Policy Papers

Clarifying the Planetary Defense Mission

June 15, 2021 Peter Garretson Defense Technology Program Brief

Since 2005, Congress has recognized that an asteroid impact represents a serious threat to national security. Though Congress tasked NASA to survey hazardous asteroids larger than 140m by 2020, sixteen years later it remains incomplete.

Xinjiang and the Genocide Question

January 15, 2021 David Knapp Indo-Pacific Security Program Memorandum

Measured by the standards outlined in Article II of the Genocide Convention, it becomes clear that Chinese authorities are, at a minimum, guilty of three separate acts of genocide in Xinjiang.

Primary Jurisdiction of Humanitarian Concern: A New Tool to Blunt China’s Campaign in Xinjiang

September 25, 2020 American Foreign Policy Council

Understanding the logic of China’s atrocities in Xinjiang is impossible apart from accounting for the One Belt, One Road (OBOR) initiative. The Chinese Communist Party (CCP) needs Xinjiang to function as a critical OBOR hub, and is cracking down on Uyghurs and other minority groups to establish total control over the territory. U.S. policymakers should exploit this logic and consider sanctioning commerce passing through Xinjiang.

Iran Strategy Brief No. 13: Reforming U.S. Persian Language Media - A preliminary Assessment

April 22, 2019 Ilan I. Berman

In the Spring of 2017, the management of the Broadcasting Board of Governors (BBG), the U.S. government’s official coordinating body for international media, approached the American Foreign Policy Council with a request. In response to persistent criticism from lawmakers on Capitol Hill, as well as mounting pressure from the newly-inaugurated Trump administration, the agency sought to commission an independent review of the content of its Persian-language media outreach. Such a process, BBG professionals explained, would help the agency to identify and rectify significant deficiencies at a time when the role of U.S. broadcasting toward the Islamic Republic was a topic of growing scrutiny (and skepticism) among those formulating the country’s strategy toward Iran...

Cyber Threats in the Space Domain

March 30, 2016 Jennifer McArdle

The ability to access and exploit space has long been woven into the fabric of American national power. It is a critical component of global political leadership, the economy, and military power. Unfortunately, those pillars are increasingly at risk. The spread of space technology to new international actors and the increasing sophistication of those capabilities have made it possible to threaten American space systems directly. The national security community is accustomed to analyzing these threats and vulnerabilities and is pursuing a reasonable mix of policies and programs to address them. (Whether those actions are sufficient is subject to debate). However, over the last decade space and cyberspace have grown increasingly integrated. This opens up new vulnerabilities in American space systems, and gives a greater number of actors the potential to exploit those vulnerabilities...

Understanding Cybersecurity - Part 5 | Military Cyber Operations

November 9, 2015 Richard M. Harrison

What is the role of cybersecurity in the conduct of war and ongoing security operations? Policymakers, academics, and journalists often think of cybersecurity as a single domain problem. That is to say, they view cyber operations as taking place solely within its own domain—one that is separate from land, sea, air or space. This perspective, however, overlooks the fact that computer systems and networks pervade society and the physical environment, and are present to some degree in all physical environs and across the three levels of war (strategic, operational, and tactical). Modern militaries employ forces in a “joint” manner, combining the specific platforms and technologies of different services to achieve a more effective force. National security policymakers should similarly see both kinetic and cyber capabilities as part of a broad set of tools available to achieve their objectives. Thinking of cybersecurity as a limited or separate space, wholly distinct from the other domains of conflict, limits the potential for understanding its strategic utility...