BRIEF. Why Obama needs drones US Drone Policy during the Obama Administration FORSVARSAKADEMIETS FORLAG

Size: px
Start display at page:

Download "BRIEF. Why Obama needs drones US Drone Policy during the Obama Administration FORSVARSAKADEMIETS FORLAG"

Transcription

1 BRIEF Why Obama needs drones US Drone Policy during the Obama Administration By Philip Chr. Ulrich, M.A. in American Studies FORSVARSAKADEMIETS FORLAG

2 BRIEF Why Obama needs drones US Drone Policy during the Obama Administration By Philip Chr. Ulrich, M.A. in American Studies

3 The Royal Danish Defence College is the Danish armed forces powerhouse for education, training and research-generated consultancy. Our research is conducted within a broad range of military-related topics. Our research priorities, such as topics and resource allocation are determined by the Commandant of the Royal Danish Defence College, who is aided by a research council. Research at the Royal Danish Defence College should enlighten and challenge the reader, whether they are in the armed forces or in the surrounding environment. This is only achievable if the employees have the freedom to administer their own research projects and draw their own conclusions. This is a principle, which is honoured at the Royal Danish Defence College. We hope you enjoy reading the Royal Danish Defence College s publications! Royal Danish Defence College All rights reserved. Mechanical, photographic or other reproduction or photocopying from this book or parts thereof is only allowed according to agreements between The Danish Defence and CopyDan. Any other use without written consent from the Royal Danish Defence College is illegal according to Danish law on intellectual property right. Excepted are short extracts for reviews in newspapers or the like. Copenhagen June 2013 Royal Danish Defence College Ryvangs Allé 1 DK-2100 Copenhagen Denmark Phone: Fax: Editor: Director of the Institute for Strategy Ole Kværnø Layout by B-O. Kure ISBN: Royal Danish Defence College Publishing House

4 Royal Danish Defence College Introduction On May 23 rd, 2013, President Obama held one of his most signifi cant national security speeches at the National Defense University (NDU) in Washington D.C. The speech has been seen by many as the announcement of the end of the war on terror and the drawing down of the administration s use of drones. However, from May 23 rd until June 9 th, 2013, the United States launched at least 4 drone strikes in Yemen and Pakistan, killing, according to offi cial sources, 26 militants. 1 How does the continued use of drones add up with President Obama s speech at the NDU? The fact is that the war on terror is not over yet, and the continued efforts against terror networks and their affi liates around the Middle East is a sign that drones will continue to play a major role in US security policy. Drones provide a cost-effi cient and effective tool to continue the war, while allowing the administration to disengage and avoid major military operations in the war on terror. The subsequent surveillance scandals that have hit the Obama administration in May and June 2013 further underline the fact that the war on terror is not over, it is just being fought less overtly than in the past. Based on President Obama s speech and his administration s defense budget proposal presented in April 2013, this brief will analyze how there seems to be no major change on the horizon in the US use of drones. The Obama administration needs drones to continue pursuing its foreign policy objectives of continuously asserting US global presence as well as continuing the fi ght against al Qaeda. And as President Obama stated in his speech at the NDU, our actions are effective. [ ] Simply put, these strikes have saved lives. 2 Drones have primarily been used in three ways: - As tactical support for forces on the ground in Iraq and Afghanistan - As a counter-terrorism asset, fl ying missions in Afghanistan, Pakistan, Yemen, and Somalia - As an Intelligence, Surveillance, and Reconnaissance (ISR) asset (1) Bill Roggio: US launches fi rst drone strike in Pakistan in 6 weeks, 29 May rst_dr.php Bill Roggio: US drones kill 8 AQAP fi ghters in Yemen strike, 1 June Bill Roggio: US drones kill 6 in North Waziristan, 7 June Bill Roggio: US drones kill AQAP commander, 5 fi ghters in Northen Yemen, 9 June (2) Remarks by the President at the National Defense University, 23 May ce/2013/05/23/remarks-president-national-defenseuniversity 3

5 The use of drones has enabled the Obama administration to support international operations in Libya and Mali while limiting or even avoiding the commitment of boots on the ground. esides this, drones have been invaluable in allowing the Obama administration to continue the fi ght against al Qaeda, the Taliban, and their affi liates. So the Obama administration has no interest in drawing down on its reliance on drones any time soon. Obama s Leading from Behind Doctrine The US economy is in historically bad shape, and millions of Americans are without jobs. For that reason, a primary objective for the Obama administration has been to focus on domestic nation building, or as it says in the administration s strategic guidance from January 2012, we must put our fi scal house in order here at home and renew our long-term economic strength. 3 At the same time, the Obama administration has two recent wars to take into account before judging the need for US commitment. Since President Obama took offi ce in 2009, his administration has worked intensely on disengaging from Iraq and Afghanistan and on avoiding new, expensive, long-term engagements. The purpose of this has been to focus on domestic nation building in the United States, as well as to put greater focus on the Asia-Pacifi c region, as announced in the strategic guidance of January Because the United States has wide-ranging global interests, it would be impossible for the United States to revert back to a 1930s isolationist foreign policy and solely focus on domestic issues. Therefore, the purpose of the 2012 strategic guidance was to create a strategy that preserves American global leadership, maintains our military superiority 5 while giving the Obama administration breathing space to focus on domestic policy. To that end, the Obama administration took steps to withdraw US forces from Iraq, which resulted in the fi nal US combat forces pulling out of Iraq in December Besides withdrawing forces from Iraq, one of the fi rst major foreign policy decisions of the Obama administration was to add additional forces to Afghanistan in order to facilitate a transition to indigenous Afghan security forces. As the situation in the Middle East evolved with great rapidity during the Arab Spring, the Obama administration was forced to act. However, as part of the pragmatic approach to foreign policy that the Obama administration has displayed since it took offi ce in 2009, the US engagement has been characterized by the phrase leading (3) Department of Defense: Sustaining US Global Leadership: Priorities for 21st Century Defense, (Washington D.C., January 2012), foreword (4) Philip Chr. Ulrich: The US Pivot Towards Asia-Pacifi c: Third Time s the Charm? (Copenhagen, Royal Danish Defence College, February 2013) (5) Ibid: foreword 4

6 Royal Danish Defence College from behind. In Libya the United States assisted with assets not contained in the European Allies arsenals, thus supporting air strikes through the use of Intelligence, Surveillance and Reconnaissance (ISR) assets such as drones. 6 The same approach could be seen as France engaged in military operations in Mali to counter the rising dominance of Islamic militants. For the military operations in Mali, the United States once again contributed with ISR assets to support French air operations. 7 These more limited contributions to international operations are the result of the approach that the Obama administration has consistently been forced to take on foreign policy issues due to domestic circumstances. Domestic policy has thus been the deciding factor in questions of international engagement during the Obama administration. Drones as central asset in war on terror In his speech on May 23rd, President Obama called for an end to the war on terror that the United States has been engaged since However, it was not an announcement declaring an end to the war rather it was an announcement of the beginning of the end: Our systematic effort to dismantle terrorist organizations must continue. But this war must end. That s what history advises. That s what our democracy demands. 8 In sum, the speech was not a declaration of the end of the war on terror, but an attempt to start the process of getting the United States out of the post-9/11 era and into a new chapter of history. The revelations of massive surveillance by the National Security Agency show the more covert way that the war on terror continues. The continued war on terror will be based more on intelligence gathering, which could possibly lead to continued use of drone strikes. This will be the way that the United States can maintain pressure on terrorist organizations while moving away from the constant state of war the country has been in since September 11 th, Since 2009, drones have become a cornerstone of the Obama administration s counter-terrorism policy. In 2009, then-cia director Leon Panetta said that drones were... the only game in town in terms of confronting or trying to disrupt the al Qaeda leadership. 9 This has been the basic idea running through the Obama administration s counter-terrorism policy since (6) Ivo H. Daalder and James G. Stavridis: NATO s Success in Libya : (7) Adam Entous, David Gauthier-Villars and Drew Hinshaw: U.S. Boosts War Role in Africa : (8) Remarks by the President at the National Defense University, 23 May ce/2013/05/23/remarks-president-national-defenseuniversity (9) Micah Zenko: Reforming U.S. Drone Strike Policies (Council on Foreign Relations, Council Special Report No. 65, January 2013), p. 9 5

7 The reliance on drones has gone so far that the budget proposal for fi scal year 2014 states the following: The MQ-1 Predators and MQ-9 Reapers have been, and will continue to be, our counterinsurgency and counter-terrorism workhorses. 10 And they have indeed been workhorses. Since 2008, the United States has conducted approximately 330 drone strikes in Pakistan and 70 in Yemen, compared to 10 and 1 respectively during the period These strikes have been supplemented by strikes against targets in Somalia. The increasing dependence can also be seen in the number of US drones. In September 2001, the United States had 50 drones. By April 2012, the number had risen to 7500 drones. These numbers include drones of all sizes, ranging from drones used by infantry units on the ground in Afghanistan for tactical reconnaissance to large drones such as the Predator, Reaper and Global Hawk systems. 12 Due to the success of the drone policy, it does not seem like the Obama administration is going to change its reliance on drones. In his speech at the National Defense University in Washington D.C. on May 23 rd, 2013, President Obama praised the drone policy: To begin with, our actions are effective. [ ] Dozens of highly skilled al Qaeda commanders, trainers, bomb makers and operatives have been taken off the battlefi eld. Plots have been disrupted that would have targeted international aviation, U.S. transit systems, European cities and our troops in Afghanistan. Simply put, these strikes have saved lives. 13 Overall, the speech was a defense of the Obama administration s drone policy. One point President Obama emphasized was that, when the drone policy is criticized, the critics should weigh the alternative of doing nothing: But as Commander-in-Chief, I must weigh these heartbreaking tragedies [civilian casualties in drone strikes] against the alternatives. To do nothing in the face of terrorist networks would invite far more civilian casualties not just in our cities and our facilities abroad, but also in the very places like Sana a and Kabul and Mogadishu where terrorists seek a foothold. 14 As has already been mentioned, the drone policy also strikes a chord in the foreign policy of the Obama administration. Using drones allows the United States to avoid (10) Department of Defense: Defense Budget Priorities and Choices. Fiscal Year 2014 (Washington D.C., April 2013), p. 30 (11) Bill Roggio and Alexander Mayer: Charting the data for US airstrikes in Pakistan, (updated on 7 June 2013) Bill Roggio and Bob Barry: Charting the data for US air strikes in Yemen, (Updated on 9 June 2013) (12) Micah Zenko: Reforming U.S. Drone Strike Policies (Council on Foreign Relations, Council Special Report No. 65, January 2013), p. 3 (13) Remarks by the President at the National Defense University: ce/2013/05/23/remarks-president-national-defenseuniversity (14) Ibid. 6

8 Royal Danish Defence College engaging boots on the ground while still achieving its anti-terrorism objectives. In order to emphasize his point, President Obama evoked the memories of past failures in order to justify the use of drones: It is false to assert that putting boots on the ground is less likely to result in civilian deaths or less likely to create enemies in the Muslim world. The results would be more U.S. deaths, more Black Hawks down [italics added], more confrontations with local populations, and an inevitable mission creep in support of such raids that could easily escalate into new wars. 15 The mention of Black Hawks down evoked the memory of the failed US engagement in Somalia in the early 1990s, and later in the speech, he evoked the memory of Vietnam as well as the recent memories of Iraq and Afghanistan to further emphasize his point. Because of the risks involved in having boots on the ground, the necessity of continuing the war against al Qaeda, the successes of the drone policy, the international pressure to engage in the Arab Spring, and the recent experiences of the United States in foreign relations, drones have proven to be an important tool for the Obama administration to achieve its foreign policy objectives with minimum risk. Issues with the use of drones Legal issues rather than military ones have been a major problem for the Obama administration s drone policy. Internationally, the United States has been criticized for targeting people without consideration for national sovereignty and for violating humanitarian law. Within the United States, the issues have been focused around the transparency of the decision-making process as well as constitutional issues regarding the targeting of American citizens. Generally speaking, the US public is very supportive of the Obama administration s drone policy. According to a Gallup poll from March 2013, 65% of the US population supported the administration s use of drones to Launch airstrikes in other countries against suspected terrorists. 16 Therefore, the great debate in the United States has focused on the drone policy s lack of transparency. It was not until early 2012 that the Obama administration acknowledged some of the strikes that had been carried out, and it was not until May 2013 that the administration admitted the killing of 4 US citizens, despite the fact that the most prominent of the operations, the targeting of Anwar al-awlaki, took place in President Obama s speech on May 23 rd, 2013 was also meant to counter these criticisms of his administration s drone policy. (15) Ibid. (16) Alyssa Brown and Frank Newport: In U.S., 65% Support Drone Attacks on Terrorists Abroad 7

9 The speech specifi ed that the use of drones is legal according to both international and domestic US law. President Obama said that, because the United States was attacked on September 11 th, 2001 by al Qaeda, the country is in a legitimate war with al Qaeda, the Taliban, and their associate forces. 17 This fact, according to President Obama, legitimizes the use of forces against these actors, no matter where they are found by the United States. Addressing the question of domestic legal issues, President Obama asserted that any US citizen who goes abroad to plot attacks on the United States cannot be protected by their citizenship. The domestic US legal foundation on which the Obama administration bases its policy is the Authorization for the Use of Military Force (AUMF) passed in Congress on September 18 th, 2001 as a response to the terrorist attacks of September 11 th. According to the AUMF, the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons. 18 However, as part of the effort to ensure more transparency, President Obama announced a proposal to repeal the AUMF and to formulate new decision making procedures for conducting drone strikes. This effort can be seen both as a consequence of the massive public criticism of the transparency issue and as an attempt to improve the Obama administration s image, which has been hammered by a number of scandals. The scandals revolve around the terrorist attack on the US consulate in Benghazi on September 11 th, 2012, the targeting of conservative political movements by the Internal Revenue Service (IRS), and the secret surveillance of an Associated Press reporter by the Justice Department. In the face of these scandals combined with the lingering criticism of its drone policy, the Obama administration was in need of improving its image. President Obama s speech on May 23 rd, 2013 should also be seen in this light. Drones in Anti-Access/Area Denial Environments A central part of the 2012 strategic guidance was the development of capabilities to operate in a so-called A2/AD environment. Because of the increasing capabilities of potential adversary states to deny the United States access to strategically important regions, it has become a central issue for the Department of Defense to develop capacities to enable continued operations despite enemy actions. The strategic guidance states the following: Accordingly, the U.S: military will invest as (17) Remarks by the President at the National Defense University: ce/2013/05/23/remarks-president-national-defenseuniversity (18) United States Congress: Public Law (Washington D.C., 107 th Congress, 18 September 2001), section 2a 8

10 Royal Danish Defence College required to ensure its ability to operate effectively in anti-access and area denial (A2/AD) environments. 19 The purpose of operating despite enemy A2/AD capacities is explained in the Department of Defense s Joint Operational Access Concept: Projecting U.S. military force invariably requires extensive use of international waters, international airspace, non-sovereign cyberspace, space, and the electromagnetic spectrum. U.S. access to and freedom of navigation within these global commons are vital to its international interests, both because the American way of life requires free access to the global marketplace and as a means for projecting military force into hostile territory. 20 Drones represent a key aspect of the strategic and doctrinal thinking of the US military. For the purpose of operating in an A2/AD environment, drones are ideal. On May 13 th, 2013, the US Navy carried out the fi rst ever launch of a drone from an aircraft carrier, the USS George H. W. Bush. The Northrop Grumman X-47B, or any other similar system, can provide an increased action radius for US aircraft carriers, thus better enabling them to operate in an A2/AD environment. The new X-47B drone has an unrefueled combat radius of nearly 3000 km, which is twice that of an F-35 Joint Strike Fighter. This range can be doubled by air refueling, which also means that the X-47B can stay in the air for anywhere between 50 and 100 hours. Its internal payload capacity is equivalent to that of the F-35 Joint Strike Fighter. 21 All these features, combined with a stealth design, make the X-47 B and equivalent systems ideal for achieving the goal set by the Joint Operational Access Concept, which is to allow US forces to achieve operational access in the face of armed opposition by a variety of potential enemies and under a variety of conditions, as part of a broader national approach. 22 The Department of Defense s appreciation of the potential of these drone systems can also be seen in the budget proposal for fi scal year 2014, which was presented by the Department of Defense in April Part of the proposal requests funds for the further development of sea-based drone capacities, which would amount to $427 million, as part of an overall $2.5 billion program to invest in such airborne (19) Department of Defense: Sustaining U.S. Global Leadership: Priorities for 21 st Century Defense, (Washington D.C., January 2012), pp. 4-5 (20) Department of Defense: Joint Operational Access Concept (Washington D.C., January 2012), p. 5 (21) Thomas P. Ehrhard and Robert O. Work: The Unmanned Combat Air System Carrier Demonstration Program: A New Dawn For Naval Aviation? (Washington D.C., Center for Strategic and Budgetary Assessments, May 2007), p. 32 (22) Department of Defense: Joint Operational Access Concept (JOAC) (Washington D.C., 17 January 2012), p. 1 9

11 ISR capacities. 23 The goal for the Department of Defense is to enhance mission effectiveness, improve operational speed and effi ciency, and affordably close warfi ghting gaps. 24 The plan is to fl y drones from US aircraft carriers in Drones will remain central The use of drones has worked well for the Obama administration -- both the use of armed and unarmed ISR drones for international missions in Libya and Mali as well as the use of drones for targeting al Qaeda, Taliban and affi liate organizations. Although many viewed it as an announcement of the end of the war on terror, President Obama s speech on May 23 rd, 2013 was meant as a defense of the drone policy and a justifi cation for the continued use of drones in counter-terrorism operations. The successes that the programs have achieved are remarkable, leading to a diminished threat from al Qaeda and affi liate organizations against the United States mainland. The Obama administration s foreign policy since 2009 has been focused on disengaging from the Middle East, rebalancing (or pivoting) to the Asia-Pacifi c region, and focusing on domestic nation building in the United States. The use of drones has allowed the Obama administration to pursue such a policy while still engaging to secure US interests. The economic and political conditions in the United States will not change any time soon to a point where a more active US foreign policy can return, and even then, the primary focus will still be on countering Chinese infl uence in the Asia-Pacifi c region. Drones will therefore continue to be a primary counterterrorism asset for the Obama administration, as well as an asset with which the United States can contribute to international operations, thus contributing capacities the European Allies lack. At the same time, drones have great potential in relation to the increasing focus and development of capacities that will enable the United States to operate in an A2/ AD environment. This priority is emphasized in both the 2012 strategic guidance as well as the Joint Operational Access Concept, and subsequently in the budget proposal for fi scal year (23) Secretary of Defense Chuck Hagel s Submitted Statement to the House Armed Services Committee on the FY 2014 Budget Request for the Department of Defense, Thursday, 11 April 2013: 4c19-818f-0aeaffda938a&ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&Group_ id=64562e79-731a-4ac6-aab0-7bd8d1b7e890&monthdisplay=4&yeardisplay=2013 (24) Department of Defense: Unmanned Systems Integrated Roadmap. FY , (Washington D.C.), p. 5 (25) David Axe: The case for sea-based drones 10

12 Royal Danish Defence College All these factors indicate that drones will continue to be a central part of US defense policy, both in a counter-terrorism capacity and in future force developments for counter A2/AD operations. 11

Drone Warfare: effective or counter-productive?

Drone Warfare: effective or counter-productive? Drone Warfare: effective or counter-productive? Stefan Wolff, University of Birmingham While there can be no doubt that the national and international legal regulation of the deployment of Unmanned Aerial

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

Assessment of the terror threat to Denmark

Assessment of the terror threat to Denmark 28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks

More information

Revista Relaciones Internacionales Nº 39 (Segmento Digital) Instituto de Relaciones Internacionales (IRI) Segundo semestre de 2010

Revista Relaciones Internacionales Nº 39 (Segmento Digital) Instituto de Relaciones Internacionales (IRI) Segundo semestre de 2010 NATO Declaration by the Heads of State and Government of the Nations contributing to the UN-mandated, NATO-led International Security Assistance Force (ISAF) in Afghanistan Introduction We, the nations

More information

INTERVIEW WITH ANDERS FOGH RASMUSSEN *

INTERVIEW WITH ANDERS FOGH RASMUSSEN * INTERVIEW WITH ANDERS FOGH RASMUSSEN * In this exclusive interview with TPQ, the Honorable Secretary General provides an overview of the major developments of the past two years in Turkey s neighborhood,

More information

Re: Reported Increase in Civilian Casualties Resulting from U.S Operations in Afghanistan

Re: Reported Increase in Civilian Casualties Resulting from U.S Operations in Afghanistan April 19, 2016 General John W. Nicholson Commander, Operation Resolute Support 7115 South Boundary Boulevard MacDill AFB, FL 33621-5101 Re: Reported Increase in Civilian Casualties Resulting from U.S Operations

More information

How To Get A Law Passed In The United States

How To Get A Law Passed In The United States HARVARD MODEL CONGRESS SAN FRANCISCO 2015 BRIEFING SUMMARIES A Memo for Members of the Presidential Cabinet RECENT UPDATES CIA - Cyber Hacking The CIA is concerned about cyberhacking because it has the

More information

Assessment of the Terror Threat to Denmark

Assessment of the Terror Threat to Denmark 19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals

More information

CITIZEN ADVOCACY CENTER

CITIZEN ADVOCACY CENTER CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Todd M. Rosenblum. Defining Homeland Security Intelligence

Todd M. Rosenblum. Defining Homeland Security Intelligence Prepared Remarks Todd M. Rosenblum Deputy Under Secretary of Intelligence Department of Homeland Security Defining Homeland Security Intelligence Washington Institute for Near East Policy June 4, 2010

More information

Lesley Gill American University

Lesley Gill American University Vol. 4, No. 3, Spring 2007, 209-213 www.ncsu.edu/project/acontracorriente Review/Reseña Alfred W. McCoy A Question of Torture: CIA Interrogation From the Cold War to the War on Terror. NY: Metropolitan

More information

Examples of International terrorist attacks since 9/11

Examples of International terrorist attacks since 9/11 PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist

More information

ON OBAMA S WARS IN AFGHANISTAN AND PAKISTAN. by Tom Hayden February 6, 2009

ON OBAMA S WARS IN AFGHANISTAN AND PAKISTAN. by Tom Hayden February 6, 2009 ON OBAMA S WARS IN AFGHANISTAN AND PAKISTAN by Tom Hayden February 6, 2009 It is time to rethink Afghanistan and Pakistan. Otherwise the new Obama administration will be led into a yawning quagmire. It

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision

National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision National Responses to Transnational Terrorism: Intelligence and Counterterrorism Provision Thomas Jensen October 10, 2013 Abstract Intelligence about transnational terrorism is generally gathered by national

More information

Promotion and protection of human rights and fundamental freedoms while countering terrorism

Promotion and protection of human rights and fundamental freedoms while countering terrorism United Nations A/68/389 General Assembly Distr.: General 18 September 2013 Original: English Sixty-eighth session Item 69 (b) of the provisional agenda* Promotion and protection of human rights: human

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

AFGHANISTAN: FRANCE IS ALSO IN THE SOUTH

AFGHANISTAN: FRANCE IS ALSO IN THE SOUTH FRENCH EMBASSY IN CANADA? Ottawa, June 2008 AFGHANISTAN: FRANCE IS ALSO IN THE SOUTH "France will maintain its forces in Afghanistan. Our country wishes to adapt the role of its forces to make them more

More information

IAI/Malat Solutions for the Maritime Arena

IAI/Malat Solutions for the Maritime Arena IAI/Malat Solutions for the Maritime Arena Any country with a proximity to the sea has an important operational need to positively and unambiguously identify, in time, threats that originate in the maritime

More information

Ohio Families First:

Ohio Families First: OHIO HEART AND SOUL www.tedstrickland.com Ohio Families First: Defeating Terrorism & Keeping Americans Safe On 9/11, our country was attacked on our home soil, and none of us who lived through that day

More information

Key Concepts Chart (The United States after the Cold War)

Key Concepts Chart (The United States after the Cold War) Unit 10, Activity 1, Key Concepts Chart Key Concepts Chart (The United States after the Cold War) Key Concept +? - Explanation Extra Information NAFTA Presidents George H.W. Bush and Bill Clinton both

More information

SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY. " 166c. Geographic combatant commander's authority to transfer excess defense articles

SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY.  166c. Geographic combatant commander's authority to transfer excess defense articles SEC.. GRANTS OF NON-LETHAL EXCESS DEFENSE ARTICLES BY GEOGRAPHIC COMBATANT COMMANDERS. 1 7 8 9 10 11 1 1 1 1 1 17 18 19 0 1 (a) IN GENERAL. Chapter of title 10, United States Code, is amended by inserting

More information

INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500

INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 MEMORANDUM FOR DISTRIBUTION SUBJECT: Government Accountability Office (GAO) Weekly Activity Rep01i Attached

More information

"The European Union's Security Architecture and its role to strengthen Peace and Security"

The European Union's Security Architecture and its role to strengthen Peace and Security Chairman EU Military Committee General Patrick de Rousiers at the 29 th Asia Pacific Round Table in Kuala Lumpur 02 June 2015 "The European Union's Security Architecture and its role to strengthen Peace

More information

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

FUNDING FOR DEFENSE, HOMELAND SECURITY AND COMBATING TERRORISM SINCE 9-11: WHERE HAS ALL THE MONEY GONE?

FUNDING FOR DEFENSE, HOMELAND SECURITY AND COMBATING TERRORISM SINCE 9-11: WHERE HAS ALL THE MONEY GONE? FUNDING FOR DEFENSE, HOMELAND SECURITY AND COMBATING TERRORISM SINCE 9-11: WHERE HAS ALL THE MONEY GONE? By Steven M. Kosiak The tragic events of September 11, 2001 have had a significant impact on federal

More information

Integration of Financial Investigation into Counter Terrorism Strategy

Integration of Financial Investigation into Counter Terrorism Strategy Integration of Financial Investigation into Counter Terrorism Strategy Arabinda Acharya and Gunawan Husin* The 10 August 2006 foiled bombing plot in the UK once again reinforces the importance of financial

More information

Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership

Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership Joint Statement of the Security Consultative Committee Toward a Deeper and Broader U.S.-Japan Alliance: Building on 50 Years of Partnership June 21, 2011 by Secretary of State Clinton Secretary of Defense

More information

Foreign Affairs and National Security

Foreign Affairs and National Security Foreign Affairs and National Security Objectives: TLW understand and explain the following questions as it relates to the Foreign affairs of the American Government What is foreign policy? What is the

More information

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland

More information

Military Aid, Direct Intervention and Counterterrorism

Military Aid, Direct Intervention and Counterterrorism University of Kent School of Economics Discussion Papers Military Aid, Direct Intervention and Counterterrorism María D.C. García-Alonso, Paul Levine and Ron Smith January 2015 KDPE 1501 Military Aid,

More information

Danish lessons learned: The comprehensive/integrated approach after Iraq and Afghanistan

Danish lessons learned: The comprehensive/integrated approach after Iraq and Afghanistan Military Studies Magazine Danish lessons learned: The comprehensive/integrated approach after Iraq and Afghanistan by Peter Viggo Jakobsen Photo: Forsvaret ISSUE 01, VOLUME 02, 2014 1 Subcribe at fak.dk/eng/magazine

More information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

Name. September 11, 2001: A Turning Point

Name. September 11, 2001: A Turning Point Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point

More information

The Progress and Failure of the Women s Liberation Movement in Afghanistan:

The Progress and Failure of the Women s Liberation Movement in Afghanistan: 1 Philip Stubbs The Progress and Failure of the Women s Liberation Movement in Afghanistan: A Global Mission of Challenging and Rethinking Ideas about Freedom, Democracy, and Justice in a Post-9/11 World

More information

USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties?

USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties? USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties? Historical Thinking Skills Assessed: Sourcing, Critical Reading, Corroboration Author/School/System: Matt Hipszer, Howard County

More information

The Implication of TMD System in Japan to China s Security

The Implication of TMD System in Japan to China s Security The Sixth ISODARCO Beijing Seminar on Arms Control October 29-Novermber 1, 1998 Shanghai, China The Implication of TMD System in Japan to China s Security Institute of World Economics & Politics Chinese

More information

UNITED STATES OF AMERICA TARGETED KILLING POLICIES VIOLATE THE RIGHT TO LIFE

UNITED STATES OF AMERICA TARGETED KILLING POLICIES VIOLATE THE RIGHT TO LIFE UNITED STATES OF AMERICA TARGETED KILLING POLICIES VIOLATE THE RIGHT TO LIFE Amnesty International Publications First published in June 2012 by Amnesty International Publications International Secretariat

More information

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have

More information

Active Engagement, Modern Defence

Active Engagement, Modern Defence Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation Adopted by Heads of State and Government in Lisbon Active Engagement, Modern Defence Preface We,

More information

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013 GCC Homeland Security in a New Order Dr. Theodore Karasik Director of Research and Consultancy INEGMA September 2013 Secular Sectarian Tribal State Actors Regional Shifts and Threats in the New Order A

More information

The Al-Qaida Papers - Drones This document is one of several found by The Associated Press in buildings recently occupied by al-qaida fighters in

The Al-Qaida Papers - Drones This document is one of several found by The Associated Press in buildings recently occupied by al-qaida fighters in The Al-Qaida Papers - Drones This document is one of several found by The Associated Press in buildings recently occupied by al-qaida fighters in Timbuktu, Mali. Below are the original in Arabic and a

More information

Team of Training Center Patriot

Team of Training Center Patriot Team of Training Center Patriot Patriot Training center is a team of military professionals who are instructors from the USA, Israel, Georgia and Ukraine. Combat experience of the team members: Deployments

More information

The National Counterintelligence Strategy of the United States

The National Counterintelligence Strategy of the United States The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence

More information

Does NATO s Article V Genuinely Protect Its Members?

Does NATO s Article V Genuinely Protect Its Members? Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful

More information

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013 AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This

More information

Security Council. United Nations S/2008/434

Security Council. United Nations S/2008/434 United Nations S/2008/434 Security Council Distr.: General 3 July 2008 Original: English Special report of the Secretary-General pursuant to Security Council resolution 1806 (2008) on the United Nations

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

O.K. PARTY DEBT/SPENDING

O.K. PARTY DEBT/SPENDING DEBT/SPENDING General Overview: The national debt has totaled over 15 trillion dollars and counting. Something needs to be done to put a stop to our nation s outrageous spending. I believe that if we put

More information

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS 1 DIPLOMATIC SECURITY PROTECTS The Bureau of Diplomatic Security is the security and law enforcement arm of

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

The Future of Drone Strikes: A Framework for Analyzing Policy Options

The Future of Drone Strikes: A Framework for Analyzing Policy Options The Future of Drone Strikes: A Framework for Analyzing Policy Options Diane M. Vavrichek Cleared for Public Release COP-2014-U-008318/Final September 2014 Photo credit line: "A British MQ-9 Reaper sits

More information

OFFICE OF THE UNDER SECRETARY OF DEFENSE (COMPTROLLER)/ CHIEF FINANCIAL OFFICER UNITED STATES DEPARTMENT OF DEFENSE FISCAL YEAR 2015 BUDGET REQUEST

OFFICE OF THE UNDER SECRETARY OF DEFENSE (COMPTROLLER)/ CHIEF FINANCIAL OFFICER UNITED STATES DEPARTMENT OF DEFENSE FISCAL YEAR 2015 BUDGET REQUEST OFFICE OF THE UNDER SECRETARY OF DEFENSE (COMPTROLLER)/ CHIEF FINANCIAL OFFICER UNITED STATES DEPARTMENT OF DEFENSE FISCAL YEAR 2015 BUDGET REQUEST OVERVIEW MARCH 2014 This Page Left Blank Intentionally

More information

capabilities Emerging Trends and Key Priorities

capabilities Emerging Trends and Key Priorities Future capabilities Emerging Trends and Key Priorities Emerging trends and key priorities Increased insecurity on Europe s borders combined with continued constraint on military budgets at home has refocused

More information

Position Statement on the National Aeronautics and Space Administration (NASA) FY 2014 Budget Request submitted by the

Position Statement on the National Aeronautics and Space Administration (NASA) FY 2014 Budget Request submitted by the Government Relations 1828 L Street NW, Suite 810 Washington, DC tel 1.202.785.3756 fax 1.202.429.9417 www.asme.org 20036-5104 U.S.A. Position Statement on the National Aeronautics and Space Administration

More information

DEPARTMENT OF DEFENSE

DEPARTMENT OF DEFENSE DEPARTMENT OF DEFENSE The Department of Defense (DoD) provides military forces and capabilities to project power in order to protect the security of the United States and its interests around the world

More information

ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye

ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye Director, ISS Regional Office for West Africa dbarakamfitiye@issafrica.org 0 www.issafrica.org OUTLINE Historical Overview

More information

Statement of John Sammon. Assistant Administrator for. Transportation Sector Network Management. Transportation Security Administration

Statement of John Sammon. Assistant Administrator for. Transportation Sector Network Management. Transportation Security Administration Statement of John Sammon Assistant Administrator for Transportation Sector Network Management Transportation Security Administration U.S. Department of Homeland Security Before the United States House

More information

TITLE and AFFILIATION: EXECUTIVE VICE PRESIDENT, TURKISH HERITAGE ORGANIZATION (THO)

TITLE and AFFILIATION: EXECUTIVE VICE PRESIDENT, TURKISH HERITAGE ORGANIZATION (THO) NAME: ALI CINAR TITLE and AFFILIATION: EXECUTIVE VICE PRESIDENT, TURKISH HERITAGE ORGANIZATION (THO) COMMITTEE: HOUSE COMMITTEE ON FOREIGN AFFAIRS, SUBCOMMITTEE ON EUROPE, EURASIA AND EMERGING THREATS

More information

The role of special operations in the combating terrorism

The role of special operations in the combating terrorism AARMS Vol. 7, No. 1 (2008) 47 53 SECURITY The role of special operations in the combating terrorism CSABA KOVÁCS Miklós Zrínyi National Defence University, Budapest, Hungary The Special Operations Forces

More information

WORLDWIDE SECURITY PROTECTION

WORLDWIDE SECURITY PROTECTION Worldwide Security Protection Resource Summary ($ in thousands) Appropriations FY 2008 Actual FY 2009 Estimate FY 2010 Request Increase / Decrease Positions 1,458 1,558 1,898 340 Funds 1,178,938 1,313,383

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

A COMPARATIVE ASSESSMENT OF SAUDI ARABIA

A COMPARATIVE ASSESSMENT OF SAUDI ARABIA A COMPARATIVE ASSESSMENT OF SAUDI ARABIA WITH OTHER COUNTRIES OF THE ISLAMIC WORLD Targeting Terrorist Finances Project * Watson Institute for International Studies Brown University June 2004 During the

More information

Top Level Messages February 2015

Top Level Messages February 2015 Top Level Messages February 2015 With an annual budget of 34 billion, Defence protects the security and interests of the UK at home and abroad. Having taken difficult decisions to balance the budget, Defence

More information

21st Century Conflict: From Revolution in Military Affairs (RMA) to a Revolution in Civil-Military Affairs (RCMA)

21st Century Conflict: From Revolution in Military Affairs (RMA) to a Revolution in Civil-Military Affairs (RCMA) Revised September 21, 2015 21st Century Conflict: From Revolution in Military Affairs (RMA) to a Revolution in Civil-Military Affairs (RCMA) Anthony H. Cordesman The U.S. and its allies need to take a

More information

The United States Has No Authority to Continue to Detain Citizens of Afghanistan at Guantanamo Bay

The United States Has No Authority to Continue to Detain Citizens of Afghanistan at Guantanamo Bay March 30, 2015 VIA FEDEX Barack H. Obama General Martin E. Dempsey President of the United States Chairman, Joint Chiefs of Staff The White House 9999 Joint Staff Pentagon 1600 Pennsylvania Avenue Washington,

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Defense Budget Programs That Provide Assistance To Foreign Countries

Defense Budget Programs That Provide Assistance To Foreign Countries Defense Budget Programs That Provide Assistance To Foreign Countries 1. Accounting for Missing United States Government Personnel First legislated in 2008. $1,000,000 Section 408 of Title 10, U.S. Code

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

The Defence Strategy of the Slovak Republic

The Defence Strategy of the Slovak Republic The Defence Strategy of the Slovak Republic approved by the National Council of the Slovak Republic 23 September 2005 TABLE OF CONTENTS Introduction I II III IV V Slovak Republic in the Changing Security

More information

Resources projected in the previous development plan and the reality

Resources projected in the previous development plan and the reality NATIONAL DEFENCE DEVELOPMENT PLAN 2013-2022 Resources projected in the previous development plan and the reality 1. The previous 10-year development plan approved in 2009 (Military Defence Development

More information

Statement of James Costos. Ambassador Designate to Spain. Senate Foreign Relations Committee. July 25, 2013

Statement of James Costos. Ambassador Designate to Spain. Senate Foreign Relations Committee. July 25, 2013 Statement of James Costos Ambassador Designate to Spain Senate Foreign Relations Committee July 25, 2013 Chairman Murphy, Ranking Member Johnson, Members of the Committee, Thank you for the opportunity

More information

The Iraq Study Group Report

The Iraq Study Group Report The Iraq Study Group Report James A. Baker, III, and Lee H. Hamilton, Co-Chairs Lawrence S. Eagleburger, Vernon E. Jordan, Jr., Edwin Meese III, Sandra Day O Connor, Leon E. Panetta, William J. Perry,

More information

peace, Security and Development in BRICS

peace, Security and Development in BRICS BRICS ACADEMIC FORUM 2014: THE ELEPHANT IN THE ROOM: PEACE AND SECURITY IN THE BRICS PARTNERSHIP TOWARDS THE 6 TH BRICS SUMMIT Dr Candice Moore Senior Researcher (ACCORD) and Research Associate (UJ, Faculty

More information

Interoperability for joint operations

Interoperability for joint operations Interoperability for joint operations July 2006 Interoperability for joint operations An Alliance of 26 nations can only effectively work together in joint operations if provisions are in place to ensure

More information

Visit our website for other free publication downloads http://www.strategicstudiesinstitute.army.mil/ To rate this publication click here.

Visit our website for other free publication downloads http://www.strategicstudiesinstitute.army.mil/ To rate this publication click here. Visit our website for other free publication downloads http://www.strategicstudiesinstitute.army.mil/ To rate this publication click here. The United States Army War College The United States Army War

More information

The threats which were perceivable 20 years ago differ greatly from our ever increasing

The threats which were perceivable 20 years ago differ greatly from our ever increasing 1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different

More information

Military Chemical Security in Russia s National Security System

Military Chemical Security in Russia s National Security System Military Chemical Security in Russia s National Security System 1 Military Chemical Security in Russia s National Security System Col. V.B. ANTIPOV (Res.), Doctor of Technical Sciences Col. S.V. NOVICHKOV

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

U.S. Voting Rights Timeline

U.S. Voting Rights Timeline 1776 Only people who own land can vote Declaration of Independence signed. Right to vote during the Colonial and Revolutionary periods is restricted to property owners most of whom are white male Protestants

More information

Introduction The United States has played a leading role in transforming the international system over the past sixty-five years. Working with like-minded nations, the United States has created a safer,

More information

AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism

AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism AMBASSADOR TINA KAIDANOW Coordinator for Counterterrorism Expanding Counterterrorism Partnerships: U.S. Efforts to Tackle the Evolving Terrorist Threat Washington Institute for Near East Policy 1828 L

More information

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS ARF WORKSHOP 21-22 JUNE 2005 ULAANBAATAR, MONGOLIA BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS Overall, Brunei Darussalam security assessment remains peaceful and stable. However, the range of

More information

FACT SHEET. General Information about the Defense Contract Management Agency

FACT SHEET. General Information about the Defense Contract Management Agency FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory

More information

AS PREPARED EMBARGOED UNTIL DELIVERY

AS PREPARED EMBARGOED UNTIL DELIVERY SECRETARY OF DEFENSE LEON E. PANETTA DEFENDING THE NATION FROM CYBER ATTACK BUSINESS EXECUTIVES FOR NATIONAL SECURITY NEW YORK, NY THURSDAY, OCTOBER 11, 2012 Let me begin by extending my deepest gratitude

More information

WikiLeaks Document Release

WikiLeaks Document Release WikiLeaks Document Release February 2, 2009 Congressional Research Service Report RS20506 International Military Education and Training Program Richard F. Grimmett, Foreign Affairs, Defense, and Trade

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Offensive capabilities

Offensive capabilities Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and

More information

New York: Center of the World Teacher s Guide

New York: Center of the World Teacher s Guide Page 1 The Center of the World offers insights into American history topics including the post-world War II economic order, city planning in the era of urban renewal, and globalization and its consequences.

More information