Strategy and Policy

The Army Role in Achieving Deterrence in Cyberspace

Author: Mr Jeffrey L Caton In 2015, the Department of Defense (DoD) released the DoD Cyber Strategy which explicitly calls for a comprehensive strategy to provide credible deterrence in cyberspace against threats from key state and nonstate actors. To be effective, such activities must be coordinated with ongoing deterrence efforts in the physical realm, especially …

The Army Role in Achieving Deterrence in Cyberspace Read More »

Contemporary Chemical Weapons Use in Syria and Iraq by the Assad Regime and the Islamic State

Author: Dr Robert J Bunker This monograph focuses on an understudied, but yet a critically important and timely component of land warfare, related to the battlefield use of chemical weapons by contemporary threat forces. It will do so by focusing on two case studies related to chemical weapons use in Syria and Iraq by the …

Contemporary Chemical Weapons Use in Syria and Iraq by the Assad Regime and the Islamic State Read More »

The U.S. Army in the Iraq War – Volume 1: Invasion – Insurgency – Civil War, 2003-2006

Author: COL Joel D. Rayburn, COL Frank K. Sobchak The Iraq War has been the costliest U.S. conflict since the Vietnam War. To date, few official studies have been conducted to review what happened, why it happened, and what lessons should be drawn. The U.S. Army in the Iraq War is the Army’s initial operational …

The U.S. Army in the Iraq War – Volume 1: Invasion – Insurgency – Civil War, 2003-2006 Read More »

The U.S. Army in the Iraq War — Volume 2: Surge and Withdrawal, 2007-2011

Author: COL Joel D. Rayburn, COL Frank K. Sobchak The Iraq War has been the costliest U.S. conflict since the Vietnam War. To date, few official studies have been conducted to review what happened, why it happened, and what lessons should be drawn. The U.S. Army in the Iraq War is the Army’s initial operational …

The U.S. Army in the Iraq War — Volume 2: Surge and Withdrawal, 2007-2011 Read More »

Maneuvering the Saudi-Iranian Rivalry in the Middle East: How the United States Can Preserve and Protect Its Long-Term Interests in the Region

Author: Mr Gregory Aftandilian This monograph examines the conflicts in the Middle East region between Saudi Arabia and Iran and the so-called proxy wars that are being fought between them, and discusses ways that the United States needs to maneuver carefully in this struggle to preserve its long-term interests in the area. Although Washington has …

Maneuvering the Saudi-Iranian Rivalry in the Middle East: How the United States Can Preserve and Protect Its Long-Term Interests in the Region Read More »

Creating Great Expectations: Strategic Communications and American Airpower

Author: Dr Conrad C Crane Americans have always been uniquely attracted to airpower, a fact that has been successfully exploited by generations of U.S. Air Force leaders in information campaigns. But as a result, the nation has often entered conflicts with exorbitant expectations about what airpower could actually accomplish, creating unique challenges in strategic communications …

Creating Great Expectations: Strategic Communications and American Airpower Read More »

Silent Partners: Organized Crime, Irregular Groups, and Nation-States

Author: Dr Shima D Keene The U.S. Army increasingly faces adversaries that are difficult to define. The threat landscape is further complicated by the silent partnership between criminal organizations, irregular groups, and nation-states. This collaboration, whatever its exact nature, is problematic, because it confounds understanding of the adversary, making existing countermeasures less effective, and thus …

Silent Partners: Organized Crime, Irregular Groups, and Nation-States Read More »

Assessing the Collective Security Treaty Organization: Capabilities and Vulnerabilities

Author: Dr Richard Weitz Russia has strengthened its military position in Central Asia and the South Caucasus through a combination of bilateral and multilateral initiatives. The Collective Security Treaty Organization (CSTO) has become the most important multilateral defense structure in the former Soviet Union and is an essential instrument in Russia’s resurgence. The CSTO has …

Assessing the Collective Security Treaty Organization: Capabilities and Vulnerabilities Read More »

Maintaining Information Dominance in Complex Environments

Author: Dr John A S. Ardis, Dr Shima D Keene There are many risks to the U.S. Army’s command and control (C2) operations and to its intelligence and information warfare (IW) capabilities. The challenges include: significant uncertainty; sudden unexpected events; high noise and clutter levels in intelligence pictures; basic and complex deceptions exercised through a …

Maintaining Information Dominance in Complex Environments Read More »

Exit Strategy: Rule of Law and the U.S. Army

Author: Dr Shima D Keene Establishing the rule of law is a key goal and end state in counterinsurgency (COIN) operations and is a critical aspect of securing peace and preventing future conflict. However, recent experience in theaters such as Afghanistan has shown that establishing effective rule of law institutions and practices is not a …

Exit Strategy: Rule of Law and the U.S. Army Read More »