example, see Sydney J. Freedberg, Jr., “No Longer Unthinkable: Should U.S.
Ready for ‘Limited’ Nuclear War?” BreakingDefense.com, May 30, 2013, available at
<http://breakingdefense.com/2013/05/no-longer-unthinkable-should-us-ready-for-limit-
ed-nuclear-war/2/>.
• 124 •
Weapons of Mass Destruction
42
The BWC entered into force on March 26, 1975, and the Chemical Weapons Con-
vention (CWC) entered into force on April 29, 1997. Only three states currently remain
outside the CWC: Egypt, North Korea, and South Sudan. Israel signed the convention in
1993 but has never ratified it. Angola, Myanmar, and Syria joined within the last 3 years.
Fourteen states remain outside the BWC: Angola, Chad, Comoros, Djibouti, Eritrea,
Guinea, Israel, Kiribati, Micronesia, Namibia, Niue, Samoa, South Sudan, and Tuvalu.
Myanmar and Andorra are the most recent state parties, joining in December 2014 and
March 2015, respectively. See Arms Control Association, Fact Sheets and Briefs, “Chemi-
cal Weapons Convention Signatories and States-Parties,” available at <www.armscontrol.
org/factsheets/cwcsig>; “Biological Weapons Convention Signatories and States-Parties,”
available at <www.armscontrol.org/factsheets/bwcsig>; United Nations Office for Dis-
armament Affairs, “The Biological Weapons Convention, Status and Text of the Treaty,”
available at <http://disarmament.un.org/treaties/t/bwc>; Organisation for the Prohibition
of Chemical Weapons, “Note by the Technical Secretariat, Status of Participation in the
Chemical Weapons Convention as at 17 October 2015,” available at <www.opcw.org/
fileadmin/OPCW/S_series/2015/en/s-1315-2015_e_.pdf>.
43
Syria, however, had acceded in December 1968 to the Protocol for the Prohibition of
the Use in War of Asphyxiating, Poisonous, or Other Gases, and of Bacteriological Methods of
Warfare (also known as the 1925 Geneva Protocol). United Nations Office for Disarma-
ment Affairs, Treaties Database, available at <http://disarmament.un.org/treaties/t/1925>.
As such, Syria’s use of sarin in 2012–2013 violated its obligations under the 1925 Geneva
Protocol.
44
The White House, “Government Assessment of the Syrian Government’s Use of
Chemical Weapons on August 21, 2013,” press release, August 30, 2013, available at
<www.whitehouse.gov/the-press-office/2013/08/30/government-assessment-syrian-gov-
ernment-s-use-chemical-weapons-august-21>.
45
Ibid. Estimates of the number of fatalities range from the low hundreds to more
than 1,400. On August 30, 2013, the White House claimed 1,429 deaths resulted from
Syria’s use of sarin. On August 29, 2013, the Chairman of the British government Joint
Intelligence Committee report referred to “at least 350 fatalities.” See United Kingdom
Chairman of the Joint Intelligence Committee, “Syria: Reported Chemical Weapons Use,”
August 29, 2013, available at <www.gov.uk/government/uploads/system/uploads/attach-
ment_data/file/235094/Jp_115_JD_PM_Syria_Reported_Chemical_Weapon_Use_with_
annex.pdf>. The term hundreds of deaths is used in a Human Rights Watch report from
September 2013. See Human Rights Watch, “Attacks on Ghouta,” September 10, 2013,
available at <www.hrw.org/report/2013/09/10/attacks-ghouta/analysis-alleged-use-chemi-
cal-weapons-syria>.
46
See Organisation for the Prohibition of Chemical Weapons (OPCW), “Syrian Chem-
ical Destruction Data as of 27 July 2015,” available at <www.opcw.org/special-sections/
syria/destruction-statistics/>.
47
OPCW, “Report of the OPCW Fact-Finding Mission in Syria Regarding Alleged
Incidents in the Idlib Governorate of the Syria Arab Republic between 16 March and 20
May 2015,” S/1319/2015, October 29, 2015.
48
Theodore Schleifer, “Kerry: Syrian Regime ‘Absolutely’ Used Chlorine in Attacks,”
CNN.com, June 17, 2015, available at <www.cnn.com/2015/06/16/politics/john-ker-
ry-syrian-chemical-weapons-chlorine/>. Numerous eyewitness accounts indicate that the
weapons were delivered by helicopters, which the Syrian regime possesses but not by the
rebels it is fighting. See, for example, OPCW, “Report of the OPCW Fact-Finding Mission
in Syria,” annex 2.
49
Inaccurate media reports have given rise to the fallacy that Syria’s use of chlorine as
a weapon of war is not prohibited by the CWC. The likely basis of these reports is the fact
that chlorine is not listed on the CWC’s Schedules of Chemicals. However, the schedules
were drawn up during the negotiation of the CWC to inform the convention’s monitor-
• 125 •
Caves
ing and verification efforts and focused on the types of chemical warfare agents known
to be in military arsenals of the time. Though chlorine was the chemical released in the
first successful, large-scale chemical attack of the modern age—by Germany in the 1915
World War I Battle of Ypres—the world’s militaries had long moved on to more potent
agents optimized for warfare purposes such as phosgene, sulfur mustard, sarin, and VX.
Chlorine came to be viewed as a toxic industrial chemical widely used for commercial
purposes rather than a chemical warfare agent. But that does not exempt it from the
CWC’s prohibition on chemical weapons, which is defined as applying to any toxic chem-
ical used as a method of warfare. Syria’s use of chlorine as a weapon of war unequivocally
is a violation of its CWC obligations.
50
Per The Economist, “the last precise death toll published by the [United Nations] was
191,369 in August 2014, followed by an estimate of more than 250,000 in August 2015.
But it then stopped updating the figure because of dwindling sources of good informa-
tion. On February 11 the Syrian Centre for Policy Research, a nonprofit group, claimed
that the true figure is now almost double that estimate at about 470,000.” See “Quantify-
ing Carnage,” The Economist, February 20, 2016, available at <www.economist.com/news/
middle-east-and-africa/21693279-how-many-people-has-syrias-civil-war-killed-quantify-
ing-carnage>.
51
United Nations, “Security Council Unanimously Adopts Resolution 2235 (2015),
Establishing Mechanism to Identify Perpetrators Using Chemical Weapons in Syria,”
SC/12001, August 7, 2015, available at <www.un.org/press/en/2015/sc12001.doc.htm>.
Russia insisted at the time that, if the Joint Investigative Mechanism attributes the attacks
to the Syrian regime, another United Nations Security Council Resolution (UNSCR)
would be required to authorize any punitive action. If Russia and others block adoption
of such a UNSCR, the United States and its allies will need to determine whether the
situation merits taking action on their own.
52
United Nations, “Joint Investigative Mechanism Presents Its Third Report to
Security Council,” DC/3651, August 30, 2016, available at <www.un.org/press/en/2016/
dc3651.doc.htm>.
53
Stephen Hummel, “The Islamic State and WMD: Assessing the Future Threat,” CTC
Sentinel 9, no. 1 (January 2016), 18–22, available at <www.ctc.usma.edu/v2/wp-content/
uploads/2016/01/CTC-SENTINEL-Vol9Iss13.pdf>. Also see Beatrix Immenkamp, ISIL/
Da’esh and “Non-Conventional” Weapons of Terror (London: European Parliamentary
Research Service, 2015), available at <www.europarl.europa.eu/thinktank/en/document.
html?reference=EPRS_BRI(2015)572806>.
54
United Nations, “Joint Investigative Mechanism.”
55
The Fact-Finding Mission (FFM) “confirmed with utmost confidence” that two
individuals in Syria suffered exposure to sulfur mustard and concluded that it was “very
likely” that a baby also died from exposure to that chemical. See OPCW, “Report of the
OPCW Fact-Finding Mission in Syria Regarding Alleged Incidents in Marea, Syrian Arab
Republic, August 2015,” S/1320/2015, October 29, 2015. Consistent with its mandate,
the FFM did not attempt to ascribe responsibility for the attack, but media reports sug-
gested the Islamic State of Iraq and the Levant (ISIL).
56
For example, see Hummel, 18–22; Robert Windrem and Tracy Connor, “Could
ISIS Strike the West with Chemical Weapons?” NBC News, November 19, 2015, available
at <www.nbcnews.com/storyline/isis-terror/could-isis-strike-west-chemical-weap-
ons-n466431>.
57
ISIL claimed responsibility for the March 2016 terror attacks in Brussels, Belgium.
See Kim Hjelmgaard, Delphine Reuter, and John Bacon, “Islamic State Claims Responsi-
bility for Brussels Attack That Killed Dozens,” USA Today, March 23, 2016, available at
<http://www.usatoday.com/story/news/world/2016/03/22/explosions-rock-brussels-air-
port/82107254/>; for the November 2015 attacks in Paris, see Rukmini Callimachi, “ISIS
• 126 •
Weapons of Mass Destruction
Claims Responsibility, Calling Paris Attacks ‘First of the Storm,’” New York Times, Novem-
ber 14, 2015, available at <www.nytimes.com/2015/11/15/world/europe/isis-claims-re-
sponsibility-for-paris-attacks-calling-them-miracles.html>.
58
In November 2015, as French Prime Minister Manuel Valls observed, “Terrorism hit
France not because of what it is doing in Iraq and Syria . . . but for what it is. We know
that there could also be a risk of chemical or biological weapons.” See Hamza Hendawi,
Qassim Abdul-Zahra, and Ken Dilanian, “Officials: Islamic State Determined to Produce
Chemical Weapons,” Associated Press, November 19, 2015, available at <http://bigstory.
ap.org/article/b6c721d1beb34b989bf46aa101cf361a/iraqi-us-officials-working-pro-
duce-chemical-weapons>. In December 2015 the European Parliamentary Research Ser-
vice wrote, “the European Union and its Members States must prepare for the possibility
of a chemical or biological attack on their territory by the self-styled ‘Islamic State’ in Iraq
and the Levant.” See Immenkamp, 1.
59
Rolf Mowatt-Larssen, Al Qaeda Weapons of Mass Destruction Threat: Hype or Reality?
(Cambridge, MA: Belfer Center for Science and International Affairs, January 2010),
available at <http://belfercenter.ksg.harvard.edu/publication/19852/al_qaeda_weapons_
of_mass_destruction_threat.html>.
60
Harald Doornbus and Jenan Moussa, “Found: The Islamic State’s Terror Lap-
top of Doom,” Foreign Policy, August 28, 2014, available at <http://foreignpolicy.
com/2014/08/28/found-the-islamic-states-terror-laptop-of-doom/>.
61
Vladimir Putin, “Being Strong: National Security Guarantees for Russia,” Rossiiska-
ya Gazeta, February 20, 2012, available at <http://archive.premier.gov.ru/eng/events/
news/18185//>.
62
“Chemical and Biological Weapons: The Poor Man’s Atom Bomb,” North Atlantic
Assembly, International Secretariat, AN 253, STC (96) 8, Lord Lyell, General Rapporteur,
October 4, 1996, table 1, available at <http://fas.org/irp/threat/an253stc.htm>.
63
John P. Caves, Jr., and W. Seth Carus, The Future of Weapons of Mass Destruction,
Center for the Study of Weapons of Mass Destruction Occasional Paper 10 (Wash-
ington, DC: NDU Press, June 2014), 27, available at <http://wmdcenter.dodlive.mil/
files/2014/07/CSWMD_OccationalPaper-10.pdf>.
64
Ibid., 27–28.
65
See, for example, Andrew Hessel, March Goodman, and Steven Miller, “Hacking the
President’s DNA,” The Atlantic, November 2012, available at <www.theatlantic.com/mag-
azine/archive/2012/11/hacking-the-presidents-dna/309147/?single_page=true>; Gigi K.
Gronvall, Mitigating the Risks of Synthetic Biology, CFR Discussion Paper (New York: Coun-
cil on Foreign Relations, 2015), available at <www.cfr.org/health/mitigating-risks-synthet-
ic-biology/p36097>; Laurie Garrett, “Biology’s Brave New World,” Foreign Affairs 92, no. 6
(December 2013), 28–46.
66
For a discussion of the limitations of and possibilities for achieving a “rapid and
nimble” medical countermeasures capability for infectious disease, see Theresa Wiz-
emann, Megan Reeve Snair, and Jack Herrmann, Rapid Medical Countermeasure Response to
Infectious Diseases: Enabling Sustainable Capabilities Through Ongoing Public- and Private-Sec-
tor Partnerships: Workshop Summary (Washington, DC: National Academies Press, 2015),
available at <http://www.nap.edu/catalog/21809>.
67
Joint Comprehensive Plan of Action (JCPOA), Vienna, Austria, July 14, 2015, avail-
able at <www.state.gov/e/eb/tfs/spi/iran/jcpoa/>.
68
See, for example, Mark Dubowitz, congressional testimony, “Hearing before the
U.S. House Committee on Foreign Affairs,” Washington, DC, July 23, 2015; Institute for
Science and International Security (ISIS), The Joint Comprehensive Plan of Action “Kicks the
Can Down the Road”: How to Prepare for the Day When the Can Finally Lands (Washington,
• 127 •
Caves
DC: ISIS, July 22, 2015); Eliot Cohen, Eric Edelman, and Ray Takeyh, “Time to Get
Tough on Tehran: Iran Policy After the Deal,” Foreign Affairs, January/February 2016, 65.
69
For a discussion of the verification challenges of the JPCOA, see, for example, Da-
vid Albright, testimony for the Senate Foreign Relations Committee, “Joint Comprehen-
sive Plan of Action (JPCOA): Non-Proliferation, Inspections, and Nuclear Constraints,”
August 4, 2015, 9–14, available at <www.foreign.senate.gov/imo/media/doc/080415_Al-
bright_Testimony.pdf>; Ollie Heinonen, Strengthening the Verification and Implementation
of the Joint Comprehensive Plan of Action (Washington, DC: Foundation for Defense of
Democracies Press, November 25, 2015), available at <www.defenddemocracy.org/me-
dia-hit/strengthening-the-verification-and-implementation-of-the-joint-comprehensiv/>.
70
Kenneth M. Pollack, “Regional Implications of a Nuclear Agreement with Iran,”
testimony before the House Committee on Foreign Affairs, July 9, 2015, 7, available at
<www.brookings.edu/research/testimony/2015/07/09-pollack-iran-nuclear-agreement>.
71
World Nuclear Association, “Emerging Nuclear Energy Countries,” updated De-
cember 2015, available at <www.world-nuclear.org/info/Country-Profiles/Others/Emerg-
ing-Nuclear-Energy-Countries/>.
72
Saudi Arabia conceivably could attempt to purchase nuclear weapons or seek
some form of extended nuclear deterrence commitment from Pakistan. Pakistan has a
longstanding defense cooperation relationship with Saudi Arabia, and Pakistan’s nuclear
weapons development program benefited from Saudi support. See Feroz Hassan Khan,
Eating Grass: The Making of the Pakistani Bomb (Stanford: Stanford University Press, 2012),
172, 280, 363. A discussion on one possible manifestation of a Pakistani extended
nuclear deterrence commitment to Saudi Arabia is discussed in Kenneth M. Pollack, “U.S.
Policy Toward the Middle East after the Iranian Nuclear Agreement,” testimony before the
Senate Committee on Foreign Relations, August 5, 2015, 9, available at <www.brookings.
edu/research/testimony/2015/08/05-us-policy-iran-nuclear-deal-pollack>.
73
For example, see ibid., 3. Pollack considers it more likely that Iran does not change
its regional strategy as a result of the nuclear agreement, but believes other courses, like
the one discussed here, are possible.
74
Ben Hubbard, “Arab World Split Over Iran Nuclear Deal,” New York Times, July 14,
2015, available at <www.nytimes.com/2015/07/15/world/middleeast/iran-nuclear-deal-
provokes-sharp-reactions-across-the-arab-world.html>.
75
For example, see Payam Mohseni, “Introduction: Views from the Arab World and
Iranian Politics Post-Nuclear Detail,” in Iran and the Arab World after the Nuclear Deal:
Rivalry and Engagement in a New Era, ed. Payam Mohseni (Cambridge: The Belfer Center
for Science and International Affairs, August 2015), 8–9, available at <http://belfercenter.
ksg.harvard.edu/files/Impact%20on%20Arab%20World%20-%20Web.pdf>. The local
observers on regional implications of the nuclear agreement generally believe that the
short-term increase in tensions could give way to a longer term improvement.
76
For example, see ibid., 9–10; Pollack, “U.S. Policy Toward the Middle East,” 4–5.
77
Peter Baker, “In Congress, Netanyahu Faults ‘Bad Deal’ on Iran Nuclear Program,”
New York Times, March 3, 2015, available at <www.nytimes.com/2015/03/04/world/mid-
dleeast/netanyahu-congress-iran-israel-speech.html?_r=0>.
78
According to a Deputy Secretary of Defense statement in 2014, this is supposed to
occur by 2020. See Cheryl Pellerin, “Budget Constraints Won’t Halt Asia-Pacific Rebal-
ance, Work Says,” DoD News, October 1, 2014, available at <www.defense.gov/News-Arti-
cle-View/Article/603364/budget-constraints-wont-halt-asia-pacific-rebalance-work-says>.
79
Third Offset Strategy refers to a DOD initiative to identify and exploit new capabili-
ties to preserve U.S. military technological advantages over its most capable adversaries as
they “catch up” to current U.S. capabilities. Deputy Secretary of Defense Robert Work has
described it as “new combinations of technologies, operational concepts, and organiza-
• 128 •
Weapons of Mass Destruction
tional constructs to once again bolster a weakened conventional deterrence.” See “The
Third Offset Strategy and America’s Allies and Partners,” prepared remarks by Deputy
Secretary of Defense Bob Work at Royal United Services Institute, London, September 10,
2015, available at <https://rusi.org/event/robert-work-united-states-deputy-secretary-de-
fense-third-offset-strategy-and-americas-allies>. Deputy Secretary Work later identified
five technological focuses for Third Offset investments: learning machines, human-ma-
chine collaboration, assisted-human operations, advanced manned and unmanned
combat teaming, and network-enabled autonomous weapons that are hardened for cyber
attack and electronic-warfare environments. See Jason Sherman, “DoD Unveils Technol-
ogy Areas That Will Drive ‘Third Offset’ Investments,” InsideDefense.com, December 9,
2015, available at <http://nges.insidedefense.com/inside-pentagon/dod-unveils-technolo-
gy-areas-will-drive-third-offset-investments>.
80
The Congressional Budget Office (CBO) estimates that the Obama administration’s
plans for nuclear forces—including the cost to field, operate, maintain, and modern-
ize—would cost $348 billion over the 2015–2024 period or about 5–6 percent of the
administration’s plans for national defense. See CBO, Projected Costs of U.S. Nuclear Forces,
2015 to 2024 (Washington, DC: CBO, January 22, 2015), 3, available at <www.cbo.gov/
publication/49870>. A report estimated that the United States plans to spend approx-
imately $1 trillion over the next 30 years on maintaining and modernizing its nuclear
forces. See Jon B. Wolfsthal, Jeffrey Lewis, and Marc Quint, The U.S. Trillion Dollar Nuclear
Triad (Monterey, CA: James Martin Center for Nonproliferation Studies, January 2014),
4, available at <www.nonproliferation.org/wp-content/uploads/2016/04/140107_tril-
lion_dollar_nuclear_triad.pdf>. Modernization costs will peak in the latter 2020s and
early 2030s. In April 2016 Secretary of Defense Ashton Carter stated, “We expect the total
cost of nuclear modernization to be in the range of $350–$450 billion. Although this
still presents an enormous affordability challenge for DOD, we believe it must be funded.
Previous modernizations of America’s strategic deterrent and nuclear security enterprise
were accomplished by topline increases to avoid having to make drastic reductions
to conventional forces, and it would be prudent to do so again.” See Secretary Carter,
“Submitted Statement—Senate Appropriations Committee–Defense (FY 2017 Budget Re-
quest),” Washington, DC, April 27, 2016, available at <www.defense.gov/News/Speeches/
Speech-View/Article/744066/submitted-statement-senate-appropriations-committee-de-
fense-fy-2017-budget-requ>.
81
The U.S. nuclear force has been the foundation of national security as long as
adversaries have possessed nuclear weapons. It is not only the primary and irreplace-
able means by which the United States deters a potentially existential attack, but it also
underpins extended deterrence commitments to major allies. Some have asserted that the
United States cannot afford the planned modernization of its nuclear force and advocated
various cost-savings measures, including reducing the number of delivery platforms and
warheads, eliminating the intercontinental ballistic missile (ICBM) or bomber legs of the
triad, and canceling the development of the long-range standoff cruise missile. See, for
example, James E. Doyle, “Better Ways to Modernize the U.S. Nuclear Arsenal,” Survival
58, no. 4 (August–September 2016), 27–50; Tom Z. Collina et al., The Unaffordable
Arsenal: Reducing the Costs of the Bloated U.S. Nuclear Stockpile (Washington, DC: Arms
Control Association, October 2014), available at <www.armscontrol.org/files/The-Un-
affordable-Arsenal-2014.pdf>; and Global Zero, Modernizing U.S. Nuclear Strategy, Force
Structure and Posture (Washington, DC: Global Zero, May 2012), available at <www.
globalzero.org/files/gz_us_nuclear_policy_commission_report.pdf>. Reducing the num-
ber of warheads and delivery platforms within the triad force may have merit, but only as
part of mutual, binding, and verifiable reductions with Russia that preserve or strength-
en strategic stability. The United States has declared its willingness to pursue further
reductions, but Russia has not taken up the offer. See “Remarks by President Obama at
the Brandenburg Gate—Berlin, Germany,” June 19, 2013, available at <www.whitehouse.
gov/the-press-office/2013/06/19/remarks-president-obama-brandenburg-gate-berlin-ger-
many>. Unilateral reductions, especially given an aggressive Russia that is deploying
• 129 •
Caves
multiple new nuclear weapons systems and issuing explicit nuclear threats, would
weaken deterrence. Discarding any leg of the U.S. triad would be highly risky as each
has attributes that complement the others and together ensure that no rational adversary
could calculate, on the basis of capabilities (leaving aside questions of will), that it could
successfully execute a disarming first strike against the United States or use limited nu-
clear strikes to decisive effect in a regional conflict. The latter consideration is particularly
pertinent to bombers and their associated nuclear weapons (standoff cruise missiles and
gravity bombs) as these capabilities provide less escalatory and more credible options to
respond to an adversary’s limited employment of nuclear weapons than those afforded by
higher yield weapons delivered by ICBMs and submarine-launched ballistic missiles. Both
standoff cruise missiles and gravity bombs deliverable by penetrating bombers are needed
to complicate sufficiently the air defense challenge of sophisticated allies with increasing-
ly effective integrated air defense systems. As long as alliances and extended deterrence
commitments remain central to U.S. national security strategy, the United States will
require an effective nuclear bomber force.
82
A recent DOD Inspector General (DODIG) investigation found, inter alia, that
theater nuclear planning expertise has not been maintained and that there is no resident
expertise on integrated theater nuclear planning at any of the geographic combatant
commands (GCCMD). The Chairman of the Joint Chiefs of Staff and Under Secretary
of Defense for Policy agreed with the DODIG recommendation that they update policy
documents and provide oversight of the capability to integrate nuclear options into con-
ventional plans. They also agreed with the DODIG that applicable GCCMD commanders
should develop nuclear planning capabilities and processes and exercise those plans.
See DODIG, “(U) Assessment of the U.S. Theater Nuclear Planning Process, (Report No.
DODIG-20150134), June 18, 2015”; Information memo from John T. Rymer, Inspector
General, DOD, to Secretary of Defense, Subject: “(U) Release of Inspector General Report,
‘Assessment of the U.S. Theater Nuclear Planning Process, dated June 18, 2015.’” These
are classified documents; only excerpts specifically marked unclassified are reflected in
this chapter. “Gulf Leaders Back Out of Camp David Summit in ‘Snub’ to Obama,” BBC.
com, May 12, 2015, available at <www.bbc.com/news/world-us-canada-32694184>.
83
See, for example, Colby.
84
In March 2016 the U.S. military conducted airstrikes against ISIL chemical weap-
ons–related targets based on information obtained by a senior ISIS detainee. Barbara
Starr, “U.S.: ISIS Detainee Providing Information on Chemical Weapons,” CNN.com,
March 9, 2016, available at <www.cnn.com/2016/03/09/politics/u-s-isis-detainee-provid-
ing-crucial-information-on-chemical-weapons/>.
85
BBC.
86
The White House, “U.S.-Gulf Cooperation Council Camp David Joint State-
ment,” press release, May 14, 2015, available at <www.whitehouse.gov/the-press-of-
fice/2015/05/14/us-gulf-cooperation-council-camp-david-joint-statement>.
87
Nicole Gaouette and Tony Capaccio, “U.S. Offers Billions in Arms to Ease Mideast’s
Iran Anxiety,” Bloomberg.com, July 9, 2015, available at <www.bloomberg.com/news/arti-
cles/2015-07-09/u-s-offers-billions-in-arms-to-ease-mideast-s-iran-deal-anxiety>.
88
Michael Bowman, “U.S., Israel Sign Record Military Aid Agreement,” Voice of Amer-
ica, September 14, 2016, available at <www.voanews.com/a/us-israel-military-aid-agree-
ment/3509463.html>.
89
It would be a much bigger step for the United States to explicitly extend its nuclear
umbrella to Gulf Cooperation Council (GCC) partners. It also may not be politically
saleable to the U.S. Congress or broader public given that GCC partners are not treaty
allies, unlike other states that enjoy the explicit protection of the U.S. nuclear umbrella,
and given the connection that a significant segment of the U.S. population seems to draw
between Muslims generally and terrorism, as highlighted in the 2016 Presidential pri-
• 130 •
Weapons of Mass Destruction
mary season. Others may object to the United States adding to its international security
obligations at a time when the country already is stretched thin by security challenges in
Eastern Europe and East Asia, as well as in the Middle East and South Asia.
90
In the 1990s the U.S. Government seconded Department of Energy employees to
the International Atomic Energy Agency to support South African elimination operations
as well as the United Nations Special Commission in Iraq.
91
For a discussion of why China would not cooperate with the United States and
South Korea concerning a North Korean contingency, see Yun Sun, The North Korean
Contingency: Why China Will Not Cooperate (Baltimore, MD: U.S.-Korea Institute at SAIS,
July 25, 2014), available at <http://38north.org/2014/07/ysun072514/>.
92
The value of engaging China about cooperation in the event of North Korean
contingencies has been widely recognized. For example, see North Korea Contingency
Planning and U.S.-ROK Cooperation (Washington, DC: Asia Foundation, September 2009),
available at <https://asiafoundation.org/resources/pdfs/DPRKContingencyCUSKP0908.
pdf>; Paul B. Stares et al., Instability in North Korea and Its Impact on U.S.-China
Relations (New York: Council on Foreign Relations, 2011), 18–24, available at <www.cfr.
org/asia-and-pacific/managing-instability-chinas-periphery/p25838>. The United States
has sought to do so in both official (Track I) and unofficial (Track II) channels, but China
largely has been unresponsive. For example, see “U.S.-China Discuss North Korean Col-
lapse Possibility,” Global Security Newswire, January 13, 2014, available at <www.nti.org/
gsn/article/us-china-discussed-regime-collapse-north-korea-years-ago/>.
93
This was a significant step toward increasing military focus on WMD contingencies.
WMD use is a low-probability (albeit increasing), high-impact contingency that has tend-
ed to garner more attention from civilian policymakers than military leaders.
94
On September 21, 2016, Marketwired.com reported that the countering WMD mis-
sion would soon move from U.S. Strategic Command to U.S. Special Operations Com-
mand. See “DTRA/SCC-WMD Hosts the 15th Combating Weapons of Mass Destruction
Global Synchronization Conference,” Marketwired.com, September 21, 2016, available
at <www.marketwired.com/press-release/dtra-scc-wmd-hosts-15th-combating-weap-
ons-mass-destruction-global-synchronization-conference-2160546.htm>.
95
Paul Bernstein, “Deterrence in Professional Military Education,” Air and Space Jour-
nal 29, no. 6 (November–December 2015), available at <www.airpower.maxwell.af.mil/
digital/pdf/articles/2015-Jul-Aug/C-Bernstein.pdf>.
96
This challenge, inter alia, was addressed in a U.S. Strategic Command DOTMLPF-P
(doctrine, organization, training, materiel, leadership and education, personnel, facilities,
and policy) Change Recommendation recently approved by the DOD Joint Requirements
Oversight Council (JROC), per the JROC decision memorandum issued by General Paul
J. Selva, USAF, Vice Chairman of the Joint Chiefs of Staff, Subject: DOTMLPF-P Change
Recommendation for the Countering Weapons of Mass Destruction Leader Development
Education and Training, JROC Memorandum 123-lS, December 7, 2015.
97
See, for example, “Humanitarian Impact of Nuclear Weapons,” ReachingCriticalWill.
org, March 11, 2016, available at <www.reachingcriticalwill.org/disarmament-fora/hinw>.
• 131 •
7
Countering Terrorism
R. Kim Cragin
The United States faces an unprecedented threat from terrorism today: two
transregional networks actively plot attacks, recruit foreign fighters, and seek
to inspire “lone wolf” terrorists. But this threat is manageable. Rather than
trying to defeat terrorist adversaries, U.S. strategy should emphasize reducing
the risk of significant attacks in the homeland, Western Europe, Canada, and
Australia. In addition to homeland security measures, such a strategy would
be characterized by a shift, and likely an increase, in the placement of U.S.
special operations forces and intelligence assets overseas. Managing this threat
would also require greater coordination with, and persistence from, other
instruments of national power, including diplomacy and law enforcement. The
key counterterrorism challenge for a new administration, therefore, is how to
develop and sustain a strategy that manages this threat persistently, without
being on a constant war footing.
• 133 •
Cragin
• 134 •
Countering Terrorism
ISIL had an annual revenue of between $265 million and $615 million as
of late 2015, stemming from local taxation, oil, kidnapping for ransom,
smuggling, and other forms of crime, although their revenue decreased
in 2016.6 ISIL leaders utilize this revenue, and personal relationships
built over the years, to reinforce their authority over “provinces” that
have been established outside the borders of Syria and Iraq, including
Afghanistan, Algeria, Bangladesh, Egypt, Indonesia, Libya, Nigeria, Paki-
stan, Russia (Chechnya), Saudi Arabia, Somalia, and Yemen.7
In June 2014, ISIL spokesman Abu Muhammad al-Adnani announced
the creation of an Islamic caliphate in the territory under ISIL’s control in
Iraq and Syria, changing his organization’s name from the Islamic State
of Iraq and the Levant to simply “Islamic State.”8 The primary message
from al-Adnani at the time was that the Islamic State had established
governing structures and religious law in its territories, and thus all Mus-
lims had a religious obligation to transfer their allegiance to ISIL and
relocate to this newly established caliphate.9 Al-Adnani’s announcement
was accompanied by additional military victories, territorial gains, and a
concerted social media campaign to terrorize local and international op-
ponents in 2014 and 2015.10 Militant groups in the outlying provinces of
ISIL’s so-called caliphate also have followed its lead, adopting ISIL tactics
and using social media to advertise their campaigns.
While most of this violence has been directed inward or toward the
local residents of territories under dispute, ISIL and its affiliates also have
attacked international targets. Examples of international terrorist attacks
by ISIL and loyal groups include:
• November 2015: Paris came under attack by ISIL fighters; 129 peo-
ple died.13
• March 2016: Twin suicide attacks on the airport and subway system
in Brussels killed 32 individuals; responsibility for the attacks was
claimed by ISIL.
Notably, prior to the Paris and San Bernardino attacks, terrorism ex-
perts debated whether ISIL or al Qaeda presented the greatest threat to
the United States, especially the U.S. homeland.14 This debate centered
• 135 •
Cragin
on two key assumptions. First, some experts assumed that ISIL leaders
were focused exclusively on the battle for control over territory in Syria
and Iraq and, therefore, would not attempt to reach beyond those coun-
tries. As a corollary, because ISIL leaders prioritized the near enemy (for
example, so-called apostate Muslim regimes) over the far enemy (for ex-
ample, the United States), it would not sponsor external attacks.15
Second, other experts assumed that ISIL would experience a backlash
among Muslim communities for its brutality on the battlefields of Syria
and Iraq. Examples of ISIL brutality included the widely disseminated
beheadings of Western journalists.16 ISIL also captured and then burned
alive a Jordanian pilot in February 2015. This assumption drew on past
experience with ISIL’s predecessor, al Qaeda in Iraq (AQI), which faced
significant backlash after its members conducted its own decapitation
campaign against Iraqi officials and foreign journalists throughout 2004
and then subsequently attacked a wedding party in Jordan in November
2005.17
Yet events eventually called both of these assumptions into question.
In the early summer of 2014, for example, rumors circulated that ISIL
had begun to reach out to militant groups that were associated with al
Qaeda but were disgruntled with its leadership and direction. These
rumors were substantiated several months later as terrorist groups in
Afghanistan, Algeria, Chechnya, Egypt, Libya, Nigeria, Saudi Arabia, So-
malia, and Yemen declared their allegiance to, and were formally accept-
ed by, ISIL.18
Additionally, an unprecedented number of foreign fighters—30,000 in
Iraq and Syria and 5,000 in Libya by November 2015—continued to trav-
el overseas to join ISIL.19 This constant flow of foreign fighters, even after
the highly publicized beheadings, suggested that the anticipated backlash
was unlikely to occur. It was coupled with an escalating number of plots
both directed and inspired by ISIL leadership.20 Indeed, investigations
into the Paris and Brussels attacks subsequently revealed that al-Adnani
had been given responsibility over external operations as early as January
2014.21 It therefore became increasingly obvious that ISIL posed the great-
er threat to North America, Western Europe, and Australia.
• 136 •
Countering Terrorism
• 137 •
Cragin
Paris in January 2015 and an attack by AQIM on the Radisson Blu hotel
in Mali in December 2015. That said, neither of these attacks reached
the level of death, injury, or damage as those conducted by ISIL fighters.
Will al Qaeda fully reemerge in 2017? Will al Qaeda join with ISIL
to form a united transregional network? Will this united network pose
an even greater threat? These are the questions being asked by terrorism
analysts today. The answers will likely depend on the extent to which
the United States and its partners can maintain pressure on ISIL and al
Qaeda’s transregional networks simultaneously. Over the past decade, al
Qaeda senior and mid-level leaders have been targeted by U.S. and other
counterterrorism forces (see figure 2). It is arguable that these and other
intensive efforts have diminished al Qaeda’s ability to attack North Amer-
ica, Western Europe, or Australia or even to mount significant attacks
on Western targets overseas. But this type of counterterrorism campaign
requires concerted resources, including intelligence collection and anal-
ysis, law enforcement and diplomatic pressure, and, in many cases, the
use of U.S. military instruments, primarily U.S. special operations forces
(SOF) and airpower. These resources are finite, and tradeoffs exist. It
still remains an open question as to whether the U.S. Government can
effectively combat two transregional terrorist networks, as well as main-
tain its readiness against more conventional state adversaries. The new
administration, Democratic or Republican, will have to reconcile these
national security priorities.
• 138 •
Countering Terrorism
New Dynamics
The United States also faces two additional counterterrorism challenges:
increased numbers of foreign fighters and lone wolves. This section ad-
dresses these two threats as they exist now and how they might evolve
in the future.
Foreign Fighters
As of November 2015, 30,000 foreign volunteers had traveled to Syria
and Iraq either to fight against the Assad regime or otherwise support
the ongoing battles; an additional 5,000 were believed to be in Libya.40
While foreign fighters are not a new phenomenon, these numbers are
unprecedented (see table 1). For example, an estimated 20,000 foreign
volunteers fought against Soviet forces in Afghanistan between 1980 and
• 139 •
Cragin
• 140 •
Countering Terrorism
at least two dozen additional team members to conduct this attack. Seven
of the nine attackers were foreign fighter returnees from Syria. Two were
Iraqis. But most of the other team members—13 in total—had not trav-
eled to Syria or Iraq to fight, suggesting that returnees represent more of a
threat than their initial numbers might suggest because they could recruit
others to their cause.48
Notably, the FBI thus far has managed the risk to the U.S. homeland
posed by foreign fighter returnees successfully, while security services
in France and Belgium have not done as well. The question for a new
administration is whether the FBI can sustain this level of effort within
the United States in the mid-term or increase its investigations as more
foreign fighter returnees reenter the United States.
Lone Wolves
Experts use the term lone wolves to denote residents of the United States
who plan or participate in terrorist attacks without direct support or
operational guidance from terrorist leaders. Some lone wolves are in-
spired by conflicts overseas. Others are part of local paramilitary groups,
white supremacists, or even environmental activists. Members of the
U.S.-based Sovereign Citizen Movement, for example, have targeted
local police officers in Arkansas, Connecticut, Florida, Nebraska, New
Hampshire, and Wisconsin.49 This section focuses only on lone wolves
inspired by transregional terrorist networks, namely ISIL and al Qaeda.
According to Director James Comey, the FBI had open investigations
on suspects associated with or inspired by ISIL in all 50 states as of Feb-
ruary 2015.50 Recent examples of lone wolf attacks include an attack by
two men against an event in Garland, Texas, in May 2015 and the death
of 14 people in San Bernardino, California, in December 2015. While
some experts dispute the danger to the U.S. homeland posed by foreign
fighters, most agree that lone wolves represent a real threat.
Significant research has been devoted to understanding why the cur-
rent conflicts have inspired so many lone wolves and attracted so many
foreign fighters. Most studies, one way or another, point to the relatively
• 141 •
Cragin
Policy Implications
In summary, the primary terrorist threat to the U.S. homeland, Western
Europe, Canada, and Australia today emanates from ISIL; al Qaeda rep-
resents a secondary threat; and Hizballah and Lashkar-e-Tayyba repre-
sent potential future threats. Given the nature and extent of these threats,
the U.S. Government faces three main counterterrorism challenges: how
to counter two transregional networks simultaneously, how to anticipate
and halt the emergence of new transregional networks, and how to mit-
igate the danger posed by lone wolves and foreign fighters. These tasks
are not easy. But while it is impossible to provide a thorough counterter-
rorism policy in this chapter, the following steps represent a viable way
forward for a new administration.
First, a new administration should take the opportunity to revisit the
access and placement overseas necessary for the U.S. Government to
sustain activities against the ISIL and al Qaeda transregional networks,
as well as anticipate emerging threats. “Access and placement,” in this in-
stance, refers to the allocation of not only U.S. SOF but also intelligence
assets, FBI legal attachés, and other law enforcement personnel, such as
Customs and Border Protection and Drug Enforcement Administration
officers.55 The Barack Obama administration has already taken several
steps in this direction by increasing the number of SOF deployed to Syria
and Iraq and delaying their withdrawal from Afghanistan.56 But given
the counterterrorism challenges outlined in this chapter, a new admin-
istration is unlikely to be able to rely solely on SOF and airpower. It will
also need to leverage even more nonmilitary assets, such as diplomacy,
intelligence, and law enforcement.
Second, a new administration should take the opportunity to revis-
it the authorities and structure within the executive branch needed to
• 142 •
Countering Terrorism
• 143 •
Cragin
ISIL’s claim to a legitimate caliphate. And just as social media assists ISIL
and al Qaeda, it also can be used to gauge the nature and the extent
to which ISIL and al Qaeda messages resonate with local populations
around the world. But the U.S. Government must have appropriate au-
thorities, structures, resourcing, and plans to take advantage of these
opportunities.
The United States faces an unprecedented threat from terrorism to-
day, emanating from a combination of transregional terrorist networks,
foreign fighters, and the lone wolves that they inspire. Yet this threat
does not necessitate that the United States be on a constant war footing.
It can be managed. Doing so, however, requires the U.S. Government to
prioritize its military and intelligence assets appropriately, coordinate its
diplomatic efforts more effectively, and expand the use of law enforce-
ment instruments for combating terrorism not only inside the United
States but also overseas.
Notes
1
See, for example, Jesse Byrnes, “FBI Investigating ISIS Suspects in All 50 States,” The
Hill, Briefing Room Blog, February 25, 2015, available at <http://thehill.com/blogs/blog-
briefing-room/233832-fbi-investigating-isis-suspects-in-all-50-states>; Molly O’Toole,
“Is Whack-A-Mole Working Against al Qaeda?” Defense One, June 16, 2015, available at
<www.defenseone.com/threats/2015/06/whack-mole-working-against-al-qaeda/115450/>.
2
For a summary of this extensive research, see Paul K. Davis and Kim Cragin, eds.,
Social Science for Counterterrorism: Putting the Pieces Together (Santa Monica, CA: RAND,
2009); see also Kim Cragin, “Resisting Violent Extremism: A Conceptual Model for
Non-Radicalization,” Terrorism and Political Violence 26, no. 2 (2014), 337–353.
3
For additional information on this group, see Michael Weiss and Hassan Hassan,
ISIS: Inside the Army of Terror (New York: Regan Arts, 2015). Note that some experts still
believe that al Qaeda poses the greatest threat.
4
Note that the Islamic State of Iraq and the Levant (ISIL) lost control over territory in
2016. For further discussion on gauging ISIL control over territory, see Kathy Gilsinan,
“The Many Ways to Map the Islamic State,” The Atlantic, August 27, 2014, available at
<www.theatlantic.com/international/archive/2014/08/the-many-ways-to-map-the-islamic-
state/379196/>.
5
Subsequent sections address the foreign fighter flows into Syria and Iraq in greater
detail. For additional references, see Patricia Zengerle, “U.S. Fails to Stop Flow of Foreign
Fighters to Islamic State,” Reuters, September 29, 2015, available at <www.reuters.com/
article/2015/09/29/us-mideast-crisis-congress-fighters-idU.S.KCN0RT1VZ20150929>;
Michael Pizzi, “Foreign Fighters in Syria, Iraq Have Doubled Since Anti-ISIL Interven-
tion,” Al-Jazeera, December 7, 2015, available at <http://america.aljazeera.com/arti-
cles/2015/12/7/foreign-fighters-in-syria-iraq-have-doubled-since-anti-isil-intervention.
html>.
6
These numbers do not account for approximately $500 million to $800 million
taken from Iraqi state-owned banks. See Guy Taylor, “Islamic State Among ‘Best Funded’
Terrorist Groups on Earth: Treasury Department,” Washington Times, October 23, 2014,
available at <www.washingtontimes.com/news/2014/oct/23/isis-best-funded-terrorist-
• 144 •
Countering Terrorism
• 145 •
Cragin
18
Liam Stack, “How ISIS Expanded Its Threat,” New York Times, November 14, 2015,
available at <www.nytimes.com/interactive/2015/11/14/world/middleeast/isis-expansion.
html>.
19
Subsequent paragraphs discuss the issue of foreign fighters in depth. It is worth
noting that as of mid-2016, the number of foreign fighters was estimated to be approx-
imately 27,500, with some departing for home or other conflict zones and others being
killed on battlefields.
20
Byrnes.
21
Rukmini Callimachi, “How ISIS Built the Machinery of Terror Under Europe’s
Gaze,” New York Times, March 29, 2016, available at <www.nytimes.com/2016/03/29/
world/europe/isis-attacks-paris-brussels.html>.
22
“Al-Qaeda Names Ayman al-Zawahiri as Osama bin Laden’s Successor,” statement
issued on jihadist forums, June 16, 2011, translated and reposted by SITE Intelligence
Group.
23
Kepel; Gerges.
24
Ibid.
25
Ayman al-Zawahiri, “Letter to Zarqawi on Campaign in Iraq,” July 9, 2005, trans-
lated and released by West Point Counterterrorism Center, available at <www.ctc.usma.
edu/v2/wp-content/uploads/2013/10/Zawahiris-Letter-to-Zarqawi-Translation.pdf>; Abu
Musab al-Suri, “Call for Global Islamic Resistance,” unpublished paper released Decem-
ber 2004/January 2005, translated and posted by SITE Intelligence Group, February
16, 2007; Abu Laith al-Libi, “Confronting the War of Prisons,” as-Sahab Media, May 24,
2007, translated and posted by SITE Intelligence Group.
26
“Militants Kill al Qaeda Emissary in Syria,” Jane’s Terrorism and Insurgency Monitor,
February 25, 2014.
27
Some fighters from al Qaeda affiliates have defected to ISIL. See Greg Miller,
“Fighters Abandoning al Qaeda to Join the Islamic State, U.S. Officials Say,” Washington
Post, August 9, 2014, available at <www.washingtonpost.com/world/national-security/
fighters-abandoning-al-qaeda-affiliates-to-join-islamic-state-us-officials-say/2014/08/09/
c5321d10-1f08-11e4-ae54-0cfe1f974f8a_story.html>.
28
When some experts argue that al Qaeda remains the most significant threat to the
U.S. homeland, they tend to reference the Khorasan Group. See Bruce Bennett, “Airstrikes
in Syria Also Target Little Known Khorasan Group,” Los Angeles Times, September 23,
2014, available at <www.latimes.com/world/middleeast/la-fg-khorasan-20140923-story.
html>.
29
Estimates for the numbers of al Qaeda fighters come from a variety of sources,
including Bennett; see also “Al-Qaeda in Afghanistan is Attempting a Comeback,” Fox
News, October 21, 2012, available at <www.foxnews.com/world/2012/10/21/al-qae-
da-in-afghanistan-is-attempting-comeback.html>; “Mapping Militant Organizations,”
Stanford University, available at <web.stanford.edu/group/mappingmilitants/cgi-bin/
groups/view/493>.
30
“AQAP and AQIM Give Scathing Rebuke of IS in Joint Statement,” November 1,
2015, translated and reposted by SITE Intelligence Group, November 1, 2015.
31
Eric Schmitt and David E. Sanger, “As U.S. Focuses on ISIS and the Taliban,
Al-Qaeda Reemerges,” New York Times, December 29, 2015, available at <www.nytimes.
com/2015/12/30/us/politics/as-us-focuses-on-isis-and-the-taliban-al-qaeda-re-emerges.
html?ref=topics&_r=0>.
32
Sirjah Wahab, “Hizballah Operating in Yemen with Houthis,” Arab News, March
28, 2015, available at <www.arabnews.com/featured/news/724391>; “Palestinian Islamic
Jihad,” profile posted by the Government of Australia, available at <www.nationalsecurity.
• 146 •
Countering Terrorism
• 147 •
Cragin
48
These numbers were calculated based on the ratio for the Paris attacks—3 foreign
fighters: 10 local recruits.
49
The Lawless Ones: The Resurgence of the Sovereign Citizen Movement, Special Report
by the Anti-Defamation League, 2nd ed. (New York: Anti-Defamation League, 2012),
available at <www.adl.org/assets/pdf/combating-hate/Lawless-Ones-2012-Edition-WEB-
final.pdf>.
50
Byrnes.
51
See, for example, Byman and Shapiro; Winter; Zelin, “Picture or It Didn’t Hap-
pen”; Barrett; see also Scott Shane and Ben Hubbard, “ISIS Displaying a Deft Com-
mand of Varied Media,” New York Times, August 30, 2014, available at <www.nytimes.
com/2014/08/31/world/middleeast/isis-displaying-a-deft-command-of-varied-media.
html?_r=0>.
52
Jyette Klausen, “Tweeting the Jihad: Social Media Networks of Western Foreign
Fighters in Syria and Iraq,” Studies in Conflict and Terrorism 38, no. 1 (December 2014),
1–22; Fisher; J.M. Berger and Jonathan Morgan, The ISIS Twitter Census: Defining and
Describing the Population of ISIS Supporters on Twitter, Analysis Paper 20 (Washington, DC:
The Brookings Institution, March 2015).
53
Ibid. See also Zelin, “Picture or It Didn’t Happen.”
54
Kevin Johnson, “FBI Director Says Islamic State Influence Growing in U.S.,” USA
Today, May 7, 2015, available at <www.usatoday.com/story/news/nation/2015/05/07/isis-
attacks-us/70945534/>.
55
Under the leadership of Admiral William McRaven, U.S. Special Operations Com-
mand explored the possibility of establishing what was referred to generally as a “global
SOF network.” This proposition came under significant criticism and so did not gain
traction among policymakers. This chapter does not advocate a return to the global SOF
network, but rather, a more limited presence in the form of a series of Special Operations
Command–Forward elements attached to Embassies or consulates. For more information,
see Posture Statement of Admiral William H. McRaven, Commander, United States Spe-
cial Operations Command, before the 113th Congress House Armed Services Committee,
March 6, 2013, available at <http://docs.house.gov/meetings/AS/AS00/20130306/100394/
HHRG-113-AS00-Wstate-McRavenU.S.NA-20130306.pdf>; Jack Jensen, “Special Op-
erations Command–Forward Lebanon: SOF Campaigning Left of the Line,” sidebar in
reprint of Michael Foote, “Operationalizing Strategic Policy in Lebanon,” Special Warfare
(April–June 2012), available at <www.soc.mil/swcs/SWmag/archive/SW2502/SW2502O-
perationalizingStrategicPolicyInLebanon.html>.
56
Jim Acosta and Jeremy Diamond, “Obama Again Delays Afghanistan Troop Draw-
down,” CNN, October 15, 2015, available at <www.cnn.com/2015/10/15/politics/afghan-
istan-troops-obama/index.html>.
57
For further discussion on how to improve interagency performance against these
types of threats, see Christopher J. Lamb’s chapter on national security reform in this
volume.
58
Somini Sengupta, “Security Council Passes Resolution to Thwart Foreign Fighters,”
New York Times, September 24, 2014, available at <www.nytimes.com/news/un-gen-
eral-assembly/2014/09/24/security-council-passes-resolution-to-thwart-foreign-fight-
ers/?_r=0>.
59
United Nations, “Action Against Threat of Foreign Terrorist Fighters Must Be
Ramped Up, Security Council Urges in High-Level Meeting,” Press Release No. 11912,
May 29, 2015, available at <www.un.org/press/en/2015/sc11912.doc.htm>.
• 148 •
8
Cyber Policy
Janice M. Hamby and Thomas C. Wingfield
B y any measure, the United States leads the world as a cyber power in
terms of its cyberspace-related leadership and capabilities, research
and development, innovation, and commercialization of leading-edge
hardware and software, as well as more specialized products for military
and scientific applications. This is also true for the world of information.
Without any whole-of-government coordination, the United States pro-
duces and exports the lion’s share of globally consumed television, film,
music, and games, as well as data, information, and knowledge systems.
Its advances in mobile communications and social media have revolu-
tionized the way the global community communicates, learns, and even
thinks.
With this largely unplanned success has come a series of challenges,
many of which require a more deliberate approach and a national-lev-
el strategic effort with Presidential leadership to resolve. This chapter
provides summary views of many of these challenges and offers recom-
• 149 •
Hamby and Wingfield
• 150 •
Cyber Policy
• 151 •
Hamby and Wingfield
with the other two boxes, we can imagine three sides that can be moved
with time, money, and political capital, just as we can imagine a fourth
side that cannot be—policy options that are considered so politically
toxic or strategically unfeasible as to be impossible.
• 152 •
Cyber Policy
• As a first step to fitting the Federal Government for the digital age,
create an empowered and resourced leadership structure in the ex-
ecutive office with a cyberspace remit (rather than one focused on
e-government or cybersecurity).
• 153 •
Hamby and Wingfield
• 154 •
Cyber Policy
• 155 •
Hamby and Wingfield
the Internet to bring local, national, and global services and benefits.7
There are others with nefarious intentions, introducing crime, exploita-
tion, and terrorism into cyberspace. We offer the following recommen-
dations:
• 156 •
Cyber Policy
• 157 •
Hamby and Wingfield
• 158 •
Cyber Policy
• 159 •
Hamby and Wingfield
• Fund research into the future of privacy, such as the issues associated
with big data analysis that derives private information from contex-
tual data, a lack of published information, or from cross-referencing
information from multiple sources. All these approaches have been
used to expose private information and present significant challeng-
es for both individuals who wish to keep aspects of their lives secret
and for governments that need to keep aspects of operations (such
as research and development and counterintelligence efforts) secret.
• 160 •
Cyber Policy
• 161 •
Hamby and Wingfield
• 162 •
Cyber Policy
• 163 •
Hamby and Wingfield
• 164 •
Cyber Policy
• 165 •
Hamby and Wingfield
• Require quarterly progress reports until these actions are fully im-
plemented.
• 166 •
Cyber Policy
• 167 •
Hamby and Wingfield
Conclusion
In a short time, cyber has emerged as both a warfighting domain, fully
as significant as the land, sea, air, and space domains, and an omni-
present public-private operating universe. The potential opportunities
found within the domain of information and cyberspace are seemingly
limitless. The risks of this reliance are clear, as demonstrated by recent
highly publicized network breaches. It is important that these risks be
deliberately accounted for and addressed in the process of making deci-
sions about the use of cyberspace.
Cyber competence must be part of the skill set for all senior leaders in
the national security enterprise. Most senior leaders received their pro-
fessional educations at the beginning of the cyber age, and their under-
standing of, and sensitivity to, the opportunities and vulnerabilities de-
scribed above may be limited. Nevertheless, mastery of the cyber domain
has now assumed critical importance because of our dependence on cy-
berspace. Agency heads must be held accountable for their organization’s
employment of information technologies—abrogation of responsibility
to CIOs and other “cyber experts” is unacceptable.
Addressing the critical challenges of cyberspace must be approached
with an understanding of limitations and risks inherent in the use of the
technologies that underpin the domain’s potential. The authors here have
highlighted promising opportunities and areas of concern. Specific rec-
ommendations are offered to contribute to a Presidency ready to embrace
both the risks and the opportunities facing the Nation in cyberspace.
• 168 •
Cyber Policy
Notes
1
Joint Publication 3-13, Information Operations (Washington, DC: The Joint Staff,
2014), available at <www.dtic.mil/doctrine/new_pubs/jp3_13.pdf>.
2
White House Fact Sheet, “Cybersecurity National Action Plan,” February 9, 2016,
available at <www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecuri-
ty-national-action-plan>.
3
Executive Order 13691, “Promoting Private Sector Cybersecurity Infor-
mation Sharing,” February 13, 2015, available at <www.federalregister.gov/arti-
cles/2015/02/20/2015-03714/promoting-private-sector-cybersecurity-information-sharing>.
4
Presidential Policy Directive (PPD) 20, “U.S. Cyber Operations Policy” (2012), is a
classified document that provides a framework for the roles and responsibilities of the
executive branch’s agencies in cyberspace as well as a framework for U.S. cybersecurity.
PPD-21, “Critical Infrastructure Security and Resilience” (2013), provides a top-down
risk management architecture and directed the creation of the national critical infrastruc-
ture centers for enhanced information-sharing and collaboration. Supporting PPD-21 is
Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” which focuses
on the cyberspace security aspect of PPD-21. PPD-41, “United States Cyber Incident
Coordination” (2016), articulates how the Federal Government coordinates its incident
response activities to significant cyber incidents.
5
Charles Perrow, Normal Accidents: Living with High-Risk Technologies (New York: Basic
Books, 1984).
6
Manuel Castells, “Informationalism, Networks, and the Network Society: A Theo-
retical Blueprint,” in The Network Society: A Cross-Cultural Perspective, ed. Manuel Castells
(New York: Edward Elgar Publishers, 2004).
7
Laura DeNardis, Internet Points of Control as Global Governance, Internet Governance
Paper No. 2 (Ontario, Canada: Centre for International Governance Innovation, 2013).
8
John Kamensky, “Why Isn’t Performance Information Being Used?” Government
Executive, October 14, 2014, available at <www.govexec.com/excellence/promising-prac-
tices/2014/10/why-isnt performance-information-being-used/96347/>.
9
U.S. Government Accountability Office (GAO), Managing for Results: Agencies’ Trends
in the Use of Performance Information to Make Decisions, GAO 14-747 (Washington, DC:
GAO, 2014).
10
PPD-21.
11
Nathan E. Busch and Austin D. Givens, “Public-Private Partnerships in Homeland
Security: Opportunities and Challenges,” Homeland Security Affairs 8, no. 18 (October
2012), available at <www.hsaj.org/articles/233>.
12
“Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience
in Cyber Space,” 2009, available at <www.gov.uk/government/uploads/system/uploads/
attachment_data/file/228841/7642.pdf>.
13
Zachary Chase Lipton, “The High Costs of Maintaining Machine Learning Systems,”
KDNuggets News, 2015, available at <www.kdnuggets.com/2015/01/high-cost-machine-
learning-technical-debt.html>.
14
Senate Hearing on Worldwide Threats, 2016.
15
The Dark Web is commonly defined as a sub-portion of the Internet that consists
of Web sites, portals, and social media similar to the open Internet, but that is accessible
only through specially designed Web browsers and using technologies that easily ano-
nymizes the user and encrypts all of his traffic, data, and activities.
• 169 •
Hamby and Wingfield
16
Ed Felton, “Preparing for the Future of Artificial Intelligence,” WhiteHouse.gov, May
3, 2016, available at <www.whitehouse.gov/blog/2016/05/03/preparing-future-artifi-
cial-intelligence>.
17
“Federal Agencies Need to Address Aging Legacy Systems,” GAO.gov, May 25,
2016, available at <www.gao.gov/products/GAO-16-696T>.
18
“Federal Agencies: Reliance on Outdated and Unsupported Information Technolo-
gy: A Ticking Time Bomb,” hearings before the Committee on Oversight and Government
Reform, House of Representatives, 114th Cong., testimony of the Honorable Tony Scott,
available at <https://oversight.house.gov/wp-content/uploads/2016/05/2016-05-25-Scott-
Testimony-OMB.pdf>.
19
White House Fact Sheet, “Cybersecurity National Action Plan.”
20
GAO, Building the 21st Century Digital Government, available at <https://18f.gsa.gov/>.
• 170 •
9
Asia Pacific
James J. Przystup and Phillip C. Saunders
This chapter examines the strategic challenges the United States confronts in the
Asia-Pacific region and argues that the United States should work with allies,
partners, and multilateral organizations to build a rules-based regional order
that includes China and advances U.S. national interests. This requires sustaining
the U.S. rebalance to the Asia-Pacific and intensifying cooperation with other
regional actors to shape China’s choices. The chapter begins by reviewing the
history of U.S. engagement with Asia and describing the range of important U.S.
national interests located in the Asia-Pacific region or strongly influenced by
developments there. It then reviews major trends shaping the region (including
economic dynamism, China’s rise, and the U.S. rebalance to Asia) and considers
specific security challenges in Northeast Asia, the Korean Peninsula, the China-
Taiwan relationship, and in the South China Sea. The authors argue that the
United States needs to devote high-level attention to its alliances in Asia, to
cooperation with new regional security partners, and to shaping the Asia-Pacific
strategic and economic order in favorable directions. These actions will place the
United States in a better position to shape China’s strategic choices and integrate
China within a rules-based regional and global order.
A merica’s engagement with Asia began before the United States ex-
isted. In February 1784, the ship Empress of China departed New
York harbor, arriving in Macau in August of that year. The ship returned
the following year with a cargo of Chinese goods that netted a $30,000
profit. In Federalist Paper No. 4, John Jay referred to American com-
merce with China and India.
In 1835, before the United States touched the shores of the Pacific
Ocean, the U.S. Navy East India Squadron was established. In 1844,
China, in the Treaty of Wanghia, granted trading rights to the United
States. Two years later, the United States attempted to negotiate a com-
mercial treaty with Japan. The talks ended in failure, but a decade later
• 171 •
Przystup and Saunders
• 172 •
Asia Pacific
• 173 •
Przystup and Saunders
• 174 •
Asia Pacific
• 175 •
Przystup and Saunders
projects within Asia, some of which are now under the umbrella of Xi
Jinping’s “One Belt, One Road” initiative, are another source of influence.
Beijing has mostly used its economic power as assurance measures and
inducements to cooperate with China, but in recent years has become
more willing to use more coercive economic measures to punish coun-
tries that displease it.8
Rapid economic growth has also supported modernization and ex-
pansion of the Chinese military, which has enjoyed double-digit budget
increases for most of the last 20 years and now has the largest defense
budget in the Asia-Pacific region ($154 billion for 2016).9 The People’s
Liberation Army has been modernizing its forces and developing the
joint doctrine, training, and capabilities necessary to win “local wars un-
der conditions of informationization.”10 This modernization effort gives
priority to naval, air, and missile forces capable of projecting power be-
yond China’s borders and places increasing emphasis on the maritime,
space, and cyber domains. As part of its efforts to deter potential U.S.
intervention in a Taiwan contingency, the People’s Liberation Army has
emphasized the development of antiaccess/area-denial capabilities that
would raise the costs and risks for U.S. forces operating near China.11
These capabilities threaten to put at risk the U.S. ability to access its
allies, extend deterrence, and meet its regional security commitments.
Expanded naval and coast guard capabilities have also supported more
assertive Chinese efforts with respect to maritime territorial disputes in
the East and South China seas.
Countries in Asia have been carefully monitoring China’s rise and the
potential for a strong China to dominate the region. Aggressive Chinese
behavior toward Taiwan and in the South China Sea from 1994 to 1996
created regional alarm about a “China threat,” but more restrained Chi-
nese behavior and assurance measures adopted over the period from
1997 to 2008 helped ease regional concerns. During this period, Asian
views largely shifted from regarding China as a potential threat to re-
garding China as an opportunity; this shift was widely interpreted as an
indicator of the success of China’s Asia policy.12 Beginning in 2009, how-
ever, more assertive Chinese behavior on maritime territorial disputes
and other issues dissipated much of the goodwill built by China’s charm
offensive and revived regional concerns about how a strong China might
behave in the future.13 These concerns are most acute for countries with
maritime or land territorial disputes with China, such as India, Japan,
Malaysia, the Philippines, and Vietnam. Chinese policymakers talk about
the need to maintain the proper balance between the competing goals of
defending Chinese sovereignty (weiquan) and maintaining regional sta-
bility (weiwen); under President Xi Jinping there has been more emphasis
• 176 •
Asia Pacific
on pursuing territorial claims and less concern about the negative impact
on relations with China’s neighbors.
In interviews conducted as part of the Institute for National Strategic
Studies research project “The Rebalance Beyond 2016,” analysts across
the region described China’s rise as “inexorable.” Despite the significant
economic and political challenges facing China, they were confident that
China will, at worst, muddle through, if not succeed eventually. Looking
ahead, interviewees defined a best-case China scenario as one in which
the pace of change would slow, allowing countries of the region to adapt
and, over time, engage and socialize China toward acceptance and sup-
port of the existing regional order. This will require sustained U.S. in-
volvement and coordination with regional allies and partners. For the
United States and the Asia-Pacific region, China’s rise (and international
reactions to that rise) will shape the contours of the international order
in the century ahead.
While participating in the postwar Bretton Woods system and bene-
fiting from a stable regional order underpinned by U.S. alliances, China
has moved to advance a parallel set of institutions that mostly exclude
the United States. These include the Shanghai Cooperation Organiza-
tion; the initial proposal for an East Asian Summit that would have ex-
cluded the United States; and under President Xi, the Asian Infrastruc-
ture Investment Bank, the One Belt, One Road Eurasian trade initiative,
the Regional Comprehensive Economic Partnership, and the “Asia for
Asians” security concept, widely viewed as aimed at U.S. alliances and
the U.S. security role in the region. Taken as a whole, China’s growing
power and willingness to use that power to try to alter regional security
arrangements and support new institutions that advance Chinese inter-
ests and exclude the United States pose a significant challenge to U.S.
interests in the Asia-Pacific.
• 177 •
Przystup and Saunders
will be a Pacific nation. . . . Here we see the future.” The President noted
that Asia is “the world’s fastest growing region,” “home to more than half
of the global economy,” and critical to “creating jobs and opportunity for
the American people.” He described the rebalance as “a deliberate and
strategic decision” to increase the priority placed on Asia in U.S. policy.14
Then–Secretary of State Hillary Clinton elaborated on the rationale
for the rebalance, arguing that “harnessing Asia’s growth and dynamism
is central to American economic and strategic interests” and that the
United States had an opportunity to help build “a more mature security
and economic architecture to promote stability and prosperity.” Given
the importance of the Asia-Pacific region, she argued that “a strategic
turn to the region fits logically into our overall global effort to secure and
sustain America’s global leadership.”15
While the main objective of the rebalance was to bring U.S. foreign
policy commitments in line with U.S. interests, it also responded to
China’s increasingly assertive regional policies, especially on maritime
territorial disputes. Countries across the Asia-Pacific region urged Wash-
ington to play a more active role in regional economic, diplomatic, and
security affairs in order to demonstrate U.S. commitment and help main-
tain regional stability in the face of a more powerful and more active
China.
Obama administration officials have stressed that the rebalance in-
cludes diplomatic, economic, and military elements, all of which must
be applied in a coordinated manner for maximum effect.16 The diplomat-
ic element has involved enhanced high-level diplomatic engagement, in-
cluding frequent travel to the region by the President, Secretary of State,
and Secretary of Defense. President Obama has participated regularly
in Asia-Pacific Economic Cooperation (APEC) and East Asia Summit
meetings; had periodic meetings with the leaders of U.S. allies Japan,
South Korea, and Australia; and launched a new U.S.-ASEAN dialogue
mechanism that included a summit with Southeast Asian leaders at Sun-
nylands, California, in February 2016.
American allies and partners in the region have stressed U.S. eco-
nomic engagement with Asia as a key means of demonstrating U.S. stay-
ing power. The Obama administration faced a number of practical and
political obstacles in increasing U.S. trade and investment ties with the
Asia-Pacific, especially in the context of the global financial crisis. The
centerpiece of the administration’s efforts is the Trans-Pacific Partnership
(TPP), as “an ambitious, next-generation Asia-Pacific trade agreement”
including Australia, Brunei Darussalam, Canada, Chile, Japan, Malay-
sia, Mexico, New Zealand, Peru, Singapore, the United States, and Viet-
nam.17 The TPP agreement was signed on February 4, 2016, but will not
• 178 •
Asia Pacific
take effect until all member countries have ratified the agreement. The
Obama administration has not submitted the agreement to Congress for
approval; once submitted, Congress will have 90 legislative days to ap-
prove or disapprove it. TPP is an example of “open regionalism,” mean-
ing that other Asia-Pacific countries willing to meet TPP standards will
eventually be able to join the agreement.
The military element of the rebalance includes both increased com-
mitments of U.S. military forces to the Asia-Pacific region and enhanced
military and security cooperation with a range of allies and partners. The
Navy and Air Force both announced plans to devote 60 percent of over-
seas-based forces to the Asia-Pacific region, including deployments of
advanced systems such as the Littoral Combat Ship and F-35 Joint Strike
Fighter. The Army announced plans to align 70,000 troops to Asia mis-
sions, while the Marines announced plans for rotational deployments of
2,500 Marines to Australia. Secretary of Defense Ashton Carter described
a three-part Department of Defense approach to the “next phase” of the
rebalance that includes investing in future capabilities relevant to the
Asia-Pacific security environment, fielding key capabilities in quantity,
and adapting the U.S. defense posture to be “geographically distributed,
operationally resilient, and politically sustainable.”18 A significant part of
the rebalance involves efforts to expand military cooperation with tra-
ditional allies such as Australia, Japan, and South Korea, while using
exercises and dialogues to reach out to nontraditional partners such as
India, Malaysia, and Vietnam.19
While the President’s remarks set out a comprehensive strategy to-
ward the region, the initial public diplomacy rollout focused on the mil-
itary aspects, unfortunately playing into the Chinese conceit that U.S.
policy is aimed at containing China. Beijing has subsequently gone a step
further, blaming the rebalance for increasing tensions in the region even
though it was partly a response to regional concerns about increasing
Chinese assertiveness.
• 179 •
Przystup and Saunders
Northeast Asia
Even 75 years after the end of World War II, tensions over the history
of Japanese colonialism and aggression continue to complicate Tokyo’s
relations with Beijing and Seoul. The Japan-China relationship is also
marked by conflicting territorial claims in the East China Sea, includ-
ing disputes over possession of the Senkaku/Diaoyu Islands, an unre-
solved maritime boundary, and resource competition for fish, oil, and
natural gas. Both China and Japan claim the islands (as does Taiwan)
and tensions over them have flared periodically since the late 1970s.20
The United States does not take a position on the sovereignty dispute
but recognizes Japanese administrative control and has stated that the
unpopulated islands are covered under the U.S-Japan Security Treaty.
In September 2010, a Chinese fishing trawler operating within Ja-
pan’s exclusive economic zone north of the Senkaku Islands collided
with two Japanese coast guard ships. The ships pursued and boarded the
trawler, taking into custody the captain and crew. Tokyo took the posi-
tion that the coast guard’s actions were correct, taking place in Japanese
waters and based on Japanese law. Beijing’s response was to call on Japan
to refrain from taking “so-called law enforcement activities” in Chinese
waters. To have accepted the legality of the coast guard’s action would
have been to compromise China’s claim to sovereignty over the islands.
The rapid deterioration of relations that followed, China’s suspension of
rare-earth metal exports to pressure the Japanese business community,
widespread anti-Japanese demonstrations across China, and small-scale
anti-Chinese protests in Japan all underscored the sensitive nature of the
territorial issue.
Two years later, in September 2012, the Japanese government pur-
chased (“nationalized”) three of the five Senkaku islands from their pri-
vate-sector owner. Widespread anti-Japanese demonstrations spread
across China, and Beijing suspended all high-level political and dip-
lomatic contacts. To assert its claims to the islands, China stepped up
patrols of white-hulled paramilitary ships (now consolidated into the
Chinese coast guard) into Japan’s contiguous zone around the islands,
establishing an almost daily presence in the area. Chinese ships also
entered Japan’s territorial waters in the Senkakus. By the end of 2013,
Chinese coast guard ships had entered Japan’s territorial waters in the
Senkakus 256 times. Of the incursions, 68 took place in the period Sep-
tember–December 2012 and 188 in 2013.21 In November 2013, China
declared an Air Defense Identification Zone that extended over the Sen-
kaku Islands. The following month the government of Prime Minister
Shinzo Abe, in its national security strategy, defined Japan’s security en-
vironment as “ever more severe.”22
• 180 •
Asia Pacific
Japan and China also hold conflicting claims over the maritime
boundary in the East China Sea. Japan claims a mid-line boundary in
the East China Sea, while Beijing’s claim is based on the continental shelf
and extends beyond the mid-line to the Okinawa trough. In the context
of this unresolved boundary, exploration for oil and natural gas has also
served as a flashpoint. In June 2008, Japanese and Chinese diplomats
reached agreement on the joint development of resources in the East
China Sea; implementing details were left to follow-on talks, which have
failed to resolve outstanding issues. In June 2013 China began the con-
struction of large exploration platforms on the Chinese side of the mid-
line boundary. Tokyo considered the Chinese action to be at odds with
the 2008 agreement and an “attempt to change the status quo unilateral-
ly.” Beijing’s response was to make clear that exploration was taking place
within China’s sovereign waters, that China and Japan have yet to reach
agreement on the maritime boundary, and that China does not recognize
Japan’s unilateral boundary demarcation. The Japanese press reported
that Prime Minister Abe has raised the issue twice with President Xi at
the November 2014 and April 2015 meetings.
North Korea
North Korea, as it has for decades, remains the most destabilizing el-
ement in the Asia-Pacific security environment. Pyongyang’s growing
nuclear and missile arsenal poses a direct threat to U.S. national securi-
ty interests. Senior U.S. defense officials have stated that North Korea,
within a decade, will be able to deploy intercontinental ballistic missiles
capable of reaching U.S. territory in the Pacific and the homeland itself.23
North Korea’s estimated 1.2 million-man conventional army also con-
tinues to pose a direct threat to the Republic of Korea, a treaty ally of
the United States. North Korean provocations, such as the sinking of the
ROK navy’s warship Cheonan, in March 2010, the shelling of Yeonpyeong
Island in November 2010, and the August 2015 incident at the demili-
tarized zone (DMZ), risk escalation into a wider conflict. Pyongyang re-
mains committed to the unification of the Korean Peninsula on its terms.
Diplomatic efforts to address North Korea’s nuclear program have a
long history. Beginning in 1991, then–Undersecretary of State Arnold
Kanter met with North Korean diplomats in New York and proposed
the basic tradeoff that has marked diplomatic efforts since: abandon-
ment of North Korea’s plutonium-based nuclear program in exchange
for an array of security guarantees and economic benefits. The initiative
eventually played out into the 1994 Agreed Framework, which offered
Pyongyang two light water reactors, a security guarantee, and moves to-
ward normalized relations. Profound distrust on both sides gradually
• 181 •
Przystup and Saunders
unraveled the accord, which collapsed in 2002 when the George W. Bush
administration discovered that Pyongyang was secretly pursuing urani-
um enrichment as an alternative path to the bomb.
In September 2003, China launched the Six Party Talks to reduce
the risk of unilateral U.S. military action and to keep denuclearization
of North Korea on the security agenda. The talks produced the Septem-
ber 19, 2005, agreement, yet another attempt at a grand bargain. The
Six Party Talks collapsed in December 2008 when North Korea failed
to produce details of its nuclear activities that would verify compliance
with the agreement. Efforts to revive the Six Party Talks have proved
unavailing.
In 2009 the Obama administration attempted to break the diplomatic
deadlock, offering to extend an open hand to North Korea. North Korea
answered with ballistic missile and nuclear weapon tests. Nevertheless,
the administration continued to pursue a diplomatic opening to Pyong-
yang, which resulted in the February 29, 2012, Leap Day agreement, a
mini–grand bargain in which the United States would provide food in
return for North Korea’s freezing of its missile and enrichment programs.
Pyongyang responded with another ballistic missile test.
In 2012 the nuclear and missile programs were enshrined in North
Korea’s revised constitution. Today, under the leadership of thirty-some-
thing Kim Jong-un, North Korea is pursuing byungjin, a two-track policy
aimed at sustaining its nuclear weapons and missile programs and si-
multaneously promoting economic growth—in short, guns and butter.
Pyongyang has made very clear that it has no interest in surrendering its
nuclear program, even for an economic windfall. Instead it seeks inter-
national recognition as a nuclear weapons state.
Uncertainties about the long-term life expectancy of the regime under
Kim Jong-un, including the prospect of instability or regime collapse,
raise daunting security challenges.24 China might intervene to prop up
a failing regime, prevent a refugee crisis from spilling over its borders,
or secure North Korea’s weapons of mass destruction. Similar conditions
could prompt the ROK to cross the 38th parallel in an effort to unify the
peninsula or the United States to intervene to secure North Korea’s weap-
ons of mass destruction. The prospects for strategic miscalculation in a
fast-moving, dynamic environment are extremely high, especially given
the absence of substantive dialogue between the United States and China
about contingency responses.
China-Taiwan
The political dispute between Mainland China and Taiwan remains an un-
resolved legacy of the Chinese civil war. The People’s Republic of China
• 182 •
Asia Pacific
• 183 •
Przystup and Saunders
• 184 •
Asia Pacific
quo by refusing to endorse the 1992 consensus and Tsai and her govern-
ment looking to Washington for support in the face of increasing Chinese
pressure. At the same time, Beijing knows that any attempt to resolve
the Taiwan issue with force would have extremely high costs and risks
(including the likelihood of U.S. military intervention) and would se-
verely damage China’s relations with the United States and other major
countries in the region.
• 185 •
Przystup and Saunders
• 186 •
Asia Pacific
• 187 •
Przystup and Saunders
Strengthening Alliances
To address the security challenges in 2017–2021 and beyond, a critical
first step for the next administration is to focus on strengthening the bi-
lateral alliance structure. This starts with the U.S.-Japan Alliance.
Japan. For over half a century, the alliance with Japan has served as the
foundation of U.S. strategy toward the Asia-Pacific region and an integral
element of U.S. global strategy. Elements of the Seventh Fleet based in
Yokosuka, Japan, were among the first U.S. units to support coalition
efforts in the Persian Gulf War in 1991 and Operation Enduring Freedom
in 2001.
Under the government of Prime Minister Abe, Japan has taken steps
to enhance security cooperation with the United States. In December
2013, the Abe government released Japan’s first-ever national security
strategy, which defined Japan as a “Proactive Contributor to Peace” in
support of international stability and security. The document set out
three objectives for Japan’s security policy: to strengthen deterrence, to
strengthen the Japan-U.S. Alliance, and to strengthen the rules-based
international order. In July 2014 a decision by the Japanese government
cabinet reinterpreted Japan’s constitution to allow for the exercise of the
right of collective self-defense.
In April 2015 the Obama administration and the Abe government re-
leased the Revised Guidelines for Defense Cooperation. The new guide-
lines aim to enhance U.S.-Japan Alliance cooperation by providing for
an Alliance Coordination Mechanism; closer operational coordination;
a whole-of-government, upgraded bilateral planning mechanism; seam-
less coordination of efforts “to ensure Japan’s peace and security in all
phases, from peacetime to contingencies”; and defense equipment and
technology cooperation as well as cooperation in space and cyberspace.
The limiting geographic reference to “Situations in Areas Surrounding
Japan” in the 1997 guidelines was omitted, theoretically expanding the
scope of alliance-based security cooperation.
• 188 •
Asia Pacific
The Republic of Korea. For over 60 years, the U.S alliance with the Re-
public of Korea has succeeded in deterring North Korea from again at-
tempting to unify the Korean Peninsula by force of arms. The resulting
armed peace has allowed for a political evolution to take place in which
the Korean people have transformed an authoritarian political system
into a vibrant democracy, while allowing the native energies of the Ko-
rean people to flourish and develop a dynamic market economy with an
international presence.
At the same time, the threat posed by North Korea to the security of
the ROK and the broader international community remains. The sinking
of the ROK navy corvette Cheonan in March 2010 and the shelling of
Yeonpyeong Island in November 2010 and the August 2015 landmine
incident at the DMZ underscore North Korea’s continuing hostility.
• 189 •
Przystup and Saunders
• 190 •
Asia Pacific
the Six Party Talks and subsequently made clear that its nuclear arsenal
will not be used as a bargaining chip to secure economic benefits.
The next administration should take the long view with respect to
North Korea—not all problems will be solvable within its term in office.
An effective policy will aim to strengthen deterrence and defense of the
ROK, maintain the external pressure of economic sanctions, and keep
the door open to dialogue and diplomacy.
To deal with the possibility of instability or regime collapse, the next
administration should work to closely coordinate U.S. and ROK objec-
tives, endstates, and policy responses and, at the same time, make every
effort to bring China into the conversation. To date China has considered
such official-level discussion to be premature.
• 191 •
Przystup and Saunders
• 192 •
Asia Pacific
• 193 •
Przystup and Saunders
land, the ROK, Russia, and the United States. In addition, the annual
Shangri-la Dialogue sponsored by the International Institute for Strategic
Studies in Singapore has served as a high-level multilateral forum for the
discussion of political and security issues.
In 2008, the Bush administration appointed the first U.S. Ambassa-
dor to ASEAN, a clear recognition of the growing importance of ASE-
AN and of the region’s expanding multilateral, diplomatic, economic,
and security forums. One explicit goal of the rebalance was to increase
the U.S. ability to help shape the emerging multilateral architecture in
the Asia-Pacific region. The Obama administration has paid particular
attention to high-level participation in the region’s multilateral institu-
tions and dialogues, with the President, Secretary of State, and Secretary
of Defense regularly attending meetings in Asia. Countries across the
region have welcomed the Obama administration’s sustained high-level
attention, but are concerned whether the next administration will place
an equally high priority there. U.S. interests would be best served by
continued high-level U.S. participation and active U.S. engagement in
efforts to shape the regional order.
• 194 •
Asia Pacific
Similarly, Assistant Secretary of State for East Asian and Pacific Affairs
Daniel Russel cast TPP as a “strategic agreement . . . the economic leg and
‘crown jewel’ of the Obama Rebalance Strategy . . . one that convincingly
demonstrates that sustained engagement by the U.S, as a Pacific nation,
is shaping an open, prosperous, rules-based region.” Russel went on to
state, “That’s why TPP is worth as much to Defense Secretary Carter as a
new aircraft carrier, as he recently said.”40
In interviews across the region over the past 2 years, political lead-
ers, diplomats, and military officials all underscored the strategic im-
portance of TPP as a benchmark of long-term U.S. commitment to the
region and the cornerstone to securing a rules-based, open international
trading order in Asia. Failure to enact TTP would be viewed as a sign
of U.S. strategic withdrawal from the region. Beyond TPP, negotiations
with the European Union on the Trans-Atlantic Trade and Investment
Partnership (TTIP) will provide the next administration an opportunity
to structure a rules-based trade and investment order that includes more
than one-third of global gross domestic product. Taken together, TTIP
and TPP provide the United States an opportunity to shape a rules-based
international economic order that advances its long-term economic and
strategic interests.
• 195 •
Przystup and Saunders
the open global trade system established by the United States after World
War II, which facilitated its economic rise. Beijing seeks to wield greater
influence within global institutions, and where possible to work with
other countries to adjust international rules and norms to better reflect
its own interests and perspectives. Nevertheless, China remains reluctant
to take on the costs, risks, and commitments necessary to play a glob-
al leadership role; its actions are usually focused on defending narrow
Chinese interests rather than aspiring for global leadership. Given that
China’s main interest in most parts of the world is to maintain stability
and secure access to resources and markets, its interests will often be
relatively compatible with those of the United States.43
U.S. and Chinese interests are less aligned at the regional level, where
there is increasing competition for influence. Over the last decade Bei-
jing has become more critical of the U.S. alliance system, arguing that it
reflects Cold War thinking and emboldens U.S. allies to challenge Chi-
nese interests. The U.S. rebalance to the Asia-Pacific and increased U.S.
regional security cooperation have stoked Chinese fears of U.S. encircle-
ment or containment. Beijing’s proposed alternatives emphasize nontra-
ditional security cooperation and the importance of resolving disputes
through peaceful dialogue. Beijing has resisted making any binding com-
mitments that might restrict its military capabilities or ability to employ
military power to defend its core interests. Its increasing military capa-
bilities and more assertive approach to maritime territorial disputes have
heightened regional concerns about how a strong China will behave,
leading most countries to improve their security ties with the United
States. If the United States emphasizes its alliances, expanding security
cooperation with other partners, and active engagement with regional
multilateral institutions, it will be able to deal with Chinese regional se-
curity initiatives and actions from a position of strength and successfully
resist Chinese efforts to erode the U.S. alliance system.
Although cooperation with China is important, U.S. policymakers
should be careful to resist Beijing’s efforts to create a U.S.-China con-
dominium or “G-2”-like arrangement. Such an arrangement would be
unlikely to last and would probably require unacceptable compromis-
es to accommodate China’s so-called core interests (including accepting
China’s territorial claims to Taiwan and in the South China Sea and East
China Sea). Accepting a Chinese sphere of influence or giving the ap-
pearance of siding with Beijing against U.S. allies would damage U.S.
credibility and compromise the U.S. position in the Asia-Pacific region.
The next administration will have the opportunity to develop a new
label for the U.S.-China relationship to replace Beijing’s preferred formu-
lation of a “new type of major country relationship.” It will be important
• 196 •
Asia Pacific
Conclusion
Over the next 4 years, the United States will be challenged to maintain
its leadership of a rules-based order in the Asia-Pacific region. U.S. di-
plomacy must play a leading role in strengthening our alliances, partner-
ships, and regional institutions that widely share the U.S. commitment
• 197 •
Przystup and Saunders
• 198 •
Asia Pacific
Notes
1
The Association of Southeast Asian Nations (ASEAN) is made up of Brunei Darus-
salam, Cambodia, Indonesia, Laos, Malaysia, Myanmar (Burma), the Philippines, Singa-
pore, Thailand, and Vietnam.
2
The World Bank, “East Asia Pacific Economic Update, October 2015: Staying the
Course,” available at <www.worldbank.org/en/region/eap/publication/east-asia-pacif-
ic-economic-update>.
3
U.S. Census Bureau, “Trade in Goods with Asia,” available at <www.census.gov/
foreign-trade/balance/c0016.html>.
4
U.S. Census Bureau, “U.S. Direct Investment Abroad for 2012–2014,” September
2015, available at <http://bea.gov/scb/pdf/2015/09%20September/0915_outward_di-
rect_investment_detailed_historical_cost_positions.pdf>.
5
East-West Center, “Asia Matters for America,” available at <http://www.asiamatters-
foramerica.org/overview>. Note that the Asia Matters for America project includes 40
countries as comprising the Asia-Pacific region.
6
Walter Lohman, Olivia Enos, and John Fleming, 2014 Asia Update: What’s at Stake
for America, Special Report No. 158 (Washington, DC: The Heritage Foundation, October
8, 2014), available at <www.heritage.org/research/reports/2014/10/asia-update-whats-at-
stake-for-america-2014>.
7
China’s official growth statistics for 1998 and 2008 do not fully reflect this slow-
down, which was partly offset by large economic stimulus packages.
8
Bonnie S. Glaser, “China’s Coercive Economic Diplomacy—A New and Worrying
Trend,” PacNet 46 (Honolulu, HI: Center for Strategic and International Studies, July 23,
2012).
9
Christopher Bodeen, “China’s Military Spending Increase to Be Smallest in 6 Years,”
Associated Press, March 4, 2016.
10
State Council Information Office, “China’s Military Strategy,” May 2015, available at
<http://eng.mod.gov.cn/Database/WhitePapers/>.
11
See Annual Report to Congress: Military and Security Developments Involving the People’s
Republic of China 2015 (Washington, DC: Department of Defense, 2015).
12
David Shambaugh, ed., Power Shift: China and Asia’s New Dynamics (Berkeley:
University of California Press, 2006); Evelyn Goh and Sheldon W. Simon, eds., China, the
United States, and Southeast Asia: Contending Perspectives on Politics, Security, and Economics
(New York: Routledge, 2008).
13
See David Shambaugh, China Goes Global: The Partial Power (New York: Oxford
University Press, 2013); Phillip C. Saunders, “China’s Role in Asia: Attractive or Asser-
tive?” in International Relations of Asia, ed. David Shambaugh and Michael Yahuda, 2nd ed.
(Lanham, MD: Rowman and Littlefield, 2014), 147–172.
14
“Remarks by President Obama to the Australian Parliament,” Canberra, Australia,
November 17, 2011, available at <www.whitehouse.gov/the-press-office/2011/11/17/
remarks-president-obama-australian-parliament>.
15
Hillary Clinton, “America’s Pacific Century,” Foreign Policy 189 (November–Decem-
ber 2011), 56–63.
16
For an analysis of the origins of the rebalance, see Phillip C. Saunders, “China’s Ris-
ing Power, the U.S. Rebalance to Asia, and Implications for U.S.-China Relations,” Issues
and Studies 50, no. 3 (September 2014), 19–55.
17
See the fact sheets from the U.S. Trade Representative’s Office, available at <www.
ustr.gov/tpp>; Jeffrey Schott, Barbara Kotschwar, and Julia Muir, Understanding the
• 199 •
Przystup and Saunders
• 200 •
Asia Pacific
35
Chang Se-jeong and Ser Myo-ja, “Xi Pressed Park on Thaad System,” Korea JoongAng
Daily, February 6, 2015, available at <http://koreajoongangdaily.joins.com/news/article/
article.aspx?aid=3000595>.
36
Available at <www.gov.ph/2014/04/29/document-enhanced-defense-coopera-
tion-agreement>.
37
“Resourcing the Pivot to East Asia and the Pacific FY 2015 Budget Priorities,” May
20, 2014, House of Representatives Subcommittee on Asian and Pacific Affairs, Commit-
tee on Foreign Affairs, 4.
38
“Fact Sheet: U.S. Building Maritime Capacity in Southeast Asia,” available at <www.
whitehouuse.gov/the-press-office/2015/11/17>.
39
Remarks by Ambassador Michael Froman at the Center for Strategic and Interna-
tional Studies, Asia Architecture Conference, September 22, 2015, Washington, DC.
40
Remarks of Daniel Russel, Assistant Secretary of State, Bureau of East Asian and
Pacific Affairs, at the Asia Society, New York City, November 4, 2015.
41
See Phillip C. Saunders, Managing Strategic Competition with China, INSS Strategic
Forum 242 (Washington, DC: NDU Press, July 2009).
42
Thomas Fingar, “China’s Vision of World Order,” in Strategic Asia 2012–2013: Chi-
na’s Military Challenge, ed. Ashley J. Tellis and Travis Tanner (Washington, DC: National
Bureau of Asian Research, 2012), 342–373.
43
Phillip C. Saunders, “Implications: China in the International System,” in The
Chinese People’s Liberation Army in 2025, ed. Roy Kamphausen and David Lai (Carlisle
Barracks, PA: Strategic Studies Institute, 2015), 301–333.
44
John Speed Meyers and Phillip C. Saunders, “Will China Start a Diversionary War?”
unpublished manuscript, April 2015.
• 201 •
10
The North Atlantic Treaty Organization and Europe
Charles L. Barry and Julian Lindley-French
The cohesion of the North Atlantic Treaty Organization (NATO), the linchpin
of the U.S. global security order for over 65 years, is threatened externally
by Russian aggression and internally by centrifugal European forces spawned
by persistent economic challenges and immigration. Yet NATO is as relevant
to the future as it was in the past. Europe is by far the region with the most
enduring ties to the United States. The world’s largest and richest region, it is
the strongest U.S. partner across all elements of power: diplomatic/political,
informational, military/security, and economic/financial. The United States
should protect this irreplaceable resource by moving with urgency to assert
strong and sustained leadership and commitment to the future of NATO’s
dominant roles in regional peace and global security. The United States
should likewise strengthen its ties to individual European nations and with
the European Union to underscore its enduring support for an appropriately
integrated and prosperous Europe at peace.
• 203 •
Barry and Lindley-French
• 204 •
The North Atlantic Treaty Organization and Europe
• 205 •
Barry and Lindley-French
• 206 •
The North Atlantic Treaty Organization and Europe
members plus representatives of the EU and many partners, and they are
watched around the world. NATO convenes a special meeting between
NATO members and Russia after each summit, adding to their potential
to improve international relations and reduce tensions. NATO and its
members typically begin to prepare for summits a year before.
• 207 •
Barry and Lindley-French
• 208 •
The North Atlantic Treaty Organization and Europe
pers are distributed after meetings with dissenting views included. These
practices indicate there is flexibility at least in the formative stages. The
Supreme Allied Commander Europe could be authorized to complete
select contingency planning and steps toward military alerts to reduce
the complexity of reaching decisions in a crisis.12
The new U.S. administration should decide on one or two techniques
for improving consensus decisionmaking and refine them with key Al-
lies. Transparency with other members should be part of the plan, and
their views should be brought into the mix before a final proposal is on
offer. The rewards will be reinforced cohesion and stronger support for
reform. In the end there will also be greater participation in implemen-
tation.
• 209 •
Barry and Lindley-French
• 210 •
The North Atlantic Treaty Organization and Europe
• 211 •
Barry and Lindley-French
• 212 •
The North Atlantic Treaty Organization and Europe
Full-Spectrum Deterrence
The United States should lead NATO toward a 21st-century vision of stra-
tegic deterrence. Deterrence cannot plateau with the operational or tac-
tical positioning of a few ready units. In order to be credible, deterrence
must be strategic as well: geographically broad, resourced in depth and
across the spectrum of forces from conventional to nuclear. Geograph-
ically, NATO capabilities must deter risks from the north as well as the
east and south. Nuclear deterrence requires exercising in that realm too,
something that has been absent for 25 years. A conceptual 360-degree
deterrence posture must be full spectrum—effective against terrorism
and hybrid threats as well as conventional and nuclear threats. Strate-
gic deterrence also means up-to-date mobilization and exercise plans to
bring the full weight of national forces, industry, and resources to bear
against any serious challenge.42 Highlights of national plans should be
reflected in the NATO Defense Planning Process, including mobilization
of critical civil resources and relevant industrial capacity.
Cyber Defense
In conflict and peacetime, no domain is more contested than cyberspace.
The Alliance should undertake to coordinate national command activi-
ties relevant to NATO by creating a Coordination Center for Operational
• 213 •
Barry and Lindley-French
Cyber Forces.43 NATO cyber defense requires steady investment via com-
mon funding. This reflects universal dependence on information systems
for mission execution, the fast-paced nature of technology evolution,
and the rapid evolution of cyber. A top priority is to ensure protection of
Alliance data on national systems connected to NATO networks.
Ten years after first being defined, it is time for NATO cyber defense
requirements to transition from incremental project-based funding to a
planned level of common funding. The reality of universal dependence
on information systems for mission execution makes steady NATO fund-
ing an imperative. Fast-paced technology evolution and the rapid mor-
phing of the cyber threat environment ensure cyber defense has become
a fundamental item in NATO resource planning.
Missile Defense
Missile defense is an essential Article 5 capability.44 It has been a goal
of NATO for 15 years given ever-growing missile threats, including po-
tential weapons of mass destruction payloads. The Alliance is making
progress toward missile defense for all allied territory and populations.
• 214 •
The North Atlantic Treaty Organization and Europe
Systems are also in place for protecting deployed troops. Aegis systems,
both ship-borne (based in Spain) and land-based (in Romania), cover
the southern regions of the Alliance. Another Aegis system is under de-
velopment in Poland. This will be the final piece of the U.S. European
Phased Adaptive Approach missile defense system. It requires funding
through 2018. When completed NATO will have an Article 5 collec-
tive defense capability against missile attacks. Other Allies contribute
to NATO missile defense with land- and sea-based systems, and these
contributions should expand. The latest countries to join the program
are Denmark, the Netherlands, and Spain.45
Missile defense is also a major NATO-Russia issue. Russia fears NATO
capabilities may neutralize the missile and rocket forces it relies on for
national defense, both conventional and nuclear, creating a destabilizing
situation of Russian vulnerability.46 Russia wants NATO to terminate its
missile defense program or allow Russia in as co-directors and decision-
makers. NATO has stated neither option is acceptable. Thus there is an
impasse at a time when risks have increased and communications are
minimal. Given that some 30 countries have missile systems capable of
reaching NATO territory, the need for effective missile defense is clear.47
It will come, however, at the price of continued Russian intransigence.
• 215 •
Barry and Lindley-French
resolved.48 Allies want to assert their resolve that Russia not have a de
facto veto over new members. However, it is equally important to take
in new members only where there is demonstrable mutual benefit to se-
curity. Expansion for expansion’s sake is unwise. For some, a permanent
partnership is all that is desired. Militarily neutral Serbia is an example of
a NATO partner (since 2006) that does not aspire to membership.
Bosnia-Herzegovina’s long, slow Membership Action Plan process is
hampered by internal political disputes between its two entities, Republika
Srpska and the Federation of Bosnia and Herzegovina. Near-term goals
are further reconciliation and avoidance of retrenchment or open conflict.
Membership for Ukraine and Georgia will continue to be conten-
tious with Russia. Russia commenced military operations in Georgia and
Ukraine in part to send a clear signal that membership in NATO now is
unacceptable. In spite of NATO’s 2008 Bucharest Declaration (one repeat-
ed at Wales) that both countries will become members, NATO should be
in no hurry. Both will take some time to complete Membership Action
Plans, a process neither has begun. Their priority should be much-need-
ed internal reforms. The goal should be to draw them closer to NATO as
active partners, along the examples set by Finland and Sweden.
Reform
NATO should respond to recent terrorist attacks and other threats fac-
ing the Alliance by solving its longstanding failure to share informa-
tion. Many attempts have failed at getting Allies to generate more than a
minimalist and untimely intelligence picture. A major transformation is
called for. A worthy solution is to invest in a standing committee of na-
tional intelligence directors, answerable to the NAC and parallel in both
structure and process to the Military Committee. Such an institution is
the only way to establish a culture of information-sharing not only for
terrorism but also for threats in every domain.
Alliance-wide reforms were initiated at the 2010 Lisbon Summit and
endorsed in 2012 at Chicago.49 These included reforms to NATO head-
quarters staffs, military command structure, and agencies. Reforms were
also enacted for Alliance resource management and common funding
processes. At the start of 2017 the focus should be on developing team
excellence, assessing performance, and making adjustments.
There is an urgent need to achieve far greater outcomes from Alliance
programs and operations. The culprit here is the unavoidable political
processes that are necessary for the Alliance to function at all. The solu-
tion is greater cooperation and more effective leadership, not just by the
Secretary General and the United States but by all members. No member
should merely “show up” and be minimally engaged. Representatives
• 216 •
The North Atlantic Treaty Organization and Europe
must know the processes and prepare well. Military commands should
receive all the properly trained and skilled personnel nations promised.
Leaders and staffs alike should lean in and be willing to support initia-
tives even as they protect essential prerogatives.
• 217 •
Barry and Lindley-French
First, the United States and the EU should agree on a new 21st-cen-
tury pact to replace the limited and ancient 1995 New Transatlantic
Agenda that still defines their relationship. There is much to build on
through transatlantic cooperation in diplomatic, political, and economic
realms. Development aid is one area. Prevention of and recovery from
crises and conflict are other portfolios. And there are myriad other issues
from terrorism (a mainstay of the 1995 agreement that should endure)
to environmental, social, and poverty issues among the disenfranchised.
Second, the United States should actively collaborate with the EU on
strategies to alleviate its most acute problems. This might include work-
ing with the World Bank and International Monetary Fund to find new
approaches to the euro crisis, within the context of a recovering global
economy. This might also include collaboration on border security to
address overwhelming refugee flows.
Third, the United States should work with the EU to preserve its co-
hesion in the face of persistent attempts by Russia to divide Union mem-
bers on a host of issues from energy supplies to sanction support related
to Russian aggression against Ukraine. Closer transatlantic ties will help
ward off hybrid attacks against the EU by partnering on cyber security,
energy security, strategic communications, and counterterrorism.
NATO-EU relations have unquestionably been affected by the June
2016 Brexit referendum vote to leave the EU, a historic event. Though
future EU-UK relations are a matter for the parties to negotiate, the United
States should make known to both sides its major interests in a strong EU
as well as a healthy United Kingdom. We can neither take solace nor be
a disinterested party in seeing the EU unravel politically, a potential that
Brexit may portend as anti-EU sentiments strengthen into political move-
ments within other members’ polities. We cannot know whether Brexit
will ultimately be a positive for the United Kingdom. However, it is already
positive for a Russia intent on eroding EU solidarity on economic sanc-
tions and its overall political resolve. Spillover into NATO decisionmaking
and cohesion cannot be ruled out, and in fact should be anticipated.
No one anticipates the EU disintegrating, and the immediate risk of
further “leave” votes appears low. However, Brexit has strengthened sim-
ilar political movements across Europe, most notably in France, Ger-
many, and Spain, and it would be unwise to ignore their genesis. For
Brussels, the UK “leave” vote should kindle determination to build a
more politically credible EU, one less focused on regulating and more
intent on addressing the day-to-day concerns of its citizenry. The United
States should urge the EU to move in that direction. No matter its faults,
it is hard to see how disintegration could best the status quo ante, even
for the United Kingdom.
• 218 •
The North Atlantic Treaty Organization and Europe
The United Kingdom has made clear its desire to maintain access to
the EU’s single market. The most probable path will be arduous negotia-
tions between London and Brussels on bilateral agreements rather than,
for example, rejoining the European Free Trade Association or otherwise
coordinating trade relations as a member of a group. The United King-
dom must also negotiate new agreements around the globe, heretofore
arranged for it by the EU. However, negotiating any new trade relations
must await completion of the Brexit separation process that the United
Kingdom will initiate by invoking Article 50 of the Treaty on European
Union (also called the Lisbon Treaty). That step is expected to be tak-
en in spring 2017. Negotiations are anticipated to take 2 years. During
that time Brexit will be the dominant preoccupation in UK-EU relations,
demanding much top-level attention by both sides. The United States
should take account of the magnitude and duration of this distraction
over the next several years.
The future foundation for transatlanticism should be a mutual U.S.-
EU commitment to NATO as the primary security provider for Europe.
This will allow mutual cooperation in a host of nonmilitary yet urgent
priorities essential to regional and global prosperity. The United States
should design programs that highlight the mutual value of a strong part-
nership with the EU to spread global prosperity. U.S.-EU cooperation
should also help surmount the final obstacle (the Cyprus conflict) to
building a collaborative and comprehensive NATO-EU transatlantic cri-
sis response capacity.52 This is sorely needed. The EU has superb capacity
for conflict prevention and postconflict recovery, and NATO has taken
on the heavier lifting of the in-between mission of crisis response. As the
two institutions learned in Kosovo, they will eventually find modalities
of cooperation during a crisis, but they can do so much better if they can
plan ahead.
• 219 •
Barry and Lindley-French
Notes
1
This point is brought out in an excellent piece on developing strategy, advising that
one strategic consideration is that “it is always better with allies.” See R.D. Hooker, Jr.,
“‘The Strange Voyage’: A Short Précis on Strategy,” Parameters 42, no. 4/43, no. 1 (Winter/
Spring 2013), 67.
2
For more elaboration on the many ways the North Atlantic Treaty Organization
(NATO) continues to serve U.S. interests, see W. Bruce Weinrod, “We Still Need NATO,”
The American Interest, January 15, 2016, available at <www.the-american-interest.
com/2016/01/15/we-still-need-nato/>.
3
Julian Lindley-French, The North Atlantic Treaty Organization: The Enduring Alliance,
2nd ed. (Milton Park, UK: Routledge, 2015), chapter 7.
4
As an example, President Barack Obama did not formally meet with new NATO
Secretary General Jens Stoltenberg until May 2015, 8 months after Stoltenberg took
office, in spite of the ongoing crisis with Russia, a request to do so from NATO, and a
multiday Stoltenberg visit to Washington, DC, in the interim. See Josh Rogin, “Obama
• 220 •
The North Atlantic Treaty Organization and Europe
Snubs NATO Chief as Crisis Rages,” Bloomberg.com, March 24, 2015, available at <www.
bloombergview.com/articles/2015-03-24/obama-snubs-nato-chief-as-crisis-rages>.
5
Examples of NATO’s global engagement include its cooperation with China in
anti-piracy operations in the Gulf of Aden, airlift and training with the African Union in
Addis Ababa, earthquake relief operations in Pakistan in 2005, and humanitarian relief
airlift operations for earthquake victims in the Philippines in 2013. See NATO Web site at
<www.nato.int/>.
6
S.R. Covington, Putin’s Choice for Russia (Cambridge, MA: Belfer Center for Science
and International Affairs, 2015), 12. See also February 2016 National Public Radio
(NPR) interview with Lieutenant General Ben Hodges, USA, commander, U.S. Army
Europe, who made the same point as firsthand experience; available at <www.npr.
org/2016/02/05/465672051/u-s-presence-in-eastern-europe-is-vital-commanding-gener-
al-says>.
7
Paul Gallis, NATO Decision-Making Procedure, RS21510 (Washington, DC: Congres-
sional Research Service, updated May 5, 2003).
8
Christof Bertram, “Toward 2015–Institutions Matter,” in Visions of the Atlantic Alli-
ance, ed. Simon Serfaty (Washington, DC: Center for Strategic and International Studies,
2005), 82–83.
9
The informal “quad” was formed as the Berlin group, the three occupying powers
and Germany, to deal with issues related to the security of Berlin during the Cold War. It
continued as the quad after the Cold War but was abandoned during strong disagreement
over requests from the United States for NATO support for the invasion of Iraq. It has not
been functional since 2003.
10
The method of Alliance decisionmaking is not specified in the Washington Treaty
except with regard to Article 10 dealing with the acceptance of new members. In that one
case, the Alliance must be unanimous. Consensus was adopted early to reflect collective
decisions of sovereign members. See “Consensus Decision-Making at NATO,” March 14,
2016, available at <www.nato.int/cps/en/natolive/topics_49178.htm>.
11
Edgar Buckley and Kurt Volker, NATO Reform and Decision Making, Issue Brief
(Washington, DC: Atlantic Council, February 2010), 2
12
Leo G. Michel, NATO Decisionmaking: Au Revoir to the Consensus Rule? INSS Strategic
Forum 202 (Washington, DC: NDU Press, August 2003), 6–7.
13
Lindley-French, chapter 5. Operation Allied Force was a bombing campaign against
Serbia, a Slavic partner of Russia, from March 24 to June 10, 1999. Its success forced
withdrawal of Serbian forces from the province of Kosovo, allowing its protection from
Belgrade by NATO forces to this day. The bombing had a significant adverse effect on
Russian perceptions of NATO.
14
See Military Doctrine of the Russian Federation, December 26, 2014, para. 12
(“The Main External Military Dangers”), a. (NATO), available at <www.scribd.com/
doc/251695098/Russia-s-2014-Military-Doctrine>.
15
See Weinrod for congressional testimony statement by Chairman of the Joint Chiefs
of Staff General Joseph Dunford. For U.S. and NATO, see General Phillip M. Breedlove,
USAF, United States European Command Theater Strategy (Stuttgart-Vaihingen, Germany:
Headquarters U.S. European Command, October 2015), 4.
16
Bridget Kendell, “Rhetoric Hardens as Fears Mount of a New Cold War,” BBC.com,
November 14, 2014, available at <www.bbc.com/news/uk-30010263>; Dmitri Trenin,
“Welcome to Cold War II,” Foreign Policy, March 4, 2014, available at <http://foreignpoli-
cy.com/2014/03/04/welcome-to-cold-war-ii/>.
17
Covington, 21; NPR, Hodges interview.
• 221 •
Barry and Lindley-French
18
Charles Barry, interviews with national defense officials in Lithuania, Latvia, and
Estonia, February 2015.
19
F. Stephen Larrabee and Peter A. Wilson, “NATO Needs a Southern Strategy,”
National Interest, January 27, 2014, available at <http://nationalinterest.org/commentary/
nato-needs-southern-strategy-9769>.
20
All data are for actual expenditures in 2014, unless otherwise noted.
21
Wallace J. Thies, Friendly Rivals: Bargaining and Burdenshifting in NATO (Armonk,
NY: M.E. Sharpe, 2003).
22
Europe used here means the 28 European Union (EU) countries plus non-EU
NATO members Albania, Norway, and Turkey (31 countries). See World Bank, “European
Union,” available at <http://data.worldbank.org/region/EU>; World Bank, “United States,”
available at <http://data.worldbank.org/country/united-states>.
23
Calculations based on data from Military Balance 2016 (London: Institute for Inter-
national Strategic Studies [IISS], 2016), chapter 4.
24
Ibid. All data in this section refer to 2014 actual defense spending, unless otherwise
noted.
25
An interesting fact is that, applying IISS data, Europeans would only need to
spend €1.86/person/day to reach 2 percent. Today they only average €1.24/person/
day. The difference: €0.6 euros. In contrast, the United States spends the equivalent of
€6.30/person/day.
26
For example, a force consisting of U.S., United Kingdom, French, Polish, and
German divisions, with brigades from Italy, Spain, Turkey, and the Nordic members and
battalions from the others, would constitute a full field army, larger than the Russian
Federation could deploy in the east.
27
This number includes Russia, whose partnership with NATO is suspended but has
not been dissolved by either party in a formal sense.
28
Breedlove, 6.
29
The initial partners invited at Warsaw to become “enhanced opportunity partners”
are Australia, Finland, Georgia, Jordan, and Sweden. See Warsaw Summit Communique,
para. 101.
30
At Warsaw, NATO also announced that its international staff will soon begin work-
ing-level ties with the international staff of the Gulf Cooperation Council (GCC). The four
Istanbul Cooperation Initiative (ICI) partners—Bahrain, Qatar, Kuwait, and the United
Arab Emirates—are all members of the six-nation GCC, and NATO has long held open
invitations for the remaining GGC members, Oman and Saudi Arabia, to join the ICI.
31
NATO’s eight partners across the globe reveal two distinct groups: Afghanistan,
Iraq, and (to a lesser extent) Pakistan are partners seeking improvement of weak security
capacity; Australia, Japan, the Republic of Korea, Mongolia, and New Zealand are stable
partners contributing to NATO missions and pursuing interoperability.
32
Breedlove, 6.
33
NATO Wales Summit Declaration, September 5, 2014, para. 49. This affirmation
is also found in the 2012 Chicago Summit Declaration (para. 58) and the 2010 Alliance
Strategic Concept (para. 17) approved at the Lisbon Summit of that year.
34
John R. Galvin, Fighting the Cold War: A Soldier’s Memoir (Lexington: University
Press of Kentucky, 2015), 360. Writing about his thoughts as Supreme Allied Command-
er Europe after a discussion with Chairman of the Joint Chiefs of Staff Admiral William J.
Crowe in early 1990, General Galvin stated, “For my part, I had become convinced that
NATO could defend itself without the use of nuclear weapons at all.” For much fuller
treatment of military as well as political factors impacting theater nuclear weapons utility,
• 222 •
The North Atlantic Treaty Organization and Europe
refer to Laurence T. Martin, “Concluding Remarks: Reflections on the Forty Years’ History
of TNF [theater nuclear forces],” in The History of NATO TNF Policy: The Role of Studies,
Analysis and Exercise Conference Proceedings, Volume II, Papers and Presentations, ed. R.L.
Rinne (Livermore, CA: Sandia National Laboratories, February 1994), 311–321, available
at <www.iaea.org/inis/collection/NCLCollectionStore/_Public/26/072/26072023.pdf>.
35
Synthesis of March 5–6, 2012, roundtable featuring three European institutes—In-
stitut de Relations Internationales et Stratégiques (IRIS, France), Institut für Friedensfor-
schung und Sicherheitspolitik an der Universität Hamburg (Germany), British American
Security Information Council (United Kingdom)—and the Washington, DC–based Arms
Control Association. IRIS report, April 2012.
36
This is a good point at which to emphasize that TNF is the only nuclear capability
subject to NATO decisionmaking. The strategic nuclear forces of NATO’s nuclear mem-
bers—France, the United States, and the United Kingdom—are employed by national
decisions of those powers alone. NATO is tied to the U.S. strategic nuclear umbrella by
the North Atlantic Treaty. In an attack demanding a nuclear response, presumably NATO
would first attempt to secure its territory by conventional means and then by TNF. An
unlimited strategic nuclear war would call for the national decisions noted here.
37
Germany and Italy use the Panavia Tornado IDS fighter as a dual-capable aircraft
platform (DCA). Belgium and the Netherlands use the F-16A/B, and Turkey uses the
upgraded F-16C/D (Block 50). Both basic models were introduced in 1974, though all
are presumed updated to some degree. Italy, the Netherlands, and Turkey are to purchase
the U.S. F-35A, a new DCA aircraft. Germany was to retire the Tornado in 2015 but will
keep it until 2020 at least. See Justin Bronk, “The Forced Evolution of Europe’s Tactical
Nuclear Capability,” RUSI Defense Systems, February 1, 2016, available at <https://rusi.
org/publication/rusi-defence-systems/forced-evolution-europe%E2%80%99s-tactical-nu-
clear-capability>.
38
The five European NATO members hosting an aggregate of fewer than 200
U.S.-controlled B61 gravity bombs are Belgium, Germany, Italy, the Netherlands, and
Turkey. Italy, the Netherlands, and Turkey are already committed to purchase the
dual-capable U.S. F-35 Lightning II. Belgium is undecided and Germany has no plans
for the F-35.
39
The United States will convert current B61 Mod 3 and 4 TNF weapons to digital
Mod 12 weapons within 10 years, allowing the EF 2000 to be modified for the DCA role.
See Bronk.
40
The Very High Readiness Joint Task Force (VJTF) is similar to the Allied Com-
mand Europe Mobile Force–Land (AMF-L), NATO’s initial response force from the early
1960s until 2002. Both forces are broad-participation (14–22 nations) multinational
brigade-size units of 5,000, kept on high alert at home bases until called on. However,
AMF-L was comprised of assigned forces under a permanent active headquarters. VJTF is
comprised of units and a command that rotates each year, following an intense train-up
and certification process. Views differ on the merits of the two designs.
41
Charles Barry, Building Future Transatlantic Interoperability Around a Robust NATO Re-
sponse Force, Transatlantic Current Paper 7 (Washington, DC: NDU Press, October 2012).
42
Author discussion at NATO headquarters in July 2012 with a senior allied military
officer. Response to author’s question regarding force reconstitution and mobilization was
simply that “we have no such plans.”
43
The model for such a center is the Special Operations Forces (SOF) Coordination
Center that resulted from the 2006 Riga Summit initiative on SOF transformation. Today
that center has evolved into the very successful NATO SOF headquarters under Allied
Command Operations.
44
Lindley-French, chapter 6.
• 223 •
Barry and Lindley-French
45
Breedlove, 10–11.
46
Julianne Smith, The NATO-Russia Relationship, Project Report (Washington, DC:
Center for Strategic and International Studies, November 2008), 13.
47
For more detailed information and a chronology of allied missile defense develop-
ment, see NATO, “Ballistic Missile Defense,” available at <www.nato.int/cps/en/natolive/
topics_49635.htm>.
48
NATO’s Warsaw Summit Declaration, para. 1, July 9, 2016, available at <www.nato.
int/cps/en/natohq/official_texts_133169.htm>.
49
NATO Chicago Summit Declaration, paras. 69–73.
50
In the security arena, the United States has developed common efforts on assistance
to Africa through U.S. Africa Command and on common concerns in the areas of securi-
ty-sector reform, terrorism, and cyber security.
51
James G. Stavridis, “Once Again Europe Needs America,” Politico.com, January 21,
2016, available at <www.politico.eu/article/europes-security-disorder-demands-amer-
ican-help-pressure-refugees-social-strain-open-borders/>; also see Damon Wilson,
“Rallying the Transatlantic Community to a Greater Purpose,” Atlantic Council, February
3, 2016, available at <www.atlanticcouncil.org/blogs/new-atlanticist/rallying-the-transat-
lantic-community-toward-a-greater-purpose>.
52
Lindley-French, chapter 7.
• 224 •
11
Russia
Peter B. Zwack
• 225 •
Zwack
• 226 •
Russia
• 227 •
Zwack
• 228 •
Russia
• 229 •
Zwack
of the border.24 The border dispute along the Ussuri River that culmi-
nated in bloody clashes between the Soviet Union and China in 1969
was pragmatically resolved in 2004.25 Additionally, trade and military
contact have increased, including the signing of a natural gas deal.26
With Russia embroiled in eastern Ukraine and Syria and China increas-
ingly committed to exerting influence and control within the Spratley
and Senkaku islands, these arrangements relaxed tensions over their
2,700-mile land border.27
Looking long term, however, one could see a natural tension reoccur-
ing along this resource-rich zone, especially on the Russian side. Russia’s
Far East and Eastern Siberia are rich in natural resources beyond oil and
gas that resource-starved China could covet. For years Russian locals along
the border have complained about illegal Chinese logging activity along
their remote border regions.28 Notably a huge chunk of the Russian Far
East, including those lands that encompass Vladivostok east of the Amur
River, was annexed by Imperial Russia from the weak Qing Dynasty in the
mid-1800s and formalized by the Treaties of Aigun (1858) and Peking
(1860)—a fact that has not been forgotten by Chinese historians.29 While
the Russians and Chinese are both practicing prudent foreign policy re-
garding one another, they are not natural friends or allies, with a history,
culture, religion, and ethnicity that are different from one another.
Central Asia
In Central Asia Russia sees the five independent FSU nations of Kazakh-
stan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan within its
“privileged sphere of influence” and will take firm action to ensure that
no excessive foreign military presence takes root in the region.30 What-
ever its post-Soviet imperial desires, Russia does not have the military
means to retake and occupy these diverse states. Therefore, it has taken
measures to maintain a strong and influential regional suzerainty among
them. There is little doubt that Russia has military contingency plans to
prop up Central Asia’s existing regimes and is prepared to counter a wide
range of scenarios, including extremist Islamists or so-called color rev-
olutions, that might lead toward some form of local liberal democracy.
This is a major reason that the Russian-controlled CSTO exists, whose
members include Kazakhstan, Krygyzstan, and Tajikistan (Uzbekistan
withdrew in 2012) as well as Belarus and Armenia.31 While likely impos-
sible today due to an extreme trust deficit, it could be far-sighted to offer
exchanging modest observer missions among Russia-controlled CSTO,
Chinese-led SCO, and U.S.-NATO.
The dynamics of Central Asia have evolved since the Soviet Union’s
breakup in 1991. In the 1990s, with Russian power and influence di-
• 230 •
Russia
The Caucasus
This complex, fractious region of both Russia and the FSU looms as dy-
namic and contentious in the years ahead. An ethnic, religious, and mi-
gratory crossroads for centuries, the Caucasus bifurcates both the Black
and Caspian seas and presents significant current and future security
challenges for Russia. The issues are not only geostrategic and economic,
but also ethnic, linguistic, and religious.
The clumsy Russian invasion of Georgia in 2008 served notice to the
region and the world that Russia would remain engaged in the FSU and
not tolerate what it perceived to be discrimination against ethnic Rus-
sians living outside Russia after the breakup of the Soviet Union. South
Ossetia and Abkhazia, wrested into autonomous “statelets” by force of
arms, remain a frozen conflict between Russia and Georgia.37 The Rus-
sian 102nd Military Base garrison in Armenia, consisting of about 3,000
troops, remains the guarantor of Christian Armenia that borders hostile
Azerbaijian.38 Smarting and revanchist over their 1990’s losses in still
simmering Nagorno-Karabagh, Azerbaijan in April 2016 launched ma-
jor incursions using late model Russian-provided weapons that shook
• 231 •
Zwack
• 232 •
Russia
The West
Any discussion about the West must begin with the Russian psychosis
toward what it perceives as a liberal democratic and economic system of
governance and finance that is totally at odds with, and perceived to be
• 233 •
Zwack
an existential threat to, the Russian state. NATO and the EU are seen as
the hard-power and soft-power agents that threaten Putin’s regime. With
a false narrative designed to present and pump up external threats and re-
inforce Russian self-reliance and internal controls, the regime sees Russia
in a permanent state of competition and confrontation with the West. As
events have shown since Georgia in 2008, Russia will use force, overt or
nonattributed, if it feels its direct interests are threatened, especially with-
in the FSU. Russia does not want to go to war with NATO or the United
States, but certainly feels threatened by them, and has singled out the
Alliance as its principal adversary.57 As such it prepares its military and is
mobilizing its societal base for what some would say is inevitable war.58
Russia’s obsession with so-called color revolutions and regime change
reveals Putin’s deep insecurity concerning the legitimacy of his regime
within the eyes of Russia’s own domestic population.59 Secure nations,
comfortable with their governance and secession processes, do not obsess
and talk about regime change. Since Muammar Qadhafi’s fall in 2011 in
Libya, and the large-scale and apparently frightening Bolotnaya protests
in Moscow in 2011–2012, the Russian media and official pronounce-
ments have sounded increasingly strident.60 In spring 2014 a main theme
at the Moscow Security Conference, and again in 2015 and 2016, was
the perceived threat to Russia of Western-backed color revolutions. Some
Russian variation of President Yanukovych’s ignominious February 2014
fall from power in Ukraine is likely what “keeps Putin up at night.”
Anyone in Russia over 45 years old remembers the fall of Communism,
when a restive Soviet population induced by deteriorating economic con-
ditions, a discredited ideology, and the unpopular conflict in Afghanistan
pressed Soviet leaders such as Mikhail Gorbachev and Boris Yeltsin to take
bold reform measures. Those measures unintentionally led to the breakup
of the Soviet Union in December 1991 and to a new Russia—shorn of 14
of its republics comprising one-third of its landmass and half its popu-
lation including 25 million ethnic Russians. This remarkable event was,
and still is, a bitter pill for many Russians. The difficult and mismanaged
economic reforms in the 1990s saw the rise of the first wave of oligarchs.
Western political chortling following victory in the Cold War, and poorly
handled insurgencies and conflicts in Chechnya and the Russian “near
abroad,” helped pave the way for a strong no-nonsense leader when Putin
became President of Russia in 2000.
From the Western perspective, NATO enlargement focused on the in-
corporation of newly sovereign states into a democratic, market-based
system with only defensive intentions. The Alliance worked hard to
bring Russia into its fold as a partner in the 1990s, resulting in the NA-
TO-Russia Founding Act and NATO-Russia Council.61 Both Russia and
• 234 •
Russia
• 235 •
Zwack
• Russia had not anticipated the simultaneous fall in oil prices and the
inflation of the ruble. These, combined with EU sanctions, placed
great stress on the Russian economy.75
• 236 •
Russia
Despite the apparent success in Syria and elsewhere, these four strate-
gic developments will continue to extract a high cost in exchange for
limited gains.
• 237 •
Zwack
• 238 •
Russia
initial cyber and electronic warfare onslaught to blind and deafen U.S.
command and control, intelligence, surveillance, and reconnaissance, as
well as space and navigational capabilities. Kinetic strikes would follow
to attack U.S. and allied capital ships and forward-based aviation with
an opening barrage of precision munitions. The loss of these symbols
of Western power and prestige would be followed by a declaration of
Russian readiness to use nuclear weapons if the United States were to
respond in kind.91 These approaches suggest a defensive mindset by a
nation that understands it is globally outmanned and outgunned, except
in the nuclear realm. In any initial phase of a conflict, Russia will use sur-
prise and shock as a decisive force multiplier. For any major preplanned
scenario, Russia will have to stage a discreet mobilization and call-up of
reserves to buttress its standing forces.
Russia’s military buildup and modernization are hampered by the
effects of ongoing sanctions and the overall weakened state of the Rus-
sian economy.92 This resulted in the announcement of a 5 percent re-
duction in the 2016 modernization budget.93 Relatedly, since the Cold
War, the diplomatic ties holding together much of global arms develop-
ment and proliferation have been unraveling. At an impasse over mis-
sile defense and increased Russian obsession about strategic U.S. global
conventional strike capabilities, the possibility for a tactical-to-strategic
nuclear exchange triggered by an accident or incident is now greater
than during the Cold War.94 The New Strategic Arms Reduction Treaty
and Open Skies Agreement are increasingly questioned, the Nunn-Lu-
gar Cooperative Threat Reduction initiative is history, the Convention-
al Armed Forces in Europe treaty is suspended, and the Anti-Ballistic
Missile Treaty is scrapped.95 Furthermore, a longstanding agreement
signed in 2000 between the United States and Russia for the mutual
disposal of dangerous military plutonium stockpiles was recently can-
celed by Russia.96 Besides actively working to reduce nuclear arsenals
and to moderate the building and testing of new destabilizing weapons,
these treaty regimens (with their associated communities of diplomats,
scientists, and bureaucrats that met nearly every working day) were
confidence-building measures that reduced tensions and enhanced un-
derstanding between the United States and the Soviet Union/Russia.
The same could be said for U.S. and Russian (diminished but still ac-
tive) cooperative space programs.
Where is all this headed? The United States and Russia remain at odds
both officially and in much of written and spoken media. Russia contin-
ues to work to divide Western allies and partners politically, domestical-
ly, and economically (principally through energy deliveries). Its disinfor-
mation machine, modulated directly by the Putin regime, is a good way
• 239 •
Zwack
• 240 •
Russia
that remain fighting and indefinitely exposed within Middle Eastern civil
and sectarian wars.
To navigate this complex relationship, the following recommenda-
tions might warrant consideration by U.S. policymakers:
• 241 •
Zwack
• Build political offramps to ensure that countries do not fall into stra-
tegic brinksmanship.
• Reiterating the first point: Rebuild atrophied personal links and con-
duits between key Western and Russian political and military lead-
ers, despite inevitable disagreements and disinformation. Establish a
network of crisis “first responders” on both sides that could rapidly
intervene at the regional level in event of a fast-breaking accident or
incident.
• 242 •
Russia
Notes
1
“Malaysia Airlines Flight MH-17 Shot Down by Russian Built Buk Missile, Dutch
Report,” Reuters, October 13, 2015, available at <www.financialexpress.com/article/
india-news/malaysia-airlines-flight-mh17-shot-down-by-russian-built-buk-missile-dutch-
report/150745/>.
2
Michael Birnbaum, “Ruble Stabilizes in Russian Crisis, but Putin and Kremlin Re-
main at Risk,” Washington Post, December 17, 2014, available at <www.washingtonpost.
com/world/ruble-swings-against-dollar-putting-pressure-on-russias-putin/2014/12/17/
f8328bd8-8578-11e4-abcf-5a3d7b3b20b8_story.html>.
3
David Amos, “Russian Protests, December 10 As It Happened,” The Telegraph (Lon-
don), December 10, 2011.
4
David Herzenhorn, “Ukraine Says It Captured Two Russian Soldiers,” New York
Times, May 18, 2015, available at <www.nytimes.com/2015/05/19/world/europe/ukraine-
captured-two-russian-soldiers.html?_r=0>.
5
Anna Borshevskaya, How Russia Views the Iran Nuclear Talks, PolicyWatch 2383
(Washington, DC: The Washington Institute, March 12, 2015), available at <www.wash-
ingtoninstitute.org/policy-analysis/view/how-russia-views-the-iran-nuclear-talks>.
6
Gordon G. Chang, “China and Russia, Axis of Weak States,” World Affairs, March/
April 2014, available at <www.worldaffairsjournal.org/article/china-and-russia-axis-weak-
states>.
7
Tom Kutsch, “The Risks of Russia’s Intervention in Syria,” Al Jazeera America,
October 2, 2015, available at <http://america.aljazeera.com/articles/2015/10/2/the-risks-
of-russias-intervention-in-syria.html>.
8
Jonathan Marcus, “Russia S-400 Syria Missile,” BBC, December 1, 2015, available at
<www.bbc.com/news/world-europe-34976537>.
9
Mike Eckel, “Russia’s Shock and Awe,” Radio Free Europe/Radio Liberty, October 7,
2015, available at <www.rferl.org/content/russia-syria-shock-awe-military-air-strikes-in-
formation-warfare/27293854.html>.
10
“Russia to Send Its Aircraft Carrier to Eastern Mediterranean,” Associated
Press, September 21, 2016, available at <www.foxnews.com/world/2016/09/21/rus-
sia-to-send-its-aircraft-carrier-to-eastern-mediterranean.html>.
11
Natalia Antonova, “Why Russia Fears Ukraine,” The Moscow Times, August
28, 2014, available at <www.themoscowtimes.com/opinion/article/why-russia-fears-
ukraine/506072.html>.
12
Peggy McNerny, “Putin Regime Unable to Change Course,” UCLA International
Institute, March 16, 2015, available at <www.international.ucla.edu/Institute/Arti-
cle/151035>.
• 243 •
Zwack
13
Joseph Chamie and Barry Mirkin, “Russian Demographics: The Perfect Storm,” Yale
Global Online, December 11, 2014, available at <http://yaleglobal.yale.edu/content/rus-
sian-demographics-perfect-storm>.
14
Kurt Hepler, “Russia’s Far East, Future Opportunities and Challenges,” The Kennan
Institute of the Wilson Center, October 11, 2015, available at <www.wilsoncenter.org/
publication/the-russian-far-east-future-opportunities-and-challenges-to-russias-win-
dow-the-pacific>.
15
World Population Review, “Russian Population 2016,” available at <http://world-
populationreview.com/countries/russia-population/>.
16
Ibid.
17
Ibid.
18
M. Zuhdi Jasser, “Russia Should Embrace Its Religious Diversity,” The Moscow Times,
July 26, 2015, available at <https://themoscowtimes.com/articles/russia-should-em-
brace-its-religious-diversity-op-ed-48531>.
19
Deborah Gordon, “Opportunities and Challenges Facing Russian Oil,” Carnegie En-
dowment for International Peace, May 28, 2013, available at <http://carnegieendowment.
org/2013/05/28/opportunities-and-challenges-confronting-russian-oil/#>.
20
David Francis, “The Race for Russian Oil,” The Week, February 27, 2014, available
at <http://theweek.com/articles/450318/race-arctic-oil-russia-vs>.
21
Nicholas Eberstadt, “Russia, the Sick Man of Europe,” The National Interest, no. 158
(Winter 2005).
22
Rakesh Krishnan, “China Emulates Russian Military Strategy in the Pacific,” August
20, 2015, available at <http://rbth.com/blogs/2015/08/20/china_emulates_russian_mii-
tary_strategy_in_the_pacific_48627.html>.
23
Justin McKurry, “Russia Says It Will Build on Southern Kurile Islands Seized from
Japan,” The Guardian (London), June 9, 2015, available at <www.theguardian.com/
world/2015/jun/09/russia-build-southern-kuril-islands-seized-moscow-tokyo-abe>.
24
Liz Bagot and Josh Wilson, “The Russian Far East, Gateway to Asia,” School of Rus-
sian and Asian Studies, May 31, 2016, available at <www.sras.org/russian_far_east>.
25
“China, Russia: An End to an Island Dispute,” Stratfor.com, July 17, 2008, available
at <www.stratfor.com/analysis/china-russia-end-island-dispute>.
26
“Russia, China Agree to Natural Gas Deal,” Stratfor.com, May 21, 2014, available at
<www.stratfor.com/analysis/russia-china-agree-natural-gas-deal-0>.
27
Dragos Turnoveanu, “Russia, China and the Far East,” The Diplomat, January 20,
2016, available at <http://thediplomat.com/2016/01/russia-china-and-the-far-east-ques-
tion/>.
28
Howard Amos, “Chinese Thirst Drives Illegal Logging in Russian Far East,” The
Moscow Times, December 5, 2012, available at <www.themoscowtimes.com/news/article/
chinese-timber-hunger-drives-illegal-logging-in-russias-far-east/472587.html>.
29
Igor Denisov, “Aigun, Russia and China’s ‘Century of Humiliation,’” Carnegie En-
dowment for International Peace, June 10, 2015, available at <http://carnegieendowment.
org/2015/06/10/aigun-russia-and-china-s-century-of-humiliation/i9o6>.
30
“Understanding the Russian Sphere of Influence,” UKEssays.com, March 23, 2015,
available at <www.ukessays.com/essays/politics/understanding-the-russian-sphere-of-in-
fluence-politics-essay.php>.
31
Alexander Cooley and Marlene Laruelle, The Changing Logic of Russian Strategy in
Central Asia: From Privileged Sphere to Divide and Conquer, Program on New Approaches
to Russian Security (PONARS) Policy Memo 261 (Washington, DC: Elliott School of
• 244 •
Russia
• 245 •
Zwack
47
Bruce Riedel, “Vlad and Yuri: How Putin Is Applying the Lessons of Afghanistan to
Syria,” al.Monitor.com, October 5, 2015.
48
Alexey Eremenko, “Why Russia’s Vladimir Putin Is Standing by Syria’s President
Assad,” NBC News, September 26, 2015, available at <www.nbcnews.com/news/world/
why-russias-vladimir-putin-standing-syrias-embattled-bashar-assas-n432936>.
49
Anne Gearan, “U.S., Russia Reach Agreement on Seizure of Syria’s Chemical
Arsenal,” Washington Post, September 14, 2013, available at <www.washingtonpost.
com/world/us-russia-reach-agreement-on-seizure-of-syrian-chemical-weapons-arse-
nal/2013/09/14/69e39b5c-1d36-11e3-8685-5021e0c41964_story.html>.
50
Lizzie Dearden, “Russia Launches First Air Strikes in Syria as Non-ISIS Rebels
Claim They Are Being Targeted,” The Independent (London), September 30, 2015.
51
Josh Cohen, “Russia’s Vested Interests in Supporting Assad,” The Moscow Times,
October 23, 2014, available at <www.themoscowtimes.com/opinion/article/russia-s-vest-
ed-interests-in-supporting-assad/509979.html>.
52
Egor Lazerev and Anna Biryukova, “20 Million Muslims Seething about Putin
Bombing Syria,” Washington Post, March 7, 2016, available at <www.washingtonpost.com/
news/monkey-cage/wp/2016/03/07/are-russias-20-million-muslims-seething-about-putin-
bombing-syria/>.
53
Dmitri Trenin, “The Revival of the Russian Military: How Moscow Reloaded,” For-
eign Affairs, May/June 2016, 26.
54
Jonathan Altman, “Russian A2/AD in the Eastern Mediterranean,” Naval War College
Review, 69, no. 1 (Winter 2016), 75.
55
Andrew Roth, “Syria Shows That Russia Built an Effective Military. Now How Will
Putin Use It?” Washington Post, March 18, 2016.
56
Alec Luhn, “Russia’s Campaign in Syria Leads to Arms Sale Windfall,” The Guardian
(London), March 29, 2016, available at <www.theguardian.com/world/2016/mar/29/rus-
sias-campaign-in-syria-leads-to-arms-sale-windfall>.
57
Karl-Heinz Kamp, “From Wales to Warsaw: NATO’s Future Beyond the Ukraine
Crisis,” American Foreign Policy Interests 36, no. 6 (2014), 362.
58
Andrew Monaghan, “Russian State Mobilization: Moving the State onto a War
Footing,” Chatham House, London, June 3, 2016, available at <www.chathamhouse.org/
event/russian-state-mobilization-moving-country-war-footing>.
59
David Matsaberidze, “Russia v. EU/US through Georgia and Ukraine,” Connections
14, no. 2 (Spring 2015), 79.
60
Michael Weiss, “Rights in Russia: Navalny and the Opposition,” World Affairs 176,
no. 4 (November 2013), 73.
61
“Russia’s Accusations,” NATO Fact Sheet, NATO Public Diplomacy Division, April
2014, 1.
62
David Yost, “The Budapest Memorandum and Russia’s Intervention in Ukraine,”
International Affairs 91, no. 3 (May 2015), 505.
63
James Hughes, “Russia and the Secession of Kosovo,” Europa-Asia Studies 65, no. 5
(July 2013), 1005.
64
Ibid., 994.
Michael Ruhle, NATO Enlargement and Russia: Die-Hard Myths and Real Dilemmas
65
• 246 •
Russia
67
“Seven New Members Join NATO,” March 29, 2004, available at <www.nato.int/
docu/update/2004/03-march/e0329a.htm>.
68
“Moscow Warns Montenegro of Possible Consequences of Joining NATO—Russian
Foreign Ministry,” Interfax, November 23, 2015, available at <www.interfax.com/newsinf.
asp?id=635054>.
69
Nicholas Ross Smith, “The EU and Russia’s Conflicting Regime Preferences in
Ukraine: Assessing Regime Promotion Strategies in the Scope of the Ukraine Crisis,”
European Security 24, no. 4 (April 2015), 528.
70
Dave Johnson, Russia’s Approach to Conflict—Implications for NATO’s Deterrence and
Defence, NATO Defense College Research Papers No. 111 (Rome: NATO Defense College,
April 2015).
71
Igor Sutyagin, Russian Forces in Ukraine, Royal United Services Institute (RUSI)
Briefing Paper (London: RUSI, March 2015), 1.
72
Ian Bremmer, “What MH17 Means for Russia-Ukraine,” Reuters, July 18, 2014,
available at <http://blogs.reuters.com/ian-bremmer/2014/07/18/what-mh17-means-for-
russia-ukraine/>.
73
Trenin, 26.
Sergei Guriev, “Russia’s Constrained Economy: How the Kremlin Can Spur
74
• 247 •
Zwack
89
Dmitry Adamsky, “If War Comes Tomorrow: Russian Thinking About Regional
Nuclear Deterrence,” The Journal of Slavic Military Studies 27, no. 1 (2014), 168.
90
Jonathan Marcus, “Russia’s Missile Deployment in Kaliningrad Ups the Stakes
for NATO,” BBC.com, October 9, 2016, available at <www.bbc.com/news/world-eu-
rope-37600426>.
91
Steven Collins, “Russia and China Now Able to Sink All American. Aircraft Carri-
ers?” Gog Magog War, available at <http://stevenmcollins.com/WordPress/russian-and-chi-
na-now-able-to-sink-all-american-aircraft-carriers/>.
92
Dmitry Gorenburg, “Impact of the Economic Crisis,” The CIPHER Brief, April
8, 2016, available at <www.thecipherbrief.com/article/europe/impact-economic-cri-
sis-1090>.
93
“In Russia, Defense Cuts Were Inevitable,” Stratfor.com, March 11, 2016, available at
<www.stratfor.com/analysis/russia-defense-cuts-were-inevitable>.
94
Julian Borger, “Nuclear Weapons Risk Greater than in Cold War, says Ex-Pentagon
Chief,” The Guardian (London), January 7, 2016, available at <www.theguardian.com/
world/2016/jan/07/nuclear-weapons-risk-greater-than-in-cold-war-says-ex-pentagon-
chief>.
95
Mark R. Wilcox, “Russia and the Treaty on Conventional Armed Forces in Europe
(CFE Treaty)—A Paradigm Change?” The Journal of Slavic Military Studies 24, no. 4
(2011), 568.
96
Andrew E. Kramer, “Russia Withdraws from Plutonium Disposal Treaty,” New York
Times, October 3, 2016, available at <www.nytimes.com/2016/10/04/world/europe/rus-
sia-plutonium-nuclear-treaty.html?_r=0>.
• 248 •
12
The Middle East
Denise Natali
U.S. national security interests in the Middle East are threatened by weak
and failed states, sectarianism and geopolitical disorder, and the frozen Israeli-
Palestinian conflict. Although these threats are unlikely to break up external
state borders in the near term, they have reconstituted the nature of states and
regional politics. The United States should recognize the deeply rooted nature
of these threats and the limitations of its leverage in the Middle East. Rather
than seeking to fix weak and failed states and attempt to comprehensively
resolve protracted conflicts, the United States should project power defensively,
contain instability, and selectively engage and support traditional partners
who can serve as strategic anchor points in the region.
• 249 •
Natali
Strategic Environment
For the first time in a century, no major foreign power exercises dom-
inant influence in the Middle East. U.S. foreign policy that emphasizes
greater selectivity and multilateralism in major military interventions
overseas has also left a vacuum of global leadership.1 Competing region-
al states such as Iran, Turkey, and Saudi Arabia are attempting to fill this
vacuum; Russia too is interested in renewed influence.2 The Middle East
is also being redefined by the strategic consequences of externally driven
regime change and popular uprisings against failed governance. Highly
centralized “deep” states are no longer the major threat to international
order; rather, weak states that are unable to effectively govern, control
populations, or secure borders are the danger. Failed governance has
destabilized Iraq, Syria, Yemen, and Libya and is unsettling traditionally
stable U.S. regional partners such as Saudi Arabia, Turkey, and Egypt.
These trends, alongside the Iranian nuclear deal (that is, the Joint
Comprehensive Plan of Action [JCPOA] signed with the P5+1 countries
in July 2015), have aggravated sectarian schisms based on Sunni and
Shia Islam. Sectarian power struggles are also being fueled by regional
actors and are playing out through local proxies in weak and failed states.
These conditions have encouraged the proliferation of local militias and
become drivers of terrorism; jihadist groups such as the Islamic State of
Iraq and the Levant (ISIL) and al Qaeda affiliates have taken root in Iraq,
Syria, Yemen, Libya, and Egypt/Sinai and threaten other regions where
state authority and governance have broken down. Centrifugal forces are
fragmenting states and their societies, causing ongoing political dysfunc-
tion in national and regional level governance.
The Middle East’s sectarian polarizations, however, have not created
strong or unified regional alliance structures that could effectively balance
power. Rather, different gradations of sectarianism coexist with domestic
security priorities, state nationalisms, commercial interests, and distinct
interpretations of Islam.3 Turkey, Saudi Arabia, and the Arab Gulf states
may converge in their aim to replace the regime of Bashar al-Asad in Syria
and challenge Iranian hegemony, but they are not unified as a Sunni bloc.
The conflict in Libya is being driven by tribal divisions and competing
Sunni Muslim powers; Saudi Arabia and the United Arab Emirates (UAE)
back former president Muammar Qadhafi’s supporters while Turkey and
Qatar are reinforcing Muslim Brotherhood groups. Syria’s civil war is also
embedded in power struggles between Sunni Muslim opposition and ji-
hadist groups. The result has been geopolitical disorder, local instability,
and economic stagnation or collapse in key regional states.
These destabilizing dynamics have reconstituted the nature of Mid-
dle Eastern states and regional politics. Although external state borders
• 250 •
The Middle East
• 251 •
Natali
• 252 •
The Middle East
• 253 •
Natali
Mansur Hadi. Iran and the Lebanese Hizballah view the conflict as driv-
en by tribal rivalries and supported by Saudi Arabia.10 These sectarian
tensions, if not a protracted civil war, are likely to continue as Saudi
Arabia and the UAE remain militarily engaged and Iran extends support
to Houthi rebels.11 Saudi Arabia has also retaliated against Hizballah’s
support for the Houthis by withdrawing $3 billion in pledged military
support to Lebanon.
Powerful sectarian spheres of influence, however, have not led to
Sunni or Shia Muslim blocs that could effectively balance power in the
Middle East. Sunni Muslim–dominant states are also driven by domes-
tic security priorities, state nationalisms, economic opportunities, and
different interpretations of Islam that prevent cohesive action. For in-
stance, instead of supporting Turkey against the Shia-led government
in Baghdad, most Sunni Arab Iraqis strongly oppose Ankara’s military
interventions in northern Iraq as a violation of state sovereignty. The Syr-
ian civil war has also become embedded in conflicts between Sunni Arab
opposition and jihadist groups, while fueling tensions between Kurds
and Arabs, regardless of shared Sunni Muslim affiliations.
Similarly, Iran has been unable to fully circumvent state nationalisms
and export its brand of revolutionary Islam to Shia populations in the
Middle East. In Iraq, most Shia Arabs are committed to Iraqi nationalism
and oppose becoming a satellite of Tehran. These distinctions are also
doctrinal; the Iraqi Shia religious establishment (marja-iyya) under the
guidance of the influential Grand Ayatollah Ali al-Sistani rejects the Ira-
nian practice of vilayet-e faqih (rule by Islamic clerics and fundamentalist
legal views) and follows a moderate approach of limited clerical engage-
ment in political affairs. In Lebanon, some Shia organizations project
both religious and secular perspectives that do not necessarily align with
Iranian clerical rule. Nor have Houthis in Yemen or Alawites in Syria,
which are Shia offshoots, shown any indication of supporting vilayet-e
faqih, even though they have aligned with and accepted Iranian military
support to assert power against opposing forces.
• 254 •
The Middle East
• 255 •
Natali
• 256 •
The Middle East
tensions are salient. In some areas Syrian refugees have helped boost
local production and local labor markets; however, the long-term impact
on growth and stability depends on how they can be integrated into local
and regional labor markets and society.
Mass migration from failed states also threatens European security.
By 2015 about one million migrants had fled to Europe, mainly from
Iraq, Syria, and Afghanistan. In contrast to the large-scale refugee flows
caused by the wars of Yugoslavia, which gradually brought over two mil-
lion refugees from 1992 to 2000, the massive and sudden population
displacements from Syria to Europe have reached levels not seen since
World War II. From April 2011 to November 2014, over 775, 000 Syr-
ians applied for asylum in Europe, more than two-thirds of whom are
young adult men. The total number of asylum seekers to Europe during
the first 10 months of 2015 increased to about one million, more than
twice the amount of the same time period in 2014.25 Instability in Libya
and its proximity to Europe’s Mediterranean shores threaten another mi-
gration spike, with Italy being increasingly vulnerable.
Massive refugee flows are occurring amid Europe’s ongoing eco-
nomic slowdown and ISIL-inspired terrorist threats. They have further
heightened Europe’s financial and security burdens and strained recipi-
ent countries’ capacities to process asylum requests, meet humanitarian
needs, and integrate refugee communities into society.26 Demographic
changes and economic pressures have fueled a populist backlash from
anti-immigration and anti–European Union parties, creating conditions
for marginalization and potential radicalization. Regional trade and en-
ergy flows have also been negatively affected. Turkey’s trade to Syria has
declined by 70 percent since 2011, while Jordan has lost about 75 per-
cent of its trade to Syria.27 Egypt, Jordan, Lebanon, and Turkey have
realized losses in tourism and total household income while military and
border security costs have increased.28
Moreover, weak and failed states and geopolitical disorder are hinder-
ing the development and export of hydrocarbons to regional and global
markets. Although Iraqi oil exports have increased to over four million
barrels per day since 2003, the country’s energy sector is vulnerable to
instability and conflict. Nearly 85 percent of Iraqi oil exports rely on the
Iranian-controlled Strait of Hormuz. A sustained closure of this strategic
chokepoint would instigate the economic collapse of Iraq as well as of
Arab Gulf oil economies.
Oil and gas exports are also susceptible to contentions over state
sovereignty and ownership of resources. In Iraq the Kurdistan Regional
Government (KRG) has taken de facto control of some oil and gas fields
in disputed territories, as well as the Iraqi government pipeline, for its
• 257 •
Natali
• 258 •
The Middle East
Iraq and Syria: Defeat ISIL and Stabilize. The United States should con-
tinue to support regional and local partners to defeat ISIL and stabilize
ISIL-free territories. This effort can include reconstruction and humanitar-
ian assistance, technical expertise to assist with services and capabilities,
reconciliation efforts, training Iraqi Security Forces and federal and local
police forces, and tapping energy resources needed for domestic and ex-
ternal consumption. Support for the KRG could be included in this effort
but should be based on the condition that the Kurds remain committed to
the Iraqi state and that all support continues to be channeled through and
be approved by central and federal authorities. The United States should
more carefully leverage the KRG and avoid enabling the Kurds to the point
where they do not think they have to negotiate with Baghdad. The United
States should also be prepared for ongoing Kurdish threats to declare in-
dependence and the regional and local backlash that may elicit.
• 259 •
Natali
The United States should support Shia leaders in Iraq who are driven
by Iraqi nationalism, seek to bridge ethnosectarian divides, and engage
in reforms. This effort should include regular and frequent engagement
at the executive level that openly supports the Haydar al-Abadi govern-
ment (and any successor inclusive, Iraqi-nationalist government) and
affirms the U.S.-Iraq strategic partnership. To diminish the influence of
Iranian-backed hardliner factions, the United States should assist Iraqi
government efforts to incorporate “reconcilable” popular mobilization
units (Shia militia) into the Iraqi Security Forces command and control
structure, and/or as a distinct counterterrorism force, while excluding
Quds Force–supported factions aligned with Iran. The United States
should also tacitly support Iraq’s marja’iyya to ensure that Najaf’s “qui-
etism” and Iraqi nationalism are sustained, particularly in the event that
the aged Ayatollah Sistani passes away.
In Syria the United States should continue efforts to negotiate a cease-
fire with the overall aim of defeating ISIL and maintaining state institu-
tions and Syria’s territorial integrity. It should not actively seek regime
change without a negotiated settlement among leading regional and local
actors and a viable transitional government in place. Turkey’s engage-
ment in stabilizing Syria and negotiating a strategic endstate is essential
and should take priority over unconditional tactical assistance to Syrian
Kurdish groups. The United States should also engage diplomatically
with Turkey to negotiate a ceasefire with the PKK and assuage Turkey’s
threat perceptions about the territorial integrity of its southern borders.
• 260 •
The Middle East
the continuation of a Jewish and democratic state. This effort could focus
on building economic interests through natural gas development and
revenue and resource-sharing in Palestine between the Israeli and Pales-
tinian governments. It should also raise civil society funding and com-
munity level projects while continuing to support long-term objectives
of Israeli-Palestinian peace. The United States should revisit the situation
when conditions change and are amenable to negotiation.
Assist European Partners. The United States should assist European al-
lies that are most vulnerable to refugee flows and ISIL foreign fighters
returning to Europe through political and operational support. It should
enhance intelligence-sharing, joint security measures in refugees’ home
and host countries, and financial support to Turkey and “frontline Eu-
ropean countries” to support comprehensive asylum and humanitarian
needs. The U.S. Sixth Fleet in the Mediterranean should cooperate with
the European Commission’s liaison (European Union Naval Force) to
help interrupt refugee smuggling operations, support Libyan and Turk-
ish coast guards and border authorities, and provide diplomatic pressure
on Arab Gulf states to increase their support of Syrian refugees.
• 261 •
Natali
Summary
The Middle East will be unstable and prone to conflict for the next de-
cade, even after ISIL is defeated. External borders are likely to remain
officially intact, but the nature of states will be reconstituted in ways that
demand new security and political arrangements at national and local
levels. These shifts may encourage politically and economically expedi-
ent pacts between substate and nonstate actors, but they are also likely
to stir or deepen conflict over control of territories, hydrocarbons, and
revenues. Although the United States cannot be expected to resolve these
problems, it can play a more effective leadership role that reaffirms its
commitment to state territorial integrity and shores up traditional re-
gional partners. There is no realistic or viable alternative from which to
choose; state breakup is not supported by any key regional government
and would only lead to greater bloodshed and instability.
While seeking to project its power defensively, the United States
should be prepared for events that could trigger dramatic shifts and force
it to engage in the Middle East at higher levels. Some key triggering
events include but are not limited to an official merger of al Qaeda and
ISIL; catastrophic collapse of the Mosul Dam; civil war in Egypt; violent
uprisings and/or civil war in Jordan; major escalation of ISIL-inspired
violence in the West Bank; Iranian nuclear or ballistic missile attacks on
Israel; and large-scale terrorist attacks inspired by Iran, ISIL, and/or al
Qaeda affiliates in Saudi Arabia. The United States should also reconsid-
er its level of engagement in the case of a mass casualty terrorist attack
in the U.S. homeland linked to core al Qaeda or ISIL operations in Iraq
or Syria. This threat is particularly pertinent if it occurs during the final
days of an outgoing administration concerned with its legacy or the be-
ginning of a new administration vulnerable to the hazards of transition.
• 262 •
The Middle East
Notes
1
Jeffrey Goldberg, “The Obama Doctrine,” The Atlantic, April 2016, available at
<www.theatlantic.com/magazine/archive/2016/04/the-obama-doctrine/471525/>.
2
Owen Harries and Tom Switzer, “Leading from Behind: Third Time a Charm?”
The American Interest 8, no. 5 (2015), available at <www.the-american-interest.
com/2013/04/12/leading-from-behind-third-time-a-charm/>.
3
Gregory F. Gause III, “Ideologies, Alliance and Under-balancing in the New
Middle East Cold War,” Project on Middle East Political Science, August 26, 2015,
available at <http://pomeps.org/2015/08/26/ideologies-alliances-and-underbalanc-
ing-in-the-new-middle-east-cold-war/>.
4
Luay Al-Khateeb, The GCC in 2020: Resources for the Future (Geneva: The Econ-
omist Intelligence Unit, 2010), 4, available at <http://graphics.eiu.com/upload/eb/
GCC_in_2020_Resources_WEB.pdf>; “Gulf States Face Hard Economic Truth About
Subsidies,” Palestine News Network SHFA, December 18, 2012, available at <www.
shfanews.net/en/index.php/component/content/article/76-i/13490-gulf-states-face-hard-
economic-truth-about-subsidies>.
5
Rami G. Khouri, “Gulf States Face Their Biggest Challenge,” The Cairo Review of
World Affairs, December 30, 2015, available at <http://thecairoreview.com/tahrir-forum/
gulf-states-face-their-biggest-challenge/>; David Rosenberg, “As a Pillar of Stability, the
Gulf Arab States Are Starting to Look Pretty Shaky,” Haaretz.com, September 17, 2015,
available at <www.haaretz.com/blogs/david-s-harp/1.676403>.
6
Metin Gurcan, “Are Clashes Spreading to Western Turkey?” al-Monitor.com, Decem-
ber 30, 2015, available at <www.al-monitor.com/pulse/originals/2015/12/turkey-kurd-
ish-militant-clashes-pkk-tak.html>.
7
“Bahrain Arrests ‘Iran-linked’ Cyber Group,” Al Jazeera, June 13, 2013, available at
<www.aljazeera.com/news/middleeast/2013/06/201361393933204365.html>; Claude
Salhani, “Bahrain Places Hezbollah on Terror List,” Oilprice.com, April 9, 2013, available
at <http://oilprice.com/Geopolitics/Middle-East/Bahrain-Places-Hezbollah-on-Terror-
ist-List.html>.
8
James Zogby, Elizabeth Zogby, and Sarah Hope Zogby, Middle East 2015: Current and
Future Challenges (Washington, DC: Zogby Research Services, November 2015), available
at <www.zogbyresearchservices.com/new-gallery-1/>.
9
Christopher Kozak, “An Army in All Corners”: Assad’s Campaign Strategy in Syria, Mid-
dle East Security Report 26 (Washington, DC: Institute for the Study of War, April 2015),
available at <http://understandingwar.org/report/army-all-corners-assads-campaign-strat-
egy-syria>.
10
Zogby, Zogby, and Zogby.
11
“Houthi-Saleh Advance to Overthrow President’s Aden-based Government Raised
Risk of Saudi-led Military Intervention,” IHS Jane’s 360, March 23, 2015, available at
<www.janes.com/article/50149/houthi-saleh-advance-to-overthrow-yemeni-president-s-
aden-based-government-raises-risk-of-saudi-led-military-intervention>.
12
“The Five Major Threats Facing Israel,” Israel Defense Forces blog, April 6, 2015,
available at <https://www.idfblog.com/blog/2015/04/06/5-major-threats-facing-israel/>.
13
Fourteen international laws stipulate that occupying powers provide functioning
administration and security. See International Committee of the Red Cross, “Treaties,
States Parties and Commentaries,” available at <www.icrc.org/applic/ihl/ihl.nsf/Article.
xsp?action=openDocument&documentId=3741EAB8E36E9274C12563CD00516894>;
and <www.icrc.org/applic/ihl/ihl.nsf/Article.xsp?action=openDocument&documen-
tId=9B46D996E36A0809C12563CD005168DC>.
• 263 •
Natali
14
Jim Zanotti, U.S. Foreign Aid to the Palestinians, RS22967 (Washington, DC: Con-
gressional Research Service, July 3, 2014), available at <www.fas.org/sgp/crs/mideast/
RS22967.pdf>; United Nations Relief Works Agency, “How We Spend Funds,” available at
<www.unrwa.org/how-you-can-help/how-we-spend-funds>.
15
“Gaza Economy on the Verge of Collapse, Youth Unemployment Highest in the
Region at 60 Percent,” The World Bank, May 21, 2015, available at <www.worldbank.org/
en/news/press-release/2015/05/21/gaza-economy-on-the-verge-of-collapse>.
16
Aaron David Miller, “Is Abbas Trying to Ride a Wave of Violence?” CNN.com, Janu-
ary 1, 2016 available at <www.cnn.com/2016/01/01/opinions/miller-abbas-violence/>.
17
“Israel National Security Project,” available at <www.israelnsp.org/what-they-say/
status-quo-is-dangerous/israels-demographic-challen.html>.
18
Ronald Reagan was the first U.S. President to explicitly commit to Israel’s qualitative
military edge—an assurance that every subsequent administration has repeated. The
commitment to maintaining Israel’s qualitative military edge was only formally written
into law in September 2008, with the passage of the law commonly known as the Naval
Vessel Transfer Act of 2008. It has been expanded in several pieces of legislation since
2008, especially in several National Defense Authorization acts. For a comprehensive
review of qualitative military edge in U.S. law, see “Israel’s Qualitative Military Edge: Leg-
islative Background,” MilitaryEdge.org, available at <http://militaryedge.org/israels-qualita-
tive-military-edge-legislative-background/>.
19
Anthony Cordesman, The Arab-Israeli Military Balance: Conventional Realities and
Asymmetric Changes (Washington, DC: Center for Strategic and International Studies,
June 29, 2010), available at <http://csis.org/files/publication/100629_Arab-IsraeliMilBal.
pdf>.
20
“Islamist Militancy in Egypt,” Council of Foreign Relations, available at <www.cfr.
org/global/global-conflict-tracker/p32137#!/conflict/islamist-militancy-in-egypt>.
21
William Young et al., Spillover from the Conflict in Syria: An Assessment of the Factors
that Aid and Impede the Spread of Violence (Santa Monica, CA: RAND, 2014), 25–28,
available at <www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR609/
RAND_RR609.pdf>.
22
Gary Samore et al., The Iran Nuclear Deal: A Definitive Guide (Cambridge, MA: Belfer
Center for Science and International Affairs, August 2015), 6, available at <http://belfer-
center.ksg.harvard.edu/files/IranDealDefinitiveGuide.pdf?webSyncID=1a99034c-3b8e-
563e-598e-d62d490a1635&sessionGUID=b2942431-616d-71dc-b0bb-49391b025b4a>.
23
United Nations Office for the Coordination of Humanitarian Affairs, “Syria,” April
2015, available at <www.unocha.org/Syria>.
24
“Syria Crisis Has Cost Lebanon $20 bln,” Al-Arabiya English, December 22, 2014,
available at <http://english.alarabiya.net/en/business/economy/2014/12/22/Syria-crisis-
has-cost-Lebanon-20-bln-.html>.
25
“The Refugee Surge in Europe: Economic Challenges,” International Monetary
Fund Staff Discussion Note, January 2016, available at <www.imf.org/external/pubs/ft/
sdn/2016/sdn1602.pdf>; Office of the United Nations High Commissioner for Refugees,
“Europe: Syrian Asylum Applications,” November 2015, available at <http://data.unhcr.
org/syrianrefugees/asylum.php>. The main European destination countries of asylum
seekers are Austria, Germany, and Sweden. In the first 6 months of 2014 about 50,000
people crossed from North Africa to Italy, twice the amount from 2013.
26
“The Refugee Surge in Europe,” 6.
27
Ülkü Özel Akagünduz, “Istanbul Fears ‘Arabization’ with Syrian Refugee Influx,”
Today’s Zaman, September 27, 2014, available at <www.todayszaman.com/anasayfa_istan-
bul-fears-arabization-with-syrian-refugee-influx_359862.html>; Akmehmet M. Hande,
• 264 •
The Middle East
“The High Cost to Turkey of the Syrian Civil War,” Newsweek, December 10, 2015, avail-
able at <www.newsweek.com/high-cost-turkey-syrian-civil-war-403535>.
28
Elena Lanchovichina and Maros Ivanic, The Economic Impact of the Syrian
War and the Spread of ISIS, Quick Note Series 140 (New York: The World Bank,
January 2015), available at <https://openknowledge.worldbank.org/bitstream/han-
dle/10986/22586/938810BRI0QN140D0virtual0collection.pdf?sequence=1>.
29
Sara Sjolin, “Why Libya Could Be the Biggest Threat to Recovering Oil Prices,”
MarketWatch.com, May 17, 2016, available at <www.marketwatch.com/story/why-libya-
could-be-the-biggest-threat-to-recovering-oil-prices-2016-05-16>.
30
Chi-King Chyong and Vessela Tcherneva, “Europe’s Vulnerability on Russian Gas,”
European Council on Foreign Relations, March 17, 2016, available at <www.ecfr.eu/
article/commentary_europes_vulnerability_on_russian_gas>.
• 265 •
13
South Asia
Thomas F. Lynch III
In late 2016, the United States has four major national security interests in
South Asia. Three of these are vital security interests with more than a decade of
pedigree. They will require new administration policies and strategy to prevent
actions that could gravely damage U.S. security: a major conventional war
between India and Pakistan, the return of global terrorist safe havens in the
region, or the proliferation of nuclear weapons or materials into the hands of
America’s enemies. The challenge will be “to keep a lid” on the potential for a
major terrorist strike of the U.S. homeland emanating from South Asia or from a
major interstate war that could risk nuclear fallout, involvement of China, the loss
of nuclear material to terrorists, or a combination of all three. A fourth objective
is relatively new, but rising in importance. It requires the new administration
to pursue a flexible strategy and proactive but patient security initiatives that
enable the responsible rise of an emerging American security partner, India, in
a manner that supports U.S. security objectives across the Indo-Pacific region
without unintentionally aggravating the Indo-Pakistan security dilemma or
unnecessarily stoking Chinese fears of provocative encirclement.
S outh Asia will not be a glamour portfolio for the incoming U.S. ad-
ministration’s security team in January 2017, but it will be one of top-
five importance. Critical U.S. national security interests are at stake that
can be compromised gravely should the South Asia security portfolio be
misappreciated or improperly managed. South Asia will require non-
trivial defense expenditure and a focused, cohesive security framework
advancing four major U.S. national security interests during the period
from 2017 to 2020.
Running from Afghanistan in the northwest to Sri Lanka in the south-
east, South Asia includes the second most populous country in the
world, India, and the sixth most populous one, Pakistan. It is the only
region in the world where two independent nuclear weapons states with
• 267 •
Lynch
• 268 •
South Asia
use that material there and beyond. The administration also will inherit
a third vital interest, the decades-old security interest of trying to prevent
a fifth major general war between Pakistan and India. Mitigating the risks
to these three vital U.S. national security interests requires a proper and
balanced U.S. military and intelligence presence in Afghanistan along
with a sustained, albeit somewhat reduced, U.S. CT partnership with
Pakistan focused on verifiable transactional outcomes.4
The next administration will face a fourth major (but not vital) inter-
est: it must actively manage India’s rise as an international security stake-
holder. India’s emerging military strength and diplomatic confidence best
assist America’s important national interest of constraining China’s use of
military might in any manner that would threaten the territorial integrity
or sovereignty of its neighbors, or that would hamper free trade, liberal
commerce, human rights or the peaceful resolution of grievances in the
Indo-Pacific region. American strategy to realize this national security
interest should expand upon already accelerating bilateral defense and
security initiatives, and, at the same time, it should encourage growing
Indian bilateral security activities with long-time U.S. defense partner
states in the Asia-Pacific region.
• 269 •
Lynch
victor while featuring the largest single clash of armored and air forces
witnessed since 1945. The 1971 war began as ugly civil strife in what
was then East Pakistan and concluded with Indian military intervention,
the defeat of a 90,000-man Pakistani army, and the establishment of the
sovereign nation of Bangladesh—stripping away half of Pakistan’s pop-
ulation and one-third of its land mass. The short, sharp 1999 war in the
Kargil district of Jammu-Kashmir was the fourth formal war fought be-
tween the two antagonists. It was fought under the nuclear umbrella af-
ter both Pakistan and India tested nuclear weapons successfully in 1998.
Islamist terrorist strikes in the Indian Parliament in December 2001
and against multiple venues in Mumbai, India, in November 2008—
both of which India blamed on the Pakistani state—brought India and
Pakistan to the brink of major interstate war once again. In each of
these near-miss incidents, India stepped back from a major conven-
tional retaliatory attack against Pakistan after close consultation with
American political and military officials.7 Significant American military
presence in the region (in Afghanistan, Pakistan, and environs) and
unparalleled American leadership access the key civilian and military
decisionmakers on both sides of the security divide helped avert a fifth
dramatic conflagration.
• 270 •
South Asia
• 271 •
Lynch
India has longstanding enmity toward the Afghan Taliban and a silent
resolve to see that it never again rules from Kabul or governs sufficient
space in Afghanistan to become a conduit for anti-Indian terrorist activ-
ities.15 As Western security forces stand down across Afghanistan, India
has proffered more direct lethal support to Afghan security forces. In late
2015, India began offering more overt offensive weapons support to the
Afghan air force, “gifting” it with four Russian-made Mi-25 “Hind D”
attack helicopters for the first time.16
New Delhi also has been expanding and extending its military and in-
telligence footprint at locations in Tajikistan that can be used to provide
logistical, medical, equipment, and intelligence support for an Afghan
government fight against the Afghan Taliban or other Pakistani militant
proxies.17 New Delhi will support Afghan government efforts to remain
sovereign and to safeguard Indian personnel and investments in Afghan-
istan. It also is setting the diplomatic conditions in Iran and the mili-
tary-intelligence access arrangements in Tajikistan necessary to support
organized proxy resistance should the Afghan government suddenly col-
lapse under the weight of Pakistani-abetted insurgency.18
The means for deadly warfare between India and Pakistan have been
growing for more than a decade. India’s increasing military spending and
its evolving conventional offensive warfare doctrine contribute to this
increasing lethality and instability. India has become the world’s largest
arms importer, accounting for 14 percent of global international arms
imports from 2009 to 2013.19 India is expected to spend more than $130
billion on arms imports between 2014 and 2020 to upgrade its dete-
riorating weapons stock.20 Its modernization efforts put at risk critical
components of Pakistan’s conventional defenses.
Ever since its frustrating inability to rapidly mobilize forces against
Pakistan during the 2001–2002 Indo-Pakistan crisis, India has been
slowly updating its offensive conventional military doctrine into one
known as “Cold Start.”21 In concept, Cold Start would enable a critical
mass of conventional Indian military forces to strike Pakistan in a puni-
tive manner within 48 hours in the event of irregular militia or terrorist
provocation.22 Cold Start remains in 2016 an Indian military aspiration
rather than a reality. But its impact on Pakistan’s defense psyche has been
profound.23 Cold Start caused Pakistan to reshape its nuclear weapons
arsenal toward one usable for both deterrence and warfighting.24
Since 2006, Pakistan’s nuclear weapons arsenal has grown dramati-
cally and its capabilities have become ever more oriented toward assured
survival and short-range, accurate use in a battlefield warfighting scenar-
io.25 In 2008, Pakistan had an estimated 70–90 nuclear weapons, rough-
ly equivalent to the 60–80 operational weapons estimated for India.26
• 272 •
South Asia
Table. Pakistan’s Growth in Mid- and Short-Range Nuclear Weapons Delivery Systems
Mid-Range Ballistic Short-Range Ballistic
Aircraft Missiles Missiles Cruise Missiles
F16 A/B (1998) Ghuari (2003) Shaheen-1 (2003) Babur (2011)
1,600 kilometers 1,200+ kilometers 450+ kilometers 600 kilometers
Mirage Vs (1998) Shaheen-2 (2011) Ghaznavi (2004) Ra’ad (2012)
2,100 kilometers 2,000+ kilometers 400 kilometers 350+ kilometers
Abdali (2012)
180 kilometers
Nasr (2014)
60 kilometers
• 273 •
Lynch
Bowed but unbroken from the U.S.-led ground force and drone attack
“surge” during 2009–2013 into Afghanistan and Pakistan, many Sala-
fi jihadist group leaders remain in the region, intermixed with jihadist
outfits that transit Central Asia and Iran, waiting for the right moment
to regenerate sanctuary in what they believe to be an ideal location from
which to manage global jihad.35 In his September 2014 announcement
of al Qaeda of the Indian Subcontinent, al Qaeda leader Ayman al-Zawa-
hiri prominently praised the Afghan Taliban mujahideen, telling all Salafi
jihadist groups in South Asia to fully resource the Afghan Taliban-led
effort to reestablish a Salifist emirate in Afghanistan.36 At the same time,
a growing array of South Asian–based jihadist groups have been infesting
eastern Afghanistan under pressure from a 2014–2015 Pakistani mili-
tary offensive against terrorists in its North Waziristan border province.
Many in the remaining leadership of al Qaeda complicit groups such as
Tehrik-i-Taliban Pakistan, Tehreek-e-Nafaz-e-Shariat-e-Mohammadi, the
Islamic Movement of Uzbekistan, the East Turkmenistan Movement, and
others have established new operational nodes in Nuristan, Kunar, and
Nangarhar provinces in Afghanistan.37
The Islamic State of Iraq and the Levant (ISIL) is also a terrorist player
in eastern Afghanistan and western Pakistan.38 However, ISIL-Khorasan,
as it calls itself, remains small in number, with inspiration but no direct
material support from ISIL in Iraq or Syria and little traction when com-
pared to the dozens of Salafi jihadist outfits in the Afghanistan-Pakistan
region with solid ties to al Qaeda.39 ISIL-Khorasan’s fate notwithstanding,
Afghanistan and Pakistan will remain highly contested spaces for bruised
but unrepentant international jihadist organizations.
Since assuming the major role in fighting the insurgency and localized
terror groups in January 2015, the 352,000-man strong Afghan National
Security and Defense Forces (ANSDF) has struggled against a Taliban re-
surgence in Afghanistan’s south, its east, and in Kabul itself. In the south
and east, Afghan security units have been challenged to secure hard-won
U.S./NATO territory contested during the surge fights of 2009–2011.40
In its December 2015 semi-annual report to Congress, the Pentagon ad-
mitted that despite ANSDF abilities to consistently retake major ground
lost to the Taliban, the overall security situation in Afghanistan had dete-
riorated, indicating a robust and resilient insurgency.41
The unmistakable growth of Taliban power across southern and
eastern Afghanistan in 2015–2016 carved out space for precisely the
kind of international terrorist training safe haven that the United States
swore to prevent.42 Al Qaeda reportedly established two new terrorism
training camps in Kandahar Province, one of which covered nearly 30
square miles. A joint U.S.-Afghan special operations attack raided these
• 274 •
South Asia
• 275 •
Lynch
• 276 •
South Asia
• 277 •
Lynch
• 278 •
South Asia
Three stand out. First, when compared to Pakistan, India’s nuclear weap-
ons safeguards are not independently verified and feared to be somewhat
weak despite Indian insistence to the contrary.69 While treading gently
so as not to excite a negative Indian response, the new administration
should encourage greater Indian transparency. Second, India has a long-
standing policy of “no first use” (NFU) of nuclear weapons, meaning
that India will not use nuclear weapons first, but if its opponents do,
then India’s response would be overwhelming.70 Incoming Prime Minis-
ter Modi ruled out change of the NFU policy in August 2014, but some
in the Indian military community continue to agitate for a revision away
from massive retaliation and toward “punitive” retaliation if struck first.71
Any such change in Indian nuclear use policy would be unhelpful for
strategic stability between India and Pakistan and between India and
China. The new American administration should take every opportunity
to encourage the Indian government to sustain its NFU doctrine.
Finally, the nuclear ballistic missile competition between Pakistan and
India is close to spurring a serious arms race. Both have flight-tested
ballistic missiles with short- and longer range delivery capability for nu-
clear warheads. Pakistan’s ballistic arsenal can now reach targets in all of
India. India’s can now reach targets throughout China. India and China
have the technical know-how to place multiple warheads atop some of
their missiles and to deploy limited ballistic missile defenses.72 Any se-
rious move by India to pursue even a limited ballistic missile defense
(BMD) against Pakistan’s growing nuclear arsenal—as some in its hawk-
ish minority now advocate—would have major ripple effects. Growth
in Indian BMD coupled with testing of multiple reentry vehicle nuclear
warhead technology could be seen as threatening by China, igniting an
undesirable and dangerous nuclear missile versus antiballistic missile
arms race.73 In addition, investments by India and Pakistan in sea-based
nuclear weapons delivery capabilities are increasing and create greater
uncertainty and instability in the region.74 American nonproliferation
interests require that the incoming administration conduct an earnest
dialogue with the Indian government about the advisability of restraint
in these areas.75
Given the multivariate challenges to nuclear weapons nonprolifera-
tion in Pakistan and India, the new administration will be best advised
to pursue prudent pragmatism as its regional nonproliferation approach.
• 279 •
Lynch
• all parties choose peaceful means for the resolution of territorial and
maritime disputes
• 280 •
South Asia
Source: CIA
Geopolitical strains between India and China are evident in five major
areas. First, India and China have a large and seemingly intractable land
border dispute over 133,000 square kilometers of contested land83 (see
figure 2). They fought a short, sharp war over these borders in 1962.
Despite decades of halting diplomatic talks, the borders remain unre-
solved.84 Second, even though India recognized Chinese territorial sov-
ereignty over Tibet in the 1950s—with the caveat that China respect the
cultural, religious, and social uniqueness of Tibet—New Delhi has been
aggravated by Chinese treatment of Tibet, offering the Dali Lama safe
haven in the late 1950s and supporting the Lama’s ownership of his Bud-
dhist successor selection. India views the growing presence of Chinese
military units and construction outfits there to be menacing.
Third, India chafes over China’s decades-long role as an enabler of
Pakistan’s military. From the 1960s, China has been the main channel
for information and equipment necessary to advance Pakistan’s heavily
embargoed nuclear power program and its nuclear weapons activities.85
For the past two decades, China has been a key conduit of information
to Pakistan on the design of ballistic missiles and, more recently, tactical
nuclear weapons.86 Almost all security observers in India are wary that
China would become party to a two-front war with India should any
combination of the three come to blows.
• 281 •
Lynch
• 282 •
South Asia
• 283 •
Lynch
• 284 •
South Asia
stan, militating against the return of any globally capable terrorist combi-
nation to safe haven in Afghanistan or Pakistan, and thoroughly tracking
and—if necessary—responding to the loss or theft of nuclear weapons
material in Pakistan by terrorists or criminals.92
A properly scoped American military presence in Afghanistan com-
bined with a reduced but sustained U.S counterterrorism partnership
with Islamabad also helps keep the Pakistan military-intelligence com-
plex engaged in the regional fight against traditional and emergent ter-
rorist organizations with global reach. Sustained U.S.-Pakistan CT inter-
action also helps to enable military-diplomatic access to Pakistan military
leaders in order to monitor and/or help arrest dramatic escalation in a
future India-Pakistan military crisis or militate against an implosion of
security or stability in Pakistan itself.
South Asia should rank among the top-five focus areas for new ad-
ministration national security priorities. It will continue to engage vital
U.S. security interests in CT, nuclear nonproliferation, and the deter-
rence of major interstate war between nuclear weapons nations. It will
also involve a major interest in managing the rise of India in the shadow
of China. The costs to national treasure for sound management of these
vital security interests should come to about 20,000 U.S. troops and $25
billion in Afghanistan, 500 to 1,000 U.S. troops and about $2.5 billion
in U.S. CT and other aid in Pakistan, and a robust and growing mili-
tary-to-military exercise and exchange presence with India. The expense
will not be trivial, but the national security benefits will be great.
Notes
1
Bruce Riedel, JFK’s Forgotten Crisis: Tibet, The CIA and the Sino-Indian War (Washing-
ton, DC: Brookings Institution, 2015).
2
Shri Ram Sharma, India-USSR Relations, 1947–1971: From Ambivalence to Steadfast-
ness, Part-1 (New Delhi: Discovery Publishing House, 1999); Andrew Small, The Chi-
na-Pakistan Axis: Asia’s New Geopolitics (New York: Oxford University Press, 2015), 9–16.
3
There are several other relatively new opportunities for increased American security
engagement across South Asia between 2017 and 2020. Burma (Myanmar) and Sri Lanka
are continuing to emerge from lengthy periods of international sanction for human rights
abuses and are anxious for greater direct American security engagements. Nepal is ready
for greater American assistance with security-sector reform. Bangladesh continues to
request more engagement in U.S. military naval and special operations forces exercises
along with continuing counterterrorism financial and maritime-shore security equipment
support. Worthy of American national security attention as these opportunities are, none
of them rise to the threshold of major American security interests in South Asia. See
Murray Hiebert, “Engaging Myanmar’s Military: Carpe Diem Part II,” CSIS.org, September
5, 2013, available at <https://csis.org/publication/engaging-myanmars-military-carpe-di-
em-part-ii>; David Brunnstrom, “U.S. General Eager for Myanmar Engagement, Awaiting
Policy Decision,” Reuters, December 8, 2015, available at <www.reuters.com/article/
us-usa-myanmar-military-idUSKBN0TR21B20151208>; Department of State Fact Sheet,
• 285 •
Lynch
“U.S. Relations with Sri Lanka,” February 25, 2015, available at <www.state.gov/r/pa/ei/
bgn/5249.htm>; Kadira Pethiyagoda, “Sri Lanka: A Lesson for U.S. Strategy,” The Diplo-
mat, August 26, 2015, available at <http://thediplomat.com/2015/08/sri-lanka-a-lesson-
for-u-s-strategy/>; Bruce Vaughn, Nepal: Political Developments and U.S. Relations, R44303
(Washington, DC: Congressional Research Service, December 4, 2015), 1–3; Jenna
Bernhardson, “U.S. Security Assistance in Bangladesh,” Department of State Dipnote, Oc-
tober 21, 2014, available at <https://blogs.state.gov/stories/2014/10/21/us-security-assis-
tance-bangladesh>; Kevin Chambers, “U.S., Bangladesh Armed Forces Complete CARAT
2015,” U.S. Navy News Service, October 5, 2015, available at <www.navy.mil/submit/
display.asp?story_id=91356>.
4
This chapter identifies three vital and enduring U.S. national security interests in
South Asia. The author’s assessment of these as vital—meaning that a failure to meet them
would lead to significant harm to the American homeland—concurs with and extends
similar assessments found in James Dobbins et al., ed., Choices for America in a Turbulent
World (Santa Monica, CA: RAND, 2015), 108–110, 113–119, available at <www.rand.
org/content/dam/rand/pubs/research_reports/RR1100/RR1114/RAND_RR1114.pdf>;
and “Threats to U.S. Vital Interests: Where Are U.S. Interests Being Threatened Around
the World?” 2016 Index of U.S. Military Strength (Washington, DC: Heritage Foundation,
2016), available at <http://index.heritage.org/military/2016/assessments/threats/>.
5
For example, see Bharat Karnad, Why India Is Not a Great Power (Yet) (London:
Oxford University Press, 2015).
6
See Stephen P. Cohen, Shooting for a Century: The India-Pakistan Conundrum (Wash-
ington, DC: Brookings Institution, 2013), 88–117; C. Christine Fair, Fighting to the End:
The Pakistan Army’s Way of War (New York: Oxford University Press, 2014), 136–153.
7
Polly Nayak and Michael Krepon, U.S. Crisis Management in South Asia’s Twin Peaks
Crisis (Washington, DC: Stimson Center, 2006); Polly Nayak and Michael Krepon, The
Unfinished Crisis: U.S. Crisis Management After the 2008 Mumbai Attacks (Washington, DC:
Stimson Center, February 2012).
8
“Everything Will Be Fine Soon: PM Modi on Kashmir Ceasefire Violations,” The
Times of India (Mumbai), October 8, 2014, available at <http://timesofindia.indiatimes.
com/india/Everything-will-be-fine-soon-PM-Modi-on-Kashmir-ceasefire-violations/arti-
cleshow/44713666.cms>; George Perkovich and Toby Dalton, “Modi’s Strategic Choice:
How to Respond to Terrorism from Pakistan,” The Washington Quarterly 38, no. 1 (Spring
2015), 23–45.
9
This scenario is cited as a feasible one leading to general Indo-Pakistani war in
Michael E. O’Hanlon, The Future of Land Warfare (Washington, DC: Brookings Institution,
2015), 109–116.
10
Violating the standing ceasefire agreement, units from Pakistan’s Punjab Rangers
and its X Corps exchanged artillery, mortar, rocket, and small arms fire with elements
of the Indian Army Northern Command in 60 incidents from July 2014 to November
2015. Both sides engaged in deadly violations. Their exchanges reportedly resulted in the
deaths of 22 Indian soldiers, 19 Pakistani soldiers, and nearly 90 civilians, with dozens
more military personnel wounded and hundreds of civilians wounded and displaced
from homes near the border. See Kamran Yousaf, “Pakistan, India Agree to Stop Ceasefire
Violations at Working Boundary,” The Express Tribune (Karachi), September 12, 2015,
available at <http://tribune.com.pk/story/955626/pakistan-india-agree-to-stop-cease-
fire-violations-at-working-boundary/>; Perkovich and Dalton, 23–26.
11
Niharrika Mandhana and Aditi Malhorta, “Indian Forces Hunt for Militants After
Deadly Attack on Air Force Base,” Wall Street Journal, January 3, 2016, available at
<www.wsj.com/articles/indian-forces-hunt-for-militants-after-deadly-attack-on-air-force-
base-1451820057>; Navjeevan Gopal, “Pathankot Attack: Parrikar Admits ‘Gaps’ in
Security, Says Terrorists Used ‘Pak-made’ Equipment,” The Indian Express (Uttar Pradesh),
• 286 •
South Asia
• 287 •
Lynch
22
For a detailed description and analysis of India’s Cold Start doctrine, see Walter C.
Ladwig III, “A Cold Start for Hot Wars? The Indian Army’s New Limited War Doctrine,”
International Security 32, no. 3 (Winter 2007/2008), 158–190; also see Nitin Gokhal,
“India Military Eyes Combine Threat,” The Diplomat, January 17, 2012, available at
<http://thediplomat.com/2012/01/17/india-military-eyes-combined-threat/>. For more
on Indian limitations in attaining its doctrinal aims, see Shashank Joshi, “The Mythology
of Cold Start,” New York Times blog, November 4, 2011, available at <http://india.blogs.
nytimes.com/2011/11/04/the-mythology-of-cold-start/>. For an alternative name to
Cold Start, proactive doctrine, first observed in 2012–2013 Indian military writings, see
Dhruv Katoch, Looking Beyond the Proactive Doctrine (New Delhi: Centre for Land Warfare
Studies, September 2013), available at <http://strategicstudyindia.blogspot.com/2013/09/
looking-beyond-proactive-doctrine.html>.
23
See Feroz Hassan Khan, Eating Grass: The Making of the Pakistani Bomb (Stanford:
Stanford University Press, 2012), 381–382.
24
As observed by Indian national security adviser Shiv Shankar Menon in August
2012, India’s civilian leadership perceives Pakistan’s nuclear weapons program to be
aimed at reducing India’s conventional military advantage, not for deterrence against
nuclear weapons first use: “The possession of nuclear weapons has, empirically speaking,
deterred others from attempting nuclear coercion or blackmail against India . . . unlike
certain other nuclear weapons states, India’s weapons were not meant to redress a military
imbalance or some perceived inferiority in conventional terms.” Quoted in “India Faced
N-blackmail Thrice: NSA,” Hindustan Times (New Delhi), August 21, 2012.
25
Jaganath Sankaran, “Pakistan’s Battlefield Nuclear Policy: A Risky Solution to an
Exaggerated Threat,” International Security 39, no. 3 (Winter 2014/2015), 118–151; Tom
Hundley, “Pakistan and India: Race to the End,” Pulitzer Center on Crisis Reporting, Sep-
tember 5, 2012, available at <http://pulitzercenter.org/reporting/pakistan-nuclear-weap-
ons-battlefield-india-arms-race-energy-cold-war>.
26
Hans M. Kristensen and Robert S. Norris, “Pakistan’s Nuclear Forces, 2011,” Bulletin
of the Atomic Scientists 67, no. 4 (2011), 83, available at <http://bos.sagepub.com/con-
tent/67/4/91.full.pdf+html>.
27
Joby Warrick, “Nuclear Experts Say Pakistan May Be Building a 4th Plutonium Reac-
tor,” Washington Post, February 9, 2011.
28
Cited in “Pakistan Successfully Test Fires Hatf-9 Nasr Missile,” The Nation (Lahore),
May 29, 2012, available at <www.nation.com.pk/pakistan-news-newspaper-daily-en-
glish-online/national/29-May-2012/pakistan-successfully-test-fires-hatf-9-nasr-missile>.
29
Kristensen and Norris, 93.
30
Table from Thomas F. Lynch III, Crisis Stability and Nuclear Exchange Risks on the
Subcontinent: Major Trends and the Iran Factor, INSS Strategic Perspectives 14 (Washing-
ton, DC: NDU Press, November 2013), 8.
31
On the dynamic of signaling versus credibility in relation to U.S. military historical
experience with battlefield nuclear weapons and the applicability to Pakistan, including
his conclusion that, “rather than improving Pakistan’s deterrence of India, these weapons
hold only the promise of lowering the nuclear threshold and guaranteeing a larger nucle-
ar exchange by both sides once they are used,” see David O. Smith, The U.S. Experience
with Nuclear Weapons: Lessons for South Asia (Washington, DC: Stimson Center, 2013),
especially 31–41. Also see Akhilesh Pillalamarri, “Confirmed: Pakistan Is Building ‘Bat-
tlefield Nukes’ to Deter India,” NationalInterest.org, March 24, 2015, available at <http://
nationalinterest.org/blog/the-buzz/confirmed-pakistan-building-battlefield-nukes-de-
ter-india-12474>. On the degree to which Pakistan’s ambiguous and uncertain relation-
ship with Islamic militants and terrorist organizations acting in Jammu-Kashmir and
India render it a dubious “unitary actor” in the construct of nuclear weapons deterrence
• 288 •
South Asia
theory, see George Perkovich, The Non-Unitary Model and Deterrence Stability in South Asia
(Washington, DC: Stimson Center, November 13, 2012), 8–16.
32
See Zachary Keck, “Watch Out, India: Pakistan Is Ready to Use Nuclear Weapons,”
NationalInterest.org, July 8, 2015, available at <http://nationalinterest.org/blog/the-buzz/
watch-out-india-pakistan-ready-use-nuclear-weapons-13284>; interview with a senior
Pakistani Strategic Plans Directorate official by author in Washington, DC, February
2011; Maria Sultan, “Cold Start Doctrine and Pakistan’s Counter- measures: Theory of
Strategic Equivalence-III,” The News (Karachi), September 30, 2011, available at <www.
thenews.com.pk/TodaysPrintDetail.aspx?ID=70218&Cat=2>; Vipin Naran, “Pakistan’s
Nuclear Posture: Implications for South Asian Stability (Cambridge, MA: Belfer Center
for Science and International Affairs, January 2010), available at <http://belfercenter.ksg.
harvard.edu/publication/19889/pakistans_nuclear_posture.html>; interview with former
Pakistani nuclear weapons program leader by author in Washington, DC, November
2012.
33
National Strategy for Counterterrorism (Washington, DC: The White House, June
2011), 2–3, 8–13. Also see Thomas F. Lynch III, The 80 Percent Solution: The Strategic
Defeat of bin Laden’s al-Qaeda and Implications for South Asian Security (Washington, DC:
New America Foundation, February 2012).
34
Terrorism and radicalism in Bangladesh continue to pose a threat to foreigners—
and often Westerners—residing there. There is some evidence that international terrorism
facilitators transit Bangladesh. See “U.S. Updates Security Alert in Bangladesh,” Dhaka-
Tribune.com, October 18, 2015, available at <www.dhakatribune.com/bangladesh/2015/
oct/18/us-updates-security-alert-bangladesh>; The Role of Civil Society in Countering
Radicalization in Bangladesh (Dhaka: Bangladesh Enterprise Institute, September 2014). In
addition, India remains at moderate risk from attempts by al Qaeda of the Indian Subcon-
tinent to radicalize its Muslim youth for local terror activities and from the Islamic State
of Iraq and the Levant (ISIL) to leverage sympathetic Indian Muslims for social media
support of its global recruiting quest. See Elizabeth Bennet, “A Comeback for al-Qaeda
in the Indian Subcontinent?” Foreign Policy Journal, May 12, 2015, available at <www.
foreignpolicyjournal.com/2015/05/12/a-comeback-for-al-qaeda-in-the-indian-subconti-
nent/>; Praveen Swami, “Al-Qaeda Chief Ayman al-Zawahari Announces New Front to
Wage War on India,” Indian Express (New Delhi), September 4, 2014, available at <http://
indianexpress.com/article/india/india-others/al-qaeda-leader-ayman-al-zawahiri-announc-
es-formation-of-india-al-qaeda/>. But these counterterrorism issues pale in comparison to
those in Afghanistan and Pakistan.
35
See Lynch, The 80 Percent Solution, 810.
36
See “Al-Qaeda Chief Zawahiri Launches al-Qaeda in South Asia,” BBC News Asia,
September 4, 2014, available at <www.bbc.com/news/world-asia-29056668>; “Full Text
of Al Qaeda Chief Ayman al-Zawahiri’s Audio Message,” TheDailyStar.net, available at
<www.thedailystar.net/upload/gallery/pdf/transcription-zawahiri-msg.pdf>.
37
See “Pakistan Wants Afghanistan to Hand Over Maulana Fazlullah,” The Express
Tribune (Karachi), October 21, 2014, available at <http://tribune.com.pk/story/454861/
pakistan-wants-afghanistan-to-hand-over-maulana-fazlullah/>; Bill Roggio, “U.S. Military
Continues to Claim al Qaeda Is ‘Restricted’ to ‘Isolated Areas of Northeastern Afghan-
istan,’” The Long War Journal, November 19, 2014, available at <www.longwarjournal.
org/archives/2014/11/us_military_continue.php>; Zahir Shah Sherasi, “U.S. Drone Strike
Kills 7 on Pak-Afghan Border,” Dawn (Karachi), September 14, 2014, available at <www.
dawn.com/news/1131869/us-drone-strike-kills-7-on-pak-afghan-border>.
38
ISIL is the official name used by the U.S. Government, originating at the U.S.
National Counter Terrorism Center (NCTC), for the Salafi jihadist terrorist group led by
Abu Bakr al Baghdadi, headquartered in Raqqa, Syria, and Mosul, Iraq, and alternatively
known as the Islamic State of Iraq and Syria (ISIS) and the Islamic State (IS). Although
many of the sources and citations in this chapter for the group reference ISIS or IS, ISIL
• 289 •
Lynch
is used to remain consistent with the official U.S. nomenclature. See “Islamic State of Iraq
and the Levant (ISIL),” Counter Terrorism Guide, available at <www.nctc.gov/site/groups/
aqi_isil.html>.
39
Thomas F. Lynch III, The Islamic State as Icarus: A Critical Assessment of an Untenable
Threat (Washington, DC: Woodrow Wilson International Center for Scholars, October
2015), 14–16, 21–25, available at <www.wilsoncenter.org/sites/default/files/theislamic-
stateasicarus.pdf>; Bill Roggio, “U.S. Drone Strike Kills Mufti of Islamic State Khorasan
Province,” The Long War Journal, October 15, 2015, available at <www.longwarjournal.
org/archives/2015/10/us-drone-strike-kills-mufti-of-islamic-state-khorasan-province.
php>; Michael R. Gordon, “ISIS Building ‘Little Nests’ in Afghanistan, U.S. Defense
Secretary Warns,” New York Times, December 18, 2015, available at <www.nytimes.
com/2015/12/19/world/asia/afghanistan-ash-carter.html?action=click&contentCollec-
tion=Middle%20East&module=RelatedCoverage®ion=Marginalia&pgtype=article>.
40
See “Afghan Troops Battle Mass Taliban Assault in Helmand,” BBC News Asia, June
15, 2014, available at <www.bbc.com/news/world-asia-28012340>; Rod Nordland and
Taimoor Shah, “Afghans Say Taliban are Nearing Control of Key District,” New York Times,
September 6, 2014, available at <www.nytimes.com/2014/09/07/world/asia/afghanistan.
html?_r=0>; Ratib Noori, “ANSF Regain Control of Sangin,” Tolo News, October 12,
2014, available at <www.tolonews.com/en/afghanistan/16711-ansf-regain-control-of-san-
gi>; David Jolly and Taimoor Shah, “Afghan Province, Teetering to the Taliban, Draws In
Extra U.S. Forces,” New York Times, December 13, 2015.
41
Enhancing Security and Stability in Afghanistan: A Report to Congress in Accordance
with Section 1225 of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2015
(Washington, DC: Department of Defense, December 2015), 16–24, available at <www.
defense.gov/Portals/1/Documents/pubs/1225_Report_Dec_2015_-_Final_20151210.
pdf>. Also see Elizabeth Williams, “Taliban Summer Offensive Shows Increasing Capa-
bility,” Institute for the Study of War, September 2014, available at <www.understand-
ingwar.org/sites/default/files/Taliban%20violence%20report_0.pdf>; Eric Schmitt and
David Sanger, “As U.S. Focuses on ISIS and the Taliban, Al Qaeda Re-emerges,” New
York Times, December 29, 2015, available at <www.nytimes.com/2015/12/30/us/politics/
as-us-focuses-on-isis-and-the-taliban-al-qaeda-re-emerges.html?ref=world&_r=0>; Jawad
Sukhanyar and Mujib Mashal, “Bombings Near Kabul Airport Add to String of Attacks
Around Afghan Capital, New York Times, January 4, 2016, available at <www.nytimes.
com/2016/01/05/world/asia/bombings-near-kabul-airport-add-to-string-of-attacks-
around-afghan-capital.html?_r=0>.
42
By late 2015, experts estimated that the Afghan Taliban controlled 40 administra-
tive districts across Afghanistan and contested another 39, including almost all of those
in southern Helmand Province and most in southern Kandahar Province. Bill Roggio,
“Taliban Controls or Contests Nearly All of Southern Afghan Province,” The Long War
Journal, December 21, 2015, available at <www.longwarjournal.org/archives/2015/12/
taliban-controls-or-contests-nearly-all-of-southern-afghan-province.php>.
43
Bill Roggio and Thomas Joscelyn, “U.S. Military Strikes Large al Qaeda Training
Camps in Southern Afghanistan,” The Long War Journal, October 13, 2015, available at
<www.longwarjournal.org/archives/2015/10/us-military-strikes-large-al-qaeda-training-
camps-in-southern-afghanistan.php>; Enhancing Security and Stability in Afghanistan,
23–24.
44
Previously, the Barack Obama administration had announced that it would
withdraw all but a small U.S. Embassy–based military contingent, estimated at about
1,000 troops, from Afghanistan by the end of 2016. See Julie Pace, “Obama Extends
U.S. Military Mission in Afghanistan into 2017,” Associated Press, October 15, 2015,
available at <http://bigstory.ap.org/article/fa394db4a9f24815ab44c573e26be8dc/offi-
cials-obama-keep-troops-afghanistan-beyond-2016>.
• 290 •
South Asia
45
Lucas Tomlinson, “Pentagon Pushing for Long-Term U.S. Presence at Bagram, as
Taliban Gain Ground,” FoxNews.com, December 28, 2015, available at <www.foxnews.
com/politics/2015/12/28/pentagon-pushing-for-long-term-us-presence-at-bagram-as-
taliban-gains-ground.html>. Mark Mazzetti and Eric Schmitt, “Obama’s ‘Boots on the
Ground’: U.S. Special Forces Are Sent to Tackle Global Threats,” New York Times, Decem-
ber 27, 2015.
46
Coalition Support Funds (CSF) normally take a year from Pakistani request to
American reimbursement. Congress has set limits on the annual maximum amount of
U.S. CSF that Pakistan’s military can receive. In fiscal year (FY) 2014, this cap was $1.2
billion; in FY2015 it was $1 billion, with $300 million of that made conditional on
Pakistani actions against the Haqqani Network; in FY2016 the congressional cap was
$900 million. See Stephen Tankel, “Is the United States Cutting Pakistan Off? The Politics
of Military Aid,” War on the Rocks, August 31, 2015, available at <http://warontherocks.
com/2015/08/is-the-united-states-cutting-pakistan-off-the-politics-of-military-aid/>.
47
Alan Kronstadt, Pakistan-U.S. Relations: Issues for the 114th Congress, R44034 (Wash-
ington, DC: Congressional Research Service, May 14, 2015), 16.
48
Ibid., 16.
49
Figure cited in multiple presentations by senior Pakistani military officials in
Washington, DC, during 2015, including by Pakistani Air Chief Marshal Sohail Aman at a
National Defense University student presentation, October 7, 2015.
50
This point is made more robustly, if less delicately, in Christine Fair, “Pakistan’s
Strategic Shift Is Pure Fiction,” War on the Rocks, August 13, 2015, available at <http://
warontherocks.com/2015/08/pakistans-strategic-shift-is-pure-fiction/>.
51
See Stephen Tankel, “Pakistan Militancy in the Shadow of the U.S. Withdrawal,”
in Pakistan’s Enduring Challenges, ed. Christine Fair and Sarah J. Watson (Philadelphia:
University of Pennsylvania Press, 2015).
52
Fair, “Pakistan’s Security Shift Is Pure Fiction.”
53
The Afghan National Army had 152 D-30 howitzers in its inventory as of late 2013
and is eventually scheduled to have 204 fielded. It has a reasonable quantity of heavy in-
direct fire support, but it lacks the ground and air mobility to move these heavy artillery
pieces to support infantry in the remote and foreboding territory where most counterin-
surgency fighting occurs. See Praveen Swami, “Why India Is Concerned about Supplying
Arms to Afghanistan,” FirstPost.com, May 22, 2013, available at <www.firstpost.com/
world/why-india-is-concerned-about-supplying-arms-to-afghanistan-800711.html>;
Antonio Giustozzi with Peter Quentin, The Afghan National Army: Sustainability Chal-
lenges Beyond Financial Aspects (Kabul: Afghan Research and Evaluation Unit, February
2014), 3–6, 17–19, available at <www.ecoi.net/file_upload/1226_1400655058_ana-20is-
sues-20paper.pdf>.
54
For a detailed review of the numbers, functions, and costs of a sufficient residual
U.S. military presence, see Thomas F. Lynch III, “After ISIS: Fully Reappraising U.S. Poli-
cy in Afghanistan,” The Washington Quarterly 38, no. 2 (Summer 2015), 119–144.
55
See Tom Vanden Brook, “Top U.S. General May Seek More Troops for Afghan-
istan,” USA Today, December 29, 2015, available at <www.usatoday.com/story/news/
world/2015/12/29/gen-john-campbell-afghanistan-taliban-isil/78033970/>.
56
These numbers are at the low end of the range of U.S. support to Pakistan in these
broad categories from 2010 to 2016. See Kronstadt, 16.
57
Dan Twining, “Pakistan and the Nuclear Nightmare,” ForeignPolicy.com, September
4, 2013, available at <http://foreignpolicy.com/2013/09/04/pakistan-and-the-nucle-
ar-nightmare/>.
• 291 •
Lynch
58
China is also a member of the pre–Nuclear Non-Proliferation Treaty nuclear weap-
ons states club, even though Washington tried to prevent Beijing from acquiring nuclear
weapons in the 1950s and 1960s. See “Nuclear Weapons: Who Has What at a Glance,”
ArmsControl.org, October 2015, available at <www.armscontrol.org/factsheets/Nuclear-
weaponswhohaswhat>.
59
See National Security Strategy (Washington, DC: White House, February 2015),
11–12, available at <www.whitehouse.gov/sites/default/files/docs/2015_national_secu-
rity_strategy_2.pdf>; Carl Levin and Jack Reed, “A Democratic View: Toward a More
Responsible Nuclear Nonproliferation Strategy,” Arms Control Today, January 1, 2004,
available at <www.armscontrol.org/act/2004_01-02/LevinReed>.
60
Theodore Kalionzes and Kaegan McGrath, “Obama’s Nuclear Nonproliferation and
Disarmament Agenda: Building Steam or Losing Traction?” NTI.org, January 15, 2010,
available at <www.nti.org/analysis/articles/obamas-nuclear-agenda/>; Department of State,
“Nuclear Security Summit: Washington, 2010,” available at <www.state.gov/t/isn/nuclear-
securitysummit/2010/>.
61
John Bolton, “The Bush Administration’s Nonproliferation Policy: Successes and
Future Changes,” testimony before the House International Relations Committee, March
30, 2004, available at <http://2001-2009.state.gov/t/us/rm/31029.htm>.
62
“The Timeline of the India-U.S. Nuclear Agreement,” The News Minute (Banga-
lore, Karnataka), February 25, 2015, available at <www.thenewsminute.com/article/
timeline-india-us-nuclear-agreement-22957>; “Agreement for Cooperation Between the
Government of the United States of America and the Government of India Concerning
Peaceful Uses of Nuclear Energy (123 Agreement), Council on Foreign Relations, August
2007, available at <www.cfr.org/india/agreement-cooperation-between-government-unit-
ed-states-america-government-india-concerning-peaceful-uses-nuclear-energy-123-agree-
ment/p15459>; C. Raja Mohan, “10 Years of Indo-U.S. Civil Nuclear Deal: Transforma-
tion of the Bilateral Relationship Is the Real Big Deal,” The India Express (New Delhi), July
20, 2015, available at <http://indianexpress.com/article/explained/10-yrs-of-indo-us-civ-
il-nuclear-deal-transformation-of-the-bilateral-relationship-is-the-real-big-deal/>; “Joint
Statement by President George W. Bush and Prime Minister Manmohan Singh,” press
release, Department of State, July 18, 2005, available at <http://2001-2009.state.gov/p/
sca/rls/pr/2005/49763.htm>.
63
On the illicit nuclear proliferation activities of Pakistan state scientist A.Q. Khan,
see Nuclear Black Markets: Pakistan, A.Q. Khan and the Rise of Proliferation Networks—A Net
Assessment (London: International Institute for Strategic Studies, May 2007), available at
<www.iiss.org/publications/strategic-dossiers/nbm/nuclear-black-market-dossier-a-net-as-
sesment/pakistans-nuclear-programme-and-imports-/>.
64
Tim Craig, “Outcry and Fear as Pakistan Builds New Nuclear Reactors in Dangerous
Karachi,” Washington Post, March 5, 2015, available at <www.washingtonpost.com/world/
asia_pacific/outcry-and-fear-as-pakistan-builds-new-nuclear-reactors-in-dangerous-ka-
rachi/2015/03/05/425e8e70-bc59-11e4-9dfb-03366e719af8_story.html>; Chris Buckley,
“Behind the Chinese-Pakistan Nuclear Deal,” New York Times, November 27, 2013,
available at <http://sinosphere.blogs.nytimes.com/2013/11/27/behind-the-chinese-paki-
stani-nuclear-deal/?_r=0>.
65
Hans M. Kristensen and Robert S. Norris, “Pakistan Nuclear Forces, 2015,” Bulletin
of the Atomic Scientists 71, no. 6 (November 2015), available at <http://thebulletin.
org/2015/november/pakistani-nuclear-forces-20158845>.
66
See Shaun Gregory, “Terrorist Tactics in Pakistan Threaten Nuclear Safety,” Combat-
ing Terrorism Center Journal 4, no. 6 (June 2011), 4.
67
On the plausibility of extreme violence, national fragmentation, and widespread
civil disorder in Pakistan’s future, see Stephen P. Cohen, The Future of Pakistan (Washing-
ton, DC: Brookings Institution, 2011).
• 292 •
South Asia
68
David O. Smith, The U.S. Experience with Tactical Nuclear Weapons: Lessons for South
Asia (Washington, DC: Stimson Center, 2013), available at <www.stimson.org/images/
uploads/research-pdfs/David_Smith_Tactical_Nuclear_Weapons.pdf>.
69
M.V. Ramana, “India Ratifies an Additional Protocol and Will Safeguard Two More
Nuclear Power Reactors,” International Panel on Fissile Materials blog, July 1, 2014,
available at <http://fissilematerials.org/blog/2014/07/india_ratifies_an_additio.html>.
70
Shashank Joshi, “India’s Nuclear Anxieties: The Debate over Doctrine,” Arms Con-
trol Association, May 2015, available at </www.armscontrol.org/ACT/2015_05/Features/
India-Nuclear-Anxieties-The-Debate-Over-Doctrine>.
71
Gurmeet Kanwal, “India’s Nuclear Doctrine: Need for a Review,” Center for Strategic
and International Studies, December 5, 2014, available at <http://csis.org/publication/
indias-nuclear-doctrine-need-review>.
72
Michael Krepon, “Deterrence Instability in South Asia,” ArmsControlWonk.com, May
4, 2015, available at <www.armscontrolwonk.com/archive/404605/deterrence-instabili-
ty-in-south-asia/>.
73
Joshua T. White and Kyle Deming, “Dependent Trajectories: India’s MIRV Program
and Deterrence Stability in South Asia,” in Deterrence Instability and Nuclear Weapons in
South Asia, ed. Michael Krepon et al. (Washington, DC: Stimson Center, April 2015),
177–199; Zafar Nawaz Jaspal, The Introduction of Ballistic Missile Defense in South Asia:
Implications on Strategic Stability (Stanford: Naval Postgraduate School, 2013), available at
<http://my.nps.edu/documents/104111744/106151936/11+Nuclear+Learning_Jaspal.pd-
f/150ce371-2c21-42ae-a684-2c0f480cef6b>. China observers note that Beijing is already
conducting research and development on its own ballistic missile defense capabilities,
including by purchases of Russian S-400 surface-to-air missiles. Thus the conditions
appear set for a costly and destabilizing arms race should New Delhi move ahead. See
Wendell Minnick, “S-400 Strengthens China’s Hand in the Skies,” DefenseNews.com, April
18, 2015, available at <www.defensenews.com/story/defense/air-space/strike/2015/04/18/
china-taiwan-russia-s400-air-defense-adiz-east-china-sea-yellow-sea/25810495/>; Ankit
Panda, “After China, India Will Become Second Buyer of Advanced Russian S-400 Missile
Defense Systems,” The Diplomat, November 5, 2015, available at <http://thediplomat.
com/2015/11/after-china-india-will-become-second-buyer-of-advanced-russian-s-400-
missile-defense-systems/>.
74
See “Pakistan Developing Sea-based Nuclear Arms,” The Times of India (Mumbai),
September 22, 2014, available at <http://timesofindia.indiatimes.com/world/pakistan/Pa-
kistan-developing-sea-based-nuclear-arms/articleshow/43115566.cms>; Andrew Winner,
“Why India and Pakistan Sea-based Nukes Are So Troubling,” The Interpreter (Sydney),
August 29, 2014, available at <www.lowyinterpreter.org/post/2014/08/29/Why-Indian-
and-Pakistani-sea-based-nukes-are-so-troubling.aspx>.
75
Michael Krepon, “Introduction,” in Deterrence Instability and Nuclear Weapons in
South Asia.
76
The East Asia-Pacific Rebalance: Expanding U.S. Engagement (Washington,
DC: Department of State, December 16, 2013), available at <www.state.gov/r/pa/
pl/2013/218776.htm>.
77
See Nick Bisley and Andrew Phillips, “A Rebalance to Where? U.S. Strategic Geog-
raphy in Asia,” Survival 55, no. 5 (October 2013), 95–114.
78
India’s ever-growing consumer middle class had risen from 47 million in 1995 to
265 million in 2014. See Pravan K. Varma, “India’s Middle Class Awakes,” The Times of
India (Mumbai), November 23, 2013, available at <http://timesofindia.indiatimes.com/
edit-page/Indias-middle-class-awakes/articleshow/26221440.cms>.
79
Bolton; New Framework for the U.S.-India Defense Relationship, OSD 12428-05,
Rumsfeld Archive, 2005, available at <http://library.rumsfeld.com/doclib/sp/3211/2005-
• 293 •
Lynch
06-28%20New%20Framework%20for%20the%20US-India%20Defense%20Relation-
ship.pdf>. This period culminated with the 2008 U.S. congressional ratification of a
U.S.-India civil-nuclear deal that was a major catalyst for additional security and defense
engagements.
80
“U.S.-India Joint Strategic Vision for the Asia-Pacific and Indian Ocean Region,”
press release, The White House, January 25, 2015, available at <www.whitehouse.gov/
the-press-office/2015/01/25/us-india-joint-strategic-vision-asia-pacific-and-indian-ocean-
region>.
81
Richard Russow, “A New Vision for U.S.-India Cooperation in Asia,” Asia Maritime
Transparency Initiative/Center for Strategic and International Studies, February 4, 2015,
available at <http://amti.csis.org/a-new-vision-for-u-s-india-cooperation-in-asia/>.
82
See Larry M. Wortzel, “PLA Contingency Planning and the Case of India,” in The
People’s Liberation Army and Contingency Planning in China, ed. Andrew Scobell et al.
(Washington, DC: NDU Press, 2015), 225–250.
83
Vivek Raghuvanshi, “India-China Border Talks Make No Headway,” DefenseNews.
com, May 23, 2015, available at <www.defensenews.com/story/defense/policy-bud-
get/leaders/2015/05/23/india-china-border-dispute-summit-talks-lac-tibet-paki-
stan/27601373/>.
84
Riedel, 109–146, 168–180; Vivek Raghuvanshi, “India-China Talks Fail to Make
Progress on Border Dispute,” DefenseNews.com, November 17, 2015, available at <www.
defensenews.com/story/defense/land/2015/11/17/india-china-talks-fail-make-progress-
border-dispute/75918626/>.
85
Khan.
86
Ibid.; Small, 29–65, 107, 155–187.
87
C. Raja Mohan, Samudra Manthan: Sino-Indian Rivalry in the Indo-Pacific (Wash-
ington, DC: Carnegie Endowment for International Peace, 2012), 47, 124–132, 203.
Important Indian military and political leaders persist in this belief despite the strong case
made that China’s maritime efforts in the Indian Ocean are far from a military or strategic
menace. See this case made in Christopher D. Yung and Ross Rustici with Scott Devary
and Jenny Lin, “Not an Idea We Have to Shun”: Chinese Overseas Basing Requirements in the
21st Century, China Strategic Perspectives 7 (Washington, DC: NDU Press, October 2014),
available at <http://ndupress.ndu.edu/Portals/68/Documents/stratperspective/china/Chi-
naPerspectives-7.pdf>.
88
Mohan, 13–34, 181–187. Among other examples of this increasing multilateral
and calculated martial response to Chinese activities that it perceives to be provocative,
India agreed to have its warships participate with the United States and Japan in joint
naval exercises in the northern Philippine Sea during 2016. See Sanjeev Miglani, “U.S.
Plans Naval Exercises with India and Japan in Philippine Sea,” Reuters, March 3, 2016,
available at <http://uk.reuters.com/article/uk-india-usa-idUKKCN0W41UL>.
89
“U.S-India Security and Defense Cooperation,” CSIS.org, January 5, 2016, available
at <http://csis.org/program/us-india-security-and-defense-cooperation>; interview of
U.S. Army and Naval attachés in New Delhi, India, by author, December 14, 2015. In
late 2015, India’s Ministry of Defence announced its return to formal status as a 2016
participant in joint special forces operational training for the first time since 2012, as a
participant in the 2016 U.S. Air Force Exercise Red Flag for the first time since 2008, and
in the US. Navy’s 2016 RIMPAC exercise for the first time ever. See Sushant Singh, “Joint
Training Exercise of India, U.S. Special Forces to Be Held after Four Years,” The Indian
Express (New Delhi), December 28, 2015, available at <http://indianexpress.com/article/
india/india-news-india/joint-training-exercise-of-india-us-special-forces-to-be-held-after-
four-years/>.
• 294 •
South Asia
90
Interview with deputy U.S. naval attaché to India by author in New Delhi, Decem-
ber 14, 2015.
91
Interview with Indian Deputy National Security Advisor Arvind Gupta by author in
New Delhi, December 15, 2015.
92
Another benefit to a properly shaped residual American military and intelligence
presence in Afghanistan is that of robust physical capability for refugee support, human-
itarian relief, and other aspects of what would be a massive international crisis response
in the event of a Pakistan implosion or devastating impacts in Pakistan from a major
India-Pakistan war.
• 295 •
14
Africa
Hilary Matfess
• 297 •
Matfess
• 298 •
Africa
• 299 •
Matfess
• 300 •
Africa
haran Africa.11 Today Nigeria (and the broader Lake Chad region) is
struggling with Boko Haram, Kenya and Somalia are still grappling with
al Shabaab, and the Sahel is afflicted by al Qaeda in the Maghreb and An-
sar al Dine. Though these groups have sworn allegiance to global jihadist
movements, they all arose out of specific socioeconomic contexts and
political systems; they evolved from campaigning on local grievances to
broader issues. Countering Islamist terrorism in Sub-Saharan Africa will
require not only identifying the international ties of these groups but also
recognizing the domestic roots of their discontent.12 These armed groups
have taken advantage of not only the weakness of African states but also
the rising criminality across the continent (addressed below) and the
popular discontent of much of the population.13 With such low trust in
the state’s security sector and political orientation, it is no surprise that
antigovernment movements have generated significant support. Civilian
support for antigovernment groups has made it difficult to counter them.
Furthermore, given porous borders, transnational kinship networks,
and displacement patterns that characterize the region, domestic armed
groups frequently have regional consequences.
Though these groups are motivated by domestic grievances, they
often have foreign sponsors. The foreign dimension of domestic rebel
groups threatens regional stability, as governments often engage in tit-
for-tat sponsorship of antigovernment militias.14 The states sponsoring
these militias typically benefit (politically and/or financially) from the
development of a “war economy” in their neighboring states; the incen-
tives are thus perverted for regional peace efforts, as some of the actors at
the table may not be earnestly interested in brokering peace. The vested
interest of some countries in fomenting instability limits the capacity of
the United States to cultivate effective partnerships on the continent; this
is compounded in instances where the U.S. Government lacks subject
matter expertise regarding intracontinental geopolitics.
The proliferation of vigilante and pro-government militia groups
highlights the weak position and lack of capacity of African states; se-
curity has been decentralized to unofficial community levels. This “de-
mocratization,” however, is not accompanied by the development of ac-
countability mechanisms, creating the conditions for impunity.15 Some
recent troubling research has suggested that “informal ties to militias
[are] a deliberate government strategy to avoid accountability” and has
correlated weak democracy and foreign aid to such ties.16 Even following
the cessation of conflict, the existence of such groups complicates the
peace-building process. These groups at times “feel a sense of entitle-
ment for some reward or recognition for their contribution to the gov-
ernment’s ‘victory.’”17
• 301 •
Matfess
• 302 •
Africa
• 303 •
Matfess
Governance Challenges
Africa is a young continent. The median age of its population is in the
teens. Development economists speculate that the demographic char-
acteristics of the region could result in a “demographic dividend” that
could jumpstart economic growth. Unfortunately, however, the sort of
economic infrastructure (from jobs and emerging industrial sectors to
educational opportunities and technical training) necessary to absorb
this youth bulge does not exist. Given a UN survey that found 40 percent
of those who joined rebel movements did so because of a lack of jobs,
this youth bulge seems poised to contribute to instability and violence
rather than economic development.33 The events of the Arab Spring
could very well be repeated in Sub-Saharan Africa if disaffected youth
also take to the streets.
In general, African youth feel distant from their political systems,
which have often been stagnant for generations. The table gives the
• 304 •
Africa
Table. Africa’s 10 Longest Serving Leaders: Median Age and Length of Current Term in
Office (in Years)
Country Median Age of Population Leader’s Term in Office
Cameroon 18.3 40
Equatorial Guinea 19.4 36
Angola 17.9 36
Zimbabwe 20.2 35
Uganda 15.5 29
Sudan 19.1 26
Chad 17.2 24
Eritrea 19.1 24
The Gambia 20.2 21
Republic of the Congo 19.8 18
median age and length of the current term in office of Africa’s 10 lon-
gest-serving leaders. The lack of economic opportunities, coupled with
unresponsive, static political systems, could contribute to an increase
in rebel movements and violent conflict. Recent reversals in term-limit
restrictions, particularly in the Great Lakes region and East Africa, could
further such destructive dynamics.
Another troubling pattern that aggravates discontent is security forc-
es’ violence against civilians. This pattern has extended beyond the
high-profile incidences of state-sponsored killings and genocides that
the world witnessed in Rwanda, the Sudans, and eastern Democratic
Republic of the Congo to the point that low-grade predation by security
forces is routine in many African countries. Transparency International
found that the police are perceived as the most corrupt institution in
Sub-Saharan Africa; according to a recent Afrobarometer report, “On av-
erage, 42% of citizens say ‘most’ or ‘all’ police are corrupt.”34 Obviously, a
corrupt and ineffective police force reduces security by hampering states’
ability to respond to challenges. As the Center for Strategic and Inter-
national Studies report on police reform in Sub-Saharan Africa noted,
“Many of Africa’s current and emerging security challenges are more ap-
propriately addressed in the first instance by competent and professional
police forces than by military forces.” The report suggests that because
the police’s “interface with the public is far wider than that of the mili-
tary, effective police forces can play a critical role in public safety, civilian
protection, and conflict protection.”35 The lack of confidence in African
police incentivizes the aforementioned troubling trends of community
policing and vigilantism. Reports of rampant torture, corruption, and
violence against civilians suggest that security-sector reform, aimed at
improving the professionalism not only of African militaries but also of
• 305 •
Matfess
• 306 •
Africa
• 307 •
Matfess
• 308 •
Africa
can training and support have not committed human rights violations
is unevenly applied and frequently waived. As RAND notes, these re-
quirements do not apply to “most drug enforcement and non–Defense
Department counterterrorism assistance” or to Federal Bureau of Inves-
tigation assistance.45 RAND concludes that the “U.S. government needs
to improve its vetting practices by making them more consistent across
programs and agencies and standardizing them across different types of
assistance.” Through this process of review, the definition of military unit
should be reconsidered, as should the withholding of training in cases of
human rights abuses. Training that emphasizes improved civil-military
relations and respect for human rights should be considered in instances
where strategically important partner nations violate human rights prin-
ciples.46 Revamping American legal restrictions on foreign assistance to
improve capacity-building objectives should be a congressional priority.
In addition to rethinking the content of our training programs, we
must reconsider their funding. The lack of multiyear funding authorities
calls into question American commitment to building partner capaci-
ty. Establishing long-term, clearly funded programs telegraphs Ameri-
can commitment more appropriately than episodic engagements. The
United States should recalibrate its continental policy to reemphasize the
importance of security-sector reform enshrining the rule of law through
a revamping of our security assistance programming’s legislative regula-
tion, operational content, and partnering bodies.
While pan-regional efforts deserve more attention than they currently
receive, bilateral relationships must also be reformed to promote good
governance; American understanding of the political, social, and cultural
relationships that contribute to governance patterns across the continent
needs significant bolstering. This dearth of information has incentivized
one-size-fits-all strategies and has allowed events hundreds of miles
away (and often decades later) to dictate contemporary policies.
Reform requires catalyzing change from our regional partners and
rethinking our assistance paradigm. Too frequently U.S. assistance (mil-
itary, humanitarian, and developmental) is co-opted by undemocratic
governments to serve their interests and bolster their regimes. Evidence
suggests that the assistance levied to the Ethiopian government to ease
the suffering from the 1984–1985 famine was used to further the gov-
ernment’s war effort; multiple sources found that “relief supplies were
used to pay soldiers and militia and to lure people into locations where
they were recruited into the military or subjected to forcible resettle-
ment.”47 Natural disasters, famines, and droughts are all too frequently
used to deflect attention from the failures of governance that have al-
lowed suffering to be so widespread. International assistance to crises in
• 309 •
Matfess
Sudan and Rwanda has also been used to bolster oppressive regimes. As
David Bayley wrote for the National Institute of Justice, “The question is
not whether assistance is political—it all is—but what its likely conse-
quences are for American objectives.”48
Reforming our assistance paradigm requires recognition of the distinct
political economies of countries with whom we partner. This will require
cultivating expertise that is currently lacking within American policy cir-
cles. Too frequently Africa is treated as a homogenous bloc and vessel
through which American aid can be implemented without being affect-
ed by the specific characteristics of partnering governments. Increasing
American institutional knowledge about specific African political econ-
omies in all sectors of government is critical; increasing the number of
American military advisors in the region, bolstering ties between Amer-
ican and domestic development agencies, and enhancing the duration
and frequency of training programs (for civil servants and the security
sector) are all important for advancing overarching American security
interests in the region. As the Overseas Development Institute notes:
• 310 •
Africa
Notes
1
U.S. Strategy Toward Sub-Saharan Africa (Washington, DC: The White House,
June 2012).
2
U.S. Agency for International Development, “Power Africa Info Sheet,” available at
<www.usaid.gov/powerafrica>.
3
The African Growth and Oportunity Act, “About AGOA,” available at <http://agoa/
about-agoa.html>.
4
Stephen Watts, Identifying and Mitigating Risks in Security Sector Assistance for Africa’s
Fragile States (Washington, DC: RAND, 2015).
5
Michael Werz and Laura Conley, Climate Change, Migration, and Conflict in Northwest
Africa: Rising Dangers and Policy Options Across the Arc of Tension (Washington, DC: Center
for American Progress, April 2012).
• 311 •
Matfess
6
Jeffrey Mazo, Climate Conflict: How Global Warming Threatens Security and What to Do
About It (London: International Institute for Strategic Studies, 2009), chapter 3.
7
International Crisis Group (ICG), Darfur: The International Community’s Failure to
Protect (Washington, DC: ICG, 2006).
8
Ibid.
9
World Health Organization, “A Fast-moving Ebola Epidemic Full of Tragic Surpris-
es,” available at <www.who.int/csr/disease/ebola/ebola-6-months/surprises/en/>.
10
The fall of Muammar Qadhafi in 2012 led to an outpouring of weapons across the
Sahel as Libyan armories were looted and fighters returned to their home countries.
11
Ryan Miller, “The Rise of Terrorist Groups in Sub-Saharan Africa,” Boren Magazine,
May 19, 2014.
12
There is an interesting interplay between local grievances and aspirations to a global
brand at play among African jihadists. Jakkie Cilliers observes that “violent jihadism is
increasingly regionalized . . . the ability of either the Islamic State or al-Qaeda to manage
a terror network with affiliates in Africa, Asia and the Middle East is limited. The schisms
and infighting within and between these groups reflect this reality, which should not de-
tract from the motivational impact of local groups seeking to associate themselves with a
global brand.” See Violent Islamist Extremism and Terror in Africa, ISS Paper 286 (Pretoria:
Institute for Security Studies, October 2015), available at <www.issafrica.org/uploads/
Paper%20286%20_v3.pdf>.
13
Andre Le Sage, Africa’s Irregular Security Threats, INSS Strategic Forum 255 (Wash-
ington, DC: NDU Press, May 2010).
14
British Broadcasting Corporation, “DR Congo Country Profile,” October 2, 2016.
15
“Who Are the Anti-balaka of CAR?” IRIN News, February 12, 2014.
16
Neil Mitchell, Sabine Carey, and Chris Butler, “The Impact of Pro-Government Mili-
tias on Human Rights Violations,” International Interactions 40, no. 5 (October 2014).
17
Eric Y. Shibuya, Demobilizing Irregular Forces (Cambridge: Polity, 2012).
18
The South Africa–based Institute for Security Studies notes that the expansion
of criminality in Sub-Saharan Africa can be partially explained by “a more sustainable
state-building path.” The group explains that the “weak capacity for governance in state
institutions and their inability to provide stable regulatory frameworks and deliver ser-
vices to marginalized populations mean that Africa’s economic growth in the last decade
has often occurred despite the state.” See Mark Shaw and Tuesday Reitano, The Evolution
of Organised Crime in Africa: Towards a New Response, ISS Paper 244 (Pretoria: Institute for
Security Studies, April 2013), available at <www.issafrica.org/uploads/Paper244.pdf>.
19
Le Sage.
20
Shaw and Reitano.
21
United Nations Office on Drugs and Crime (UNODC), Transnational Organized
Crime in West Africa: A Threat Assessment (Brussels: UNODC, 2013).
22
Global Initiative Against Transnational Organized Crime, Fixing a Fractured State (Brus-
sels: Global Initiative Against Transnational Organized Crime, 2015). Legal drugs too, such
as tobacco, are smuggled in West Africa and generate an estimate $775 million per year.
According the UNODC, in 2010 a “series of larger seizures were made indicating that large
volumes of Afghan heroin were entering the region by sea from Iran and Pakistan. Between
2010 and 2012, more heroin was seized than in the previous 20 years. . . . It was not that
the number of seizures were increasing, but those that were being made were far larger
than ever before.” The drug trade has fundamentally transformed the political economies
of the regions in which they operate, particularly in countries such as Guinea-Bissau,
where the state has become complicit with (and may even benefit from) the drug trade.
• 312 •
Africa
Enhancing drug policies globally will do little if African states remain a weak link in the
system aimed at stemming the flow of drugs.
23
Not all trafficking funnels people out of the continent. The UN notes that “general
trends within the Economic Community of West African States . . . include trafficking
from rural to urban and industrial areas for employment and sexual exploitation.” UN
Global Initiative to Fight Human Trafficking, Human Trafficking: An Overview (New York: UN
Office on Drugs and Crime, 2008).
24
Tom Maguire and Cathy Haenlein, An Illusion of Complicity: Terrorism and the Illegal
Ivory Trade in East Africa (London: Royal United Services Institute, 2015).
25
Ibid.
26
Le Sage.
27
Shaw and Reitano; Franz Stefan-Gady, “Africa’s Cyber WMD,” Foreign Policy, March
24, 2012., Cameroon, Ghana, Nigeria have become major hubs for cyber crime and the
global revenue derived from such activity is estimated to near $600 million.
28
Global Initiative Against Transnational Oganized Crime.
29
James Clapper, Director of National Intelligence, “Statement for the Record: Threat
Assessment,” available at <www.dni.gov/index.php.newsroom/testimonies/194-con-
gressional-testimonies-2013/816-statement-for-the-record-worldwide-threatassess-
ment-of-the-u-s-intelligence-community>.
30
Erik Alda and Joseph L. Sala, “Links Between Terrorism, Organized Crime and
Crime: The Case of the Sahel Region,” Stability: International Journal of Security and Devel-
opment 3, no. 1 (September 2014).
31
Research has demonstrated that though criminal networks and narcotics trade may
not necessarily catalyze new conflicts, these activities are connected to the elongation
of conflicts. In Sub-Saharan Africa, this has particular significance as the continuation
of existing conflicts would preclude the sort of infrastructural and human development
projects necessary for sustainable growth, development, and peace-building. American
national security policy in Africa must recognize the development of mutually beneficial
relationships between criminal networks and terrorist groups. Cooperation between these
groups weakens the rule of law and problematizes the cultivation of effective strategic
partnerships in the region. See Francesco Strazzari, “Captured or Capturing? Narcotics
and Political Instability along the ‘African Route’ to Europe,” The European Review of
Organised Crime 1, no. 2 (2014), 5–34, available at <http://sgocnet.org/site/wp-content/
uploads/2014/06/Strazzari_2_5-34.pdf>.
32
Le Sage.
33
Kingsley Ighobor, “Africa’s Youth: A ‘Ticking Time Bomb’ or an Opportunity?” Africa
Renewal, May 2013.
34
Pauline M. Wambua, “Police Corruption in Africa Undermines Trust, but Support
for Law Enforcement Remains Strong,” Dispatch #56, Afrobarometer, 2015.
35
Richard Downie and Jennifer Cooke, Policy Reform in Africa (Washington, DC:
Center for Strategic and International Studies, 2011).
36
See Hilary Matfess, “Should You Worry about China’s Investments in Africa?” Wash-
ington Post, September 9, 2015; Deborah Brautigam, “5 Myths about Chinese Investment
in Africa,” Foreign Policy, December 4, 2015.
37
One of the most obvious mechanisms to support this initiative is through the
provision of funding. It has been estimated that $1 billion is needed to make the force
operational.
38
The mobilization of a Military-Civil Humanitarian Mission, led by the African
Union and consisting of medical and military personnel and coordinating domestic,
• 313 •
Matfess
regional, and international volunteers and donations, suggests that partnerships are possi-
ble to plan for similar disasters.
39
John L. Hirsch, “Africa’s Challenges and the Role of the African Union: Q&A with
Aisha Abdullahi,” IPI Global Observatory, October 7, 2014.
40
Danielle Renwick, “Peace Operations in Africa,” Council on Foreign Relations
Backgrounder, May 15, 2015.
41
William Rosenau, Low-Cost Trigger-Pullers: The Politics of Policing in the Context of
Contemporary “State Building” and Counterinsurgency (Washington, DC: RAND, 2008).
42
Ibid. Rosenau argues that many African police forces have been drawn into a
military role as “low-cost ‘trigger pullers,’” rather than serving their primary purpose of
“protecting the public from serious crime.”
43
Ibid.
44
Downie and Cooke.
45
Seth G. Jones et al., Securing Tyrants or Fostering Reform? U.S. Internal Security Assis-
tance to Repressive and Transitioning Regimes (Washington, DC: RAND, 2007).
46
Ibid.
Katie Harris, David Keen, and Tom Mitchell, When Disasters and Conflicts Collide:
47
Improving Links between Disaster Resilience and Conflict Prevention (London: Overseas
Development Institute, 2013).
48
David H. Bayley, Democratizing the Police Abroad: What to Do and How to Do It
(Washington, DC: Department of Justice, 2001).
49
Harris, Keen, and Mitchell.
• 314 •
15
Latin America
Craig A. Deare
A s a new administration takes office, the time is ripe for new ap-
proaches to improve the quality of the security relationship that the
United States has with its counterparts throughout Latin America. U.S.
foreign policy in general, and U.S. national security strategy in partic-
ular, does not routinely focus on the nations of Latin America, where
threats are assumed to be less pressing than in other parts of the world.
Despite a traditional attitude of benign neglect, U.S. security interests
there are indeed consequential. Given a globalized world, and the fact
that the United States is no longer the only viable option available to
the region’s nation-states seeking external engagement, American pol-
icymakers will need to work harder—and more importantly, smart-
er—to remain relevant and engaged with our Latin American partners.
Geopolitical realities at play in this part of the world are serious and
troublesome; they will not disappear in the short term and will require
dedicated time and attention by senior national security decisionmakers
sooner rather than later.
The national security interests of the United States were captured suc-
cinctly by the Project on National Security Reform: “To maintain security
from aggression against the nation by means of a national capacity to shape
• 315 •
Deare
• 316 •
Latin America
the task. Few experts, however, see generally positive trends in recent
years, as Michael Reid (who views the glass as half full), writing in a
recent Foreign Affairs article, acknowledges:
• 317 •
Deare
The impact of the drug trade, much of which comes from or through
Latin America, is profound. In 2014, more than 16,000 Americans died
from heroin and cocaine overdoses—far more than were killed in Iraq
and Afghanistan over more than a decade at war.5 The monetary costs
to American society associated with the drug trade exceed $200 billion
every year, far surpassing those associated with terrorism, which receives
greater attention.6
Many of these criminal networks are internationally integrated activ-
ities. Like today’s global corporations, which work above, around, and
across national borders, these criminal groups will operate wherever a
profit can be made. Another factor, of course, is that typically these de-
veloping countries also have weak economic systems incapable of gener-
ating sufficient meaningful employment opportunities, for the young in
particular. An opportunity to join a mara (youth gangs prevalent in Cen-
tral America) or a more structured drug-trafficking organization (DTO)
becomes an attractive option, particularly given the lack of alternatives.
In addition to their ability to operate across borders, some of these
criminal enterprises have been relatively effective at displacing the state
in providing services demanded by the local population, in particular
within urban settings. The degree of effectiveness varies country by
country, and even by certain geographic locations within a given country.
Beyond establishing a secure environment in which they can operate—
and this security also holds for those living in the area—transnational
criminal organizations (TCOs) routinely deliver other services, ranging
from resolution of conflict to trash collection to providing greater se-
curity. As the TCOs consolidate their hold over the region, the formal
governments’ power and authority erode, undermining state legitimacy.
TCOs routinely violate governmental sovereignty and undermine
judicial systems at all levels because they are unencumbered by legal
norms. With huge profit margins at their disposal, they can purchase
the best weaponry, communications capability, and security money can
buy—giving them tactical advantages over most government agencies.
Unrestrained by the bureaucratic sclerosis that limits governments both
domestically and internationally, TCOs employ state-of-the-art informa-
tion technology and communications technology to operate effectively
across the business cycle.
Unlike terrorist organizations, organized crime is dependent on a base-
line of infrastructure and services, and therefore most TCOs do not seek
to destroy the state. They are content with undermining and co-opting
the government at the municipal, provincial, and at times national level,
depending on their requirements and capacity. Importantly, weak and still
developing states are the most vulnerable to the increasing strength of
• 318 •
Latin America
TCOs, and a significant number of Latin American countries fit this char-
acterization. These relatively weak governments lack effective and capable
institutions and frequently have small and corrupt police organizations.
The catch-22 of the situation is that because of their very weakness, these
developing states are hard pressed to generate strong popular participa-
tion. A growing concern is the degree to which the TCO assumes greater
levels of penetration of governmental power, both locally and nationally.
In certain cases, given that the government cannot provide for pub-
lic safety and security, it is the TCO—whether a gang, mara, DTO, or
even an ideologically motivated armed group—that fills that void, thus
supplanting the legitimacy forfeited by the state, generating a profound
impact on the sociopolitical construct. Of even greater concern are those
instances where states are not simply the victims of such a downturn, but
where governments are active participants in this devolution.7 Beyond
being penetrated or infiltrated by TCOs and becoming overwhelmed, in
some cases officials actually lead the process of criminalizing the state.
The result, as former Commander of U.S. Southern Command Admiral
James Stavridis, USN (Ret.), points out, is:
In short, the rise of TCOs in Latin America poses a serious and grow-
ing national security danger that deserves greater attention. Sharing a
region with unsteady neighbors represents a risk to U.S. interests, and
steps must be taken to reverse those conditions. Most theorists point
to the rise in influence of nonstate actors, which is undeniable. At the
systems level of analysis, great powers will continue to dominate the
international system. As Moisés Naím warns, however:
• 319 •
Deare
The jury is still out on whether illicit nonstate actors and their networks
threaten the international system writ large, but their activities demand
much greater attention.
The second major threat to U.S. interests in this region is the growing
presence and activity of external actors with anti-U.S. intentions. It is one
thing for extra-regional actors to promote their economic and political
interests in the hemisphere. In today’s globalized world, every market in
every country is fair game for trade; Airbus has the same right as Boeing
to market its airliners worldwide. But certain countries—Russia, Iran,
and China are the most prominent examples—are seeking access to the
region for reasons that go beyond commerce and diplomacy. The actions
in this region by these three countries in particular should give pause to
U.S. policymakers. Russia views the current geopolitical environment as
a new Cold War; China’s continued expansion into the South China Sea
clearly demonstrates its intentions; and Iran’s aggression in the Persian
Gulf and beyond reveals its global ambitions. Accepting their growing
presence in this part of the world will only embolden these countries.
Unfortunately, Secretary of State John Kerry’s unilateral declaration in
November 2013 that the Monroe Doctrine was dead did little to reas-
sure the governments in the region, instead serving as a clear invitation
to those extra-regional actors looking for opportunities to increase their
influence. This invitation was welcomed by the anti-U.S. alliance known
as ALBA (Alternativa Bolivariana para los Pueblos de América, or the
Bolivarian Alternative for the Americas), which is eager to reduce U.S.
influence despite the long-term costs to their peoples.10
At first blush, China’s expansion into the region might be perceived
as benign. Given its explosive economic growth over the past 30 years, it
comes as no surprise that its exports and imports from around the world
would expand accordingly. After all, U.S.-China trade grew from $2 bil-
lion in 1979 to $591 billion in 2014, with an accompanying trade deficit
of $344 billion.11 Chilean copper, Argentine soy and wheat, Brazilian
iron, Venezuelan oil, and Peruvian minerals are attractive commodities,
and those countries profit from increased sales to satisfy Chinese de-
mand. Upon closer examination, however, China’s economic activities
generate additional concern. Chinese economic expansion globally has
come at the direct cost of U.S. commercial contraction; China’s “policy
banks” have become the largest annual public creditors to governments
in the region.12 In 2006 the United States was the largest trading partner
for 127 countries around the world, versus just 70 for China. However,
by 2011, the situation had almost inverted itself, with 124 countries for
China and 76 for the United States.13 Leaving Mexico aside—a unique
case given the North American Free Trade Agreement (NAFTA) of
• 320 •
Latin America
1994—the rest of Latin America is turning away from the United States
and toward China, although at different rates and degrees of engagement.
Even the case of NAFTA serves to demonstrate the strength of China’s
impact on the region. Prior to China’s entrance into the World Trade Or-
ganization in 2001, Mexico benefited greatly from the new trade agree-
ment with its northern neighbors. However, once China gained preferred
access to the U.S. market, the picture changed, with Chinese products
gaining market shares in the United States at Mexico’s expense, as well
as increasing market shares in Mexico from U.S. products.14 Mexico’s
geographical advantage remains important, as demonstrated by $81.5
billion in bilateral trade in goods and services prior to NAFTA in 1993,
which increased to $247.3 billion in 2000 and reached $532.3 billion
in 2015.15
A related but largely unrecognized factor here is that China is filling a
trade space that could—and should, from a U.S. interests perspective—
be filled by Latin American manufacturers. While China has surpassed
the United States as the most important destination for South Ameri-
can exports, shipments to China continue to be heavily concentrated
in primary goods, with only a small portion of manufactured products.
When commodity prices inevitably fall and the terms of trade worsen,
Latin American manufacturers’ inability to compete effectively with the
Chinese will undermine the potential for sustained growth throughout
the region. The net effect for Latin American countries will only worsen
in the future.16
Beyond China’s deep economic engagement with Latin America,
China’s explicit support for the anti-U.S. alliance ALBA is even more
problematic and troubling. Given ALBA’s declared intent to establish an
alternative to U.S. leadership in the region and to distance itself from
Western companies and conventional multilateral institutions, China has
stepped in as its partner of choice, with both markets and financing.
This has meant the prolonged endurance of certain regimes—Venezuela
is the most obvious example—that would have failed years ago due to
flagrant incompetence, mismanagement, and corruption. China contin-
ues to fund this failed model despite the economic losses it generates;
Chinese intentions are geopolitical, not financial. Having transcended
the role of strategic partners in 2001, the China-Venezuela relationship
is now characterized as a comprehensive strategic partnership, moving
beyond trade to military weapons sales and training. With the death of
Hugo Chavez in March 2013, his designated successor, Nicolás Maduro,
has accelerated Venezuela’s economic collapse with ideological decisions
uninformed by financial realities and exacerbated by oil prices declining
to $30 per barrel. Despite the opposition parties’ takeover of the legisla-
• 321 •
Deare
• 322 •
Latin America
these cultural centers is a matter for concern, and its diplomatic, eco-
nomic, and political engagement is closely monitored.”19 Despite the nu-
clear agreement between the Obama administration and Iranian leaders,
Iran continues to employ terrorism as a deliberate tool of national power.
Iran’s honorary membership in Latin America’s anti-U.S. club—
ALBA—demonstrates Iran’s success in advancing its objectives of pen-
etrating the U.S. area of influence. Participation in ALBA provides Iran
with access to greater intelligence, regional military organizations, and
other security-related activities, and it promotes Iran’s agenda in this part
of the world. Given its previous situation of being under a strong Unit-
ed Nations sanctions regime, Iran was interested in gaining access to
proscribed military technologies, promoting its nuclear program, and
finding a way into the international banking system. The confluence of
Hizballah’s terrorist activities with transnational criminal networks is
even more alarming. Hizballah has evolved into one of the region’s most
significant DTOs, leveraging its networks in Africa, Asia, and Europe.
Unlike China, Iran seeks a presence in the region not for commercial
trade purposes—although this is used as a façade—but as a way to pro-
mote its geopolitical and ideological goals. Given Iran’s proclivity to sup-
port terrorism to achieve its objectives, U.S. policymakers should harbor
no illusions that its presence in Latin America is benign.20
But of greatest immediate concern to U.S. national security interests is
Russia’s renewed efforts to gain access in the region and undermine U.S.
goals and objectives. Taking advantage of the anti-U.S. populist stance
of the late Hugo Chavez, Russia has also established itself as an honor-
ary member in good standing of ALBA. Vladimir Putin’s government is
providing ALBA nations with weapons, police and military training and
equipment, intelligence technology and training, nuclear technology, oil
exploration equipment, financial assistance, and support as an influential
friend on the United Nations Security Council and other international
forums. With Russia’s help and advice, the once-shared hemispheric val-
ues of a functioning democratic system are being replaced by a toxic mix
of antidemocratic values, additional inputs of massive corruption, and
a doctrine that draws on totalitarian models. The ALBA bloc embraces
terrorism and terrorist groups such as the Fuerzas Armadas Revoluciona-
rias de Colombia (Revolutionary Armed Forces of Colombia), Hizballah,
and the Basque revolutionary organization Euskadi Ta Askatasuna. Also,
ALBA’s military doctrine includes the justification for the use of weapons
of mass destruction against the United States.
Russia’s intentions in this part of the world are antagonistic in nature.
Russia’s ongoing efforts to deepen ties with the nine ALBA bloc mem-
bers raise real strategic concerns. Although some attempt to excuse Rus-
• 323 •
Deare
Cultural Underpinnings
Five hundred years of externally imposed influence across the region—
political, economic, religious, and social, dating from the late 15th cen-
tury—have had the net result of generating a new culture. Infused into
the native inhabitants of the Americas over the years by invading colo-
nists, this new culture—explicitly Latin American—is a factor that re-
quires an appreciation of how different it is to what we would broadly
characterize as American. Political scientist Howard Wiarda captured
the many differences—and the reasons behind those differences—of
cultural development between the British colonies and Spanish and
Portuguese empires:
• 324 •
Latin America
Political Culture
The evolution of political parties and processes in the region has amount-
ed to a slow and gradual move away from explicitly authoritarian regimes
to a variety of democratic models, in many cases ostensibly based on sep-
aration of powers but typically highly presidentialist and characterized
by a dominant executive. This process only began to emerge in the early
20th century (in Uruguay) and has progressed in fits and starts across the
region, with countless interruptions by coups of all sizes and colors. But
the image of the Latin American military junta is not simply coincidental;
as recently as the 1980s, the major countries of the Americas were under
military control—Argentina, Brazil, Chile, Paraguay, Peru, Uruguay, and
others. In addition, the majority of the countries are based on a unitary
(versus a federal) model, although even then the concentration of au-
thority in the national executive is the norm. This brief description is
provided simply to underscore the fact that when we use the term dem-
ocratic government in referring to Latin America, this does not mean an
American model or a Canadian parliamentarian variant.
Indeed a variety of factors have contributed to create a political
culture that would be characterized as “left of center” in U.S. terms.
Although communist ideologies are considered fringe elements with-
in the mainstream of the U.S. political system, they are alive and well
throughout the region. Cuba’s communist party continues to serve as
• 325 •
Deare
Economic Culture
As with other elements, the disparity in capacity across the range of
countries is striking. Latin America is the most unequal region in the
world in terms of distribution of wealth. Although poverty has declined
from 48.3 percent to 28 percent between 1990 and 2014,23 10 of the
15 most unequal countries in the world are in the Americas (including
Brazil).24 The region with the lowest quintile is Latin America, which has
4.1 percent of income. The bottom quintile in other developing regions
includes South Asia, which has 7.9 percent, and Eastern Europe/Central
Asia, which has 8.1 percent. At the other end of the spectrum, the top
quintile in Latin America has 53.9 percent of income, the highest region-
al average.25 Measured by gross domestic product, Brazil is one of the top
10 producing countries of the world, and both Mexico and Argentina are
members of the Group of 20. But as richly endowed as those countries
are, they too share in significant levels of poverty, and their income dis-
tribution schemes are far from ideal. Although many of the countries in
the region are amply endowed with natural resources, in most developed
countries intangible capital is the largest share of total wealth. This is not
the case in Latin America, and it is explained in large part by weaknesses
in educational systems as well as rule of law.
Judiciary Systems
The legal systems throughout the region are quite different from a U.S.
model. Latin America’s legal foundations, established in the 16th and 17th
centuries, were cast in a manner that would lead to continued author-
itarian rule, founded on a legal tradition based on Roman law (versus
common law in the United States and Canada inherited from Britain).
Quoting again from Howard Wiarda:
• 326 •
Latin America
• 327 •
Deare
• 328 •
Latin America
• 329 •
Deare
The IRC model is a necessary but insufficient first step in the right
direction. This Big Idea would go beyond the IRC concept to give it the
additional responsibility of also engaging more effectively with the “civil
society”—universities, NGOs, churches, the private sector—to do those
things not well suited to the government per se.
This proposal recognizes the limits of U.S. time, attention, and re-
sources available to dedicate to the region; other parts of the world rep-
resent more significant and urgent threats to U.S. interests. The idea here
is to work smarter, not necessarily harder or with more money. Resources
will be required elsewhere in the world to confront the threat du jour
and traditionally have not been available.33 But a truly comprehensive
approach that includes nongovernmental actors, coordinated, synchro-
nized, and supported by the U.S. Government, would be a game chang-
er. There are areas of concern with duplication of effort that would be
deconflicted, as well as gaps and seams that could be recognized and
addressed by an entity authorized and bestowed with available—but not
coherently integrated—capabilities. The Latin American “Policy Direc-
tor” would lead a team of regional- and country-specific as well as func-
tional experts (economists, lawyers, judges, political scientists, anthro-
pologists, sociologists, security and defense specialists, law enforcement
officers, and so forth) to identify the key elements to assist in addressing
essential developmental goals for the region.
A natural reaction to this proposal is that it is unrealistic, too bold,
unworkable, or a combination of all three. Perhaps. But prolonging the
status quo is demonstrably ineffective; after all, the status quo is what got
us here. A system-wide reform effort, à la the Project on National Securi-
ty Reform, is currently unlikely; unfortunately, a new major crisis will be
required to propel us to action. But a pilot program in one specific part
of the world might well succeed.
In the event that the Big Idea is too great a leap and simply too hard
to pursue, there are other more limited—but still innovative—recom-
mendations that could help in the near term. First, recognizing the real
threat presented by transnational criminal organizations, as well as the
fact that a number of different actors play a role in identifying the threat
as well as dealing with it, a new administration might establish a joint
interagency task force (JIATF) with the broad mandate to go after the
TCO threat. The idea is to build upon the JIATF-South model, which
integrates many of the interagency actors with the Department of De-
fense (DOD) and Coast Guard to conduct detection and monitoring
operations regarding the interdiction of illicit trafficking and other nar-
co-terrorist threats in support of national and partner nation security.
This Joint Interagency Task Force–Transnational Criminal Organizations
• 330 •
Latin America
• 331 •
Deare
• 332 •
Latin America
Notes
1
Project on National Security Reform (PNSR), Forging a New Shield (Washington, DC:
PNSR, November 2008), v. Emphasis added.
2
Linda Robinson, Intervention or Neglect: The United States and Central America Beyond
the 1980s (New York: Council on Foreign Relations, 1991), 173. Bernie Aronson has also
noted that Latin Americans are less annoyed by U.S. intervention than by the inconsisten-
cy of our intervention, an important qualifier.
3
Michael Reid, “Obama and Latin America: A Promising Day in the Neighborhood,”
Foreign Affairs 94, no. 5 (September/October 2015), 46. Emphasis in the original.
4
James R. Clapper, Director of National Intelligence, “Statement for the Record:
Worldwide Threat Assessment of the U.S. Intelligence Community,” House Appropria-
tions Subcommittee on Defense, March 25, 2015, 8; available at <http://docs.house.gov/
meetings/AP/AP02/20150325/103200/HHRG-114-AP02- Wstate-ClapperJ-20150325.
pdf>.
5
Centers for Disease Control and Prevention, National Center for Health Statistics
2015, available at <www.drugabuse.gov/related-topics/trends-statistics/overdose-death-
rates>.
6
National Drug Threat Assessment 2010, Product No. 2010-Q0317-001, National
Drug Intelligence Center, U.S. Department of Justice, 2010.
7
For a more in-depth understanding of these arguments, a number of articles in
Convergence are quite helpful. See Michael Miklaucic and Jacqueline Brewer, eds., Con-
vergence: Illicit Networks and National Security in the Age of Globalization (Washington, DC:
NDU Press, 2013).
8
Ibid., foreword, by James G. Stavridis, ix–x.
9
Michael Miklaucic and Moisés Naím, “The Criminal State,” in Convergence, 149.
10
Formal members of Alternativa Bolivariana para los Pueblos de América, or the
Bolivarian Alternative for the Americas (ALBA), include the two original members—Cuba
and Venezuela—as well as Antigua and Barbuda, Bolivia, Dominica, Ecuador, Nicaragua,
Saint Lucia, and St. Vincent and the Grenadines. Iran and Syria maintain observer status.
11
Wayne M. Morrison, China-U.S. Trade Issues, RL33536 (Washington, DC: Con-
gressional Research Service, December 15, 2015), available at <www.fas.org/sgp/crs/row/
RL33536.pdf>.
12
Chinese “policy” banks differ from Chinese commercial banks in that they target
specific sectors for economic and trade development issues. Specifically these include the
Agriculture Development Bank of China, China Development Bank, and Export-Import
Bank of China.
13
“China Denies ‘Biggest Trader’ Status, Insists It’s ‘Developing Country,’” RT.com,
February 19, 2013, available at <www.rt.com/business/china-trading-us-partner-577/>.
14
Enrique Dussel Peters and Kevin P. Gallagher, “NAFTA’s Uninvited Guest: China and
the Disintegration of North American Trade,” CEPAL Review 110 (August 2013), 86–89.
15
Data from the U.S. Census Web site, available at <www.census.gov/foreign-trade/
balance/c2010.html#1994>.
16
For an excellent analysis of the current China–Latin America trade and finance
situation, see Rebecca Ray and Kevin Gallagher, China-Latin American Economic Bulletin
2015 Edition, Discussion Paper 2015-9 (Boston: Global Economic Governance Initiative,
2015), 1–22.
17
Yei Lu, “China’s Strategic Partnership with Latin America: A Fulcrum in China’s
Rise,” International Affairs 91, no. 5 (2015), 1047–1048.
• 333 •
Deare
18
Alma Keshavarz, “A Review of Iran’s Revolutionary Guards and Qods Force:
Growing Global Presence, Links to Cartels, and Mounting Sophistication,” Small Wars
Journal, December 23, 2015, available at <http://smallwarsjournal.com/jrnl/art/a-review-
of-iran%E2%80%99s-revolutionary-guards-and-qods-force-growing-global-presence-
links-to-car>.
19
General John F. Kelly, Posture Statement before the Senate Armed Services Commit-
tee, March 12, 2015.
20
For a particularly sobering overview of Iran’s interests and activities in the region,
see Matthew Levitt’s “Iranian and Hezbollah Operations in South America: Then and
Now,” PRISM 5, no. 4 (2013), 118–133.
21
Kelly, Posture Statement. Emphasis added.
22
Howard J. Wiarda, The Soul of Latin America (New Haven: Yale University Press,
2001), 3–4.
23
Economic Commission for Latin America and the Caribbean, “Poverty and Indi-
gence Reduction Stalls in Most of Latin American Countries,” January 26, 2015, available
at <www.cepal.org/en/pressreleases/poverty-and-indigence-reduction-stalls-most-lat-
in-american-countries>.
24
United Nations (UN) Development Programme, “About Latin America and the
Caribbean,” available at <www.latinamerica.undp.org/content/rblac/en/home/regioninfo.
html>.
25
World Bank, “Poverty and Equity Regional Dashboards,” available at <http://pover-
tydata.worldbank.org/poverty/region/ECA>.
26
Wiarda.
27
Transparency International 2015 Index, available at <www.transparency.org/
cpi2015#map-container>.
28
UN Office on Drugs and Crime, Global Study on Homicides, 2013, 35, available at
<www.unodc.org/documents/gsh/pdfs/2014_GLOBAL_HOMICIDE_BOOK_web.pdf>.
29
Fernando Carrión, “Violence Research in Latin America and the Caribbean: A Liter-
ature Review,” International Journal of Conflict and Violence 5, no. 1 (2011), 88.
30
National Security Strategy 2015 (Washington, DC: The White House, February
2015), 2.
31
Lifelong friend of President Bill Clinton, Thomas “Mack” McLarty, first served as
White House Chief of Staff and was then designated “Special Envoy for the Americas.”
His success in this position was due primarily to his close relationship with the President,
not his regional expertise.
32
PNSR, 441–442. See pages 492–506 for greater details regarding the integrated
regional center model.
33
A colleague who also specializes in Latin America makes a compelling case for more
funding: “I think more money is a necessary suggestion. We spend less in Latin America
in one year, adding up all of our programs—civilian and military—than the military
spends in Afghanistan in one week. That’s shameful for a region that neighbors the
United States. No wonder we’ve lost influence.” Dr. David Spencer, email note to author,
April 1, 2016.
34
While it is true that “mini” versions of this proposal already exist within the Depart-
ment of Justice, Department of Treasury, and Intelligence Community, they continue to
exist within functional stovepipes. The concept is to integrate efforts across all agencies.
• 334 •
Latin America
35
The precedent of having an Assistant Secretary of Defense for a single region was
established in late 2007 with the creation of the office of the Assistant Secretary of De-
fense for Asian and Pacific Security Affairs.
36
An outlier would be to place Mexico and the Caribbean into U.S. Southern Com-
mand, and merge U.S. European Command into what is left of U.S. Northern Command.
See Armed Forces Journal, “Redrawing the COCOM Map,” available at <www.armedforces-
journal.com/redrawing-the-cocom-map/>.
37
For a more detailed explanation of the logic behind these recommendations, see
Craig A. Deare, “Time to Improve U.S. Defense Policy toward the Western Hemisphere,”
Joint Force Quarterly 53 (2nd Quarter 2009), 38–39.
38
Testimony of Admiral James G. Stavridis, USN (Ret.), before the Senate Armed
Services Committee, December 10, 2015.
39
Joe Gould, “As Congress Pushes Defense Department Reform, So Does Carter,” De-
fense News, December 12, 2015, available at <www.defensenews.com/story/defense/poli-
cy-budget/budget/2015/12/12/congress-pushes-defense-department-reform-so-does-car-
ter/77057422/>.
• 335 •
16
Central Asia
Theresa Sabonis-Helf
After a decade of competition for influence in Central Asia, the region’s future
path is now clearly tied to China. While Russia retains some roles in the region,
the trend toward China is likely to continue without strong contestation. The
United States has an interest in meaningful economic development and can
help shape some aspects of China’s involvement in the region.
W ith the winding down of the war in Afghanistan and low oil pric-
es, Central Asia is no longer visible in the forefront of U.S. for-
eign policy. U.S. priorities in the region have already been through two
distinct phases. First, U.S. attention to the region from independence to
the terrorist attacks of September 11, 2001, focused on consolidation
of independence and state-building. Then from 9/11 to 2014, Central
Asia was a focus because of its proximity to Afghanistan. Now, in a third
and post-Afghanistan phase, the United States is reassessing the distant,
landlocked region and how it does—or does not—tie to U.S. national
interests.
The United States continues to be concerned about political instabil-
ity in the region, the persistence of drug-trafficking, and the prospects
for the rise of violent extremism. In each of these areas, concerns are
not matched with clear U.S. levers for influencing the outcome. In the
Afghan War era, the United States was the third party in what was com-
monly referred to as the “Great Game” for influence. The United States is
no longer a key player in the new Great Game that is unfolding between
Russia and China, but it is still likely to be called on to referee and can
play a role in ensuring that Central Asia benefits from the overlapping
and sometimes competing interests of its powerful neighbors.
The states of Central Asia face a “connect or die” challenge. Long-
standing grievances, which are personal (among the leaders) and histor-
ical (among the nations), make cooperation difficult. Yet regardless of
• 337 •
Sabonis-Helf
which hegemon wins the most influence, Central Asia’s future success
rests on economic integration and to some extent political and security
integration.
The Central Asian states are not yet persuaded of this. In February
2014, aging Kazakh President Nursultan Nazarbayev floated the idea of
changing his country’s name from Kazakhstan to Kazak Yeli, omitting
the “-stan” suffix in favor of its Kazakh equivalent.1 This idea may be the
vanity of an aging ruler, but it also reflects a sense, common in Kazakh-
stan, that as the most successful state in the region, Kazakhstan bene-
fits from distancing itself (as much as possible) from its more troubled
neighbors.2 The fact that Kazakhstan’s name is even a point of discussion
illustrates a problem that is somewhat perplexing to outsiders: Central
Asia’s core question for the coming decade is what sense will be made
of its region—and if it is a region at all. Although Central Asia is always
described as a crossroads, a renewed competition is now under way to
define the crossroads, what forms of government and security provision
will prevail, what markets will now be connected to what producers,
and what physical infrastructure and rules will shape the trade within
the region and beyond.
The United States framed its efforts to integrate Afghanistan into the
region as a “New Silk Road Strategy,” but that gained little traction be-
yond supply for and retrograde from the war in Afghanistan. The U.S.
New Silk Road Strategy did not promise or provide major investment in
the region, and the signature project, the Turkmenistan-Afghanistan-Pa-
kistan-India gas pipeline, failed to move forward due to a persistent-
ly problematic security climate and lack of investors. While the North
Atlantic Treaty Organization and European nations sought to connect
Central Asia to its south, Russia is seeking to integrate some (but not all)
Central Asian states into its Eurasian Economic Union (EEU). Moreover,
China has launched an ambitious program of investment tying the re-
gion to its own Xinjiang Province. Central Asia has established itself as
an energy powerhouse with growing exports in oil, gas, and electricity,
but the direction of these exports is evolving unexpectedly. Economical-
ly, the only other significant export besides resources is labor, and the
migration of labor is going in a different direction than resource exports.
Security is largely contingent on economic and governance success or
failure, but the alliances promising security, such as the Collective Secu-
rity Treaty Organization (CSTO), are not the same as the ones promising
prosperity, such as the EEU.
This chapter provides a brief overview of governance, oil and gas de-
velopment, and emerging security challenges, but its emphasis is on the
question of the competitive evolution of the crossroads themselves. Re-
• 338 •
Central Asia
• 339 •
Sabonis-Helf
• 340 •
Central Asia
• 341 •
Sabonis-Helf
Choosing a Leviathan
With the problems of non-integration plaguing the region, the role of
outside actors in connecting the Central Asian states to each other—if
only to reach markets beyond Central Asia—is critical. The low levels of
trust among the states cause each Central Asian state to place hopes in
outside actors to moderate the behavior of its immediate neighbors. The
two leading competitors in the region—Russia and China—have each
taken a different approach.
For Russia the preferred approach is for the Central Asian states to
join the EEU. This union, which came into being in January 2015, al-
lows for a common customs area. The common market envisioned by
the EEU is expected to go into effect in 2025, with the intervening years
being used to harmonize legislation and practices.11 Kazakhstan was a
founding member, as was Kyrgyzstan, but each state had some skepti-
cism about the future of the EEU from the outset. Kazakhstan joined the
World Trade Organization (WTO) prior to joining the EEU to ensure
that it would be bound by international rules and regulations, limiting
Russia’s power to fundamentally reshape markets. Kyrgyzstan (long a
member of the WTO) secured a clause in its agreement with the EEU
• 342 •
Central Asia
that ensured it would be able to continue with its economic ties to China
without interference. Russia has indicated (although not yet implement-
ed) that it will give preference to labor migrants from EEU countries over
non-EEU ones, a factor that strongly shaped Kyrgyzstan’s decision to
join. Although Tajikistan is exploring the possibility of membership, it is
unclear how eager Russia is to add further to the union at this time—and
a closer economic relationship with impoverished Tajikistan is not nec-
essarily in the Kremlin’s interests. There has been no evident discussion
about expanding the EEU to include Uzbekistan (whose relations with
Russia are off and on) or Turkmenistan (which remains permanently
neutral and therefore does not belong even to the Shanghai Cooperation
Organization [SCO]). Meanwhile the economic recession in Russia has
somewhat reduced its attractiveness to Central Asian migrants. Accord-
ing to World Bank data, Tajik migrants to Russia decreased by 3.8 per-
cent and Uzbek migrants decreased by 18.6 percent in 2015.12
While Russia’s current economic offering, the EEU, focuses on in-
stitutions, China’s efforts in the region clearly focus on something
more immediately attractive to the region: infrastructure. In September
2013, Chinese President Xi Jinping took the opportunity of a speech at
Nazarbayev University in Astana, Kazakhstan, to announce China’s plans
to build a “Silk Road Economic Belt” across Eurasia. This Silk Road be-
came the land-based component of China’s subsequent “One Belt, One
Road” (OBOR) strategy, which envisions land-based infrastructure con-
necting China to Europe via Central Asia (One Belt) as well as a maritime
network linking Asia to Africa via the Indian Ocean (One Road).13 The
policy envisions long-term political cooperation and cultural exchange,
but physical blueprints focus on infrastructure in three areas: transporta-
tion, energy, and telecommunications.14
Physical aspects of the OBOR include pipelines, railways, and high-
ways. The entire program is exceedingly ambitious—involving some 68
nations—but Central Asia does seem to be enjoying some pride of place
in the project to date. Analysts of China’s OBOR strategy in Central Asia
note that China’s infrastructure development in the region serves several
purposes at once: China is able to export its current overcapacity in in-
frastructure development to neighboring states, this new infrastructure
potentially helps stabilize the Xinjiang region by better linking it eco-
nomically to its nearest neighbors, and it helps China reap the benefits
of access to natural resource markets as well as to consumer markets that
have been isolated.
As envisioned, financing will come from China bilaterally, from Chi-
nese private investors, and from multilateral funds. China often cites the
Asian Infrastructure Investment Bank (AIIB) as an important multilateral
• 343 •
Sabonis-Helf
source for Silk Road project financing. China holds a 30 percent stake
in the AIIB, which is expecting to have a $100 billion capital base. Since
the articles of agreement for the AIIB require 75 percent support to make
major decisions, China’s priorities will be well reflected in funding. Chi-
na is also expecting to use the BRICS (Brazil, Russia, India, China, and
South Africa) New Development Bank (which also expects to establish a
capital base of $100 billion), although it will have less clout in that or-
ganization. China is also believed to be pressuring the SCO to establish
funding available for these projects.15 Although the ambition and scope
of China’s OBOR strategy are striking, Central Asia has an important
place. Oil and gas pipelines from Central Asia to China are already well
established (this point is discussed in the next section), and China has
established a $40 billion Silk Road Fund for additional projects in the
region. Analysts note that even if China does not follow through on all its
investment promises, projects already undertaken with Chinese funding
represent more investment than Central Asia has received from any other
source since independence.
• 344 •
Central Asia
Table 2. Central Asia Exports in Natural Gas: 2008, 2010, and 2014 in Billion Cubic Meters
per Annum (BCMA)
Origin > 2008 2008 as % 2010 2010 as % 2014 2014 as %
Destination BCMA BCMA BCMA
Turkmenistan > 47.1 86 trade*/71 9.68 49 trade*/23 9 22 trade*/13
Russia production** production** production**
Uzbekistan > 13.5 100 trade/22 10.32 76 trade/17 4.1 48 trade/7
Russia production production production
Kazakhstan > 9.6 100 trade/32 11.95 100 trade/35.5 10.9 96 trade/56
Russia production production production
years since 2009, a striking pattern emerges: Russia lost Central Asia, at
least in energy transit terms.
Historically, Russia had been the transit state for all exports of oil
and gas from the region, using its power to allow and disallow access to
markets. Early after the breakup of the Soviet Union, Russia established
a practice of using Central Asian production as “swing” capacity, which
allowed access to the pipelines only when demand in European markets
was high enough to use full Russian production plus Central Asia. The
rapid development of pipelines, which began coming on line in 2001,
began to change that, and by 2010 the picture of energy in the region
was starkly different. Kazakhstan’s oil production increased and its nat-
ural gas production declined (as it increasingly used reinjected gas to
improve the productivity of the oil fields). Uzbekistan’s production re-
mained relatively constant, but its export of oil and gas declined sharply,
as it used more of its natural endowments to support autarkic industries
within Uzbekistan. Turkmenistan’s production of natural gas rose sharp-
ly, but it simultaneously reduced exports and developed entirely new
routes in an effort to secure independence and prosperity. Table 2 gives
a sense of the changes and shifts in natural gas flows from the region.
As table 2 shows, the clear winner in this development has been Chi-
na, particularly with regard to Turkmenistan. It is instructive how much
of China’s relationship with Turkmenistan resulted from a Russian policy
• 345 •
Sabonis-Helf
blunder. China did not so much “win” Turkmenistan as Russia “lost” it.
During the global economic downturn, in an effort to preserve scarce
profits, Gazprom responded slowly to a rupture on the main Turkmeni-
stan pipeline (and, some argue, caused it). Turkmenistan was unable to
export any gas via its main line for several months, throwing the nation
into a severe economic crisis. By the end of that crisis, Turkmenistan had
committed to completing pipeline infrastructure to China—infrastruc-
ture that had been discussed for years but on which there had been little
progress. In short, the cost to Russia of Gazprom using Turkmenistan as
its “swing” capacity was the geostrategic loss of Turkmenistan as an en-
ergy ally. Although Turkmenistan accounted for only 2 percent of global
production in 2015, it has the fourth largest proven reserves of natural
gas in the world, indicating a promising future.19
Construction of Turkmenistan’s first pipeline to China preceded artic-
ulation of the OBOR strategy, but now the network of natural gas pipe-
lines connecting Central Asian gas to markets in China is seen as an im-
portant component of the strategy. The Central Asia–China gas pipeline,
the longest pipeline in the world, transits Uzbekistan and Kazakhstan
on its way to China. It is currently comprised of three lines, with a total
capacity of 55 BCMA. A fourth line, currently under construction, will
take a different route, flowing through Uzbekistan, Tajikistan, and Kyr-
gyzstan, and will add another 25-BCMA capacity. Since the completion
of the Central Asia–China gas pipeline, Turkmenistan’s production has
risen by over 25 BCMA.
This infrastructure is especially attractive to China as it provides for
an expansion of supply that is overland (and therefore not involved in
growing pressures on the Strait of Malacca), and it enables China to tap
into—and presumably become a near-monopsony for—available but
landlocked natural gas in Central Asia. At the outset, Turkmenistan pro-
vided all the natural gas that traverses the Central Asia–China gas pipe-
lines, but China has since pursued development of natural gas supply
in Uzbekistan and in Kazakhstan, with the intention of these nations
becoming suppliers rather than merely transit states for China. At the
same time, China is involved in infrastructure improvement that will
help gasify regions of these countries that do not currently have such
infrastructure.20
The fourth line of the gas pipeline, Line D, which takes a new route
and is still under construction in late 2016, is particularly attractive to
the energy-poor states of Kyrgyzstan and Tajikistan. They will receive
both transit fees and lower dependence on their historical gas supplier,
Uzbekistan.21 China is billing this route choice as an aspect of regional
development. This route also helps discipline the main transit states by
• 346 •
Central Asia
• 347 •
Sabonis-Helf
Security Climate
Although Central Asia trade has shifted decisively toward China, Russia
continues to play a soft-power and a security role. To date Russia retains
the soft power of language: news services in Russian remain popular,
Russian remains one of two official languages in Tajikistan, Kazakhstan,
and Kyrgyzstan, and Russia provides almost the only coverage in the
region of international affairs. It also retains security relationships with
most Central Asian states, as reflected in table 3. The Collective Security
Treaty Organization, led by Russia, was established in 1992 and includes
three of the five states. China shares some (minimal) security relations
with Russia through the SCO, established in 2001 and including four of
the five Central Asian states. The security obligations of the SCO have in
recent years expanded somewhat and include military cooperation and
intelligence-sharing. The SCO, however, focuses on countering separat-
ism and extremism, while the CSTO is a more comprehensive intergov-
ernmental military alliance.
While Uzbekistan and Turkmenistan have opted out of security infra-
structure linking with Russia, the other three states retain military and
• 348 •
Central Asia
state security links. Military security is arguably the only sphere in Cen-
tral Asia where Russia actively plays a leading role. Russia seems eager to
maintain these relationships but has limited resources available to inter-
vene in ethnic or sectarian conflicts, as evidenced by Russia’s choice to
stay out of 2010 ethnic clashes in Kyrgyzstan, despite the Kyrgyz govern-
ment’s requests for assistance.34
Beyond threats from each other, and concerns about their militarily
powerful northern neighbor, threats to Central Asian states are largely
internal. Central Asian governments voice growing concern about the
threat of Islamic extremism, but these risks are often exaggerated. As
some analysts note, the governments often misrepresent political protest
in order to justify repression. Also, because of relatively effective state
repression in Central Asia, several militant groups (including the Islamic
Movement of Uzbekistan) have moved the base of their operations from
Central Asia to South Asia.35 While not an existential threat to the state
in Central Asia in the near term, foreign fighters from Central Asia have
been and are a source of instability in Afghanistan and Pakistan as well
as in Iraq and Syria. Their return home to Central Asia is a concern for
the long term. The role of opium routes in financing both extremism and
criminal organizations is another key issue that the Central Asian states
remain poorly equipped to address.
Beyond the commitments of the SCO, China has not sought to project
military power into the Central Asian region, but most analysts expect
that China will protect its growing economic stakes and that China will
remain vigilant against terrorism, separatism, and extremism.36 China is
positioning itself to, at a minimum, mediate between the Central Asian
• 349 •
Sabonis-Helf
states. Regional scholar Alexander Cooley notes that the legal structure of
Central Asia’s pipelines gives China an unusual role: each country along
the Central Asia–China pipeline route has a separate joint venture agree-
ment with China concerning the pipeline on its territory. China owns 50
percent, while the host nation owns the other. This means that any region-
al dispute that interferes with the flow of gas will be mediated by China.37
While the implications of this for price, volume, and maintenance are
obvious, it also suggests that China itself will take responsibility—and
hold each transit state individually responsible—for continuing the flow
of natural gas regardless of other problems among the states.
• 350 •
Central Asia
• 351 •
Sabonis-Helf
The author would like to thank her National Defense University col-
leagues Dr. Vivian Walker and Colonel Robert Timm, USA, as well as Dr.
Gavin Helf for their insights on this chapter.
Notes
1
The name in either formulation means “place of the Kazakhs.”
2
“Don’t Call Me Stan,” The Economist, February 22, 2014. This article does not note
the fact that, in the Soviet era, the region was often termed “Kazakhstan and Central
Asia,” a reflection of Kazakhstan’s higher status in Moscow’s eyes.
3
See Alexander Cooley, Great Games, Local Rules: The New Great Power Contest in
Central Asia (Oxford: Oxford University Press, 2012).
4
See World Bank Report, “Listening2Tajikistan: Survey of Wellbeing,” April 25, 2016,
based on a survey of 3000 households, available at <www.worldbank.org/en/country/
tajikistan/brief/listening2tajikistan>.
5
The World Bank defines Europe and Central Asia as a region that includes Albania,
Armenia, Azerbaijan, Belarus, Bosnia and Herzegovina, Bulgaria, Croatia, Cyprus, Former
Yugoslav Republic of Macedonia, Georgia, Hungary, Kazakhstan, Kosovo, Kyrgyz Repub-
lic, Latvia, Lithuania, Moldova, Montenegro, Romania, Russian Federation, San Marino,
Serbia, Tajikistan, Turkey, Ukraine, and Uzbekistan. Turkmenistan is not included in
the region, presumably for lack of reliable data. See Doing Business 2015: Going Beyond
Efficiency, 12th ed. (Washington, DC: World Bank Group, 2014).
6
See Paul Collier, The Bottom Billion (Oxford: Oxford University Press, 2007).
7
Migration and Remittances: Recent Developments and Outlook, World Bank Migration
and Development Brief #26 (Washington, DC: World Bank, April 2016), annexes, 22.
8
Noah Tucker, Central Asian Involvement in the Conflict in Syria and Iraq: Drivers and
Responses (Arlington, VA: Management Systems International, May 4, 2015).
9
Based on 2014 data as provided on the “Observatory of Economic Complexity,” MIT
Media Atlas, available at: <http://atlas.media.mit.edu/en/>.
10
Kyrgyzstan exported 12 percent of its electricity production and Tajikistan exported
6 percent of its electricity production in 2012, even though both states faced domestic
• 352 •
Central Asia
electricity crises. See Central Intelligence Agency (CIA), The World Factbook, available at
<www.cia.gov/library/publications/the-world-factbook/>.
11
Eugene Rumer, Richard Sokolsky, and Paul Stronski, U.S. Policy Toward Central Asia
3.0 (Washington, DC: Carnegie Endowment for International Peace, January 2016), 12.
12
Migration and Remittances, 23.
13
Thomas Zimmerman, The New Silk Roads: China, the U.S., and the Future of Central
Asia (New York: New York University Center on International Cooperation, October
2015), introduction.
14
Ibid., 7.
15
Ibid., 8.
16
For a full discussion of the negotiations, see Daniel Yergin, The Quest: Energy, Securi-
ty, and the Remaking of the Modern World (New York: Penguin Press, 2011), 43–63.
17
See BP Statistical Review of World Energy June 2015, 64th ed. (London: British Petro-
leum, 2014), 8, 22.
18
Department of Energy, Energy Information Administration, “Kazakhstan Interna-
tional Energy Data and Analysis,” January 14, 2015 edition, available at <www.eia.gov/
beta/international/analysis.cfm?iso=KAZ>.
19
Turkmenistan contains 9.4 percent of world reserves and supplied only 2 percent
of global production in 2014. Data according to BP Statistical Review of World Energy June
2015, 20, 22.
20
Martha Brill Olcott, “China’s Unmatched Influence in Central Asia,” Carnegie En-
dowment for International Peace, September 18, 2013.
21
Ibid.
22
Kazakhstan-China Crude Oil Pipeline, Kazakhstan, data available at <www.hydro-
carbons-technology.com/projects>.
23
Usen Suleimen, “Energy Cooperation between Kazakhstan and China,” Astana
Times (Kazakhstan), January 14, 2014, available at: <http://astanatimes.com/2014/01/
energy-cooperation-kazakhstan-china/>.
24
Department of Energy, Energy Information Administration, “Kazakhstan Country
Analysis,” available at <www.eia.gov/beta/international/analysis.cfm?iso=KAZ>. Other
international corporate investors in Kashagan include Eni, ExxonMobil, Shell, Total, and
Inpex.
25
Bobo Lo, China’s Energy Policy Toward Central Asia, Short Term Policy Brief #54,
Europe-China Research and Advice Network, April 2012.
26
Chen Aizhu and Adam Rose, “Private Chinese Firm to Take Control of Unit of
Kazakh State Oil Company,” Reuters, December 15, 2015.
27
Ibid.
28
Rumer, Sokolsky, and Stronski, 9.
29
For a full discussion of this transformation and its significance, see Alexander Cool-
ey, “China’s Changing Role in Central Asia and Implications for U.S. Policy: From Trading
Partner to Collective Goods Provider,” prepared remarks for “Looking West: China and
Central Asia,” U.S.-China Economic and Security Review Commission, March 18, 2015,
available at <www.uscc.gov/sites/default/files/Cooley%20Testimony_3.18.15.pdf>.
30
For these and other examples, see Olcott.
31
Zimmerman, 6.
• 353 •
Sabonis-Helf
32
Simon Denyer, “In Central Asia, Chinese Inroads in Russia’s Back Yard,” Washington
Post, December 27, 2015.
33
The World Factbook.
34
Rumer, Sokolsky, and Stronski, 13.
35
Ibid., 9.
36
Ibid., 10.
37
Cooley, “China’s Changing Role,” 2.
38
For a detailed discussion of U.S. assistance, see Rumer, Sokolsky, and Stronski, 17.
39
Ibid., 13.
40
Cooley, “China’s Changing Role,” 4.
41
Zimmerman, 15.
• 354 •
17
The High North
David Auerswald
When it comes to security policy, there are three distinct Arctic subregions:
North America, the North Atlantic and Europe, and Russia. As Arctic ice melts
from climate change, the security of the United States and its allies will be
increasingly challenged in the Atlantic and European Arctic subregion. Russian
behavior is becoming more aggressive, the Arctic states have different priorities
and approaches to regional issues, and the region lacks an international forum
to resolve hard-power disputes. This chapter advances four initiatives to
manage Arctic relations in light of these developments: amending the 2013 U.S.
Arctic strategy to account for regional changes, creating a regional forum for
security and economic discussions, initiating a Western security organization
in the European Arctic subregion to complement the North Atlantic Treaty
Organization, and improving U.S. capabilities to operate across the Arctic.
Each initiative supports U.S. regional interests at a relatively low cost.
• 355 •
Auerswald
there are search and rescue and early warning of nuclear attack. The
Siberian Arctic is dominated by Russia and is also largely peaceful. The
final Arctic subregion is in Northern Europe and above the North Atlan-
tic (for simplicity’s sake, called the European Arctic in this chapter). This
is a contested Arctic, a place of increasing security competition between
East and West and the most likely Arctic subregion for instability, crises,
and even military conflict. As a result, much of this chapter is devoted to
the European Arctic.
Based on author interviews with more than 70 current and former se-
nior government officials in the region, the most immediate regional con-
cern for the European Arctic is Russia’s growing proclivity to challenge
the international order, as demonstrated through its actions in Ukraine,
its remilitarization of its northern and eastern provinces, and its infringe-
ments on Nordic and Baltic states’ airspace and territorial waters. Rus-
sian actions have heightened threat perceptions among European Arctic
states and led to the belief among security professionals in the region
that the Arctic will not be compartmentalized from broader geopolitical
concerns for much longer. In the words of Norwegian Foreign Minis-
ter Borge Brende, the “Arctic cannot be viewed in isolation from events
elsewhere.”2 Indeed the relatively cooperative dynamic within the region
on climate research, pollution controls, and search-and-rescue protocols
is already being eclipsed by diverging policies on refugees, European
integration via the European Union (EU), security policy priorities, and
resource extraction.
At the same time, Arctic states have no ready-made forum for ad-
dressing regional, hard-power economic and security concerns. Going
through the United Nations (UN) brings a wide variety of non-Arctic
actors into the discussion, which is anathema to some Arctic states. The
primary regional venue, the Arctic Council, is limited by an explicit fo-
cus on environmental cooperation and economic development. Absent a
new regional forum, there is no easy way to bridge the significant differ-
ences between Nordic approaches to regional issues and those empha-
sized by the United States and Canada, to say nothing of Russia.
Just because a solution is hard does not make it impossible. Prudent,
relatively modest initiatives could address many of these challenges and
protect U.S. and Western interests across the European Arctic subregion.
As discussed in more detail later, U.S. Arctic strategy should account for
Russian challenges to the existing international order. The United States
should establish a new confidence-building forum for economic and se-
curity negotiations in the Arctic. At the same time, the United States and
its Nordic partners should engage in visible Nordic-Baltic war planning
and exercises to deter Russian coercion in the region. And finally, the
• 356 •
The High North
• 357 •
Auerswald
Shipping traffic has not expanded to the extent expected either. De-
creasing amounts of ice do not necessarily translate into ice-free ocean
transit, forcing businesses that rely on just-in-time delivery to avoid Arc-
tic shipping. Traditional international shipping routes may be slower but
are more predictable. Perhaps more importantly, uncertainty about risk
has made it difficult for insurance companies to price insurance, and
shipping companies are reluctant to risk Arctic transshipments without
loss insurance.8 The exception to the rule may be destination shipping.
Even without a boom in offshore resource extraction, there is every likeli-
hood of increased onshore economic activity from tourism, mining, new
high-tech facilities, and cold weather infrastructure. That will require an
increase in destination shipping, particularly for the European and Rus-
sian Arctic subregions given their less extensive ice coverage compared
to the North American Arctic.9
Emerging Challenges
Just because the resource and shipping gold rush has yet to occur does
not mean that the region has been immune to important geopolitical de-
velopments. Three challenges will confront the next U.S. administration
in the region, each focused on but not exclusive to the European Arc-
tic: Russian activities in the Nordic-Baltic region, diverging preferences
across the region on important hard-power issues, and a lack of viable
international venues to discuss and negotiate solutions to regional chal-
lenges. Consider each in turn.
• 358 •
The High North
was the only exception to the rule, increasing from 1.3 to 1.4 percent
of GDP over the same period, largely because of its 833-mile border
with Russia.10 Moreover, the focus within defense establishments was on
expeditionary operations such as the International Security Assistance
Force in Afghanistan rather than territorial defense. The result was that
Denmark gutted its armored, artillery, and air defense capabilities, and
Sweden essentially dissolved its army and its antisubmarine capabilities,
to give just two examples.
That all changed in early 2014 with events in Ukraine. Russian actions
were seen by Nordic states as a fundamental challenge to the European
international order in a way that was not true with the 2008 invasion of
Georgia.11 Nordic states vocally condemned Russian actions. As Norwe-
gian Defense Minister Ine Soereide noted, “We are in a completely new
security situation where Russia shows both the ability and the will to use
military means to achieve political goals.”12 Later she went on to note
that “we are faced with a different Russia. The situation has changed, and
it has changed profoundly. There is no going back to some sort of nor-
mality because it does not exist.”13 Carl Bildt, Swedish Foreign Minister
at the time, stated, “A new sense of being exposed and vulnerable has
descended on the security debates around Europe.” Soon after he noted
that “Russia has emerged as a revisionist power violating and question-
ing the very foundations of the European order of peace and stability.”14
Each country backed up its rhetoric with actions, complying with EU
sanctions on Russia even when such sanctions cost them domestically, as
was the case with Norwegian fish and Finnish dairy and meat exports.
Nordic states are particularly concerned about three things with re-
gard to Russia. First, Russia demonstrated that it is willing to advance
its interests through military force and has done so in Georgia, Ukraine,
and now Syria. Russian military exercises involve the movement of thou-
sands of troops and heavy equipment, sometimes without advance warn-
ing, to include exercises such as Vostok-2014 with over 100,000 troops
and Western Strategic Direction with 150,000 troops, among others.15
In his 2015 annual report, North Atlantic Treaty Organization (NATO)
Secretary General Jens Stoltenberg warned that “these [Russian] exercis-
es have been used to mask massive movements of military forces.”16 The
Russians have used their military to repeatedly violate Nordic airspace
and territorial waters, with increasingly complex military formations,
most famously with mock airborne nuclear attacks against Sweden in
2013 and against a 90,000-person political convention on Denmark’s
Bornholm island in June 2014, and an alleged October 2014 submarine
intrusion into the waters near Stockholm.17 Each time Nordic states hold
an exercise, Russia responds with a larger so-called snap exercise.18
• 359 •
Auerswald
• 360 •
The High North
The shift to national and regional defense has been particularly pro-
nounced in Norway and Sweden and to a lesser extent in Denmark.
Planned defense spending will increase in both of the former states,
when measured in dollar equivalent amounts, though defense spending
as a percentage of GDP will stay relatively flat or increase only slightly.24
And both Norway and Sweden are crafting new defense strategies, with
a focus on territorial defense rather than expeditionary capabilities.25
The Norwegians have been pushing for years for a larger NATO role in
the region, over the objections of the Canadians and others, and have
decided that Norway must act on its own, on NATO’s behalf, to secure
Norwegian territory and its EEZ. In short, there has been a fundamental
change in perceptions among most Arctic states regarding Russian will
and capabilities, leading officials to believe that at least the European
Arctic is less peaceful and stable than it was 2 years ago.
The most obvious regional response, NATO membership for Sweden
and Finland, does not appear to be a viable option. It is true that NATO
membership is for the first time being openly debated in both countries,
which represents a break from past practice. That said, neither Sweden
nor Finland is on the verge of applying for NATO membership, though
that is not out of the question should Russia take more aggressive ac-
tions in the region. Three factors have affected their decisions on NATO
membership.
First, no one in either country knows what might be the international
ramifications of applying for NATO membership. Those ramifications
weigh particularly heavy in Finland, which shares a long border with
Russia. Some in Finland believe that Russia’s newfound aggressive pos-
ture makes NATO membership imperative for national defense and re-
gional stability, particularly given that neither Finland nor Sweden can
unilaterally defend itself from Russian attack or do so bilaterally with its
Nordic neighbor. Others argue that applying would needlessly antago-
nize Russia, worsening rather than increasing regional stability. Russian
officials have played to those fears in public statements.26
Second, there is also a bilateral dimension at work. Neither country
wants to apply for NATO membership without the other. Politicians and
civil servants in both Sweden and Finland want to avoid repeating the
coordination problems associated with their EU membership applica-
tions, when Sweden unexpectedly moved ahead with its request after
promising Finland that both countries should join the EU together. So
while the current government in Helsinki might be amenable to joining
NATO if Sweden were also on board, it will not move without Sweden,
and the current Swedish government is opposed.
• 361 •
Auerswald
• 362 •
The High North
for geopolitical and cultural reasons. The United States, Canada, and
Russia have often taken a more unilateral route when their vital interests
are at stake.
The Nordic focus on multilateralism and international law is at least
partly due to their geopolitical reality as relatively small European pow-
ers. Table 1 lists common measures of power for each Arctic nation.
The Nordic states combined have fewer people, a smaller GDP, and far
less territory and arable land, and spend roughly the same amount on
defense as does Canada, which is the least powerful of the non-Nordic
Arctic states.
Multilateralism makes sense for relatively weak powers surrounded
by more powerful neighbors, and Nordic states have utilized multilat-
eral approaches to advance their national interests since well before the
end of the Cold War. Working through multilateral institutions such
as NATO, the EU, and the UN creates partners that can help balance
against more powerful states such as Russia. This is particularly true
when thinking about the security and environmental implications of
Nordic economic reliance on the Baltic and North seas. Linking their
economies to the EU—even if to varying degrees—and its relatively
stringent monitoring and regulation help protect their economies from
predation by larger powers.
Emphasizing international law is another way of constraining great
power behavior. As Icelandic Prime Minister Sigmundur Cunnlaugsson
noted, “Small states usually favor multilateralism where our voices can
• 363 •
Auerswald
• 364 •
The High North
• 365 •
Auerswald
• 366 •
The High North
the Arctic for each country. Those differences matter when the issues in
question represent vital interests (security and prosperity) rather than
tertiary interests (scientific cooperation and shipping protocols). It is
relatively easy to get regional cooperation on tertiary national interests
even if not all Arctic nations see the region as a priority. Region-wide
cooperation becomes difficult, however, when some nations believe the
issue in question is a vital interest but others do not, or when states have
diametrically opposed interests.
The Arctic as a distinct region is only a priority for some Arctic na-
tions. The Norwegian government, for example, has consistently seen
the Arctic as its top priority in large part because so much of its EEZ, its
export revenue, and Norwegian maritime traffic are located in European
Arctic waters. The Russian government has prioritized the Arctic because
Russia’s strategic nuclear submarine force is home-ported in Murmansk,
and northern Russia contains abundant hydrocarbon, mineral, and tim-
ber deposits. The Canadian government under Prime Minister Stephen
Harper saw the Arctic as a priority issue principally for domestic political
reasons dealing with economic development of the northern Canadian
provinces and with Canadian control of the Northwest Passage.
But other countries in the region have placed Arctic issues much
lower on their agendas. Sweden has few direct interests in the Arctic
beyond environmental stewardship and has focused more of its atten-
tion on economic and political relations with its neighbors to the south
and east. Finland is much more focused on the Baltic Sea and relations
with Russia, Sweden, and the EU than it is on the Arctic per se. The
current government in Iceland sees the Arctic as a priority, but the same
could not be said for previous governments. The Danes see the Arctic
through the prism of their territory in Greenland and the Faroe Islands,
and their main concern there is in ensuring the local people are even-
tually self-sufficient. And last but not least, the United States essentially
ignored the Arctic as a policy issue between 1991 and 2015.35 Even the
Barack Obama administration’s recent efforts to highlight the Arctic seem
to be a small piece in the administration’s larger climate agenda, rather
than a focus on the Arctic for its own sake.
If getting all regional countries to pay attention to Arctic issues is dif-
ficult, it is even more difficult to get agreement on issues of vital na-
tional interest, particularly in the European Arctic. Take the question of
resource extraction. Finland would like to engage in mining above the
Arctic Circle with fewer environmental constraints. Sweden wants strict
environmental controls on mining and oil extraction, but less regulation
of recreation. The Green Party in Sweden, a member of the two-party
coalition government, would like to halt all oil and gas extraction from
• 367 •
Auerswald
• 368 •
The High North
Policy Recommendations
Four policy initiatives could improve the regional situation in the Arc-
tic from a U.S. perspective. First, the United States needs a new Arctic
strategy that accounts for the differences between the North American,
European, and Russian Arctic subregions.39 As I argue elsewhere, the
resulting U.S. strategy should account for developments on the political
and security fronts. That strategy should have three goals.40 The United
States should prevent either Russia or China from dominating the Euro-
pean Arctic subregion in terms of economics or security. Regional partic-
ipation by both countries is inevitable (and, one could argue, desirable),
particularly regarding Chinese investment. Dominance by either power,
however, would undercut U.S. influence and commitments and put at
risk U.S. interests in protecting the global commons. Another goal could
be preventing an environmental disaster in any part of the Arctic. This
requires that existing cooperation continue on shipping protocols, fish-
eries management, and oil spill prevention and response—something
in the interests of all Arctic coastal states. A final goal could be fostering
responsible private-sector investment in the North American subregion.
Specific actions here could include providing U.S. loan guarantees, tax
incentives, or access to government climate and geological data in ex-
change for private-sector creation of needed Alaskan infrastructure.
These goals deconflict the myriad crosscutting priorities, threats, and
opportunities of the Arctic nations. The first goal aligns the United States
with every Arctic nation except Russia and is just the sort of assurance
that Nordic states (and their Baltic neighbors) have been looking for
from the U.S. Government. The second goal focuses on the environ-
mental concerns of the Arctic coastal states and their economic self-in-
terest. Even Russia, with its less-than-stellar environmental record, has
an interest in maintaining fish stocks, and the Western-based oil com-
panies that Russia will need to extract oil and gas from the Barents and
Kara seas have the reputational and fiduciary need to engage in relatively
careful extraction in Arctic waters. The third goal is attractive to those
in Alaska, and if expanded across the Arctic could be attractive to Can-
ada, Denmark, and Iceland, each of which wants more investment in its
Arctic territories.
• 369 •
Auerswald
• 370 •
The High North
Notes
1
For the purposes of this chapter, I follow the U.S. Government’s definition of the
Arctic as anything north of the Arctic Circle, at approximately 66 degrees, 34 minutes
north latitude. See <www.arctic.noaa.gov/faq.html>. U.S. law (15 U.S. Code § 4111) also
adds all U.S. territory and territorial waters north of the Aleutian island chain to the defi-
• 371 •
Auerswald
nition of the U.S. Arctic. Others define the Arctic by a maximum average July tempera-
ture or by the northernmost tree line. Norwegian officials call the Scandinavian portion of
the Arctic the High North, though there is no precise territorial delineation associated with
that term.
2
Borge Brende, “The Arctic: Important for Norway, Important for the World,” Harvard
International Review 36, no. 3 (Spring 2015).
3
The Northern Sea Route is the more viable, near-term shipping route from a climate
perspective.
4
U.S. Geological Survey, “Circum-Artic Resource Appraisal,” Fact Sheet 2008-3049,
available at <http://pubs.usgs.gov/fs/2008/3049/fs2008-3049.pdf>.
5
Gordon Kristopher, “Why Is the Breakeven Price of Crude Oil So Important?” Mar-
ket Realist, January 15, 2015, available at <https://marketrealist.com/2015/01/breakev-
en-price-crude-oil-important/>; U.S. Department of the Interior, “Interior Department
Cancels Arctic Offshore Lease Sales,” October 16, 2015, available at <www.doi.gov/press-
releases/interior-department-cancels-arctic-offshore-lease-sales>. The partial exception
is the Norwegian government’s new drilling concessions awarded in mid-May 2016 for
areas in the Barents Sea, but drilling test wells will not start until 2017, with no guarantee
that extraction will occur in the near future.
6
The Swedish government, for example, has called for a prohibition on hydrocar-
bon extraction unless stringent conditions are met: “We want only companies that can
assume the entire cost of a disaster to be granted permits to extract oil in the Arctic.” See
“Government to Strengthen Arctic Environmental Policy,” January 25, 2016, available
at <www.government.se/articles/2016/01/government-to-strengthen-arctic-environmen-
tal-policy/>.
7
That said, Gazprom continues to extract gas and oil from the Yamal Peninsula,
though most of those wells were established before sanctions took effect.
8
“Cooperation Needed to Allay Arctic Risks,” Lloyds.com, September 8, 2014,
available at <www.lloyds.com/news-and-insight/news-and-features/emerging-risk/emerg-
ing-risk-2014/cooperation-needed-to-allay-arctic-risks>.
9
Arctic economic development is a priority in the Arctic strategies of each Arctic
nation.
10
Bergt-Goran Bergstrand, “Military Expenditure Trends in the Baltic Sea States, FOI
Memo 5544,” Swedish Defense Research Institute, December 9, 2015. Figures for North
Atlantic Treaty Organization (NATO) members are comparable to those reported in Jens
Stoltenberg, The Secretary General’s Annual Report 2015 (Brussels: NATO Public Diploma-
cy Division, January 28, 2016), available at <www.nato.int>.
11
The 2008 Russian invasion of Georgia took place outside of Europe and was a
conflict where blame could be placed with both sides.
12
See Ine Soereide’s interview with Reuters, May 20, 2014.
13
See Ine Soereide’s interview with CNN, February 26, 2015.
14
Carl Bildt, “Statement at IISS [International Institute for Strategic Studies], Lon-
don,” September 19, 2014; “Statement on the Ukrainian Crisis,” September 22, 2015.
This was in marked contrast to Bildt’s praise for Russian cooperation with Europe before
Crimea in statements such as “Russian foreign policy has become oriented towards
serving the goals of this cooperation, which is very welcome.” Carl Bildt, “Russia and the
World,” Keynote Speech at the Andrei Sakharov Foundation Conference, Moscow, May
21, 2011.
15
The most disturbing exercise before 2014 from the perspective of Nordic-Baltic
security was Zapad-2013, which took place in late 2013 and focused on the “defense”
of Kaliningrad. For exercise numbers and composition, see Johan Norberg, Training to
• 372 •
The High North
• 373 •
Auerswald
defensenews.com/story/defense/policy-budget/warfare/2016/02/07/russian-aggres-
sion-drives-swedish-defense-spending/79841348/>. Yet, projected defense spending
will not provide for adequate national defense against Russia and does not account for
big-ticket replacements for aging fighter aircraft, naval ships, and submarines.
26
For example, see Jorge Benitez, “The Bully to the East,” U.S. News and World Report,
August 6, 2015, available at <www.usnews.com/opinion/blogs/world-report/2015/08/06/
russia-bullies-sweden-and-finland-away-from-joining-nato>.
27
A September 2015 poll showed that 41 percent of Swedes supported NATO mem-
bership, up 10 points from May, versus 39 percent opposed. See Gerard O’Dwyer, “New
Poll Shows Sharp Shift in NATO Support,” Defense News, September 17, 2015, available
at <www.defensenews.com/story/defense/policy-budget/leaders/2015/09/17/new-poll-
shows-sharp-shift-nato-support/32549641/>.
28
Sigmundur Gunnlaugsson, “Iceland in a Sea of Change,” speech delivered at St.
Gallen Symposium, May 7, 2015.
29
The five Arctic littoral states are Canada, Denmark (via Greenland), Norway, Russia,
and the United States. The text of the Illulissat Declaration is available at <www.oceanlaw.
org/downloads/arctic/Illulissat_Declaration.pdf>.
30
Philip Steinberg, Jeremy Tasch, and Hannes Gerhardt, Contesting the Arctic (New
York: Palgrave Macmillan, 2015), 1–6, 73–74.
31
Sauli Niinisto, “Speech at the Opening of Parliament on 3 February 2016,” available
at <www.presidentti.fi/public/default.aspx?contentid=341376&culture=en-US>.
32
Alastair MacDonald and Noah Barkin, “European Leaders Fear the Refugee Crisis
Will Tear the EU Apart,” Reuters, January 18, 2016, available at <www.huffingtonpost.
com/entry/european-leaders-fear-the-refugee-crisis-will-tear-the-eu-apart_569cf-
c32e4b0778f46fa010c>.
33
Other venues include the United Nations and its subsidiary entity (International
Maritime Organization), European Parliament, Nordic Council of Ministers, and NATO,
depending on the issue and the countries involved.
34
For additional information on the Polar Code, see <www.imo.org/en/MediaCentre/
HotTopics/polar/Pages/default.aspx>. For texts of the agreements on Arctic search and
rescue and oil spills, see <www.state.gov/documents/organization/205770.pdf>; and
<www.state.gov/r/pa/prs/ps/2013/05/209406.htm>.
35
The United States maintained a robust scientific research agenda in the area and
has been a mainstay in the Arctic Council. It also has a nuclear submarine presence in the
region and military facilities in Alaska. That said, the Arctic has not been a priority region
for U.S. policymakers since the Cold War.
36
See statements by Leonid Kalashnikov, Russia’s First Deputy Chairman of the Du-
ma’s Committee on International Affairs, quoted in Thomas Nilsen, “Norway Summons
Russian Ambassador,” BarentsObserver.com, April 20, 2015, available at <http://barentsob-
server.com/en/politics/2015/04/norway-summons-russian-ambassador-20-04>.
37
For a review, see Donald Rothwell, “The Canadian-U.S. Northwest Passage Dis-
pute,” Cornell International Law Journal 26, no. 2 (Spring 1993), 331–372.
38
According to Swedish Supreme Commander General Micael Bydén, “We also know
that areas in our region, the Baltic and increasingly the Arctic, constitute areas of friction
between Russia and the West.” Quoted in O’Dwyer.
39
The current U.S. strategy for the Arctic was written in 2013, before events in
Crimea. See National Strategy for the Arctic Region (Washington, DC: The White House,
May 2013), available at <www.whitehouse.gov/sites/default/files/docs/nat_arctic_strategy.
pdf>.
• 374 •
The High North
40
David Auerswald, “Geopolitical Icebergs,” Proceedings 141, no. 12 (December
2015), 18–23.
41
The Arctic Economic Council is a public-private entity that seeks to coordinate
business activities in the region. See <http://arcticeconomiccouncil.com>.
42
For information on Nordic Defense Cooperation (NORDEFCO), see <www.nordef-
co.org>. For a discussion of NORDEFCO expansion to the Baltics, see Henrik Breiten-
bauch, “Strengthening Nordic-Baltic Defense Capabilities,” in Advancing U.S.-Nordic-Baltic
Security Cooperation, ed. Daniel Hamilton, Andras Simony, and Debra Cagan (Washing-
ton, DC: Center for Transatlantic Relations, 2014), 135–155.
43
Note that while information-sharing is proceeding well, coordinating weapons
acquisition across NORDEFCO nations has proved difficult in the extreme.
44
The Obama administration has begun this process with its $3.4 billion request
for fiscal year 2017 to deploy weapons and equipment to Eastern Europe. Preposition-
ing standoff weapons and refurbishing and hardening airfields in the Nordic states are
critical additional steps, however. On the administration request, see Mark Landler and
Helene Cooper, “U.S. Fortifying Europe’s East to Deter Putin,” New York Times, February
1, 2016, available at <www.nytimes.com/2016/02/02/world/europe/us-fortifying-eu-
ropes-east-to-deter-putin.html>.
45
Note that the United States already participates in exercises involving Nordic
members of NATO and partner nations such as Sweden and Finland. The proposal here
is to tailor those exercises to more accurately reflect war plans that include Swedish and
Finnish territory and militaries as full participants.
46
Deeper transatlantic security cooperation for the European Arctic was one of the
subjects discussed at the May 2016 U.S.-Nordic summit. See “U.S.-Nordic Leaders’ Sum-
mit Joint Statement,” May 13, 2016, available at <http://tpk.fi/Public/default.aspx?conten-
tid=346273&culture=fi-FI>.
47
Yasmin Tadjdeh, “Coast Guard Releases Solicitation for New Polar Icebreaker,”
National Defense, January 13, 2016, available at <www.nationaldefensemagazine.org/blog/
Lists/Posts/Post.aspx?List=7c996cd7-cbb4-4018-baf8-8825eada7aa2&ID=2060&utm_
source=Sailthru&utm_medium=email&utm_campaign=New%20Campaign&utm_ter-
m=%2ASituation%20Report>.
• 375 •
Contributors
Dr. R.D. Hooker, Jr., is The Theodore Roosevelt Chair in National Se-
curity Affairs and Director of the Institute for National Strategic Stud-
ies (INSS) at the National Defense University (NDU). A member of the
Council on Foreign Relations, he previously served as the Dean of the
NATO Defense College in Rome and as a White House staff member in
the administrations of George H.W. Bush, William Clinton, and George
W. Bush. He holds an MA and Ph.D. in International Relations from the
University of Virginia.
John P. Caves, Jr., is Deputy Director of the Center for the Study of Weap-
ons of Mass Destruction, INSS, and a Distinguished Research Fellow at
NDU. He previously served in the Office of the Secretary of Defense,
including as Deputy Director for Counter Proliferation Policy. Mr. Caves
has an MPA in International Relations from the Woodrow Wilson School
of Public and International Affairs at Princeton University and an MS in
National Security Strategy from the National War College.
• 377 •
Contributors
• 378 •
Contributors
• 379 •
Contributors
Dr. James J. Przystup is a Senior Research Fellow in the Center for Stra-
tegic Research, INSS, at NDU. He graduated summa cum laude from the
University of Detroit. Dr. Przystup received an MA from the Committee
on International Relations at the University of Chicago and a Ph.D. in
History from the University of Chicago. He studied Japanese at Colum-
bia University and was a Visiting Scholar at Keio University in Tokyo.
Dr. Phillip C. Saunders is Director of the Center for the Study of Chi-
nese Military Affairs and a Distinguished Research Fellow, INSS, at NDU.
Previously he worked at the Monterey Institute of International Studies,
where he was director of the East Asia Nonproliferation Program from
1999 to 2003. Dr. Saunders served as an officer in the U.S. Air Force
from 1989 to 1994. He attended Harvard College and received an MPA
and Ph.D. in International Relations from the Woodrow Wilson School
of Public and International Affairs at Princeton University.
• 380 •
Contributors
• 381 •
T he new administration takes office in a time of great complexity.
The President faces a national security environment shaped
by strong currents: globalization; the proliferation of new, poor,
and weak states, as well as nonstate actors; a persistent landscape
of violent extremist organizations; slow economic growth; the
rise of China and a revanchist Russia; a collapsing Middle East;
and domestic policies wracked by division and mistrust. While in
absolute terms the Nation and the world are safer than in the last
century, today the United States finds itself almost on a permanent
war footing, engaged in military operations around the world.
This book, written by experts at the Defense Department’s National
Defense University, offers valuable policy advice and grand strategy
recommendations to those senior leaders who will staff and lead the
next administration in national security affairs. The President and
his staff, Members of Congress, and the many leaders throughout
government concerned with the Nation’s security interests should
find this book valuable. Their task is not an easy one, and this
volume’s insights and reflections are offered with an ample dose
of humility. There are no silver bullets, no elegant solutions to the
complex problems confronting America and its leaders.
This volume provides context and understanding about the current
national security environment to those in the new administration as
they prepare to lead the Nation during challenging times. To those
senior leaders who bear the heaviest responsibilities, these policy
insights may chart a course forward.