Analysis / Strategy

By Other Means – Part I: Campaigning in the Gray Zone

With the significant costs of engaging the U.S. in combat and a growing range of non-military tools at their disposal, rivals threaten U.S. interests by operating in the “gray zone.” The U.S must employ a broad spectrum of tools and concepts to deter and compete in the gray zone.

Analysis / Acquisition, Budget, Forces, Strategy

What to Look for in the FY 2020 Defense Budget Request

Expectations have been building for the FY 2020 defense budget request, a budget that acting secretary of defense Shanahan has called the “masterpiece.” As the Office of Management and Budget (OMB) works on finalizing the request, experts from the CSIS International Security Program outline what to look for in the FY 2020 defense budget.

Opinion / Acquisition, Budget, Forces, Reform, Strategy

No Good, Very Bad Ideas in National Security

Bad ideas. How much trouble do they cause in national security? How do they disrupt or hinder the protection and advancement of American interests? Listen to the War on the Rocks podcast featuring authors from the Defense360 “Bad Ideas in National Security” series.  

Opinion / Strategy

Bad Idea: Permanent Alliances

In Washington, military alliances have become an end in themselves rather than a means to security; an icon for worship, instead of a policy with costs and benefits worth weighing. Permanent defense guarantees inflate U.S. military costs, makes rich states into enfeebled dependents, and heightens the danger of getting pulled into needless wars. It should be obvious that U.S. alliances should serve U.S. security interests. But if alliances are permanent, U.S. security interests serve them.

Opinion / Forces, Strategy

Bad Idea: Creating a U.S. Department of Cybersecurity

We recognize that the magnitude of the threats posed by malicious cyber activity leads people to look for a big, bold, visible sign of change. Creating a U.S. Department of Cybersecurity is not the answer. We cannot stovepipe thinking about cybersecurity into one centralized place or approach. The threat is so pervasive and so severe that it requires a recognition that a change in thinking is necessary for everyone operating an enterprise.

1 2 3 8