1 - 16 of 16
Number of results to display per page
Search Results
2. Transforming Military Technology Through Aquisition Policy
- Author:
- Rabia Altaf
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- The Trump administration’s 2018 National Defense Strategy (NDS) emphasized the need for continued technological modernization of the U.S. Armed Forces.324 This notion, first brought to light by the Obama administration, is underlined by the military’s inability to adapt and modernize at the pace necessary to restore the United States’ military dominance. At the root of this issue is the relationship between the Pentagon and the defense industry, which currently operates with an inadequate military technology acquisition process. Acquisition allows the Department of Defense (DoD) to communicate its strategic vision and shape the military to meet current and future threats. As it stands, this deficient process results in the mis-regulation of the defense industry. Improving the acquisition process by clearing hurdles, creating policy with innovation in mind, and carefully crafting regulation is critical for the United States to regain its competitive military advantage to tackle the global security issues of the coming decades. The Pentagon must also rethink its relationship with the private sector to induce more companies to join its supply chain and provide fresh solutions and perspectives to problems the United States has never faced before. As a notoriously difficult customer, the Pentagon must remove unnecessary roadblocks to attract a more diverse group of companies to supplement the defense industrial base.
- Topic:
- Security, Defense Policy, Science and Technology, Armed Forces, and Supply Chains
- Political Geography:
- United States of America and north amer
3. Russian New and Experimental Nuclear-Capable Missiles: A Short Primer
- Author:
- Christopher Mihal
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Russia has tested a wide variety of new weapon systems in an effort to modernize and upgrade its nuclear forces. Russian President Vladimir Putin has not been shy about publicly discussing these new weapon systems or the capabilities of several of them, though a few are not currently feasible for any sort of deployment. More of a threat, however, are the two weapons that Putin did not boast about: the SSC8 and SSC-X-31, both of which were almost certainly in violation of the Intermediate-Range Nuclear Forces (INF) Treaty. While these missiles represent a threat in and of themselves, a far greater threat is the indication that Russia does not feel bound by international agreements. These missiles have already had their first successful casualty in the death of the INF Treaty, and they may have also dealt a mortal blow to the New START Treaty. To adequately understand Russia’s new nuclear arsenal, one must simultaneously look at the weapon systems themselves as well as the context in which they are being developed. Russia continues to view both the U.S. and NATO as supreme existential threats. Unfortunately for Russia, both the U.S. and NATO have greater military, political, and economic power, and so Russia has long sought avenues to achieve its national objectives without conventional military confrontation.386 Russia has turned to two primary means of ensuring supremacy: enhancing its nuclear arsenal, which it views as a powerful deterrent that is cheaper to maintain than a large conventional military, as well as ‘hybrid’ war, which encompasses a number of techniques just shy of war including cyber warfare, informatsionaya voyna (information warfare) and a large amount of maskirovka (deception) in both military and non-military realms.387 Putin has emphasized information control and manipulation since coming to power, ranging from direct methods such as election interference and masking the identity of irregular forces in Ukraine, to more subtle methods of dezinformatsiya (disinformation), of which the exaggerated capabilities of Russia’s new nuclear weapons are prime examples. Dezinformatsiya is using false or misleading information and disseminating it to credible news outlets. This causes opponents to either act upon the incorrect information, thus wasting time and resources, or it undermines the credibility of the news outlet when it is proven false.388 Both of these goals of dezinformatsiya are being met with the current furor regarding Russia’s new nuclear weapons. This primer aims to dispel some of the false or misleading claims regarding these weapons and present a factual foundation from which to react to Russia’s new weapon developments and how they fit into Russia’s strategic vision.
- Topic:
- Defense Policy, NATO, National Security, Nuclear Weapons, Cybersecurity, and Weapons
- Political Geography:
- Russia, Eurasia, and United States of America
4. Forget China: A Policy for an Interconnected Region
- Author:
- Scott McDonald
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- The United States (U.S.) must approach the growing assertiveness and revisionism of the People’s Republic of China (PRC) by deemphasizing its importance to U.S. policy formation. Although this will seem counterintuitive to most observers, it is an important first step in placing the very real challenges posed by the PRC in their appropriate context. Neither is this to suggest the intentions and actions of the PRC do not pose a serious threat to the interests of the U.S., for in many areas they do. However, in crafting foreign policy, the U.S. government must first focus on promoting and defending its own interests. By contrast, the popular emphasis on “countering” other states is a second-handed approach that cedes the initiative and allows one’s adversary to control one’s policy. That is not to say that U.S. policy should not, where appropriate, be confrontational. Washington should not feel the need to kowtow or appease an increasingly aggressive Beijing. However, any action—cooperative or confrontational—must be taken in pursuit of a larger, positive purpose. The starting point for any policy towards the PRC, therefore, is a grand strategic approach to the Indo-Pacific as a region. It lies in a positive, provalue orientation towards building the world in which the U.S. wants to live.
- Topic:
- Security, Foreign Policy, and Defense Policy
- Political Geography:
- China, Asia, and United States of America
5. Challenges in Common European Defense Policy: Russia’s Involvement in Ukraine
- Author:
- Monica M. Ruiz
- Publication Date:
- 07-2017
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- There are often misunderstandings among member states in international organizations (IO) regarding the legal nature of certain acts. Issues of privileges and immunities based on the principle of functional necessity, both inherent and implied powers, and the principle of good faith under common law are continuously criticized and debated by both member states and IOs alike. For this reason, international legal order can be a process of continuous transition and constant evolution. This essay analyzes the development and changes of legal norms in the European Union’s (EU) Common Foreign and Security Policy (CFSP). On that basis, it will unfold by looking at the EU’s legal structure to create a solid framework for understanding the current challenges for common European defense policy in relation to Russia’s involvement in Ukraine. Although there have been substantial legal improvements introduced by the Treaty of Amsterdam (effective 1999) and by the Treaty of Nice (effective 2003) to help clarify the ambiguous nature of the CFSP, its objectives remain wide and abstract. This further precludes the EU from formulating a joint and coherent stance on issues related to defense...
- Topic:
- Security, Defense Policy, International Law, International Organization, and Treaties and Agreements
- Political Geography:
- Russia, Ukraine, and European Union
6. Below the Threshold: Gray Warfare and the Erosion of U.S. Influence: A Conversation with Hal Brands
- Author:
- Austin Bowman
- Publication Date:
- 07-2017
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Hal Brands is a Henry A. Kissinger Distinguished Professor of Global Affairs at the Johns Hopkins University School of Advanced International Studies (SAIS). He is also the author and editor of several books, the most recent including Making the Unipolar Moment: U.S. Foreign Policy and the Rise of the Post-Cold War Order (2016) and What Good is Grand Strategy? Power and Purpose in American Statecraft from Harry S. Truman to George W. Bush (2014).
- Topic:
- Security, Defense Policy, Alliance, Conflict, and Gray Zone
- Political Geography:
- North America, Global Focus, and United States of America
7. The Four Horseman of the Modern World: FSR Interviews Dr. Harlan Ullman
- Author:
- Harlan Ullman
- Publication Date:
- 07-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Dr. Harlan Ullman, a distinguished Fletcher School alumnus, sat down with the Fletcher Security Review recently to discuss the past, present, and future of U.S. and global security, as well as his most recent book, A Handful of Bullets: How the Murder of Archduke Franz Ferdinand Still Menaces the Peace. He is Chairman of the Killowen Group, which advises leaders in business and government; Chairman of CNIGuard Ltd and CNIGuard Inc. which are infrastructure protection firms; Senior Advisor at the Atlantic Council and Business Executives for National Security, both in Washington, D.C.; on the Advisory Board for the Supreme Allied Commander Europe; and Director Emeritus of the Wall Street Fund, one of the nation’s first mutual funds. A former naval officer with 150 combat operations and missions in Vietnam in patrol boats and other commands at sea, he was principal author of the ’Shock and Awe’ doctrine, which was released in 1996. With seven books and thousands of articles and columns to his credit, he was made UPI’s Arnaud de Borchgrave distinguished columnist earlier this year.
- Topic:
- Security, Defense Policy, War, History, and Military Strategy
- Political Geography:
- Iraq and United States of America
8. Corruption Threats & International Missions: Practical Guidance for Leaders (A Book Review by Michael Sullivan)
- Author:
- Michael Sullivan, Mark Pyman, Jodi Vittori, Alan Waldron, and Nick Seymour
- Publication Date:
- 07-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Over the last 14 years of war, our military developed incredible relationships both within and outside the Department of Defense. The concept of the Joint Force reached its full potential as we relied on one another in places such as Iraq and Afghanistan. We learned how to effectively integrate the talents of our Special Operations Forces and conventional forces on the battlefield. We integrated with other government agencies on the battlefield, ranging from the CIA to USAID, moving the concept of “one team, one fight” forward. We even worked closely with non-governmental organizations (NGOs) and humanitarian organizations, often finding ourselves in similar areas with similar goals. As we continue to downsize in Afghanistan and our efforts in Iraq remain at the advisory level, my biggest fear is that we forget the lessons we have paid for with the blood and sweat of our brothers and sisters. It is absolutely critical that the military retain the myriad lessons learned from these 14 years for future conflicts. Toward the goal of capturing important lessons learned, Transparency International UK’s Defence and Security Programme has published the valuable handbook, “Corruption Threats and International Missions: Practical Guidance for Leaders.” This well-written and easy-to-use document will be invaluable to leaders of any organization conducting operations in areas where corruption exists, but especially for our military leaders of today and tomorrow.
- Topic:
- Defense Policy, Corruption, Peacekeeping, and Book Review
- Political Geography:
- Afghanistan, Iraq, United Kingdom, and United States of America
9. Nip It in the Bud: Disrupting Insurgent Financial Networks Before They Take Root
- Author:
- Tom Keatinge
- Publication Date:
- 01-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- The rapid rise of Islamic State[1] has galvanised the international community to take action to contain it. One issue in particular – financing – has drawn increasing attention from policy-makers. As U.S. Secretary of Defense Chuck Hagel noted in August 2014, "ISIL is as sophisticated and well-funded as any group that we have seen. They’re beyond just a terrorist group…they are tremendously well funded."[2] He elaborated on this further in a September testimony to the U.S. Senate Armed Services Committee, stating that the United States would work with international partners "to cut off ISIL’s funding" and that "the Department of Treasury’s Office of Terrorism and Financial Intelligence is working to disrupt ISIL’s financing and expose their activities."[3] This decision by international partners to jointly focus on finance disruption has resulted in a bombing campaign partly targeting oil refineries (a major source of funds for Islamic State) and in a UN Security Council Resolution that exhorts the international community to inhibit foreign terrorist fighter travel and otherwise disrupt financial support.[4] But will it work? This article will give necessary broader context on this key question by exploring in more general terms the importance of financing for terrorist and insurgent groups and the extent to which disrupting their funding can reduce the security threat posed by such groups. Specifically considering the evolution of Islamic State, this article will first review the importance of financing in conflict, then assess the way in which funding models develop. It will argue that, once groups move from a reliance on externally sourced funding to generating sufficient internal financing – a path several groups have now followed – disruption becomes significantly more challenging and complex. The international community consistently fails to prioritise the early disruption of terrorist and insurgent financing – an attitude that needs to change...
- Topic:
- Defense Policy, Counterinsurgency, Finance, Islamic State, and Financial Crimes
- Political Geography:
- Iraq, Middle East, Syria, and Global Focus
10. Embattled Superpowers
- Author:
- John H. Maurer
- Publication Date:
- 01-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- On the eve of the Second World War, the noted journalist John Gunther could still maintain that: “Great Britain, as everyone knows, is the greatest Asiatic power.”[1] The British Empire in Asia controlled a vast territory and large population, sweeping in a great arc from New Zealand and Australia in the South Pacific, to Southeast Asia and South China, and on to India and the Middle East. Britain stood as a superpower with economic interests and security commitments stretching around the globe, much as the United States stands today. That position of leadership, however, was endangered. The emergence of major new industrial great powers was transforming the international landscape. These challengers, as they converted their growing economic strength into military power, confronted Britain’s leaders with uncomfortable strategic choices. In Asia, one of those rising challengers, imperial Japan, posed a dangerous threat to Britain’s standing as a world power after it embarked on a policy of expansion. We know the outcome of Japan’s challenge: war and the catastrophic breakdown of Britain’s standing in Asia. The collapse of British power was in part brought about by dynamic changes in technology and the lethality of modern weaponry, particularly the advent of naval aviation, which shifted the naval balance in Japan’s favor. On the eve of war, Britain sought to deter Japan by forming a naval force in the Pacific, known to history as Force Z, consisting of the battleship Prince of Wales and battle cruiser Repulse. Even as Force Z steamed eastward, the Admiralty could spare none of its aircraft carriers, to protect it from air attack. Nor did the Royal Air Force have enough modern aircraft based in the Far East to offer adequate protection for Force Z. Britain’s inability to control the skies meant the Royal Navy could not command the seas, and this permitted the Japanese to land ground forces in Malaya and seize Singapore, the strategic pivot of British defenses in Asia. Not since Yorktown had Britain suffered such a crushing setback. The world’s leading naval power had been bested by a challenger that exploited innovations in technology and doctrine to gain a marked qualitative edge in fighting power.
- Topic:
- Defense Policy, History, Power Politics, Budget, and Navy
- Political Geography:
- Britain, Japan, Asia-Pacific, and United States of America
11. Full Issue: Emerging Domains of Security
- Author:
- Meg Guliford, Thomas McCarthy, Alison Russell, Michael M. Tsai, Po-Chang Huang, Feng-tai Hwang, Ian Easton, Matthew Testerman, Nikolas Ott, Anthony Gilgis, Todd Diamond, Michael Wackenreuter, Sebastian Bruns, Andrew Mark Spencer, Wendy A. Wayman, and Charles Cleveland
- Publication Date:
- 09-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- The theme of this special edition is “Emerging Domains of Security.” Coupled with previously unpublished work developed under a prior “Winning Without War” theme, the articles therein honor Professor Martel’s diverse, yet forward-leaning, research interests. This edition maintains the journal’s four traditional sections of policy, history, interviews, and current affairs. Our authors include established academics and practitioners as well as two Fletcher students, Nikolas Ott and Michael Wackenreuter. Each of the articles analyzes critical issues in the study and practice of international security, and our authors make salient arguments about an array of security-related issues. The articles are borne out of countless hours of work by FSR’s dedicated editorial staff. I deeply appreciate the time and effort they devoted to the publication of this volume. They are full-time graduate students who masterfully balanced a host of responsibilities.
- Topic:
- Security, Defense Policy, Intelligence, International Cooperation, International Law, History, Military Affairs, Counter-terrorism, Cybersecurity, Navy, Conflict, Space, Interview, Army, Baath Party, and Norms
- Political Geography:
- China, Iraq, Europe, Middle East, Taiwan, Germany, Asia-Pacific, Global Focus, and United States of America
12. Special Operations Today: FSR Interviews LTG Cleveland (Ret.) Former Commanding General, USASOC
- Author:
- Charles Cleveland
- Publication Date:
- 09-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Lieutenant General Charles T. Cleveland, an Army Special Forces Officer, relinquished command of the United States Army Special Operations Command (USASOC) and retired after 37 years of military service on 01 July 2015. He previously commanded the Special Operations Command Central and Special Operations Command South as well as the Combined Joint Special Operations Task Force-North during Operation Iraqi Freedom. LTG Cleveland is a native of Arizona and a 1978 graduate of the United States Military Academy at West Point, New York. His military awards and decorations include the Defense Superior Service Medal and the Legion of Merit Medal.
- Topic:
- Security, Defense Policy, War, Military Strategy, Military Affairs, Interview, Army, and Special Operations
- Political Geography:
- Africa, North America, Panama, and United States of America
13. The Bypass: Ahmad Chalabi, Dick Cheney and the Disbanding of the Iraqi Army
- Author:
- Michael Wackenreuter
- Publication Date:
- 09-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- On March 12, 2003, a week before the invasion of Iraq, a Principals Committee meeting of the National Security Council was held at the White House to formally decide the fate of the Iraqi Army.[1] The participants, having all received extensive briefings on the subject prior to meeting, voted unanimously and with little discussion that after disbanding the Republican Guard, the “regular soldiers” of the Iraqi Army would be called “back to duty.”[2] In spite of this decision, on May 23, 2003, L. Paul Bremer III—President Bush’s “special envoy” in Iraq—announced Coalition Provisional Authority Order No. 2, “Dissolution of Entities.” Among the relevant entities to be dissolved by the decree was the Iraqi Army.[3] In an interview with the journalist Robert Draper at the end of his presidency, President Bush commented on this apparent dissonance when he remarked, “The policy was to keep the army intact; didn’t happen.” When asked further of his reaction when he found out about the decree, Bush replied, “Yeah, I can’t remember, I’m sure I said, ‘This is the policy, what happened?’”[4] Having endured significant criticism over CPA Order No. 2, Mr. Bremer was quick to defend himself, providing letters to The New York Times to and from the president “in order to refute the suggestion in Mr. Bush’s comment that Mr. Bremer had acted to disband the army without the knowledge and concurrence of the White House.”[5] Such a puzzling exchange over such an important topic serves to illustrate a larger point. That is, despite its centrality to America’s involvement in Iraq, from the emergence of the insurgency onward to its current conflict with ISIS, it still remains unclear how and why the decision to disband the Iraqi Army was made. In this paper, I demonstrate that the impetus for CPA Order No. 2 came from the prominent Iraqi exile Ahmad Chalabi, and was carried out under the authority of Vice President Richard “Dick” Cheney by a small group of Chalabi’s supporters in the Office of the Vice President and the Pentagon. I do so first by establishing the lengths to which those in the vice president’s office, in concert with like-minded officials at the Defense Department, were willing to go in order to support Chalabi, who favored disbanding the army. Secondly, I identify the striking similarities between the events surrounding the order and other instances involving the vice president that involved a bypass of the normal interagency policy-making process...
- Topic:
- Security, Foreign Policy, Defense Policy, History, Army, Baath Party, and Iraq War
- Political Geography:
- Iraq, Middle East, North America, and United States of America
14. China’s Development of Space Warfare and Its Operational Applications
- Author:
- Feng-tai Hwang
- Publication Date:
- 09-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- As early as March 2011, the journal Aerospace America featured an article with the title “China’s Military Space Surge,”[1] which warned that there had been a rapid increase in China’s capability to conduct warfare in space. Such capabilities would then in turn threaten and jeopardize the ability of the carrier battle groups of the United States to conduct operations in the Pacific. This article was soon translated into Japanese and published in Space Japan Review. This and other high profile articles highlight the anxieties on the part of the U.S. and Japan about China’s increasing ability to militarize space, and also their concerns about its implications for the peace and security of East Asia and the entire Pacific Asia region. On December 31, 2015 China announced the creation of three new branches of armed forces to be added into the reformed People’s Liberation Army (PLA): Army General Command, Strategic Support Force, and the PLA Rocket Force. While the PLA Rocket Force replaced the old Second Artillery Corps, what is even more intriguing is the mission of the new Strategic Support Force. According to Chinese media, the Strategic Support Force will be responsible for overseeing intelligence, technical reconnaissance, satellite management, electronic warfare, cyberwarfare, and psychological warfare. It is no coincidence that Gao Jin (高津), the newly appointed commander of the Strategic Support Force, is also an expert on rocket science, which has further fueled media speculations that the Strategic Support Force has been created for the purpose of conducting future space warfare.[2] In fact, China has been increasing the focus on the military applications of space since the end of Persian Gulf War in the 1990s. During that war, the United States mobilized dozens of satellites to aid the American-led coalition forces, enabling them to defeat Iraqi forces with extraordinary efficiency and ease. The Persian Gulf War greatly shocked PLA observers at the time, and served as a reminder that the conduct of modern warfare had been transformed by the arrival of a new generation of technology. Chinese military theorists then began to study the concept of “space warfare.” The most influential was Chang Xian-Qi (常顯奇), who categorized space warfare into three distinct phases based on his observations of U.S. planning: the “Entry into Space,” the “Utilization of Space,” and the “Control of Space.” “Entry into Space” is represented by the delivery of a military-purpose spacecraft into its designated orbit path. “Utilization of Space” is to harness the power of existing space assets to aid military operations across the land, naval, and air domains. For example, such power can manifest in the forms of using space sensors to conduct surveillance and gather intelligence for Anti-Access/Area Denial (A2/AD) against potential foes, to provide ballistic missile early warning, satellite navigation and communications, among other purposes. The “Control of Space” phase focuses on establishing “space superiority” with the missions of: (1) increasing survivability of one’s own military satellites and systems; (2) disrupting, sabotaging, or destroying opposing countries’ satellites and their systems when necessary; and (3) directly using space-based weapons to aid in combat operations on the ground.[3]...
- Topic:
- Security, Defense Policy, Science and Technology, War, Military Affairs, and Space
- Political Geography:
- China, Asia, North America, and United States of America
15. China’s United Front Strategy and its Impacts on the Security of Taiwan and Asia-Pacific Region
- Author:
- Michael M. Tsai and Po-Chang Huang
- Publication Date:
- 09-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- In 1949, Mao Zedong, leader of the Communist Party of China (CCP), defeated Chiang Kai-shek’s Kuomintang (KMT) troops and succeeded in establishing the communist dictatorship of the People’s Republic of China out of the “barrel of a gun.” At the beginning of its rule, the CCP believed that the use of violent instruments as provided by the People’s Liberation Army (PLA) was in and of itself sufficient to both suppress “reactionaries” at home and defeat “invaders” from abroad. In this vein, during the Korean War of the early 1950s, the CCP regime sent a million-strong “Volunteer Army” into the Korean Peninsula and fought against the U.S.-led United Nations forces, thus cementing the political division of Korea and its complications that linger to this day. Between 1958 and 1960, PLA troops heavily bombarded the Chiang Kai-shek-controlled island of Kinmen, resulting in significant casualties on both sides. Between the 1960s and 1980s, the PLA and militia troops engaged in a series of border conflicts and clashes with the Soviet Union, India, and Vietnam. Throughout this period, the CCP regime still believed that military force alone was sufficient to serve as the primary bargaining chip and policy instrument in its dealing with other states.[1] However, from the late 1980s to 1990s, the collapse of Soviet Union and Eastern Bloc marked the end of Cold War and the confrontation between two global superpowers. The CCP’s strategy in the international arena evolved from an overreliance on hard military force to one that utilizes both “soft power” and the “carrot and stick.” From the Chinese perspective, the concept of “soft power” encompasses the exploitation of any policy or tool outside the traditional definition of “hard” military power to achieve its desired political, economic, and diplomatic objectives. Such exploitation takes place via political, societal, commercial, economic, legal, psychological, cultural, and other means. Mass media and even tourist groups could all be used as a means of penetration to funnel and support Chinese agents deep inside enemy territory and to create conditions that are conducive to achieving China’s desired outcome. This is the essence of China’s strategy of the “United Front.” This article examines the United Front strategy and the ways in which China’s deployment of this strategy impacts the national security of Taiwan as well as neighboring countries such as Japan, Vietnam, the Philippines, and even the United States.[2] The article concludes with proposed policy recommendations for how Taiwan can counter such strategies...
- Topic:
- Security, Defense Policy, Cold War, History, Military Strategy, and Soft Power
- Political Geography:
- Japan, China, Taiwan, Soviet Union, Vietnam, Philippines, and United States of America
16. Russia's Arctic: A Necessary Space for Dialogue
- Author:
- Andrew Yerkes
- Publication Date:
- 09-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Over the weekend of November 21st, 2015, Russia flew 141 sorties over Syria, hitting 472 targets in eight different provinces throughout the country.[1] While the deployment of the Russian Air Force over Syria has been in full affect since last September, the events of November 20th proved to be unique. Two of the TU-160 blackjack bombers that participated in the weekend’s campaign took flight not from a base in southern Russia, but rather from Olenegorsk Airbase on the Kola Peninsula of the Russian Arctic.[2] The two bombers traveled southwest along the coast of Norway, skirting United Kingdom airspace, turning east through the straits of Gibraltar, and achieved their goal of firing cruise missiles on Syria from the eastern Mediterranean. After their mission was complete, they flew northeast over Iran and the Caspian Sea to their home base in Engles, Saratov Oblast, in Southern Russia.[3] In total, the flight lasted 16 hours, with the aircraft traveling 8,000 miles, while motivating Norway[4] and Britain,[5] among other nations, to scramble fighter jets in the process. Presumably, the Russians chose such a circuitous route along the edges of Europe to demonstrate its long range bombing capabilities. In doing so, the Russian Federation also showed the rest of the world that its capabilities might rival those of the United States, proving that Russia too could attack targets all throughout the world. This use of an Arctic airbase for active bombing missions also marks a turning point in history; not even during the Cold War did the Russians demonstrate Arctic-based military capabilities with such expansive reach.[6] While this mission did not focus on targets within the Arctic, the use of an Arctic base for active bombing missions draws attention to Russia’s military buildup in the region...
- Topic:
- Security, Defense Policy, Military Strategy, and Weapons
- Political Geography:
- Russia, Europe, Syria, Arctic, and United States of America