Number of results to display per page
Search Results
42. Cooperation Between Kazakhstan and the United States in Military Professionalization Programs
- Author:
- Sebastian Engles
- Publication Date:
- 03-2018
- Content Type:
- Working Paper
- Institution:
- George C. Marshall European Center for Security Studies
- Abstract:
- The U.S. should remain committed to Central Asian security cooperation, but must carefully evaluate each program for merit and value added to U.S. security goals in the region. Military professionalization of the Kazakh armed forces will have the most significant impact towards accomplishing these goals and help Kazakhstan attain a more capable military. U.S. security cooperation efforts in assisting Kazakhstan to improve non-commissioned officer development serve as an excellent example of effective professionalization and a way to further our strategic relationships with non-NATO countries. Training programs that professionalize the Kazakh military can offer a cost-effective way for the United States to further a lasting partnership with Central Asia’s most stable country.
- Topic:
- Security, NATO, Imperialism, and Military Strategy
- Political Geography:
- United States, Central Asia, Kazakhstan, and Asia
43. Classifying Cyber Events: A Proposed Taxonomy
- Author:
- Charles Harry and Nancy Gallagher
- Publication Date:
- 02-2018
- Content Type:
- Working Paper
- Institution:
- Center for International and Security Studies at Maryland (CISSM)
- Abstract:
- Publicity surrounding the threat of cyber-attacks continues to grow, yet immature classification methods for these events prevent technical staff, organizational leaders, and policy makers from engaging in meaningful and nuanced conversations about the risk to their organizations or critical infrastructure. This paper provides a taxonomy of cyber events that is used to analyze over 2,431 publicized cyber events from 2014-2016 by industrial sector. Industrial sectors vary in the scale of events they are subjected to, the distribution between exploitive and disruptive event types, and the method by which data is stolen or organizational operations are disrupted. The number, distribution, and mix of cyber event types highlight significant differences by sector, demonstrating that strategies may vary based on deeper understandings of the threat environment faced across industries. EXPLORE:
- Topic:
- Security, Science and Technology, and Cybersecurity
- Political Geography:
- United States, Washington, and D.C.
44. How to Address the Global Refugee Crisis and Safeguard U.S. National Security
- Author:
- Eleanor Acer
- Publication Date:
- 09-2018
- Content Type:
- Working Paper
- Institution:
- Human Rights First
- Abstract:
- Historically, the United States has been a global leader in protecting vulnerable refugees fleeing persecution. Both Republican and Democratic administrations have recognized the moral and strategic importance of a strong commitment to refugee protection. But the Trump Administration has adopted policies that diverge from this historic leadership, to the detriment of U.S. national security interests. Under PresidentTrump’s directives, the United States has banned refugees from Muslim-majority countries, decimated the U.S. refugee resettlement program, curtailed access to asylum, taken children from the arms of asylum- seeking parents, refused to release refugees from U.S. immigration jails, and undermined due process in asylum adjudications. Thus far this fiscal year, the United States resettled only 60 Syrian refugees, a 99% drop from 2016. The president and administration officials have repeatedly employed rhetoric that paints refugees and asylum seekers as threats, frauds and criminals. Even though unauthorized border crossings are at historically low levels, the president directed that the National Guard bedeployed to the U.S. southern border “until” Congress strips away legal protections and authorizes the long-term detention of children and families seeking refugee protection. This race to the bottom has global consequences. Not only have thousands of refugees had their lives irreparably impacted, but the global humanitarian and human rights systems themselves are threatened by the Trump Administration’s statements and actions. In addition to relieving human suffering, these systems foster global stability and security. The United States should change course immediately, before the damage is irreversible. Though the global refugee crisis lacks easy solutions, there are many steps the United States could take to alleviate suffering and increase regional and global security—if the U.S. government were invested in tackling the problem. Unfortunately, the Trump Administration’s political strategy seems to reston fomenting public anxiety around questions of migration. Until this changes, Congress must use its legislative and oversight authorities to restore U.S. global leadership on refugee protection, the courts must stand firm behind U.S. legal obligations, and American citizens must demand an end to politicized fearmongering. The government has policy tools that would allow it to lead a comprehensive initiative to address the global refugee and displacement crisis. By working with the international community to effectively address these challenges, the United States could safeguard the stability of strategically-important countries and regions, bolster allies, enhance the ability of front-line countries to host refugees, uphold the rule of law internationally, and restore its tarnished global leadership. As the world leader in humanitarian assistance and resettlement, the United States has a unique role to play, both in leading by example and in encouraging other states to increase their aid, development investment, and resettlement contributions. Most critically, the United States should champion adherence to human rights and refugee protection conventions, promoting the rule of law globally and supporting the ability of many refugees to live safely in countries near their homes. This paper lays out key steps that the United States should take to lead a comprehensive initiative to address the global refugee crisis. Though the Trump Administration is unlikely to put these measures into effect any time soon, it is important that those interested in fixing the global refugee crisis understand that the U.S. government has many tools at its disposal should it choose to use them.
- Topic:
- Security, Humanitarian Aid, Refugees, and Asylum
- Political Geography:
- United States and North America
45. How the United States Should Address Refugee Protection at its Border
- Author:
- Eleanor Acer
- Publication Date:
- 11-2018
- Content Type:
- Working Paper
- Institution:
- Human Rights First
- Abstract:
- Instead, the Trump Administration and Congress should focus on effective solutions that safeguard both American ideals and interests—including: Address the Actual Causes of Displacement. Instead of threats to cut aid to programs in Central America, the United States should increase targeted support for effective programs that decrease gang and other violence in these countries, promote the rule of law, and build accountability for human rights abuses. A task force co-chaired by former Department of Homeland Security (DHS) Secretary Tom Ridge and former USAID Administrator Gayle Smith warned that cuts to foreign assistance “risk creating greater problems and greater flows of people later,” ultimately “weakening our security.” They recommended the United States increase development aid to address root causes, encourage other countries, institutions, and the private sector to invest in fragile states, and focus foreign assistance on governance and other reforms that enable private sector growth. Strengthen Refugee Protection in Other Countries in the Region. As the UN Refugee Agency has reported, Central American refugees are seeking asylum in Mexico, Costa Rica, Panama, and Belize, as well as the United States. The United States should increase support for the UN Refugee Agency and the development of strong refugee protection systems in Mexico and other countries. These asylum systems must actually grant protection to refugees, conduct fair and timely adjudications, and eliminate barriers that block refugees from asylum. In Mexico for instance, many are blocked from asylum by a counterproductive filing deadline, low recognition rates, lack of effective appeal procedures, and migration officers who deport asylum seekers rather than refer them for asylum processing. In addition to encouraging Mexico and other countries to uphold human rights standards by providing protection to refugees, the United States should provide a strong example by upholding its own refugee protection obligations. If Mexico and other countries build strong and rights-respecting systems, more refugees will be able to choose to seek protection in those countries. Follow U.S. and International Law at Borders. The Trump Administration and Customs and Border Protection (CBP) must stop blocking, turning away, or threatening to bar from asylum people seeking refuge at U.S. border posts or after crossing the U.S. border. Instead, the Trump Administration and U.S. agencies must uphold U.S. law, end the orchestrated blockade and slow-down on processing at ports of entry, and ensure timely CBP processing of asylum seekers. Refugees turned away from U.S. ports face deadly dangers from traffickers, smugglers, and other criminals in Mexico, and the country is far from meeting the legal standards for a “safe third country.” By blocking or turning away people seeking protection, U.S. officials are violating and attempting to evade both U.S laws and treaty obligations. Given its historic role as a global leader, the United States’ failure to protect refugees at home reverberates around the world, discouraging other nations from providing refuge at their borders. This practice is also counterproductive from a border protection perspective. DHS’s own Office of the Inspector General recently reported evidence that CBP’s practice of turning away and limiting entry of asylum seekers at official border posts “leads some aliens who would otherwise seek legal entry into the United States to cross the border illegally.” A supervisor confirmed that the agency “sees an increase in illegal entries when aliens are metered at ports of entry.” Receive and Manage Refugee Arrivals While Upholding American Ideals. The United States must stop responding to the increase in refugee protection requests with punitive and threatening actions like family separation, family detention, bans on asylum, criminal prosecutions, and military deployments. These actions conflict with American ideals (confirmed by recent polling), violate U.S. law, and harm children—as the American Academy of Pediatrics has repeatedly warned. They also don’t address the real problem. As former DHS Secretary Jeh Johnson explained in 2018, “[i]t is basic human instinct to save yourself and your family by fleeing a burning building.” He concluded that attempts to deter people from fleeing have ultimately proven ineffective because the “push” factors of violence and poverty persist in Guatemala, Honduras, and El Salvador. In addition to taking the steps outlined above to address root causes, the United States should launch effective, humane, and fiscally prudent strategies for receiving and managing people seeking U.S. protection—including: A Comprehensive Case Management Program. Instead of wasting more money on immigration jails and trying to overturn safeguards on detaining children, ICE should launch a community-based case management program using specially trained case managers to oversee asylum seeker cases. The Family Case Management Program operated by Immigration and Customs Enforcement (ICE) resulted in 99% attendance for ICE check-ins and appointments, and 100% attendance at court. DHS’s own advisory committee recommended expansion of community-based programs rather than detention. This approach is cost effective and enjoys strong support from Americans according to 2018 polling. Support Access and Funding for Legal Representation. Congress should support increased funding for legal information and funds for legal counsel. Statistical studies have repeatedly confirmed that asylum seekers represented by counsel overwhelmingly appear for their hearings, making legal representation a more fiscally prudent expenditure than detention. Assure Fair, Timely, and Adequately Staffed Asylum Adjudications. Congress and the administration must ensure necessary staff levels to reduce backlogs and ensure fairness of asylum and immigration court adjudications. Reforms should include: rolling back use of expedited removal for high protection populations, a fast-track process for urgent humanitarian cases delayed by USCIS’s use of the “last in first out” approach, and removal of “cancellation” cases from the asylum system by creating a process for such applications. Critically, political appointees leading agencies conducting these adjudications must stop painting asylum claims as false or lacking in merit and altogether halt the politicization of immigration judge hiring.
- Topic:
- Security, Border Control, Refugees, and Asylum
- Political Geography:
- United States and North America
46. PeSCo – Anything There for European Defence?
- Author:
- Sandro Knezović
- Publication Date:
- 02-2018
- Content Type:
- Working Paper
- Institution:
- Institute for Development and International Relations (IRMO)
- Abstract:
- The European strategic landscape has changed dramatically over the course of the last decade. The post-Cold War mantra about the obsolescence of conventional threats in the wider European space proved to be short-sighted with developments at its eastern �lanks, while security dysfunctions in the MENA region and their immanent consequences for the safety of European citizens have loaded a heavy burden on compromise-building and decision-making in the �ield of the Common Security and Defence Policy (CSDP) of the EU. Furthermore, the approach of the new US administration to European security and the strategic consequences of Brexit have changed the wider framework in which security of 'the Old Continent' is to be determined, hence stimulating European leaders to rethink European security in a strive for strategic autonomy of their own. The very ambitiously phrased EU Global Strategy that came out in June 2016, served as both catalyst and umbrella document for such an endeavour. However, in order to achieve measurable progress in responding to contemporary security challenges, it was clear that the EU needs to develop a structural way for member states to do jointly what they were not capable of doing at the national level. This is so especially in the environment in which China, Russia and Saudi Arabia are championing the defence spending, right after the US, while European states are signi�icantly trailing behind. The fact that the EU collectively is the second largest military investor and yet far from being among the dominant military powers only emphasises the burning issue of ef�iciency of military spending and the level of interoperability among member states’ armies. High-level fragmentation of the European defence market and the fact that defence industries are kept in national clusters is clearly contributing to that. The reality on the ground is obviously challenging traditional methods of co-operation that operate mainly in ‘national boxes’ and calling for a paradigm change in the wider policy context of CSDP. However, it remains to be seen to which extent will this new security environment actually be able to push the European defence policy context over the strict national boundaries.
- Topic:
- Security, Economics, Military Strategy, and European Union
- Political Geography:
- United States, China, Europe, Middle East, Asia, and Saudi Arabia
47. Cybersecurity and the New Era of Space Activities
- Author:
- David P. Fidler
- Publication Date:
- 04-2018
- Content Type:
- Working Paper
- Institution:
- Council on Foreign Relations
- Abstract:
- The tasks of securing outer space and cyberspace are converging. The internet increasingly depends on space-enabled communication and information services. Likewise, the operation of satellites and other space assets relies on internet-based networks, which makes these assets, like cars and medical equipment, devices on the internet of things. New government actors, companies, goals, and technologies are expanding and transforming space activities. However, neither space policy nor cybersecurity policy is prepared for the challenges created by the meshing of space and cyberspace, which could increase national security risks. To meet these challenges, government, industry, and international action is needed. The Donald J. Trump administration’s National Space Council should develop cybersecurity recommendations for space activities, and federal agencies should prioritize these within the government and in cooperation with the private sector. In crafting needed legislation for commercial space activities, Congress should bolster industry efforts to strengthen cybersecurity. Private-sector actors should strengthen their adoption of cybersecurity best practices and collaborate with one another on improving implementation of cybersecurity strategies. Internationally, the United States should pursue collaboration on space cybersecurity through the North Atlantic Treaty Organization (NATO), plurilateral space cooperation mechanisms, and bilateral forums.
- Topic:
- Security, Science and Technology, Cybersecurity, and Space
- Political Geography:
- United States and North America
48. Sharing Classified Cyber Threat Information With the Private Sector
- Author:
- Robert K. Knake
- Publication Date:
- 05-2018
- Content Type:
- Working Paper
- Institution:
- Council on Foreign Relations
- Abstract:
- The U.S. government and private industry have been stuck at an impasse concerning cybersecurity information sharing for over a decade. While the Barack Obama administration rolled out executive and legislative efforts to increase information sharing, many U.S. companies still argue that the federal government should do more to provide them with useful intelligence on cyber threats. But the U.S. intelligence community argues that greater declassification and sharing of information with private companies could put technical sources and methods at risk. Fixes to this problem exist. The Department of Defense already provides a classified network for cleared defense contractors to receive intelligence on threats to their companies. Replicating this network for cyber threats has long been discussed as a way to share more information with the financial sector, electricity suppliers, and other private-sector entities critical to the U.S. economy. Expanding this network requires increasing the number of cleared personnel and of facilities that can hold classified information, as well as changing intelligence collection priorities. These hurdles can be addressed by cooperative efforts between the public and private sectors. As a crucial first step, the U.S. government should begin the targeted collection of intelligence on cyber threats to critical infrastructure. To disseminate this information, the government should establish security standards different from those applicable to defense contractors to determine who may hold clearances.
- Topic:
- Security, Cybersecurity, Information Age, and Private Sector
- Political Geography:
- United States and North America
49. Strategic deterrence redux: Nuclear weapons and European security
- Author:
- Leo Michel and Matti Pesu
- Publication Date:
- 09-2018
- Content Type:
- Working Paper
- Institution:
- Finnish Institute of International Affairs
- Abstract:
- One of the most notable consequences of the end of the Cold War was the diminished role of nuclear weapons in international relations. The world’s primary nuclear weapon powers, the United States and the Russian Federation, made considerable reductions in their nuclear forces. The climax of the process was the New START Treaty signed in 2010. Now, the optimism that characterized the first decades of the post-Cold War era is rapidly evaporating. Geopolitical competition again dominates global and regional security dynamics. Nuclear powers are modernizing their forces and introducing novel systems that may affect strategic stability. At the same time, existing arms control regimes are crumbling. This report takes stock of recent developments in deterrence in general, and nuclear deterrence in particular. Its main ambition is to understand how deterrence has changed in light of certain post-Cold War trends. To this end, the report introduces the basic principles of deterrence. It also explores the nuclear-related policies and capabilities of the four nuclear weapon states most directly involved in European security affairs – Russia, the United States, France, and the United Kingdom. Importantly, the report also analyses the implications of the recent trends in strategic deterrence for Northern Europe. This report is part of a research project conducted by the FIIA entitled ‘New Challenges for Strategic Deterrence in the 21st Century’. The project is part of the implementation of the Government Plan for Analysis, Assessment and Research 2018.
- Topic:
- Security, Defense Policy, Arms Control and Proliferation, Diplomacy, Nuclear Weapons, Military Strategy, and Deterrence
- Political Geography:
- Russia, United States, United Kingdom, Europe, France, and North America
50. The Changing Security Dynamics of the Persian Gulf
- Author:
- Center for International and Regional Studies
- Publication Date:
- 01-2017
- Content Type:
- Working Paper
- Institution:
- Center for International and Regional Studies (CIRS), Georgetown University in Qatar
- Abstract:
- Academic interest in Gulf security has continued to focus on traditional notions of zero-sum security threats emanating from Iran or Iraq, or the role of the United States. There has been limited exploration of the deeper, structural issues that threaten the region. In line with this, in the 2014-2015 academic year, CIRS launched a research initiative on “The Changing Security Dynamics of the Persian Gulf.” The purpose of this project is to scrutinize the ways in which domestic security threats in the region are evolving, and how newer challenges related to human security are being reinforced by—and in some ways actually replacing—military threats emanating from regional and outside actors. This project brings together a number of distinguished scholars to examine a variety of relevant topics, which resulted in original research chapters published in an edited volume titled, The Changing Security Dynamics of the Persian Gulf (Oxford University Press/Hurst, 2017), edited by Kristian Coates Ulrichsen.
- Topic:
- Security, Military Strategy, and Political structure
- Political Geography:
- United States, Iraq, Iran, and Middle East