Archive for the 'Homeland Security' Category
Last year on National Public Radio’s “Marketplace,” host Kai Ryssdal closed many of his interviews in the Corner Office segment by asking those captains of industry to describe what their firms do in 5 words or fewer. Intel CEO Brian Krzanich came close: “We make everything connected and smart.” Most didn’t come that close.
A couple of months ago, DoD and DHS teamed up to unveil “A Cooperative Strategy for 21st Century Seapower.” Admiral Greenert, General Dunford, and Admiral Zukunft got together at the Center for Strategic and International Studies with Admiral (ret) Stavridis to discuss the new strategy, and give those in attendance a chance to ask a few questions. They didn’t make it in 5 words.
The challenge for the Chief of Naval Operations: In 5 or fewer words, what does the Navy do?
To be fair, bedrock guidance for the at-sea service of a global power will probably have to flesh things out a bit, and the Cooperative Strategy certainly does: What does the Navy do? How do we aim to do it? How do we sustain those efforts into the future? Check, check and check, but at 48 pages it isn’t exactly accessible. To those of us who live, eat, and breathe Navy, it is clear and understandable. How does it resonate with the millions of Americans who do not spend their days poring over budget exhibits and JCIDS documents, but still pay taxes, vote and watch CNN?
The 5 word definition by itself is not important. The conversation is. The Navy doesn’t need this description to replace the “global force for good,” and 5 words is probably impossible. To paraphrase Ike: plans are worthless; planning is everything. It is important to our young talent pool who may choose to honor us with their service. Junior officers and NCOs will want to know why to stay. Taxpayers will want to know what they’re buying. So why 5 words? The Navy needs to hone its messages, and needs a barrier to drive creativity. Set the bar high, and force discussion, argument and compromise. In 5 words, no one will get everything they want, but everyone will have to make a strong case for it. So where does this exercise drive us?
The Navy needs champions, vocal leaders in the service, in Congress, and elsewhere to communicate a compelling vision of the value the United States Navy provides for the country and the world. Alfred Thayer Mahan’s compelling argument of the importance of Seapower left a lasting imprint on U.S. policy. He didn’t see the future in terms of hardware and tactics, but he didn’t have to. Presidents, Congressmen, and the people took note, and the United States funded and built a Navy capable of playing in a balance-of-power world. Champions of the Navy must articulate clear objectives and cogent arguments. While the QDR and 21st Century Strategy provide top-level guidance, they seem to indicate that we should be doing everything. If everything is a priority, then nothing is a priority, and we’re left with POM competition to determine our path. “Five words” discussions will force us to be brutally honest about what we want to achieve, what we can afford, and what the limits of American Seapower may be.
Another important group the Navy needs to inspire is young people, the workforce of the future. While pop-cultural generalization indicates Millennials seek out inspiration in their careers, the truth is everyone, of all generations, wants to be inspired. Everyone wants to believe that their contributions are meaningful. Access and aptitude for using technology and navigating the ever-growing web of information apparently makes Millennials more difficult to lead than the coffee house slackers and the “Me Generation” that came before them. This changes neither the Navy’s requirement to recruit and train a fighting force, nor the fierce competition with other services for talent. As economic recovery continues, recruiting and retention challenges will only continue to mount. Focus counts to anyone who considers joining the Navy.
While the economy may have taken a step forward from 2009, pressure on the national budget remains. Even though years have passed since 9/11, virtually no one will say that defense spending is not important, but increased funding for defense spending is not in the offing. Many tax payers will wonder if it is as important as it once was, and as critical as other agencies’ concerns today. The focus and debate stimulated by the 5-word question will help hammer out how best to spend limited resources. How do we put a price on readiness? How can we calculate the cost of a sufficient deterrent? We must prove to the country that we are making the most of our resources.
How would the CNO respond, in 5 words or fewer: What does the Navy do? (At best, they need to do it in 140 or fewer characters.) The answers may determine how the Navy is viewed, funded and used as a component of U.S. foreign policy, and the U.S. role in global affairs. Let’s start with the corner office challenge. How about “Deterrent and coercive force of American Foreign Policy in the Global Commons?” Twelve words. Missed out on humanitarian operations, and “coercive” seems a bit impolite. “Sea control in maritime domains?” Five words, but should the United States aspire to truly control the seas? Credit Mr. Ryssdal (a former naval aviator himself), this is a tough question.
To: Admiral X, CINCSTUFF
From: LTJG Kat Dransfield
BCC: North Korea, Iran, Google, Russia, Boris in Belarus
Fw: Fw: Fw: Fw: Subj: Decisions, Secrecy and Sclerosis: Why Email Is the Single Greatest Threat to National Security
Today, information is all around us. The proliferation of digital technologies and resultant data explosion does not simply affirm the efficacy of digital systems over their analog predecessors like letters, the telegraph, and carrier pigeons. Rather, the data revolution mandates a shift towards a world permeated and enabled by data in a whole new way. This requires a mindset shift that will have significant consequences, many of which are not readily apparent even to experts. From the emergence of digital currencies such as bitcoins, to personal technologies like Fit Bit, the intimate fusion of the digital with our physical and social experiences is an increasingly salient aspect of culture. We have a level of connection to data the like of which historically has been reserved for spouses and significant others.
Data and the digital world are nearly ubiquitous in the military and broader society. With so much data now readily available, data and the digital world have fundamentally altered and enhanced how humans arrive at evidence-based decisions. To adapt to this, conventional military decision-making models and technological practices should have been re-examined to leverage the untapped military potential hidden within our data stores. Although the growth in complexity and quantity of data analytic packages and modeling platforms HAS altered decision models in realms as disparate as weight management and finance, the Navy faces a glaring deficiency in this arena.
As large amounts of digital data have increasingly become the basis of decisions today (including those of potential military adversaries), many of our naval decision-making processes and framework have remained in the 19th century. For the most part, advanced Navy systems for managing, synthesizing, and sharing data have failed to materialize. This problem does not simply manifest itself in the realm of supercomputers and high-end weapons and analysis development. It is all-encompassing, the most corrosive example of which is the foundation of our military communication: email.
To: Admiral X, CINCSTUFF
From: LTJG Kat Dransfield
CC: North Korea, Iran, Google, Russia
Fw: Fw: Fw: Subj: Just Because it’s Digital Doesn’t Make It Better
Email simply took an ancient model of communication — the sending and receiving of written word–and digitized it. While the physical act of transmission is far more efficient, the human, cognitive limitations on reading and processing speed remain. We have failed to develop the technologies needed to augment the human brain and actually use email traffic in its totality. There is an easy analogy: imagine if you received 200 letters in your mailbox every day. In its current form, that is all email is. We have created an environment where millions of “letters” are generated without parallel capacity to make use of the information they contain. This doesn’t even begin to deal with the problems created by forwarding – imagine if those letters had stapled to the bottom a copy of every preceding letter, which you would need to read through in order to understand what the original letter was about!
Everyone with a .mil address knows the trials and tribulations of operating within the email construct, especially when utilizing an IT infrastructure that is inadequate, outdated, and scandalously overpriced due to the inherent deficiencies of our acquisition strategy. Many of us receive hundreds of emails a day, most of which we will frankly delete at the expense of some critical information they may contain. For the emails we do choose to read, the legibility of email traffic is compromised by the ratio of actionable information to extraneous routing data. We spend more time reading “looping in Tim’s” than tending to the “meat” of our emails.
As processors, human brains are poorly designed to collate and apply analytic rigor to the amount and format of information in our inboxes–this is why we can never quite seem to get caught up on email. The way the human psyche evolved renders humans attentive to environmental anomalies but very bad at focusing on environments that don’t stimulate the “threat detection” portions of our brains (ex. parsing emails that all look largely the same). In other words, we get distracted easily, like when we put this youtube video right in the middle of this article.
Fortunately, there are some examples of best practices we can turn to remedy our information dilemna. Financial statements used to be nearly meaningless to a broad set of the population. However, when free easy to use budgeting tools like Mint were developed, the ability to visually understand through graphs and trend summaries transformed the way many people think about saving and spending money. If Mint is an example of making large datasets meaningful and the catalyst for behavior change, then Microsoft Outlook is the opposite–equivalent to reading all of our financial statements and purchase transcripts without any frame of reference to understand what it all means.
The continued reliance on email as the cornerstone of our not only our business processes but many of our actual warfighting processes therefore renders the Navy organization hopelessly inefficient, vulnerable to security compromises, and frustrating to operate in. The time expenses, shortcomings in data presentation, and lack of analytic capacity in the email construct ensure blind, non-data-driven decision-making. The lack of enterprise-wide, algorithm-driven governance of data sharing and retrieval means protocol implementation is informed by culture rather than system design. As a result, information sharing etiquette is poorly enforced by end users who are expected to navigate the abject complexity of web traffic–locating, identifying, sharing, and safeguarding information without the assistance of modern tools. And ironically, when email fails to produce needed critical information, we naturally seek to correct the information deficit by sending more emails–adding noise to the already impossibly complex and overburdened data management construct. The over-cultivation of information makes information worthless.
To: Admiral X, CINCSTUFF
From: LTJG Kat Dransfield
CC: North Korea, Iran, Google
Fw: Fw: Subj: Some thoughts about thinking differently
While we tend to think of email as a business instrument and not a warfighting tool, every warfighting outcome refers back to this communication medium in various degrees. One alternative to the current email construct would be for the Navy to eliminate email entirely and introduce a cloud-based information retrieval system. Imagine a Navy where instead of having to ask Bob to ask Sally to ask Fred for a particular piece of information (who may ultimately opt not to share it), the data object of interest could simply be queried via a Navy-wide search engine, then integrated into a more meaningful picture. For example, current year equipment casualties could be instantaneously generated alongside relevant trend data. The time savings and decision enhancement acquired by installing such a system would be astronomical.
To: Admiral X, CINCSTUFF
From: LTJG Kat Dransfield
CC: North Korea, Iran
Fw: Subj: Secrecy and Sclerosis: Maybe we like it this way
However, even if the shortcomings of the acquisition system could be overcome to make such a cloud solution a reality, it is unlikely to be implemented. To start, the fact that naval personnel have continued to tolerate the email construct this long belies reason. Imagine if you didn’t empty your physical mailbox in over a year. After a series of notices from your post office and a few angry neighbors, legal action might be warranted owing to the growing piles of (sensitive) information. Yet it is also exposed to the elements, degrading and disappearing. Juxtapose this example with the email environment, where the descriptive and injunctive norms of our Navy validate this behavior. We must ask ourselves why.
The fact that we as an institution continue the use an email system that is openly acknowledged to be terribly designed and marginally effective is underpinned by a more deeply rooted problem that email has continued to facilitate; secrets remain the organization’s authoritative currency. From our budgeting process to our conversations with detailers, power in the Navy organization is extracted from our capacity to control the dissemination and transparency of information. Enacting a cloud-based system that allowed users to query for any piece of information would threaten this culture of secrecy calcified by our continued use of 19th and 20th century information exchange models. For example, making information related to a program-of-record readily available would completely dismantle the Navy’s current methods of defending its budget. . The current method is stating in a unified manner across the leadership that that every program is equally vital and equally successful becomes impossible if information on those programs is readily available. Similarly, the military’s rank structure is reinforced by a practice of knowledge hoarding (“I out-rank you, therefore I get to be the exclusive owner of this information and you have to beg for it”) that breaks down if access in a cloud-based system is relatively free and open. These are just two of many ways in which the precession of secrecy would be fundamentally disrupted by efficient communication mechanisms.
To: Admiral X, CINCSTUFF
From: LTJG Kat Dransfield
CC: North Korea
Subj: Secrecy and Sclerosis: Why Email is the Single Greatest Threat to National Security
Therefore, ensuring our information management practices allow the Navy to remain a relevant instrument of national power depends on more than the adoption of new hard and software–it requires coming to terms with the very real socio-cultural barriers that prevent us from using information appropriately and effectively. Email as a communication medium is no longer relevant given the growth and availability of powerful analytic and collaboration tools. And if we do not find ways of making our culture and business models more receptive to the use of these tools, we will quickly find ourselves outmatched by our most agile and innovative adversaries. These adversaries will outpace us in decision-making and have better situational awareness. They will also have the tools and analytic capacity to exploit the currently untapped data flowing over our own relatively insecure networks (the more data we produce in the form of useless emails, the more opportunities there are for exploitation). If the US Navy is to remain the preeminent naval force in the future, it must restructure its processes and identity around something other than secrecy. Until we can effectively exploit our own data, we will lag our adversaries in the information space.
Today, understanding national security means understanding the ‘cyber’ dimension of warfare. For the last twenty years we have lived in a world where every day more people gain access to the global online commons and benefit financially, politically and educationally from that access. The concept of cyber warfare, taken to its logical extreme, will threaten the very nature of the global commons and force policy makers to improvise strategies to defend it.
The tools, tactics and strategies of cyber warfare are rapidly evolving in complex ways – a process that will be greatly accelerated in the event of conflict between two or more nation-states with mature cyber capabilities. While it is impossible to predict exactly how cyber warfare will shape the future battlespace, a sustained cyber conflict will likely pose an existential threat to the global, lightly regulated internet most liberal democracies know today. The Chinese model of the internet (a tightly regulated national network with few connections to the global system) will likely seem increasingly attractive to policymakers under intense political pressure to stop the constant barrage of foreign cyber-attacks. The global consequences of a shift to such a system would be devastating to the current paradigm of free-flowing information upon which much of the global economy is based.
War As Geopolitical Phase Change: Chaotic Systems and Phase Changes
Imagine a straight line composed of individual dots on a piece of graph paper. The line moves left to right. At a certain point along the line the dots begin to jump around and the line breaks up. Eventually the points are drawn together and reform a line. If you draw a box around the points between the two smooth segments of your line, the points inside that box will be scattered, without any rhyme or reason. In this example, the line is an orderly system, moving in a way that is understandable and predictable. The box that bounds the sporadic points is the outline of a chaotic system. The activity within the box seems strange and erratic.
The graph can be used as a model of human experience. Typically, events proceed in a way we can understand and plan for – a linear progression – but sometimes the nature of events becomes chaotic and we find ourselves unable to make sense of the world around us. War is the ‘phase change’ period of geopolitics, an inherently chaotic state during which unlikely or seemly insignificant events can play outsized roles in shaping the course of events. Once a person or a civilization is affected by war, the effects can be almost impossible to model. Who in early 2001 envisioned a major American deployment to Afghanistan by the end of the year? Importantly, the effect of war on technology can be also nonlinear and impossible to model.
Cyber at the Threshold of Phase Change
Highly specialized weapons of cyber warfare already exist in the form of STUXNET-class worms. Those weapons have already demonstrated an ability to inflict massive damage on targeted industrial systems. Clearly, cyber weapons will play a role in future conflicts, but it may be impossible to model the extent to which they will reshape the battlefield.
We are likely standing at the end of the first ‘linear’ period of the history of cyber warfare. Over the last two decades, crude denial of service attacks have evolved into more sophisticated distributed denial of service attacks. Vulnerabilities in operating systems have been used to exploit industrial control systems previously thought to be safe from manipulation due to the ‘air gap’ separating these control systems from the internet (in the case of STUXNET, the virus was introduced via a USB thumb drive). Cyber tactics are being developed, tested, combined, and retested on a daily basis.
If this already seems like a hopelessly complex problem to solve, I’ve got bad news for you. Kim Zetter, in her novel Countdown to Zero Day, states that, to date, the total volume of cyber-attacks conducted by nation states still only numbers in the hundreds, and those attacks largely have been conducted independent of conventional military actions. A notable exception, the ‘cyber salvo’ that Russia launched against Georgia immediately before Russia’s 2008 invasion, made headlines, but was only the beginning. Several hundred attacks sounds like a lot, but it’s still a small enough number that each attack can be studied and understood. Sustained conflict between any of the mature cyber powers (US, Israel, China, Russia, France, and Iran) will exponentially increase the number and complexity of attacks. Such a conflict will herald the beginning of the phase change.
At the Other End of the Chaotic Interval (The Example of Border Controls)
Though it’s impossible to model the way that cyber warfare will evolve once the phase change begins, we can still speculate, as many security experts have, about how a sustained cyber campaign might affect our world. The doomsday scenarios trotted out repeatedly over the last decade have become depressingly familiar: the banks will crash, satellites will fall out of the sky, and the dams will be blown open, flooding everything. Each of these scenarios imagines a particular cyber tactic being violently directed against a defenseless target. These scenarios contain two problematic misconceptions. The first problem with all these scenarios is that they presume to know which tactic (targeting banks, satellites, and dams) will be adopted by cyber actors. It’s impossible to know for sure which tactic will be adopted because that decision will likely made during wartime and hence occur during the chaotic interval when nothing can be safely predicted. The second problem is that these scenarios fail to appreciate the ways in which systems under attack will evolve to defend themselves. Warfare is a struggle between forces. Even if targeted nations are slow to understand what’s occurring, they will eventually develop strategies to counter cyber threats.
To use an analogy from the early 1900s, before World War I it was possible for a French citizen to travel from France to China with little or no documentation. The pre-World War I era was one of globalization – the states of Europe had not yet developed the mechanisms of border control we now associate with the inter-war and Cold War periods (imagine the fortified checkpoints surrounded by concertina wire and frowning soldiers crouched in machine gun nests).
After World War I, the surviving states all implemented strict border controls. They did this despite the cost and the detrimental effects that checkpoints have on trade and commerce. The risk of uncontrolled borders was just too great. In many cases these control measures lasted until the early 1990s when the European Union made a concerted effort to remove those barriers and expand the freedom of movement of goods and people throughout Europe.
The Fate of the Global Internet
Today’s internet is a truly global phenomenon. Users in the United States can easily access websites hosted in Russia, Poland, France, Kenya or Iran. These connections are lightly regulated by most nation states, though China is a major exception. These connections are also highly lucrative. The global internet has allowed financial institutions to quickly and efficiently synchronize operations around the world. Without the internet, there would be no online ordering or ‘just in time’ manufacturing chains. The social and economic benefits of a direct, unpoliced US – Russia internet connection outweigh the risk of, say, a concerted effort by Russian cyber actors to infiltrate the US banking networks. That may not always be the case.
The response of European states to the violent chaos released by World War I was to severely restrict inter-state economic traffic and the movement of people across borders. A similar phenomenon may occur following the first sustained conflict by major cyber actors. While countries may not completely choke off their citizens’ access to web addresses hosted in hostile nation states, it may be incumbent upon those countries to severely restrict that access in the name of network security. China has already moved in this direction by creating the Great Firewall, a system that strictly regulates the points where China’s internet connects to the rest of the global commons. President Putin recently called on Russia to build its own internet, calling the existing global internet a ‘CIA project.’
The movement away from a global Internet and toward a system of national or regional networks (North Atlantic, EU or North American for example) is one possible outcome of a future cyber conflict. While there is no guarantee that such segmentation will occur, it follows from the way that nations typically react to security crises for which they are unprepared. In a word; they ‘overreact,’ and tend to put heavy-handed structures in place that can take generations to remove (see also, post-9/11 airport security in the US). For the reasons outlined above, it is likely impossible to know exactly how a cyber-conflict will change our world… but human nature doesn’t change much. If we fail, as a nation, to appreciate the degree to which cyber conflict will change our world, we will likely make short-sighted decisions in the heat of the moment that may take a long time to fix. We should start grappling with the implications now, while we’re still in the linear phase and have some control over events.
The Institute is pleased to have the guidance of a select panel of Navy Officers who believe this destination can continue to host the most important lines of thought concerning naval policy and the nation’s defense. LTJG Chris O’Keefe and a network of junior naval officers have agreed to assemble content for the USNI Blog, focusing specifically on key issues that they describe below in their inaugural post.
They are not strangers to the forum, and already have an impressive resume of posts and articles. They continue a fine tradition of important discussions on the USNI Blog led by a strong network of key Navy figures including guest bloggers from the naval blogging community, who were responsible for guiding the USNI Blog to three consecutive years of being named “Best Navy Blog” sponsored by Military.com and USAA. Our founding guest bloggers will continue to contribute as they desire.
Mary D. Ripley | Director of Digital Content
Bill Miller | Publisher
Since 2008, the Naval Institute’s blog has served as a key forum for thinkers and naval leaders to collaborate, argue, think, and write. The blog, with its essentially unlimited audience and condensed production timeline, helps ensure the Institute continues to play a vital role in shaping the dialogues that will shape the Navy of the 21st century and beyond. It is important therefore to periodically step back and ensure that the blog’s content sufficiently captures the critical discussions taking place throughout the Fleet. A small group of junior naval thinkers is working to facilitate this, and we would like you to join our ranks through thinking and writing.
Looking forward, we’ve identified conversations in the naval sphere that we believe are not getting enough attention, and that are ripe for dynamic debate. The four identified areas are:
-The navy and cyber
-Future war fighting
-Revitalizing practical professional notes
One of the flagship platforms for naval discourse is Proceedings. However, the capacity of the magazine is finite, and there are many discussions that simply may not meet the threshold for publication in a particular issue. The blog team is coordinating with the Proceedings editorial staff to develop a framework for two-way content flow between the magazine and the blog. A rising tide raises all ships, and just because an article doesn’t find the right home in the magazine does not mean that it is not a valid discussion piece meriting dissemination. Therefore, beginning shortly, authors who submit to Proceedings whose articles are not accepted for publication will be invited to submit to the blog team for editorial assistance and publication. At the same time, blog authors whose pieces are well received will be invited to contribute a larger, more comprehensive piece to Proceedings Magazine. Our essay contest winners will also begin to have entries published on the blog, and we will eventually sponsor online-only essay contests. Combined with other events, we hope broaden naval discussion by encouraging more people to write, speak out, and be heard.
The online blogging forum presents unique technological affordances compared to traditional mediums. In thinking about the implications of the blog’s digital existence, we were forced to reflect on how the digital has altered the form and practice of naval discourse more broadly. By extension, we were prompted to contemplate how the digital space has fundamentally altered naval disciplines. Therefore, as our first effort, we will be launching a conversation starting May 3rd about the Navy and cyber, and how this discussion should be framed and shaped.
Why May 3rd? On that date in 1997 IBM’s Deep Blue began a 6 game re-match with chess champion Garry Kasparov. Although Kasparov won this match, an apparent bug in Deep Blue caused it to make a move that puzzled Kasparov. American statistician Nate Silver believes that “Kasparov had concluded that the counterintuitive play must be a sign of superior intelligence. He had never considered that it was simply a bug.” His confidence shaken, Kasparov would go on to lose the series, marking the first time under tournament conditions a computer had defeated a reigning world chess champion.
Deep Blue’s name is particularly appropriate for conversation about the Navy’s cyber domain, and this comes on the heels of the launch of the concept of all-domain access within the new maritime strategy. We already have a few articles ready in rough draft form, and have been in conversations with leaders at all levels in the naval cyber realm. We invite you to submit an article between 800 and 1000 words that would help shape the conversation on how we integrate the navy and the cyber domain.
In the next week we will announcing our revised blog submission policies and instructions on how to submit posts for publication. Whether you are a member of the nation’s Naval service, or an armchair admiral, the groundswell of naval thought is palpable, and we hope you will put pen to paper or open your laptop to join it.
Chris O’Keefe is an active duty naval officer who spends much of his spare time working to foster professional naval discourse by helping and encouraging current and future thinkers and writers.
This is worth an hour of your time:
If you have doubt, there is this Reuters headline, U.S. missile defense agency warns of “jeopardy” from budget cuts:
Further budget cuts would put the U.S. military’s ability to protect the United States in “serious jeopardy” at a time when Iran and North Korea are advancing their own missile programs, the head of the U.S. Missile Defense Agency said on Thursday.
Vice Admiral James Syring told U.S. lawmakers that failure to lift budget caps in fiscal 2016 would force him to delay urgently needed steps aimed at improving the reliability of a system that top military leaders have already called “unsustainable” given growing threats and budget pressures.
It is not rational to think standing still means your potential enemies will also call a halt to their activities.
U.S. Naval Insitute News offers up Army-Navy Memo on need for Ballistic Missile Defense Strategy, referenced in the above:
UPDATE: Robert Work, Deputy Defense Secretary on budget issues as found in the Aviation Week opinion piece, “Budget Blunders Threaten U.S. Military Superiority”:
Sequestration is a blunder that allows our fiscal problems, not our security needs, to determine our strategy.
Please join us Sunday, 15 March 2015 at 5pm (U.S. EDT) for Midrats Episode 271: “Red Flag and the Development USAF Fighter Pilots”
In parallel efforts that in the Navy which led to Top Gun, the US Air Force looked hard at the lessons of air to air combat in the Vietnam War and brought forward “Red Flag,”
Moving beyond the technical focus, they looked to training and
fundamentals to bring back a primacy of combat skills.
Our guest for the full hour to discuss this and his new book, The Air Force Way of War: U.S. Tactics and Training after Vietnam, will be
Dr. Brian D. Laslie, Deputy Command Historian, North American Aerospace Defense Command (NORAD) and United States Northern Command (USNORTHCOM).
A historian of air power studies, Dr. Laslie received his Bachelor’s degree in history from The Citadel: The Military College of South Carolina, his Master’s from Auburn University Montgomery in 2006 and his Doctorate from Kansas State University in 2013.
Dr. Laslie was Honorably Discharged from the United States Air Force in 2007 as a Captain after serving as a logistics officer, doctrine instructor, and Action Officer to the Commander of Air University.
This Sunday join us for our 5th Anniversary Show. No guests, no agendas – just us talking about what 2014 had to teach us, and looking towards what 2015 may have in store for everyone in the national security arena. This is a great time if you ever wanted to call in to ask either one of us a question on a topic you wish we would address … or just to say “hi.” Just be warned, we might ask you a question back. It’s what we do.
5pm EST. 4 Jan 14.
Okay, kids, here’s America’s newest fun game: “Name that 2015 Hotspot!”
The challenge is to pick 15 places which have the potential to become hell holes for their residents and which will involve the presence of U.S. military forces before the dust clears. Name a place and give a quick reason. The fact that a place is already a disaster does not exclude putting it on this list, but you do have to state why you think it will continue to be a troubled area. You can add places in the comments or send me an email and I’ll tack them on the list. It is perfectly okay to challenge things on the list. In fact, it is encouraged. Got more than 15? That’s okay, I had to use 15 to make it work with the year.
Contest ends whenever I say it does but no later than 6 January 2015. No prizes are to be awarded. Credit will be given to the most brilliant suggestions unless I steal them.
Here are 5 I came up with to get you started:
1) Nigeria: Potentially one of the richer countries in the world due to its mineral wealth, it suffers from incredible corruption and a nearly complete inability to get its house in order. Criminal gangs, tribal rifts, Boko Haram, pollution, grinding poverty, kidnap for ransom schemes are some of the issues. Just might turn into an even more failed state if it can’t get its eastern area under control.
2) Cuba: As the former Soviet empire proved, there ain’t no such thing as a “little freedom” for the oppressed masses. The Castro brothers have to die sometime, why not in 2015? With the right support from expatriate Cubans the place appears ready to – um- explode? Cuba seems to have lost all its old Commie sponsors. What will the U.S. do if China decides to help out 90 miles off the Florida coast?
3) Venezuela: Can you say failing state? A dysfunctional economy and an oppressive regime riddled with factionalism even in the army. There are opposition groups. Could get really messy, especially if oil prices stay down.
4) Russia: Putin needs a war to keep his power. Oil prices and the embargo (weak as it is) are killing the Russian economy. Somewhere in the Rodina there must be a crowd of reformers who really want to toss off the corrupt oligarchs and their man in Moscow. I guess the questions are whether Putin’s internal police are good enough to stifle freedom and whether the Russians who want to fix things can get any support among Russia’s youth.
5) South China Sea: The nasty Dragon covets all that water and the power it would bring. Bullying, lawfare and playing good China/Bad China games are in the Dragon’s bag of tools. The little Hobbit lands surrounding the South China Sea look to their east for support. Will/Can the U.S. and its allies help the Hobbits or do more dancing to push this problem off on the administration elected in 2016?
I am also going to put this up at my home blog EagleSpeak
As we near Christmas,it is a season of surprises – and Midrats presents Episode 258: COIN, Cyber, and Lawfare: the continuity of war in to 2015 on 14 Dec 14 at 5pm:
With the coming of the new year, some things have not changes and the old challenges are still with us; most waxing – only a few waning.
This Sunday we have returning guest Charles J. Dunlap, Jr., Major General, USAF (Ret.), Professor of the Practice of
Law, and Executive Director, Center on Law, Ethics and National Security at Duke University.
We will cover the board spectrum of the evolution of Counter Insurgency, warfare in the cyber domain, and the ever-present impact of law on the conduct of war.
General Dunlap’s teaching and scholarly writing focus on national security, international law, civil-military relations, cyberwar, airpower, counter-insurgency, military justice, and ethical issues related to the practice of national security law.
By Mark Tempest
Please join us live on Sunday, 7 September 2014 at 5pm EDT US, for another discussion on the fight against terrorism, especially the terrorism and action of radical jihadist groups, as we host Episode 244: Long War update with Bill Roggio
If you fell asleep on Memorial Day and woke up on Labor Day, your head is probably swimming. The situation in the Muslim world from Libya to the Iranian border has turned in to some strange chaos if you have not been paying attention – but when you look at the details and trendlines, the logic is a lot clearer.
The long war has not gone anywhere, like a field untended, the weeds have returned and are prospering.
To help us understand developments over the summer, coming back to Midrats for the full hour to discuss this and more will be Bill Roggio, senior fellow at the Foundation for Defense of Democracies. Bill is also the President of Public Multimedia Inc, a non-profit news organization; and the founder and Editor of The Long War Journal, a news site devoted to covering the war on terror. He has embedded with the US and the Iraqi military six times from 2005-08, and with the Canadian Army in Afghanistan in 2006. Bill served in the US Army and New Jersey National Guard from 1991-97.
As noted, Bill was with us recently (Episode 225: The Long War Becomes a Teenager), but recent events suggested that it would be good to have him back sooner rather than later.
Join us live if you can or pic the show up later by clicking here.