Strategic Information Warfare


Book Description

Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national institutions and infrastructures on potentially vulnerable elements of the U.S. national information infrastructure. To examine these effects, the authors conducted a series of exercises employing a methodology known as the Day After ... in which participants are presented with an information warfare crisis scenario and asked to advise the president on possible responses. Participants included senior national security community members and representatives from security-related telecommunications and information-systems industries. The report synthesizes the exercise results and presents the instructions from the exercise materials in their entirety.







Making Strategy


Book Description

National secuirty strategy is a vast subject involving a daunting array of interrelated subelements woven in intricate, sometimes vague, and ever-changing patterns. Its processes are often irregular and confusing and are always based on difficult decisions laden with serious risks. In short, it is a subject understood by few and confusing to most. It is, at the same time, a subject of overwhelming importance to the fate of the United States and civilization itself. Col. Dennis M. Drew and Dr. Donald M. Snow have done a considerable service by drawing together many of the diverse threads of national security strategy into a coherent whole. They consider political and military strategy elements as part of a larger decisionmaking process influenced by economic, technological, cultural, and historical factors. I know of no other recent volume that addresses the entire national security milieu in such a logical manner and yet also manages to address current concerns so thoroughly. It is equally remarkable that they have addressed so many contentious problems in such an evenhanded manner. Although the title suggests that this is an introductory volume - and it is - I am convinced that experienced practitioners in the field of national security strategy would benefit greatly from a close examination of this excellent book. Sidney J. Wise Colonel, United States Air Force Commander, Center for Aerospace Doctrine, Research and Education




Military Strategy: A Very Short Introduction


Book Description

Military Strategy: A Very Short Introduction adapts Clausewitz's framework to highlight the dynamic relationship between the main elements of strategy: purpose, method, and means. Drawing on historical examples, Antulio J. Echevarria discusses the major types of military strategy and how emerging technologies are affecting them. This second edition has been updated to include an expanded chapter on manipulation through cyberwarfare and new further reading.




The Biological Threat Reduction Program of the Department of Defense


Book Description

This Congressionally-mandated report identifies areas for further cooperation with Russia and other states of the former Soviet Union under the Cooperative Threat Reduction (CTR) program of the Department of Defense in the specific area of prevention of proliferation of biological weapons. The report reviews relevant U.S. government programs, and particularly the CTR program, and identifies approaches for overcoming obstacles to cooperation and for increasing the long-term impact of the program. It recommends strong support for continuation of the CTR program.




Strategies to Protect the Health of Deployed U.S. Forces


Book Description

Risk management is especially important for military forces deployed in hostile and/or chemically contaminated environments, and on-line or rapid turn-around capabilities for assessing exposures can create viable options for preventing or minimizing incapaciting exposures or latent disease or disability in the years after the deployment. With military support for the development, testing, and validation of state-of-the-art personal and area sensors, telecommunications, and data management resources, the DOD can enhance its capabilities for meeting its novel and challenging tasks and create technologies that will find widespread civilian uses. Strategies to Protect the Health of Deployed U.S. Forces assesses currently available options and technologies for productive pre-deployment environmental surveillance, exposure surveillance during deployments, and retrospective exposure surveillance post-deployment. This report also considers some opportunities for technological and operational advancements in technology for more effective exposure surveillance and effects management options for force deployments in future years.




Defence Planning and Uncertainty


Book Description

How can countries decide what kind of military forces they need, if threats are uncertain and history is full of strategic surprises? This is a question that is more pertinent than ever, as countries across the Asia-Pacific are faced with the military and economic rise of China. Uncertainty is inherent in defence planning, but different types of uncertainty mean that countries need to approach decisions about military force structure in different ways. This book examines four different basic frameworks for defence planning, and demonstrates how states can make decisions coherently about the structure and posture of their defence forces despite strategic uncertainty. It draws on case studies from the United States, Australian and New Zealand, each of which developed key concepts for their particular circumstances and risk perception in Asia. Success as well as failure in developing coherent defence planning frameworks holds lessons for the United States and other countries as they consider how best to structure their military forces for the uncertain challenges of the future.




Preventive Defense


Book Description

William J. Perry and Ashton B. Carter, two of the world's foremost defense authorities, draw on their experience as leaders of the U.S. Defense Department to propose a new American security strategy for the twenty-first century. After a century in which aggression had to be defeated in two world wars and then deterred through a prolonged cold war, the authors argue for a strategy centered on prevention. Now that the cold war is over, it is necessary to rethink the risks to U.S. security. The A list--threats to U.S. survival--is empty today. The B list--the two major regional contingencies in the Persian Gulf and on the Korean peninsula that dominate Pentagon planning and budgeting--pose imminent threats to U.S. interests but not to survival. And the C list--such headline-grabbing places as Kosovo, Bosnia, Somalia, Rwanda, and Haiti--includes important contingencies that indirectly affect U.S. security but do not directly threaten U.S. interests. Thus the United States is enjoying a period of unprecedented peace and influence; but foreign policy and defense leaders cannot afford to be complacent. The authors' preventive defense strategy concentrates on the dangers that, if mismanaged, have the potential to grow into true A-list threats to U.S. survival in the next century. These include Weimar Russia: failure to establish a self-respecting place for the new Russia in the post-cold war world, allowing it to descend into chaos, isolation, and aggression as Germany did after World War I; Loose Nukes: failure to reduce and secure the deadly legacy of the cold war--nuclear, chemical, and biological weapons in Russia and the rest of the former Soviet Union; A Rising China Turned Hostile: failure to shape China's rise to Asian superpower status so that it emerges as a partner rather than an adversary; Proliferation: spread of weapons of mass destruction; and Catastrophic Terrorism: increase in the scope and intensity of transnational terrorism.They also argue for