Wasted Space:
How and Why the U.S. Must Prepare
to Fight a Clean War in Space
Howard Kleinberg
http://www.abc.net.au/
Who is the Prey?: The Challenges of the Predator Drone Program and High-Val-
ue Targeting
Sarah Catanzaro
Too Much Information: Europe’s Successful Security Regime and its Elusive
European Rapid Reaction Force
Alexander Justice Moore
Executive Director
David E. A. Johnson
Board of Directors
Sharon Brown
April Foley
Lester S. Hyman
Sergey Kanareykin
Sue Kelly
Jerrold Post
Ammar Qusaibaty
Senior Fellows
Shlomo Argamon
Drew Bewick
John Callery
Robert M. Cassidy
James E. Davidson
Gideon Frieder Defense Concepts is published by the Center for
Norman D. Geddes Advanced Defense Studies (CADS), a global se-
Mathieu Guidère
Robert Lawrence
curity think tank headquartered in Washington,
Michael Litzelman DC. As a non-profit, non-governmental organiza-
Chris Mason tion, CADS empowers experts from government,
Anthony Shaffer military, academia and the private sector who are
committed to solving the security problems of
Fellows
Mishkat Al-Moumin today and examining the defense issues of tomor-
Sviatoslav Braynov row.
David Brown
Martin Dudziak
Edward Ghafari
Douglas M Hosmer
Chris Kammerman
James O'Neill
Steve Orrin
Stefan E. Schmidt
J. Michael Waller
Staff
Sarah Catanzaro
Elise Hogan
Daniel Lawner
Farley Mesko
Benjamin E. Power
Lindsay Vacek
Defense Concepts
Published by CADS Press
Editor in Chief
Newton Howard
Editorial Board
Sarah Catanzaro, Elise Hogan, David E.A. Johnson, Lindsay Vacek
Compiled by
Fellows, Researchers and Staff
Designed by
Sarah Catanzaro
The Center for Advanced Defense Studies does not adopt specific policy positions; opinions
expressed in Defense Concepts are solely those of the authors and do not necessarily reflect
the opinions of the Center for Advanced Defense Studies, its fellows, researchers or staff.
Copyright © 2010 by Center for Advanced Defense Studies. All rights reserved.
Table of Contents
COVER STORY
Wasted Space:
How and Why the U.S. Must Prepare to Fight a Clean War in Space
by Howard Kleinberg
COMMENTARY
The Golden Gun: Economic Warfare in the 21st Century by Andrew Baer
FEATURES
Who is the Prey: The Challenges of the Predator Drone Program and High-
Value Targeting by Sarah Catanzaro
Too Much Information: Europe’s Successful Security Regime and its Elusive
European Rapid Reaction Force by Alexander Justice Moore
Taking the Offensive: The Utility and Limitations of Raiding by Adam Elkus
A Message from the Executive Director
People Centric Security
In our last message, we described the path towards a Comprehensive
Approach to security. This multi-disciplinary path bypassed the the obstacles
of persistent conflict through a more effective and efficient use of govern-
ment, international, enterprise and non-governmental organization assets to
provide more complete protection. The security and defense sector is reexam-
ining traditional roles in light of the challenges posed by continuous spectrum
of threats associated with persistent conflict. Our biggest challenges now
relate to the episodes where the military cannot be the principal steward.
Metrics for success for these phases are elusive, because the perception of
security of the target population and the global audience ultimately deter-
mines if a program or approach will be successful.
Experts, pundits, and practitioners of all sorts recognize the need to
enable cooperation, coordination, collaboration, and communication to em-
power both military and non-military partners. Too often, the search is for a
silver bullet - a new organization, information sharing software, or cool gear
- instead of a more complete understanding. At its root, cooperation, coordina-
tion, collaboration, and communication involve the interaction of people in a
physical space to achieve a higher cognitive capacity. Decisions in this
environment are not about data, they are about harmonizing how different
groups of people use the same data.
CADS has recently expanded its strategic and media footprint through a
new positioning and visibility strategy. The Center expanded its roster of
partners by welcoming Ambassador April Foley to our Board of Directors.
The Global Security Monitor highlighted unprecedented challenges in India,
Kyrgyzstan, and Lebanon before they became popular topics of discussion.
Our Understanding Clandestine Organizations Program (UCOP) has gener-
ated interest in adversary behavioral studies among government clients.
CADS sponsored both a Common Defense West conference in San Diego,
CA and an International Law Enforcement Conference on Post Traumatic
Stress Disorder in Palm Beach, FL. And this is only a short list that does not
include many other flourishing initiatives.
To ensure these programs and advances in interagency coordination and
interdisciplinary research continue to lead us towards a “people centric”
security, the Center relies upon public donations and grants. Please help us to
make Innovation for Peace a reality by donating at www.c4ads.org.
Wasted Space: How and Why the U.S. Must Prepare for a Clean War in
Space
Howard Kleinberg
The challenge of space debris generated by active defenses is oftentimes
misunderstood and overstated. More importantly, the concerns regarding
space debris are far less ominous than threats to the very survival of the U.S.
as a nation. Because space is a pivotal arena for the U.S., we may to have to
defend it by force. With judicious design and utilization of future space-based
assets and weapons, U.S. space-based assets can be protected against ASATs
with a minimum of space debris generation.
Who is the Prey?: The Challenges of the Predator Drones Program and
High-Value Targeting
Sarah Catanzaro
In a volatile and perilous global setting, human capital is a terrorist
organization’s most valuable asset, differentiating terrorist groups that sur-
vive from those that struggle. Terrorist groups rely on important decision-
makers who establish policies and organizational structure, allocate resources,
and communicate strategic vision. When executed properly, a high-value
targeting approach can generate strategic effects; however, an assessment of
the relative utility of this program requires a discriminating look at purposes,
targets, and circumstances.
COMMENTARY
http://twitter.com/qhsrdialogue
The DHS leveraged social networks such as Facebook and Twitter, blogs, and Ning com-
munities to advertise the National Dialogue.
Vol. 5, Ed. 2 2
Defense Concepts
Second, the QHSR was executed in a transparent, open and collaborative man-
ner using the latest Web 2.0 technologies to engage stakeholders and the public. In
colloquial language, this quadrennial review is not your father’s quadrennial re-
view. The QHSR was not designed in a smoke-filled room by select Senior Steer-
ing Groupsiv nor was it created using a top-down approach like the Pentagon’s
early Quadrennial Defense Reviews. Through a series of three web-based, public
Dialogues (the National Dialogue on the QHSR) driven by an iterative, online col-
laborative discussion forum hosted by the National Academy of Public Administra-
tion (NAPA), DHS collected the wisdom of U.S. citizens, as well as
operational-level expertise and specialized knowledge and incorporated it in the
review. Insights gained from this experience led DHS to continue the momentum
by launching a new collaborative forum to help expand its capacity for public en-
gagement.
The Dialogue was conducted in three phases between July 16 and October 4,
2009. More than 20,000 stakeholders from all 50 states and the District of Colum-
bia, and more than 1,000 cities participated in the conversation. The National Dia-
logue on the QHSR included three dialogues:
· Dialogue 1: An initial forum for the exchange of participant ideas on the goals
and objectives developed by DHS study groups across six topic areas.
· Dialogue 2: A deeper discussion on how best to prioritize and achieve the pro-
posed goals and objectives.
· Dialogue 3: A review of the final products of each study group with partici-
pant feedback and identification of next steps.
Over the course of these three Dialogues, stakeholders were asked to review,
rate, and discuss the concepts, ideas, and draft recommendations developed by the
six QHSR study groups. The valuable comments and ideas solicited were made
available to the study groups tasked with writing the QHSR for DHS.v Overall, the
extensive stakeholder feedback, along with insights from the DHS study group
members, interagency partners, and ordinary citizens informed the work of the
QHSR study groups in an unusually open and collaborative manner in the often
secretive homeland security and counter terrorism domain. The final report has
been delivered to Congress and can be viewed on the Department of Homeland
Security’s QHSR page.vi
By conducting their study in a manner so that the drafts were accessible to all
interested parties, without regard to their position or formal credentials, the Dia-
logue provided the opportunity for stakeholders and the public to review, rate, and
openly discuss the raw, unvetted materials initially developed by the QHSR Study
3 Vol. 5, Ed. 2
Defense Concepts
Vol. 5, Ed. 2 4
Defense Concepts
5 Vol. 5, Ed. 2
Defense Concepts
HIGHLIGHTS
The Global Security Monitor (GSM) is CADS’s web resource that provides timely, in-
depth analysis of domestic and international developments. The GSM features a blog
where staff members and interns at the Center can share ideas and opinions on important
current events and policy issues. The GSM also includes briefs that focus on evolving
trends such as asymmetric threats, hybrid warfare, economic warfare, and energy security.
The Center supplements the GSM website with a bi-weekly newsletter delivered to a grow-
ing readership. The following two articles were selected as exceptional examples of the
editorial work presented in the GSM. To find out more about the GSM, visit
gsm.c4ads.org, and to subscribe to the bi-weekly newsletter, write to info@c4ads.org.
Vol. 5, Ed. 2 6
Defense Concepts
key and Armenia. However, this reasoning is somewhat dubious. In a CNN inter-
view, Fadi Hakura, Turkey Analyst at Chatham House, a London-based think tank,
suggested that the security interests of the U.S., and not the international communi-
ty, are the real motivator for the State Department’s intervention.
The response from Turkey has been quick and pointed. Turkey recalled Namik
Tan, its ambassador to the United States, for consultations following the resolution
and Foreign Minister Ahmet Davutoglu cautioned that “each interference by a
third party will make this normalization impossible,” thereby alerting the U.S. of
the effects its actions could have on diplomacy between Turkey and Armenia. Da-
vutoglu also mocked the seemingly arbitrary voting process and narrow margin of
victory by which the resolution was passed. He questioned whether history should
be treated in such an “unserious manner.” His criticism undermines the
Committee’s respect for the legacy of its allies
Those investigating this episode have faced hurdles in acquiring access to nec-
essary primary sources from the Ottoman archives, but 2008 marked a diplomatic
turning point between Turkey and Armenia when they created an impartial interna-
tional historical commission to examine available archival evidence. Much of the
debate is centered on what is and is not considered genocide, since several of the
deaths during this epoch were caused by displacement, war, and disease.
http://www.gwpda.org
A relic of the Armenian massacre at Erzingan. Such evidence of the casualties can be found
throughout Armenia.
Turkey acknowledges and commemorates the 1915 deaths of Armenian civil-
ians, but does not regard the casualties as genocide, which it defines as a planned
and deliberate systematic elimination of people. Rather, Turkey ascribes the esti-
mated 1.5 million deaths to the civil war and unrest that occurred in the wake of a
disintegrating Ottoman Empire.
After the defeat of the Ottoman Empire, nationalism diffused rapidly as a con-
sequence of the dynamic reign of Mustafa Atatürk and the advent of Kemalism,
7 Vol. 5, Ed. 2
Defense Concepts
whereby the nation seeks to establish a modern, democratic and secular nation-
state, guided by educational and scientific progress. Under Atatürk, Turkey was
quickly modernized according to the western European example. Education, lan-
guage, religion and penal codes were reformed during the first part of the twentieth
century. As a result, modern Turkey is a fiercely proud nation, and is consequently
framing the passing of this resolution as a deeply emotional affront on Turkish
identity and history. Davutoglu is correct; it is reductive and quite frankly, absurd,
that one vote, by a nation that was not even a participant in the incident, can seal
the pages of history.
Since the resolution was passed, Secretary Clinton expressed White House op-
position to the resolution by offering condolences to Davutoglu, thereby thawing
U.S.-Turkey tensions. The ambassador has since returned to Washington and Tur-
key sent representatives to the April Nuclear Summit in Washington, DC. Never-
theless, the timing and administrative fumbling surrounding the House resolution
marred the United States’ ties with Turkey. Moreover, the resolution cut off Turk-
ish-brokered peace talks between Syria and Israel and may have further strained
the already tenuous relationship between Turkey and Armenia. While Secretary
Clinton’s belated intervention and subsequent apology may have patched U.S.-Tur-
key relations for the time being, the ripple effects of the Armenian genocide reso-
lution are multi-dimensional and are yet to be fully realized.
Vol. 5, Ed. 2 8
Defense Concepts
http://www.naturalnews.com/cartoons/old-new-warfare_600.jpg
9 Vol. 5, Ed. 2
Defense Concepts
COVER STORY
Wasted Space:
How and Why the U.S. Must Prepare
to Fight a Clean War in Space
Vol. 5, Ed. 2 10
Defense Concepts
Introduction
Much anxiety has been engendered within the various space operations commu-
nities regarding combat operations in space. Several stakeholders fear that anti-
satellite (ASAT) weapons will generate so much space debris that Earth’s Orbital
Space (EOS)i will become too ‘clogged up’ with lethally bullet-fast pieces of debris
to ever be usable again. With this in mind, critics argue that space warfare should be
prohibited.ii Unfortunately, the recent test of an anti-satellite weapon by China in
January of 2007 transformed the issue of space warfare and its attendant space
debris-generation challenge from the realm of the hypothetical to the real.iii With just
one test, space has been irrevocably altered from a free and open observation and
communications zone into a battlefield of the post-Cold War era. Thus, it behooves
the U.S. to contemplate how to counter such weapons (including their physical
destruction) through methods that render these armaments ineffective and keep U.S.
space systems secure. Concurrently, policymakers must consider solutions that
generate minimal amounts of long-term space debris.
Satellites have been used
“The key lesson of China’s 2007 ASAT as warfighting assets by the
test is that the physical destruction of a U.S. military since Opera-
tion Desert Storm in 1991.
satellite of even moderate size can result Indeed, their use in combat
in the generation of a massive amount of has only expanded in scope
space debris...” and extent and continues to
be a vital part of the ongo-
ing War on Terror, operations in Iraq and Afghanistan and elsewhere.iv This new
battlefield, like all others before (and below) it, has strategic implications that are of
immeasurably great importance. Consequently, the issue of the residual wreckage
caused by any physical combat conducted therein should also be given proper
consideration. However, discussions of ‘pollution’ in space must place this issue in
its appropriate context within the overall, broader range of issues involving the
transformation of space into a strategic environment. Now is an opportune time to
revisit the debris inquiry and consider the options for minimizing debris resulting
from space combat operations and for removing debris.
The key lesson of China’s 2007 ASAT test is that the physical destruction of a
satellite of even moderate size can result in the generation of a massive amount of
space debris in addition to the loss of the satellite itself. Therefore, ASATs must be
stopped at all costs, not only to prevent the resulting space debris but also to secure
the increasingly vital space-based capabilities and all satellites within that orbital
zone. ASATs are here to stay, simply because there is no way to legislate their
removal, regardless of the effort put forth to try to prevent their proliferation. The
only reliable means to prevent their devastation of space in the foreseeable future is
11 Vol. 5, Ed. 2
Defense Concepts
to find and implement ways to thwart or destroy them, with as little collateral
damage to friendly assets and the space environment as possible.
This paper argues that not only is the challenge of space debris misunderstood
and oftentimes even overstated (if only by omission of certain key facts), but in
actuality, it is a far less important issue than threats to national security that may
even jeopardize the survival of the U.S. as a nation. Space is a vital arena for the
U.S.; it is a venue not only from which, but also in which, the U.S. can win or lose
future wars against other space-capable adversaries, both current and nascent. Thus,
space is a “terrain” that we may have to have to defend by force in both the physical
and electromagnetic contexts.
Fortunately, there are a number of methods and approaches, both passive and
active, that can be used to counter the ASAT threat. Moreover, relatively few of
them involve the use of force in space itself. Indeed, the earlier in the ASAT’s
launch cycle it can be thwarted, the better positioned the defenders will be.
Next, the author of this paper argues that with the judicious design and utiliza-
tion of future space-based assets and weapons, U.S. space-based assets can be well
protected against ASATs. Notably, these weapons could also be used to provide the
U.S. with the single most effective possible missile defenses with minimal to no
hazardous space debris generated. Space-based kinetic-kill weapons can destroy
rockets in their boost phase in or just above the Earth’s atmosphere, regardless of
their payloads, whether they are nuclear warheads, satellites, or ASATs. No satel-
lites will be lost and no hazardous space debris will be generated if a boost-phase
missile-defense system is operational and functional. Additionally, there are a
number of other means by which satellites can be disabled without generating debris.
ASATs themselves must be stopped at all costs, since the damage they could
wreak, both in the short-term and longer-term, indubitably warrants their defeat and
destruction. Kinetic kills of satellites can be achieved, but only when the national
security of the U.S. is at sufficient risk. Under these circumstances, the destruction
of enemy space-based assets would abrogate concerns regarding the secondary
consequences of the space debris generated. However, there are less ‘dirty’ ways to
render a satellite nonoperational, such as directed energy and forcibly maneuvering
the satellite about, as well as blinding or shading it from the sun’s energy-providing
rays. Space debris hazards can be mitigated or eliminated entirely, even in the
eventuality of a kinetic kill, given the correct targeting and tactics. Kinetic kills are
Vol. 5, Ed. 2 12
Defense Concepts
not the only means by which anti-satellite operations can be conducted; other
options exist than can disable the satellite without obliterating it.
Finally, in the longer run, the rising numbers of nations and organizations using
space mean that the problem of space pollution will inevitably worsen, possibly to
hazardous levels that prohibit access.
“Today, however, the bipolar EOS will eventually need to be
international system is gone, cleaned up, regardless of wartime or
replaced by an increasingly peacetime usage. To solve this long-
multipolar scenario of a growing term challenge, there are a number
of entirely viable, affordable, but as
number of actors with capabilities yet untried technologies available to
in space.” perform the space-cleanup task.
13 Vol. 5, Ed. 2
Defense Concepts
nuclear capabilities. They agreed not to attack these space-based verification assets
in order to avoid provoking a nuclear war.vii
Today, however, the bipolar international system is gone, replaced by an increas-
ingly multipolar scenario of a growing number of actors with capabilities in space.
This changing spacescape has resulted in a higher likelihood of physical combat
operations as evidenced by China’s recent testing of a direct-ascent anti-satellite
(ASAT) weapon. This threat is one that cannot be swept away by the stroke of a pen
or the wording of a treaty. On the contrary, it requires the development of physical
defenses. Daniel Davis summarizes this issue as follows:
Vol. 5, Ed. 2 14
Defense Concepts
Fortunately, not all space debris remains in orbit permanently. In fact, certain
regions of Earth’s orbital space are actually self-cleansing, as is the case with debris
in Low Earth Orbit (LEO), the most frequently used zone of EOS. The Earth’s outer
atmosphere (mesosphere, thermosphere and exosphere)xiv extends out as far as
1,000km, exerting a small but measurable amount of aerodynamically induced
friction on objects in space.xv If not corrected or compensated for, this aerodynamic
drag will eventually bring an object into the Earth’s main atmosphere where the
combination of high air density and object velocity will incinerate the object. Thus,
space debris in LEO does not inherently pose a long-term risk to space-accessibility,
because that much-used volume of EOS is essentially self-cleaning. However, this
process can take months or even years to occur.xvi
15 Vol. 5, Ed. 2
Defense Concepts
Vol. 5, Ed. 2 16
Defense Concepts
mass assumes a uniform distribution over all of EOS. In fact, the debris from these
kills would scatter throughout a band around the original orbit of the destroyed
satellite. This phenomenon was exhibited after the Chinese ASAT test of 11 January
2007 destroyed an obsolescent weather satellite, thereby exposing a greater number
of satellites in a similar orbital band to potential collisions.xxiii Secondly, ASAT
operations would generate vastly increased absolute quantities of space debris. This
debris could exacerbate the already challenging task of controlling space traffic, of
managing and manipulating satellites’ orbits so that they are not struck by any of the
increased numbers of pieces of debris.
Third, it is not the mass per unit volume of space that counts, but rather, the
number, size, and orbits of discrete pieces that is of concern. It only takes one strike
from a debris object to destroy a satellite. Additionally, logic dictates that the smaller
the size of the fragments, the more numerous they may be. To make matters worse,
the smaller and more numerous the objects, the less likely we are to know where
they are.xxiv
The final caveat is that, given the bullet-like speeds of orbital debris, even very
small objects can inflict lethal damage to a satellite. While space wouldn’t necessar-
ily become unusable in the aftermath of even a high-intensity space war, subsequent
space traffic control and management operations would be vastly more difficult,
dangerous, and could result in the loss of one or more spacecraft, particularly in LEO,
where most of the targets and subsequent combat is likeliest to take place.
17 Vol. 5, Ed. 2
Defense Concepts
ally all of these measures are utilized in both the design and operation of combat
aircraft, few are currently in use in contemporary spacecraft.xxv
Of particular interest in the quest for an ASAT-resistant satellite system
design is the distributed multiple-small-satellite-design architecture proposed by
DARPA’s F6 program, in which a number of small co-orbiting satellites would
function collectively as a single larger satellite. A loosely-grouped cluster of
small satellites has many advantages. Each satellite is smaller and has a lower
radar cross-section, making it much more difficult to detect and to hit. With
sufficient separation distances between the component satellites, debris generat-
ed from the physical destruction of one is unlikely to reach or damage the others.
Redundancy of functions among satellites in the group enables it to continue to
function even after one or more direct strikes by a KE ASAT. Finally, small
satellites can be replaced more quickly with other small satellites than a single
large satellite would.xxvi Redundancy either through the use of many platforms or
readily available replacements and launchers on the ground (the concept underly-
ing the Air Force’s concept of Operationally Responsive Space, or ORS)xxvii
would make it more difficult to cripple the U.S. military for extended periods.
The F6 concept is illustrated in Figure 1, below:
Vol. 5, Ed. 2 18
Defense Concepts
Other passive efforts could also prove useful, for example, transposing a satel-
lite to a higher altitude out of the ASAT’s range. ASATs can also be thwarted by
changing the satellite’s orbital path or by placing the target out of the ASAT’s reach.
Moreover, an ASAT can be defeated by active means, like destroying it on its launch
pad.
However, there are problems and limitations to all passive measures, both in the
present and in the future. ORS is still in its infancy, and might not stop a challenger
who has plenty of ASATs to spare, or simply deliberately creates orbiting clouds of
debris. In addition, F6 and like designs are still years away from deployment. While
the recommendation to armor satellites in critical locations is used in the Shuttle and
ISS, it is employed by few other platforms. Even if all the passive-defense options
were implemented in all future satellite designs and operations, they would do
nothing to protect the large array of large, non-stealthy, unarmored, high-value
satellites currently in orbit, which constitute the bulk of the U.S.’ space-based
capabilities and will continue to do so in the future. This means that U.S. space
capabilities are and will remain extremely vulnerable to attack, a precarious security
situation that is unlikely to be remedied for the many years or decades to come. If
the adversary’s space situational awareness and ASATs are effective and numerous
enough, and if its
targets are rela-
“Even if all the passive-defense options
tively few, large,
were implemented in all future satellite low-orbiting, and
designs and operations, they would do important, they
nothing to protect the large array of large, will be found and
non-stealthy, unarmored, high-value satellites destroyed. This
will hold true un-
...which constitute the bulk of the U.S.’ less other protec-
space-based capabilities...” tive measures are
taken.
19 Vol. 5, Ed. 2
Defense Concepts
Vol. 5, Ed. 2 20
Defense Concepts
21 Vol. 5, Ed. 2
Defense Concepts
Vol. 5, Ed. 2 22
Defense Concepts
way is to use Kinetic Energy (KE) weapons against a target in space, but this
approach should only be used in limited circumstances.
Given the attributes and limitations of hypervelocity-impact kills of targets
in space, some recommendations and restrictions on the use of KE weapons need
to be made. First, both the interceptor and its target must both be relatively small
and compact or larger fragments might escape the pulverization process. Second,
the collision velocities must be as high as possible in order to deliver as much
energy to the target as possible, to pulverize as much of it as possible. Third, the
interception must occur in or close to the outer reaches of the Earth’s atmosphere
so that at least some aerodynamic drag (relative to their small masses) will be
present to drag these small fragments farther down into the atmosphere where
they will be incinerated. Lastly, the target should ideally be intercepted before it
reaches orbital velocity; otherwise, some of the resulting fragments could remain
in orbit for years to come. KE weapons will not result in clean satellite kills at all
altitudes of EOS, nor can KE ASATs guaranteeably be cleanly used outside this
zone, almost regardless of their collision velocities.xlii If the kill must be achieved,
the interception/collision velocity must be as high as possible, in order to
pulverize as much of both target and interceptor into fine particulates as possible.
Direct proof of both the efficacy and limitations of the clean-KE satellite-kill
approach, of ‘how it should be done,’ was evidenced in the 20 February, 2008
shoot-down of an out-of-control U.S. National Reconnaissance Office (NRO)
satellite by the U.S. Navy using a specially-modified Standard SM-3 missile
defense interceptor launched from the AEGIS missile-defense cruiser USS Lake
Erie while sailing in the Pacific Ocean. In this shoot-down, the satellite was dead,
tumbling out of control in a decaying low Earth orbit, its electrical power systems
shut down, its solar power panels folded, and its hydrazine fuel frozen solid in its
tanks; the optimal small, densely-packed target for a clean KE kill in LEO.
Indeed, this was precisely the effect achieved, with no large long-term debris
resulting from the AEGIS KE intercept.xliiixliv
23 Vol. 5, Ed. 2
Defense Concepts
the fact that today, debris from these Soviet-era tests still poses an on-orbit
hazard. “Several Soviet ASAT tests did create thousands of detectable pieces of
junk that are still in orbit after 25 years… In total, 371 detectable pieces of
orbiting junk still survive today from various Soviet ASAT weapons tests.”xlvii
Worryingly, the Russians produced stockpiles of these IS-Axlviii and IS-MUxlix
co-orbiting ASATs during the Cold War. These stockpiles have not been dis-
posed of and may become a space-security threat in the future, either through
their reactivation into service by Russia, or via sales to other countries.l
Figure 5 – Soviet Co-Orbiting ASAT Attacking a Satelliteli
Vol. 5, Ed. 2 24
Defense Concepts
25 Vol. 5, Ed. 2
Defense Concepts
and KE weapons; the target may be in too high an orbit to be within range of DE
weapons. Nor is the risk of debris generation reduced to zero with the use of DE
weapons, since some pieces might be sliced or melted off the target, or the target
might explode outright (propellant tanks, batteries) with sufficient energy deposi-
tion.
Vol. 5, Ed. 2 26
Defense Concepts
27 Vol. 5, Ed. 2
Defense Concepts
Vol. 5, Ed. 2 28
Defense Concepts
29 Vol. 5, Ed. 2
Defense Concepts
“It is the Sense of Congress that the United States should place greater
priority on the protection of national security space systems… The Secre-
tary of Defense, in conjunction with the Director of National Intelligence,
shall develop a strategy, to be known as the Space Protection Strategy, for
the development and fielding by the United States of the capabilities that are
necessary to ensure freedom of action in space for the United States… The
strategy required… shall include each of the following:
“An identification of the threats to, and the vulnerabilities of, the national
security space systems of the United States… A description of the capabili-
ties currently contained in the program of record of the Department of
Defense and the intelligence community that ensure freedom of action in
space…
Vol. 5, Ed. 2 30
Defense Concepts
“For each period covered by the strategy, a description of the capabilities that
are needed for the period, including-- the hardware, software, and other materi-
als or services to be developed or procured; the management and organization
al changes to be achieved; and concepts of operations, tactics, techniques,
and procedures to be employed.”lxxii
While this language doesn’t specifically call for weapons in space, it directs the
DOD for the first time to ensure that the U.S. military and intelligence communities
plan appropriately to ensure that they will have freedom of action in space. As this
analysis shows, that guarantee will require active defenses to defend U.S. space
assets while at the same time preventing or minimizing the creation of additional
long-term hazardous space debris.
31 Vol. 5, Ed. 2
Defense Concepts
“The nearer term system would be able to remove from orbit essentially
all of the 30,000 1-to-10-cm debris objects at or below about 800-km
altitude within three years, for an estimated total cost of $60 million-$80
million, including R&D and operations. The longer term system would
be able to remove essentially all of the 125,000 1-to-10-cm debris objects
at or below 1,500-km altitude within two years, for an estimated total
cost of $150 million-$180 million.”
Vol. 5, Ed. 2 32
Defense Concepts
33 Vol. 5, Ed. 2
Defense Concepts
Vol. 5, Ed. 2 34
Defense Concepts
ASATs leave little time for any kind of measured response, such as knocking out
ground-control stations in order to stop them. Similarly, attacking ground sta-
tions might not stop an ASAT already on its way towards its target. Put simply,
there is no substitute for a space warfighting force that can provide an effective,
active, timely, direct defense of U.S. space-based assets.
Fortunately, there is increasing interest in some military circles in boost-
phase missile defenses as a means of defending against ASATs. MDA’s then-
Director, Gen. Obering said, “It’s not prudent to rely only on just one approach
to meet the threat of anti-satellite weapons… You can’t always go on the
assumption that you can do this offensively. You need some kind of defensive
capability as well.”lxxxvi The goal of a missile-defense-oriented approach to
ASAT defense would be to shoot down the missile launching the ASAT.lxxxvii
However, the absence of any mention of active space defenses in recent Congres-
sional testimony by the senior leaders of the U.S. government’s national security
space establishment is conspicuous.lxxxviii
“This successful test… also raises the specter of a potential (and perhaps
intentional) secondary threat with broad consequences – the generation
of orbital debris as a threat to general satellite survivability. This second-
ary threat of widespread orbital debris, while undirected, would be far
more likely to disadvantage a nation such as the U.S., with its far heavier
35 Vol. 5, Ed. 2
Defense Concepts
One day the U.S. will be forced to choose between losing a war to a space-
capable enemy, or defending against that enemy’s assaults on our own space assets
by destroying its ASATs and ‘poking out’ its ‘eyes in space,’ by disabling or
eliminating its space-based assets.xci Is the space debris ‘pollution’ problem really a
higher national security risk than the loss of thousands of American or allied troops,
and possibly the loss of an entire war? Will we be prepared to deal with the threat if
an enemy launches ASATs at our satellites? Do we simply stand by, or prepare to
destroy those ASATs before they can do even worse damage? If the only weapons
available are KE interceptors and the U.S. is facing defeat, what should U.S. space
security policy be? This is the question that U.S. policymakers are going to have to
confront and answer in the years to come.
Vol. 5, Ed. 2 36
Defense Concepts
to pursue these weapons and tactics, since this pursuit can guarantee not only the
security of its satellites, but also the long-term usability of EOS, particularly LEO,
against the likelihood of hostile ASAT operations. Furthermore, there are plentiful
ideas for viable and affordable technologies and methods for cleaning up the space
environment. Maintenance of space will become necessary as its use grows in the
coming years, decades, and centuries. Even if many large pieces of long-term space
debris were generated at higher altitudes by a space conflict, the choice ultimately
remains a simple one: between ‘space-pollution’ and national defeat, between
security and naiveté, between our all-important self-defense, and our de facto
surrender to the first adversary that chooses to attack our space assets via this route.
These are the stark yet undisputable policy choices being faced by U.S. policymak-
ers today.
The technologies currently envisioned for U.S. space weapons would provide
the best means of achieving U.S. space security and continued national security in
the foreseeable future. These technologies would also minimize the risk of space
debris generation. If used intelligently and judiciously, both hypervelocity-collision
and directed-energy weapons will provide an effective and debris-minimizing
space-defense force. It is vital that we arm ourselves to deter and defend against
ASATs and other space-traversing threats as soon as possible. With luck, a strong
U.S. space-defense force will prevent a conflict from ever occurring in space.
Failing that, these forces will enforce the safety and security of space, hopefully with
a minimum of long-term orbital debris along the way.
Grand Strategy in Space, Washington, DC: The George C. Marshall Institute.: 2-5,
http://www.marshall.org/pdf/materials/408.pdf.
37 Vol. 5, Ed. 2
Defense Concepts
v Rumsfeld, Donald H. (Chair). January 11, 2001. Report to the Commission to Assess
United States National Security Space Management and Organization, Washington:
Committee on Armed Services of the U.S. House of Representatives.: 8-9,
http://space.au.af.mil/space_commission/executive_summary.pdf.
vi Lee, James G. et al August 2003. Air University Space Primer, (USAF Air Universi-
test of 11 January 2007, which added about 1,500 objects over 10cm in size to the mix.
From Stansbery, Eugene. 29 April 2005. Orbital Debris Frequently Asked Questions.
NASA Orbital Debris Program Offic., http://orbitaldebris.jsc.nasa.gov/faqs.html; and,
Staff, Battlefield Space,. August, 2007. Cape Town: Popular Mechanics.
http://www.popularmechanics.co.za/content/general/singlepage.asp?fid=991&pno=1.
x David, Leonard, Space Traffic Control. May 5, 2004. Space.com.
http://www.space.com/businesstechnology/technology/space_traffic_040505.html.
xi Ailor, William. Winter 2000. New Hazards for a New Age Los Angeles: The Aero-
Package. Houston: NASA Orbital Debris Program Office, last accessed 15 May 2007:3.
http://orbitaldebris.jsc.nasa.gov/library/EducationPackage.pdf.
xiv Phillips, Shaun. 1 December 2005. Earth’s Atmosphere. NASA MSFC Exploration.
http://liftoff.msfc.nasa.gov/academy/space/atmosphere.html.
xv Lee, James G., et al. August 2003. Air University Space Primer. U.S.AF Air Universi-
Vol. 5, Ed. 2 38
Defense Concepts
GlobalSecurity.org. http://www.globalsecurity.org/space/systems/kh-12.htm
xxiiiStaff. March 28, 2007. Space Debris Left by Chinese Test Poses Near-Term Worries.
Inside Missile Defense, Vol. 13, No. 7; pg. 9-10
xxiv Staff. 1997. Protecting the Space Shuttle from Meteoroids and Orbital Debris. Washing-
ty: Applying Lessons Learned from NASA, Missile Defense, and Aircraft Survivability
Programs,” (Alexandria, VA: Institute for Defense Analyses, Briefing to Space and Defense
Conference, Las Vegas, NV: 12, 20.
xxvi Foust, Jeff. 20 August, 2007. From One, Many. The Space Review.
http://www.thespacereview.com/article/937/1
xxvii Rupp, Sheila. 22 May 2007. Operationally Responsive Space, News - Kirtland Air
Modeling at the Aerospace Corporation,. Orbital Debris Conference: Technical Issues and
Future Directions, Baltimore, MD, American Institute of Aeronautics and Astronautics,
39 Vol. 5, Ed. 2
Defense Concepts
tiny rocket-powered devices that would independently detect, track, and neutralize in-
coming missiles. It was designed to operate in conjunction with the Brilliant Eyes sen-
sor system and would have detected and destroyed missiles without any external
guidance
xxxiv Wood, Lowell and Cooper, Henry F. 23 July, 2002. Hit-To-Kill Intercepts In Near-
Earth Space. The High Frontier, 2002 Strategic Policy Issue Briefs.
http://users.erols.com/hifront/2002_issue_briefs.html
xxxvPfaltzgraff, Robert L., Jr. and Van Cleave, William R.. 2006. Independent Working
Group on Missile Defense, the Space Relationship, and the Twenty-First Century –
2007 Report, (The Institute for Foreign Policy Analysis, Inc.:41-58.
http://www.ifpa.org/pdf/IWGreport.pdf
xxxviStaff. May, 2006. Fact Sheet – Ground-Based Midcourse Defense. Missile Defense
Agency. http://www.mda.mil/mdalink/pdf/gmd06.pdf
xxxvii Robert L., Pfaltzgraff, Jr. and William R. Van Cleave, Independent Working
Group on Missile Defense, the Space Relationship, and the Twenty-First Century –
2007 Report, (The Institute for Foreign Policy Analysis, Inc., 2006, pg. 46),
http://www.ifpa.org/pdf/IWGreport.pdf
xxxviii Cooper, Henry F. 1 October, 2002. Defending America from Offshore Missile At-
Applying Lessons Learned from NASA, Missile Defense, and Aircraft Survivability Pro-
grams. Wright-Patterson AFB: Aircraft Survivability Journal: 23-25.
http://www.bahdayton.com/surviac/asnews/AS_Summer_2008.pdf
xliii Matthews, Jim. 20 February, 2008. U.S. Navy Shoots Down Satellite. Aviation Week
Vol. 5, Ed. 2 40
Defense Concepts
xlv Grego, Laura. May 30, 2006. Space Weapons Basics – A History of Anti-Satellite Pro-
http://www.astronautix.com/craft/isa.htm
xlvii
Staff. August 10, 1995. Congressional Record – Amendment No. 2402, DEPARTMENT
OF DEFENSE APPROPRIATIONS ACT 1996. U.S. Senate.
http://www.fas.org/spp/military/congress/1995/cr950810.htm
xlviii Wade, Mark. 2007. IS-A. Astronautix.com. http://www.astronautix.com/craft/isa.htm
xlixWade, Mark. 2007. IS-MU. Astronautix.com.
http://www.astronautix.com/craft/ismu.htm
l Ibid
li
Zak, Anatoly. 30 December, 2006. SPACECRAFT: Military: IS anti-satellite system.
Russianspaceweb.com. http://www.russianspaceweb.com/is.html
lii Beason, Doug. 2005. The E-Bomb – How Directed Energy Will Change the Way Future
Wars Will be Fought. Cambridge, MA: Da Capo Press: 9, 21-29
liiiButterworth, Robert. January 2008. Assuring Space Support Despite ASATs. Washington,
http://www.fas.org/spp/starwars/program/sbl.htm
lixDouglas, Beason. 2005. The E-Bomb – How America’s New Directed Energy Weapons
will Change the Way Future Wars Will be Fought. Perseus Books Group: 165-169
lxIbid, pg. 164
lxi Ibid
41 Vol. 5, Ed. 2
Defense Concepts
lxvi Preferably, the interception will be carried out in such as away as to deflect the debris
and Black, Douglas S. (Maj., U.S.AF), and Henderson, Scott A. (Maj., U.S.AF), and John-
son, David C. (Maj., U.S.AF). August 1996. Star Tek—Exploiting the Final Frontier:
Counterspace Operations in 2025.Maxwell-Gunter AFB: Center for Strategy and Technolo-
gy, Air Force 2025 Study. http://csat.au.af.mil/2025/volume3/vol3ch09.pdf.
lxix Singer, Jeremy. 6 November, 2006. Pentagon Weighs Global Strike Options,
electronic attack in air strike against Syrian mystery target. Aviation Week & Space Tech-
nology.: 28-29.
lxxi Staff. 6 December, 2007. National Defense Authorization Act for Fiscal Year 2008
(Enrolled as Agreed to or Passed by Both House and Senate), Section 911 - Space Protec-
tion Strategy. Washington, DC: The United States Congress. http://thomas.loc.gov/cgi-
bin/query/F?c110:7:./temp/~c110FZKhfy:e891522
lxxiiStaff. 6 December, 2007. National Defense Authorization Act for Fiscal Year 2008
(Enrolled as Agreed to or Passed by Both House and Senate), Section 911 - Space Protec-
tion Strategy. Washington, DC: The United States Congress. http://thomas.loc.gov/cgi-
bin/query/F?c110:7:./temp/~c110FZKhfy:e891522
lxxiiiMurphy, Bill. May 28, 2004. Sandia-Designed Space Reactor Could Drive In-Orbit Sal-
extremely efficient in terms of the total amount of thrust obtained per unit mass of fuel.
Dennis Wingo et al, Orbital Recovery System Overview, (London: Orbital Recovery Limit-
ed, August 2005,) pg. 1-8,
http://www.orbitalrecovery.com/images/orbital_sys_overview.pdf
lxxvPhipps, Claude, ORION: A Solution to the Orbital Debris Problem, (Tucson: University
Vol. 5, Ed. 2 42
Defense Concepts
of Arizona) http://www.seds.org/spaceviews/9707/articles.html
lxxvi Bekey, Ivan. May 1997. Orion’s Laser: Hunting Space Debris. Reston, VA: Aerospace
lxxviiiMurphy, Bill. May 28, 2004. Sandia-Designed Space Reactor Could Drive In-Orbit
lxxxviiiRandolph,
Monique (SSgt. USAF). Senior Leaders Testify about Air Force Space Pro-
gram. Washington: Department of Defense, April 9, 2007.
lxxxixStaff
May 2006. Annual Report to Congress – Military Power of the People’s Republic
of China, (Washington: Office of the Secretary of Defense.; 31-35,
http://www.defenselink.mil/pubs/pdfs/China%20Report%202006.pdf
xcWilliamsen, Joel. Spring 2008. Satellite Vulnerability to Direct Ascent KE ASAT: Apply-
ing Lessons Learned from NASA, Missile Defense, and Aircraft Survivability
43 Vol. 5, Ed. 2
Defense Concepts
Power’s Quest for Strategic Paralysis. Maxwell AFB: School of Advanced Airpower Studies:
49. http://www.maxwell.af.mil/au/aul/aupress/saas_Theses/Fadok/fadok.pdf
Vol. 5, Ed. 2 44
Defense Concepts
FEATURES
http://www.rall.com
Since 1996, military and defense experts have advocated a
network-centric approach to interpreting warfare in the infor-
mation age. However, the following authors explain that a
people-centric understanding of conflict is also instructive.
45 Vol. 5, Ed. 2
Defense Concepts
Background:
Some scholars have examined the effects of high-value targeting on terrorist
organizations as a function of age, size, and type. For instance, based on an analysis
of a comprehensive dataset of 290 cases of “leadership decapitation” from 1945-
Vol. 5, Ed. 2 46
Defense Concepts
2004, Jenna Jordan, a scholar at the University of Chicago, infers that as terrorist
organizations become older and larger, they become less vulnerable to the removal
of their leaders.ii Additionally, she contends that religious and separatist groups are
also less vulnerable to HVT operations than ideological organizations. The reason-
ing behind Jordan’s contention is as follows: she argues that ideological organiza-
tions are often dominated by an influential leader who articulates an appealing
vision for his group. In contrast, religious and separatist groups often have a strong
base of community support from which they draw motivation. Moreover, religion
and ethnicity are often integral to individual identity. Thus, members of religious
and ethnic organizations may have a more difficult time distinguishing between
“personal” and “social” missions. Jordan recommends that policymakers study trends
in organizational decline to better understand whether and how certain types of
organizations are more vulnerable to destabilization.
Based on a statistical study of the HVT strategy, the researcher Aaron Mannes
from the University of Maryland suggests that different organizations have different
vulnerabilities/sensitivities to high-value targeting.iii Similar to Jordan, he avers that
religious organizations can better survive the loss of a leader because they are
frequently more robust in terms of membership and financial resources. He warns
that religious organizations often have the capability to strike back against their
adversaries in response to a HVT strike; in fact, they may become substantially more
violent and radical in the aftermath of HVT strikes.
Other authors suggest that the specific personality traits of a leader must be
considered when assessing whether or not an organization will be crippled by HVT
operations. Patrick Johnston, a pre-doctoral fellow at Stanford University, argues
that operations should be designed to target groups led by charismatic leaders.iv He
contends that a charismatic leader establishes strong interpersonal bonds with his
followers based on mutual trust, positive support, informal interdependencies,
common bonds, open communication, high degree of autonomy, satisfaction, and
shared loyalty. By instilling a sense of belonging and a positive feeling of identifica-
tion with the group, the charismatic leader enhances his followers’ commitment to
the organization and can generate maximum participation in rebellion. Consequent-
ly, the removal of a charismatic leader will upset the cohesion and enthusiasm of a
group and lead to its disbanding, or at least to its increased vulnerability. To support
his argument, he highlights the example of the Indonesian Islamic terrorist group
Darul Islam, active since 1942, which immediately collapsed after its leader Karto-
swiryo was captured and executed by the Siliwangi Army in 1962. He also cites the
example of the Burmese peasant revolt of 1930-1931, which subsided after its leader
Saya San was hanged by British forces in November 1931.
One of the most sophisticated analyses of terrorist leadership targeting efficacy
is provided by Michael Freeman and Gordon McCormick, researchers at the Naval
47 Vol. 5, Ed. 2
Defense Concepts
Postgraduate School.v These authors suggest that the nature of leadership within an
organization must be evaluated to determine how and when the HVT option is
appropriate. Freeman and McCormick argue that HVT operations will succeed when
the survival of a terrorist group is dependent on a leader’s charismatic attributes or
its survival is dependent upon the leader’s ideological influence on the group (in
particular, his ability to convince members of the legitimacy of its goals and tactics).
However, HVT operations will not be effective if the leader has already mentored
and groomed a cadre of potential successors and institutionalized his ideas and
beliefs by establishing customs and codes to guide the organization and/or councils
that oversee its functioning in his absence. Additionally, the authors maintain that
HVT strikes may work when the survival of the terrorist group is dependent on the
leader’s management skills and when decision-making responsibility is vested
solely in the single leader (i.e. there is a central leader who determines strategy and
tactics, guides recruitment, and provides resources to the group).
The conclusions drawn by these scholars do not appear to have significantly
influenced military doctrine for targeting enemy leadership. It would seem critical
that military policy needs to be devised in conjunction with the extensive data mined
from sociological, psychological, and computational studies that examine human
behavior under changing circumstances. Surprisingly, current analyses and under-
standings of the organizational structure and succession strategies for violent extrem-
ist groups appear incomplete. While it may seem intuitive that a group that relies
upon rigorous succession planning and management will be more immune to
leadership high-value targeting, hitherto there has been no published analysis that
has considered the succession strategy or the decision-making and governance
structure of the groups listed
on U.S. State Department’s
“...military policy needs to be devised in list of Foreign Terrorist Orga-
conjunction with the extensive data nizations. Without this data,
mined from sociological, psychological it is difficult to accurately
and computational studies that examine estimate the probability of an
effective succession. As a re-
human behavior under changing sult, successful outcomes
circumstances.” from HVT strikes are diffi-
cult to predict and calculate.
Current Trends:
Decapitation operations are currently perceived by many as an effective means
to reduce terrorist violence. Advocates of HVT strikes suggest that by exterminating
violent extremists who have attacked civilians, the U.S. can gain domestic support
in places like Pakistan, where the population is terrorized.vi Others maintain that
missile strikes force militants to devote more time to operational security (i.e.
Vol. 5, Ed. 2 48
Defense Concepts
49 Vol. 5, Ed. 2
Defense Concepts
A single person widely identified on the world stage as the nucleus of the
system or the environment he influences and is subsequently given signifi-
cant diplomatic, informational, military, and economic value relative to vital
national interests and the desired end state.xii
Tactics
Targeted individuals have historically been eliminated through surgical strikes,
invasions (i.e. when military forces invade with orders to capture a leader), and
insurgencies (i.e. when military forces facilitate coups or insurgencies to remove
specific leaders).xiii However, Unmanned Aerial Vehicles (UAVS) are currently
used to annihilate terrorist leaders and operatives. UAVS, which have been opera-
tional since 1999, are controlled from the ground via satellite systems and onboard
cameras. UAVs have been flown in combat over Afghanistan, Pakistan, Bosnia,
Serbia, Iraq, and Yemen, although the drone program in Pakistan has received the
most media attention and criticism. The MQ9-Reaper craft, designed by General
Atomics Aeronautical Systems, is the first hunter-killer UAV designed for long-
endurance, high-altitude surveillance. It can carry four Hellfire missiles (which
provide precision striking power against tanks, structures, bunkers and helicopters)
and two 500lb GBU-12 laser-guided bombs (used mostly against fixed armor).xiv
Predator and Reaper drones cost $4.5 and $17 million respectively, compared
to $100 million for a F-35 fighter that performs tactical bombing. Business informa-
Vol. 5, Ed. 2 50
Defense Concepts
http://www.wired.com
Defense Review Report, the De-
partment of Defense announced
plans to expand the unmanned air-
craft system program.xvi By 2012,
the Air Force intends to grow its
fleet of UAVs from 100 to 370
and expand its roster of UAV pi- U.S. military and intelligence operations use pilotless
lots and operation staffers to at drones in Iraq, Afghanistan, and Pakistan both for
least 1,100.xvii surveillance and to fire missiles at targets.
Actors
The CIA and U.S. Special Operations Command (SOCOM) both conduct HVT
operations. Tactically, they execute these operations through the drone programs
described above. The military version of the drone program operates in the recog-
nized war zones in Afghanistan and Iraq and targets enemies of American and allied
troops (most often, insurgents) stationed there. However, during a House Armed
Services Committee hearing in July 2007, James Clapper, Undersecretary of De-
fense for Intelligence, also admitted to the use of U.S. Special Forces in targeted
counterterrorism operations in Pakistan.xviii
The Pentagon’s roster of approved terrorist targets seems to be expanding
despite their announcement regarding declines in the number of Al Qa’ida and the
Taliban fighters. While it originally contained 367 names, 50 Afghan drug lords
were recently added in an attempt to limit the flow of drug money that is helping
finance the Taliban insurgency, but there is no precedent for killing individuals who
are not traditional military targets, such as drug lords.xix The Pentagon has divulged
some information about it taxonomy of targets: some people are approved for killing
on sight while others necessitate additional authorization; a target’s location must be
considered to limit collateral damage; and two “credible human sources” and
“substantial additional evidence” are required to prove the person is an enemy.xx
However, based on records of those killed, organizational features – such as succes-
sion strategy, the existence of a strong deputy or heir, and the presence of institutions
51 Vol. 5, Ed. 2
Defense Concepts
to perpetuate policy in the event of a strike – are not seriously considered when
selecting targets.
The CIA initialized a drone program to increase the number of U.S. personnel in
Afghanistan and crack down on suspected terrorists in the region. In 2002, President
Bush authorized the CIA to target and kill Osama bin Laden and specific individuals
associated with Al Qa’ida. In November 2002, top Bush Administration officials
publicly announced a successful MQ1-Predator (the predecessor to the MQ9-Reap-
er) strike against Aqed Salim Sinan al-Harethi, a suspected Al Qa’ida operative
credited with plotting the October 2000 attack on the USS Cole. Unlike SOCOM’s
mission, the CIA’s program currently focuses on terror suspects throughout the
world, including in countries where U.S. troops are not based (i.e. Al-Harethi was
eliminated in Yemen, although Yemen is not considered a battlefield or an enemy
state). Moreover, the CIA has also joined SOCOM and Pakistani intelligence
services in an aggressive campaign to eradicate local and foreign militants who have
taken refuge in some of the most inaccessible parts of the country.xxi
Peter Bergen and Katherine Tiedemann, investigators from the New America
Foundation, report that the Obama administration has sanctioned at least forty-one
CIA missile strikes in Pakistan alone and that CIA attacks have killed between 760
and 1,050 people. Approximately 500 to 720 of the total killed were identified in
reliable press reports as militants. Only twenty leaders of Al Qa’ida, the Taliban, and
allied groups were eliminated, all of whom were killed since January 2008.xxii
Vol. 5, Ed. 2 52
Defense Concepts
When President Bush provided written legal authority to the CIA to hunt down
and kill the terrorists, he did not stipulate that the Agency should seek further
approval each time it plans to stage an operation. Consequently, the agency does not
provide information on how it selects targets. Nevertheless, reports of fatal air
strikes often emerge, exposing some information on the type of individuals targeted
in HVT operations. Such reports reveal that those eliminated by the CIA range from
Bin Laden’s family members to operational elements to paramilitary planners.
Drones have targeted little-known Pakistani Taliban figures that remain obscure
even amongst U.S. counterterrorism scholar circles. Strikes have also killed several
low level Al Qa’ida militants whose importance to Bin Laden is questionable at best.
In fact, only a handful of the drone strikes reported by Bergen and Tiedemann killed
Al Qa'ida leaders.xxiv Since the pipeline of militant recruits has not been blocked, the
opportunity cost of eliminating such minor figures, regardless of the group’s leader-
ship structure or succession strategy, is unclear. Despite the order of the U.S.
Government that force should only be applied when it is a military necessity, it
seems as if the CIA continues to broaden the definition of high value targets due to
pressure from congressional intelligence committees, greater confidence in the
technology, and reduced resistance from Pakistan.
1. Civilian Casualties:
There is evidence that attacks kill innocent victims due to poor ground intelli-
gence. According to an analysis released by the New America Foundation, the
number of civilians killed in Predator and Reaper attacks could be as high as 320
innocents. In February 2002, a Predator reportedly followed and killed three suspi-
cious Afghans, including a tall man in robes who was thought to be Bin Laden;
however, authorities later discovered that the victims were innocent villagers. In
September 2009, a NATO air strike in Afghanistan killed between 70 and 125
people, many of them civilians who were mistaken for Taliban insurgent, who were
taking fuel from two stranded oil trucks.xxv
2. Geographical Dispersion:
Decapitation operations may also have deleterious effects if they disperse Al
Qa’ida and its associated cells, particularly to Pakistan’s densely populated urban
areas like Karachi.xxvi While cross-border strikes in Pakistan may induce limited
collateral damage, drone strikes and commando raids in more heavily inhabited
53 Vol. 5, Ed. 2
Defense Concepts
areas would result in additional civilian casualties and corresponding anger directed
against the governments in Islamabad and Washington. Thus, militant groups
attempting to hide important insurgents will most likely move to heavily populated
areas, hoping that their enemies will be discouraged from attacking and might suffer
heavily from bad public opinion if they do.
4. Revenge Attacks:
Revenge also
plays an important
role in the upsurge in
deadly violence fol-
lowing a HVT opera-
tion. For example,
http://cpdweb.net
brutal assaults on
Pakistani govern-
ment strongholds sug-
gest that formerly
unaligned militant
Members of the National Trade Union Federation of Pakistan groups have joined
demonstrate in Karachi against U.S. drones on January 23, 2010
Vol. 5, Ed. 2 54
Defense Concepts
5. Loss of Intelligence:
When militant leaders and foot soldiers are eliminated, U.S. forces lose a source
of information. Important intelligence could be gleaned by interrogating jihadist
operatives rather than killing them. Moreover, drone strikes may also destroy
important documents and communication devices containing valuable
information.xxxiii
Successful Succession?
It can be argued that an increase in the number of drone attacks would augment
the appeal of militant groups and anger many civilians. However, since neither the
military nor the political establishment has articulated an effective alternative, drone
strikes are a viable temporary tactic to pressure the Al Qa’ida leadership and its
allies. Nonetheless, for the reasons articulated in the prior sections, the author is in
support of carefully specifying and limiting the use of drone attacks. Decapitation
strikes lose much strategic efficacy if used non-specifically and if applied in circum-
stances where the next generation of mujahedeen is poised to take over. A surgeon
would not use the same operation to treat every disease; instead he would select an
organ- or disease-specific option. Likewise, the U.S. government should not apply
the same technology in all circumstances.
Leadership Succession:
Leadership succession is an important event for any organizationxxxiv since it
affects not only the members of the organization, but also the security and political
climate of the region. To external constituents, the leader of a militant group
represents the organization, thus succession may be viewed as a signal of the
organization’s future. In some cases, when there is no apparent successor nor are
there institutions charged with selecting one, succession can cause disruptive change
and difficult transitions as the organization seeks to regain stability. Factionalization
and in-fighting become increasingly probable in this scenario.xxxv After the death of
55 Vol. 5, Ed. 2
Defense Concepts
Salamat Hashim in 2003 due to lingering illness, the Moro-Islamic Liberation Front
(MILF) became so factionalized that it no longer resembled a functional and
coherent organization. Some factions remained strongly motivated by jihadist polit-
ical aspirations, while others were willing to accept secular government and social
pluralism.xxxvi
Unlike some corporations that are disturbed by CEO succession, terrorist organi-
zations are often highly idiosyncratic. Thus, most subordinates possess important
personal contacts and networks, the ability to garner the cooperation of the
organization’s membership, and knowledge of local conditions and the internal
operations as a result of their individual experiences.xxxvii Consequently, when an
established and knowledgeable group member is groomed as a successor they can
quickly gain credibility and be accepted by key stakeholders of the group.
Succession literature suggests that successors promoted from within an organi-
zation make few changes, thereby maintaining organizational stability. Moreover,
inside successors are related to better post-succession performance than
outsiders.xxxviii With regard to clandestine organizations like terrorist groups, succes-
sors are virtually always selected from insiders. Thus, terrorist groups with designat-
ed deputies or heirs are more likely to survive HVT strikes without experiencing
dramatic changes.
Furthermore,
succession decisions “With regard to clandestine organizations
in clandestine orga- like terrorist groups, successors are virtually
nizations rarely rest
in the hands of indi- always selected from insiders. Thus, terrorist
viduals who are un- groups with designated deputies or heirs are
familiar with the more likely to survive decapitation strikes
group and its inter- without experiencing dramatic changes.”
nal processes. Ter-
rorist groups with
executive bodies are probably capable of controlling the disruptive responses often
created by leadership succession by rational means. For example, they can select
someone to take over interim control of the group until a new leader is selected.
Councils or committees can also ensure that succession planning is integrated with
an analysis of the group’s mission, its strengths and weaknesses, and its opportuni-
ties and threats. They can develop and implement succession plans to ensure a match
between the leadership candidate’s characteristics and group strategy. Most impor-
tantly, they can legitimate and train the successor. At times, these assemblies may
even chose to utilize succession as a means to adapt to their changing
environment.xxxix
Vol. 5, Ed. 2 56
Defense Concepts
Applications in Pakistan:
In recent years, several new terrorist groups have emerged in Pakistan, the
country in which the most rigorous and controversial HVT program is administered.
Moreover, several existing groups have reconstituted themselves in Federally Ad-
ministered Tribal Areas (FATA) of Pakistan, a remote and mountainous territory
where the Pakistani government has ceded control over the Waziristan region to
tribal leaders aligned with Al Qa’ida and the Taliban.
57 Vol. 5, Ed. 2
Defense Concepts
Case Study:
The Groupe Salafiste pour la Prédication et le Combat (GSPC) was able to
survive momentary HVT after the death of its second emir, Nabil Sahraoui because
the group’s founding members had clearly set down a succession strategy in its first
official communiqué and charter. Moreover, the group was structured around an
executive council, which legitimated the new leader. Despite optimistic assessments
by the Algerian press that Sahraoui’s neutralization would establish peace and
stability in the region, violence continued unabated. Because the leadership gap was
immediately filled, the GSPC’s efforts were not affected by the death of their chief.
In fact, this HVT operation may have even strengthened organizational commitment
to Abdelmalek Droukdel, Sahraoui’s successor.
The origins of the GSPC date back to the 1930s (i.e. when Algeria was under
French colonial rule) with the foundation of the Algerian Ulama. The manifest
purpose of the Ulama was to provide a basic social structure for Muslims. However,
through its efforts to create political and economic equality in the colony, the
Vol. 5, Ed. 2 58
Defense Concepts
59 Vol. 5, Ed. 2
Defense Concepts
Vol. 5, Ed. 2 60
Defense Concepts
Droukdel, was also dead. These fears were fueled when the Algerian president
congratulated the Algerian authorities on their progress in the battle against terror-
ism. To quell the anxiety of the GSPC’s membership, Mokhtar Belmokhtar, the
chief of the second zone, momentarily assumed the leadership position. However,
their concern faded when Abou Omar Abd Al-Birr, the head of the media committee,
released a communiqué announcing that Droukdel was alive.xlix
On August 6,
“The leadership transition occurred seamlessly 2004, Abou Al-
Barra Ahmed, the
and the impact of the death of Sahraoui and head of the judi-
decapitation of the GSPC proved fleeting. In cial committee,
fact, it was not even necessary for the executive published a sec-
council to meet to discuss the nomination of the ond communiqué
in which he an-
new leader.” nounced the ap-
pointment of Droukdel as the new emir of the group.l Although Droukdel had
previously occupied the post of chairman of the council under his predecessor and
thus had already been designated as the successor to Sahraoui prior to his death, Al
Barra officially endorsed him in this communiqué to ensure his legitimacy amongst
the GSPC’s ranks.
The leadership transition occurred seamlessly and the impact of the death of
Sahraoui and HVT of the GSPC proved fleeting. In fact, it was not even necessary
for the executive council to meet to discuss the nomination of the new leader.
Droukdel automatically assumed the position of the new emir of the group. His
nomination was not contested; after Droukdel’s survival was confirmed,
Belmokhtar stepped down voluntarily and confirmed Droukdel’s position, quashing
any rumors of internal fighting within the group.li
Upon taking office, Droukdel immediately initiated conversations with other
Algerian groups to unite the Islamic movement in the country under one flag, that of
the GSPC. Faced with pressure from the Algerian army and allured by Droukdel’s
entreaties, which included offers to organize training and coordinate operations,
many groups joined the GSPC and its membership swelled.
Moreover, within one year of taking office, Droukdel led the first operation of
the GSPC outside Algerian borders. The raid on the remote Lemgheiti barracks in
Mauritania killed 150 soldiers. Abu Musab al-Zarqawi congratulated Droukdel for
his role in organizing this operation.lii
Additionally, some experts credit Droukdel with introducing new strategies of
violent action, including suicide bombings, to Algeria. On April 10, 2007, the new
organization claimed credit for two suicide car bomb attacks in Algiers that killed
61 Vol. 5, Ed. 2
Defense Concepts
23 people. This strike was the most aggressive and deadliest attack executed in
Algeria in years. Droukdel imported other Al Qa’ida tactics as well, including the
use of vehicle-borne improvised explosive devices and satellite imagery for the
geolocalization and planning of attacks. Droukdel also promoted the use of multime-
dia technology as a new component in the ideological battle for the movement. For
example, he began filming operations and including them in sensational videos
distributed on the Internet.liii The video “Jahim Al-Murtadin” (The Apostates' Hell)
featured footage of the groups' brutal killings set to a soundtrack of jihad songs
performed by a male choir. The attack sequences were interspersed with statements
by Al Qa’ida commanders and footage from the GSPC training camps. liv
Some scholars have argued that although the alarming internationalization of the
Algerian insurgency was initiated in 2003, the strategic shift – from local to global –
really began under the leadership of Droukdel. According to U.S. and European
officials, Droukdel decided to intensify efforts to reach out to Al Qa’ida and other
extremist networks. The earliest contacts regarding a union occurred between
Droukdel and Al-Zarqawi, and were dated from 2004, almost immediately after
Droukdel became head of the group. From that time on, contacts with Al-Zarqawi
were ongoing. To bolster ties with Al Qa’ida, Droukdel dispatched several emissar-
http://www.nytimes.com
Harald Ickler, who was kidnapped by Al Qaeda in the Islamic Maghreb, presents a photo
of his captors, including one of the group’s top operatives, Amari Saifi, right.
Vol. 5, Ed. 2 62
Defense Concepts
ies to Iraq. In September 2006, Al Qa’ida announced that it had formalized its
alliance with Droukdel’s network.lv
Hence, the HVT of Sahraoui failed to degrade or destroy the capacity of the
GSPC to continue its attacks. Sahraoui was replaced by Droukdel, a commander of
arguably superior expertise and talent. In the year immediately after Sahraoui was
eliminated, the GSPC conducted 56 attacks. This case study demonstrates that HVT
strikes should not be regarded as an assured way to cripple a terrorist organization.
In contrast to the HVT strategy used against the GSPC, Algeria offered a
six-month amnesty to Islamic militants on the condition of surrender. The offer was
quietly extended indefinitely. This strategy effectively exploited fissures within the
group. Many GSPC leaders took advantage of the offer, each bringing their own
knowledge of GSPC activities while promising to encourage other militants to
follow their example. Consequently, infighting regarding the GSPC’s involvement
in the Iraq War was compounded by distress over difficulties fillings its ranks with
new recruits.lvi
Recommendations:
To determine the succession plan of various jihadist groups, analysts must first
develop a better understanding of their organizational structure. Some groups are
more bureaucratic in nature. They are characterized by a formal division of power,
a hierarchy among office, and formal and informal networks that connect organiza-
tional actors through flows of information and patterns of cooperation. On the
contrary, other groups utilize a network structure whereby they outsource certain
functions, harness volunteer labor, and adopt a minimalist model. Analysts should
also examine the governance and decision-making structure of terrorist groups.
While some groups are more consultative, others seem to be more oligarchic.
Although some groups make decisions through parliamentary processes, others
require consensus or unanimity. By comprehensively examining the mechanics of
militant groups, researchers can better determine what sort of protocol the organiza-
tion in question has in place for replacing its leaders and if future leaders will be
promoted, appointed, or elected.
The most effective way to determine the anatomy of a terrorist organization is to
analyze the terrorists’ own discourse. In recent years, jihadist groups have developed
sophisticated communication systems with the ability to react to political develop-
ments. Jihadist sites on the Internet that are used by terrorist organizations and their
supporters to spread their extremist message and to recruit funds and activists can
reveal important information about the group’s infrastructure. Similarly, printed
media from Arab countries as well as Arabic-language London dailies and maga-
zines and Iran, Pakistan, Afghanistan, India, and Turkey should also be scrutinized
for indications of the group’s configuration. Audio media, such as cassettes and
63 Vol. 5, Ed. 2
Defense Concepts
radio broadcasts and visual media from TV channels in the Arab world and jihadist
videos posted online should also be translated and analyzed. From these sources,
scholars can also glean information about emerging alliances or oppositions and
conflicts within the jihad camp. Writings and speeches by both prominent Islamic
terrorists like Osama bin Laden and Abu Musab al-Zarqawi as well as other less
notorious jihadis can also provide powerful insights into the authority structure and
relationships that characterize their organization.
Social Network Analysis (SNA) can also be applied to analyze the structure of
Al Qa’ida and related terrorist organizations. SNA models individuals, places, and
objects as nodes of a graph and represents relations between each node as links.
Important subgroups can be identified as cliques on the graph and individuals in
particular positions of control or influence can be identified by their centrality on the
graph. Substructures of particular interest, such as communications chains can also
be discovered using SNA. Researchers can also use Dynamic Network Analysis
(DNA), which varies from traditional SNA in that it can handle large dynamic
multi-mode, multi-link networks with varying levels of uncertainty.
Figure 4: The Social Network of the Terrorist Group Responsible for the 1988
U.S. Embassy Bombing in Kenyalvii
Knowledge of a terrorist group’s design and succession strategy can be used not
only to determine if the group is an appropriate candidate for a HVT strike, but also
to develop measures that leverage and heighten the group’s dysfunctional structure,
behavior, and both internal and external competition. Equipped with an understand-
ing of the source of authority and legitimacy of leadership, other sub-lethal muni-
tions and tactics can be designed to undermine the influence of enemy leadership.
Vol. 5, Ed. 2 64
Defense Concepts
First of all, terrorist group members who appear less committed to the
organization’s goals should not be removed, especially if they can be reliably
monitored. Some terrorist operatives may be galvanized by thrill, financial gain, or
attention-seeking. Others may furtively disagree with the group’s priorities. Because
terrorist leaders must delegate tasks to their subordinates, allowing less dedicated
members who are unlikely to perform well to remain in the organization can lead to
agency problems and organizational dysfunction.lviii
Effective information oper-
“Dissension among the leadership of ations can be used to in-
terrorist groups decreases cohesiveness crease internal dissension
and control within the organization..” in a terrorist group. Dr.
Jerrold Post suggests that
psychological operations can be used to “magnify tension, sow distrust, recast the
image of the leader or pretenders to the throne, or weaken the already stressed
climate and paralyze the group.”lix Propaganda can cause fissures in the enemy
camp by openly bringing up and playing upon contentious questions and issues
which the enemy wishes to ignore, such as the tolerability of suicide attacks.
Agency problems experienced by terrorist networks can be aggravated by
emphasizing the difference between affiliated groups. Publicly recognizing the
differences between associated groups or the disparity between peripheral groups
and the center may generate competition for authority between these cliques. For
example, jihadists in the North Caucasus republics (Chechnya and its neighbors)
recently denounced ultra-radical "Kharijites" in their midst for holding heterodox
positions.lx The disagreements between Salafi jihadists and Kharijites could be
exacerbated by U.S. information operations specialists. Nevertheless, the manipula-
tion of specific tribal rivalries and competitions requires a more sophisticated
understanding of the subtle points and positions that differentiate these groups.
Psychological operations can also be used to invalidate the legitimacy and
tarnish the reputation of key leaders within an organization. For example, the
Pentagon released a video allegedly discovered by U.S. forces in a hideout in the
Al-Yusufiyah neighborhood of southern Baghdad that portrays al-Zarqawi fumbling
with a U.S. M249 squad automatic weapon (SAW), the standard weapon of the U.S.
Army. The video portrays him as a foolish and incompetent field commander.lxi
Psychological operations can also be designed to play up rivalry among leaders,
create fissures between working partners, or cast doubt over the loyalties of old
comrades. Dissension among the leadership of terrorist groups decreases cohesive-
ness and control within the organization. “Divide and conquer” is an old, highly
effective strategy.
Efforts should also be made to facilitate exit for operatives from the terrorist
group. As the Algerian example demonstrates, governments can implement national
65 Vol. 5, Ed. 2
Defense Concepts
Sarah Catanzaro is a Program Manager at the Center for Advanced Studies, where
she directs the “Understanding Clandestine Organizations Program.” As an Honors
Scholar at the Center for International Security and Cooperation at Stanford Univer-
sity and Recipient of the William Perry Award for Excellence in Interdisciplinary
Studies, she examined the relationship between Al Qa’ida and local jihadist groups.
Vol. 5, Ed. 2 66
Defense Concepts
i Bergen, Peter and Katherine Tiedemann. 4 February, 2010. The Year of the Drone. Wash-
ington, DC: New America Foundation.
ii Jenna Jordan. When Heads Roll: Assessing the Effectiveness of Leadership Decapitation.
ing its Leaders Reduce a Terrorist Group's Activity? The Journal of International Policy
Solutions 9: 40-50.
iv Johnson, Patrick. 2009. The Effectiveness of Leadership Decapitation in Counterinsur-
gency. Stanford University .
v Freeman, Michael, and Gordon McCormick. 28 February, 2007. Rethinking Decapitation
News. http://www.cbsnews.com/stories/2009/11/09/world/main5584584.shtml.
viii Anon. 2009. Offensive by Pak and U.S. drones has Shaken Qaeda. Indian Express. June
2. http://www.indianexpress.com/news/offensive-by-pak-and-us-drones-has-shaken-
qa/469521/.
ix Evans, Michael. 3 January 2009. Death from Above: How Predator is Taking its Toll on
Leadership. Fort Leavenworth, Kansas: U.S. Army School for Advanced Military Studies.
xi Ibid
xii Ibid
xiii Ibid
xiv Loo, Bernard. 2009. Military Transformation and Strategy. New York: Taylor & Francis.
xv Teal Group. 1 February 2010. Teal Group Predicts Worldwide UAV Market Will Total
Over $80 Billion In Its Just Released 2010 UAV Market Profile and Forecast. Teal Group
Corporation.
http://www.tealgroup.com/index.php?option=com_content&view=article&id=62:uav-
study-release&catid=3&Itemid=16.
xvi Department of Defense. 2010. Quadrennial Defense Report. Washington, DC: The
White House.
xvii EAA. 18 February 2009. U.S. Military Expands UAV Fleet. Young Eagles.
http://www.youngeagles.org/news/archive/2009%20-%2002_20%20-
%20UAV%20Fleet%20Expands.asp.
67 Vol. 5, Ed. 2
Defense Concepts
xviii Scahill, Jeremy. 23 November 2009. The Secret U.S. War in Pakistan. The Nation.
http://www.thenation.com/doc/20091207/scahill.
xix Risen, James. 10 August 2009. U.S. to Hunt Down Afghan Drug Lords Tied to Taliban.
http://www.newamerica.net/publications/articles/2009/drone_war_13672.
xxiii Bergen, Peter, and Katherine Tiedmann. 24 February 2010. The Year of the Drone .
http://www.newamerica.net/publications/articles/2009/drone_war_13672.
xxviii Kilcullen, David, and Andrew Mcdonald Exum. 17 May 2009. Death From Above,
http://www.newamerica.net/publications/articles/2009/drone_war_13672.
xxx Mayer, Jane. 2009. The Predator War. The New Yorker, October 26.
http://www.newyorker.com/reporting/2009/10/26/091026fa_fact_mayer.
xxxi Bergen, Peter, and Katherine Tiedemann. 3 June 2009. The Drone War .
xxxii
Bergen, Peter, and Katherine Tiedemann. 24 February 2010. The Year of the Drone.
Counterterrorism Strategy Initiative Policy Paper. Washington, DC: New America Founda-
tion.
xxxiii Ibid
xxxivKesner, Idalene F., and Terrence C. Sebora. 1 April 1994. Executive Succession: Past,
Present & Future. Journal of Management 20, no. 2: 327-372.
doi:10.1177/014920639402000204.
xxxv Datta, Deepak K., and James P. Guthrie. September 1994. Executive Succession: Orga-
Vol. 5, Ed. 2 68
Defense Concepts
xxxvi Islam, Syed Serajul. May 1998. The Islamic Independence Movements in Patani of
Thailand and Mindanao of the Philippines. Asian Survey 38, no. 5: 441-456.
xxxvii Hoffman, Bruce. 1996. Intelligence and Terrorism: Emerging Threats and New Securi-
ty Challenges in the Post-Cold War Era. Intelligence and National Security 11, no. 2: 207.
doi:10.1080/02684529608432353.
xxxviii Helmich, Donald. April 1977. Executive Succession in the Corporate Organization: A
Reliance on Rules of CEO Succession. Administrative Science Quarterly 44, no. 2: 384-
416.
xl Bergen, Peter, and Katherine Tiedmann. 24 February 2010. The Year of the Drone . New
Rocher.
xlvi Ibid
xlvii
Boudali, Lianne Kennedy. 2007. The GSPC: Newest Franchise in al-Qa’ida’s Global
Jihad. The North Africa Project. West Point: The Combating Terrorism Center, April.
xlviiiGuidere, Mathieu. 2007. Al Qa'ida a La Conquete du Maghreb. Paris: Editions du
Rocher.
xlix Ibid
l Ibid
li Ibid
lii Lecocq, Baz, and Paul Schrijver. 2007. The War on Terror in a Haze of Dust: Potholes
and Pitfalls on the Saharan Front. Journal of Contemporary African Studies 25, no. 1: 141.
doi:10.1080/02589000601157147.
liii Boudali, Lianne Kennedy. April 2007. The GSPC: Newest Franchise in al-Qa’ida’s
Global Jihad. The North Africa Project. West Point: The Combating Terrorism Center.
liv Kohlmann, Evan. May 2007. Two Decades of Jihad in Algeria: the GIA, the GSPC, and
69 Vol. 5, Ed. 2
Defense Concepts
http://www.nefafoundation.org/miscellaneous/nefagspc0507.pdf.
lv Johnson, Thomas. November 2006. An Introduction to a Special Issue of Strategic In-
sights: Analyses of the Groupe Salafiste pour la Prédication et le Combat (GSPC). Strate-
gic Insights 5, no. 8.
lvi Steinberg, Guido, and Isabelle Werenfels. 2007. Between the ‘Near’ and the ‘Far’ Ene-
my: Al-Qaeda in the Islamic Maghreb. Mediterranean Politics 12, no. 3: 407.
doi:10.1080/13629390701622473.
lvii Carley, Katherine. 26 April 2008. Vulnerability Assessment on Adversarial Organiza-
tion: Unifying Command and Control Structure Analysis and Social Network Analysis. SI-
AM International Conference on Data Mining, Workshop on Link Analysis,
Counterterrorism and Security, Atlanta, Georgia.
lviiiShapiro, Jacob. 13 May 2008. Bureaucracy and Control in Terrorist Organizations.
Princeton, NJ: Woodrow Wilson School. http://www.utdallas.edu/epps/terrorism-and-
policy-conference/papers/Shapiro_Bureaucracy_Control_Terrorism_1.pdf.
lix Post, Jerrold. 2005. Psychological Operations and Counterterrorism. Joint Force Quar-
and the Rise of a Takfiri Movement – A Historical and Doctrinal Analysis. MEMRI. The
Jihad and Terrorism Threat Monitor.
lxi Hernandez, Nelson. 5 May 2006. U.S. military airs video of a bumbling al-Zarqawi. SF-
Gate.
lxii Post, Jerrold. 2005. Psychological Operations and Counterterrorism. Joint Force Quar-
Vol. 5, Ed. 2 70
Defense Concepts
71 Vol. 5, Ed. 2
Defense Concepts
financial resources and political support to the ERRF. On the other, they may elect
to defect, prioritizing near-term state-level concerns over the potential long-term
advantages offered by this joint force. According to neoliberal institutionalist
thinking, such collaboration problems are best solved by providing information to
relevant parties. This information would ostensibly help each state understand the
benefits of cooperation as well as the intentions of the other actors. Parties would
thus be able to assuage fears that their own unilateral investments in the ERRF
would not be reciprocated by fellow EU members.
The theoretical literature on security regimes and collective security suggests
that such information sharing and cooperation is especially difficult in the security
realm. As a result, this literature largely focuses on the challenges involved in these
efforts. According to Robert Jervis’s seminal work on security regimes, the critically
important, competitive, unforgiving, and uncertain nature of security politics usually
obliges leaders to rely “on unilateral and competitive modes of behavior rather than
by seeking cooperative solutions…The result is that security regimes, with their call
for mutual restraint and limitations on unilateral actions, rarely seem attractive to
decision makers.” iiiThe literature, thus, creates a behavioral dichotomy in the
security realm: cooperation entails mutual restraint while competition involves
unilateral action. Because power-oriented theorists perceive competitive behavior
as more advantageous in the context of a worst-case scenario view of international
relations, they, are pessimistic about the likelihood of security regimes’ emergence
and resilience. As John Mearsheimer puts it:
Nevertheless, however unlikely it may seem to realists, one region does exhibit
such genuine peace. In Europe, Jervis’s challenges have been successfully overcome.
Cooperation and restraint define state policies. A security regime, which Jervis
defines as “principles, rules, and norms that permit nations to be restrained in their
behavior in the belief that others will reciprocate,” developed in Western Europe
after World War II, chiefly because of the NATO alliance and its codification of the
United States’ role as security guarantor.v The European security regime included
both formal NATO members and friendly neutral countries such as Ireland who
gained implicit U.S. protection. With the end of the Cold War, this regime expanded
east. Some states joined NATO outright while others, ostensibly neutral countries
entered the Alliance’s less-stringent Partnership for Peace. Their differing legal
status within NATO belied implicit inclusion within the European security regime.
73 Vol. 5, Ed. 2
Defense Concepts
Vol. 5, Ed. 2 74
Defense Concepts
regarding a potential U.S. retreat from international affairs in the early 1990s,
America’s considerable reluctance to act in Kosovo, and recurring episodes
involving transnational terrorism after 9/11 each inspired brief periods of ERRF
progress. But the uncertainty triggered by these occasions never constituted a total
informational failure that seriously compromised regional security. Effective
“collective security allows states to develop a certain degree of immunity toward
isolated developments and changes in the strategic setting that would, under anarchy,
have far greater reverberations.”viii When these major shocks occurred, this
immunity conditioned Europe’s response, as it chose greater defense integration
with an eye towards crisis response over developing unilateral capabilities for major
inter-state warfare. Such policy prescriptions indicate that Europe’s sense of
insecurity was considerable but not fundamental. In each instance, Europe’s
inability to respond to crises was exposed, but at no point was its territorial security
threatened in ways that undermined the foundations of its security regime. If
Member States had truly lacked substantial information about the potential shift to
noncooperation by their neighbors or the United States, security regime theory
suggests that individual leaders would have pursued competitive, unilateral
strategies. Instead, leading European states pressed for more cooperation, not less.
These high-watermarks of ERRF institutional impetus, however, lasted only as long
as the crisis-induced uncertainty. Once it became clear that Europe’s status quo and
America’s security commitments would endure, cooperative action reverted back to
cooperative restraint. Commitments to the ERRF then faltered and though progress
slowed dramatically, it never stopped entirely.
75 Vol. 5, Ed. 2
Defense Concepts
remains strong among key nations and its halting but undeniable progress suggests
that such sentiments are more than just ‘cheap talk.’ European leaders appear to
understand that while the U.S. security guarantee offers a considerable degree of
immunity from external shocks, this immunity is not absolute. When it comes to the
‘big-ticket’ items of a modern fighting force, the ERRF remains deficient. Looking
forward, Europe’s limited sense of vulnerability is likely to lead to limited ERRF
progress. Barring a massive shock or a sudden retreat of U.S. primacy, it is hard to
imagine a serious and sustained European commitment to a muscular, independently
capable ERRF.
The following analysis reveals a clear pattern of EU behavior. First, an external
shock prompts European uncertainty. Leading states respond with pressure for a
cooperative military buildup. However, this brief burst of progress subsides when
Europe’s security regime, and in particular America’s commitment to it, proves
resilient. European nations, finding the costs of cooperative action excessive in light
of this commitment, revert to cooperative restraint. Such restraint inspires policies
contrary to military buildups, depriving EU joint forces of critical capabilities. This
status quo persists until the next shock, when the cycle begins anew. After discussing
this behavioral pattern, I describe ERRF progress—or general lack thereof—since
EU uncertainty after the last external shock waned EU uncertainty waned. I then
draw on neoliberal and constructivist thinking to offer alternative explanations for
the largely, but not completely, stagnant state of the ERRF. Finding these competing
interpretations insufficient, I conclude with a pessimistic evaluation of near-term
ERRF prospects in lieu of unanticipated shocks.
Vol. 5, Ed. 2 76
Defense Concepts
progress in strictly European defense cooperation ceased until after the collapse of
the Iron Curtain. In 1993, the WEU instituted a military Planning Cell, established
a relationship with NATO’s Military Committee, and built early, yet promising, joint
frameworks for non-member observation, armaments research and development,
and collective security.x As the decade progressed, NATO and the U.S. security
guarantee did not wither as many predicted. Instead, NATO maintained its vitality
and even expanded to include former Soviet republics. European doubt of America’s
commitment eased gradually.
In 1997, efforts to unify existing European institutions into a broader, deeper
European Union were in full swing. The long-standing WEU and its more recent
security cooperation mechanisms would have provided valuable organizational
platforms for the EU to build upon. But formerly neutral states—Sweden, Denmark,
Austria, and Ireland chief among them—vociferously opposed integrating the
WEU’s security apparatus “with an open-ended protocol containing the collective
defence guarantee for those who wished to sign it. The formerly ‘neutral’ members
of the EU, particularly Sweden, had objected to integrating the WEU ‘lock, stock
and barrel’.”xi The partisan nature of this debate proves puzzling for security regime
theory, as both sides were part of the same European security regime—one formally
tied to the NATO apparatus and the other protected implicitly by its continued
existence. If both believed in cooperative security, why did WEU integration
discussions become so uncooperative?
77 Vol. 5, Ed. 2
Defense Concepts
consistently been lower than the EU average.”xii By avoiding excessive Cold War
entanglements—and with them, commensurate military responsibilities—these
countries were able to apply a ‘neutrality dividend’ toward other political priorities.
When whatever specter of danger they faced diminished after the Cold War, this
dividend only increased. Today, Sweden, Denmark, Ireland, and Austria possess,
respectively, the 33rd, 51st, 55th, and 37th-ranked economies in the world.
Comparatively, the percentages of GDP they devote to military expenditures vis-à-
vis the rest of the planet are disproportionately small, as they rank respectively, 106th,
125th, 146th, and 140th.xiii
These countries were able to evolve as military dwarves because of the ample
information they possessed on other states’ intentions—especially those of their
larger Western European neighbors and American security benefactor. Ireland, for
example, could engage in a policy of ‘disarmed neutrality’ because “NATO
implicitly guarantees the security of Ireland. Furher, during the Cold War…Ireland
was safely tucked away behind Britain.”xv Given the contentious history of Irish-
British relations, the UK’s de facto security relationship with the Emerald Isle
speaks to a remarkable advancement toward mutual assurance. Belfast’s awareness
of other countries’ intentions encouraged both restraint of its own military spending,
and total confidence that neglecting WEU security institutions would not inspire
retaliatory action from powerful neighbors. Had leading European states been more
sensitive about the security status quo’s resilience to external shocks, some measure
of political or diplomatic retaliation for shirking regional security commitments
would have been implemented as a predictable practice of statecraft. Instead,
objections from Ireland and similarly situated states led the EU “to dismantle the
operational institutions recently established by the WEU and build them up again
from scratch as the new EU Military Staff and the EU Military Committee.”xvi
Vol. 5, Ed. 2 78
Defense Concepts
79 Vol. 5, Ed. 2
Defense Concepts
traditional military infrastructure, they proved ill-suited for stopping small, low-tech
groups of armed thugs from victimizing civilians—a much more common foe in
situations calling for humanitarian intervention. In fact, the seventy-eight days of
NATO air strikes were the period of the “most egregious abuses,” inciting more
violent behavior among Serbs, not less.xx Going forward, Europe was not
excessively worried that America would neglect it in the event of an outside invasion.
It did, however, have legitimate doubts about the reliability and efficacy of future
U.S. involvement in lesser crises that involved European interests rather than
American ones. These concerns, political and practical, explain the EU’s response to
Kosovo: the ERRF.
Vol. 5, Ed. 2 80
Defense Concepts
Union must have the capacity for autonomous action, backed up by credible
military forces, the means to decide to use them, and a readiness to do so,
in order to respond to international crises…In strengthening the solidarity
between the member states of the European Union, in order that Europe can
make its voice heard in world affairs, while acting in conformity with our
respective obligations in NATO, we are contributing to the vitality of a
modernised Atlantic Alliance which is the foundation of the collective
defence of its members.xxiv
But this joint statement, reflecting the later consensus at Cologne and Helsinki,
did not reflect a genuine, common understanding. It soon became clear that Britain
and France possessed dramatically different visions of the EU’s military future and
of cooperative action itself. France proceeded to emphasize the autonomy of a future
EU force from the Alliance and its American sponsor. Britain, meanwhile, worked
vigorously to convince Washington that a new European commitment to defense
spending “would not supplant Europe’s transatlantic link with the United States
through NATO but would enhance it.”xxv These divergent concepts stem from each
country’s unique history, which conditions its approach to the European security
regime. As Constantine Pagedas puts it, “While Great Britain is one of America’s
81 Vol. 5, Ed. 2
Defense Concepts
closest and most trusted allies, as well as one of the strongest supporters of NATO,
France has traditionally sought to enhance its own power and prestige in Europe
through the deliberate diminishment of NATO and U.S. influence on the
continent.”xxvi British tradition informed the UK’s position of enhancing the existing
security regime by adding independent capabilities and interdependent EU-NATO
institutions to direct them. French pride inspired a desire for independent EU
capabilities and institutions. France had nothing more to fear from the U.S. than
Britain (which is to say nothing at all), suggesting that its behavior was not intended,
as a realist might surmise, to balance against America. Paris perceived the
inconsistency of American commitments in the same manner as London and was
equally committed to advancing the European security regime. Their conflicting
visions of cooperative action were informed by different national histories, not
different perceptions of threat.
Aware that the
embryonic ERRF“The British vision of cooperative action—
had the potential to a European military buildup with U.S. support
both enhance and and input—was costly. The French vision of
diminish EU-NATO
cooperation, the cooperative action—a European military build
United States entered up that excluded the U.S. from its governing
the discussion. institutions—was even more so.”
Alhough Washington
welcomed additional
European defense spending, it demanded that the ERRF in no way duplicate
resources, decouple the EU defense structure from NATO, or discriminate against
non-EU NATO members. These actions, the U.S. believed, would foster competition
and undermine the European security regime. Britain, which so often aligns with
U.S. on foreign policy priorities, saw little conflict between its ERRF vision and
these U.S. conditions. Britain’s version of autonomy demanded the ability to
conduct operations where the Alliance was not engaged—essentially, instances
where the U.S. was not opposed to action per se but lacked the political will or
strategic interest to commit forces and resources. France, meanwhile, resisted each
American stipulation. For Paris, autonomy necessitated duplication of capabilities,
an independent planning apparatus, and the ability to proceed without interference
from non-EU NATO members like the U.S. and Turkey. The British vision of
cooperative action—a European military buildup with U.S. support and input—was
costly. The French vision of cooperative action—a European military buildup that
excluded the U.S. from its governing institutions—was even more so.
As time passed and the post-Kosovo sense of urgency faded, neither side was
willing to shoulder the costs of enhanced military capabilities alone. A neoliberal
Vol. 5, Ed. 2 82
Defense Concepts
would have been encouraged by the cautious institution-building process that began
in 2000, as joint EU-NATO working groups initiated discussions on intelligence
sharing, joint planning, and future “more permanent consultation
arrangements.”xxviiBut the main barrier to ERRF progress was not disputes between
British and French-led factions. Both parties eventually agreed on a shortcut to get
the ERRF up and running: borrowing NATO assets to fill in EU capability gaps. In
a telling response to the obstacles posed by insufficient capability, both sides
reverted to a strategy of indefinitely relying on NATO and implicitly American,
resources. However, once this issue was resolved, Turkey—a nation inside NATO’s
security apparatus possessing an ambivalent attitudes toward Europe—blocked
ERRF-NATO collaboration for it “wanted to have assured participation in the
planning of operations before agreeing to assured EU access to NATO assets.”
xxviiiNeoliberal emphases on information deficits can explain objections by Turkey
83 Vol. 5, Ed. 2
Defense Concepts
Continued EU-NATO
negotiations resulted in the 2003
Berlin Plus arrangements, which
authorized ERRF access to NATO
planning, a NATO European
command option for ERRF
http://www.nato.int
operations, and Europe’s ability to
request NATO assets and
capabilities. Berlin Plus required
EU-NATO planning
cooperation—a stipulation that
cut to the core of the UK-France NATO Secretary General, Jaap de Hoop Scheffer
debate. France, Germany, and European Union High Representative,
Belgium, and Luxembourg had Dr. Havier Solana mark the end of NATO’s SFOR
initially sought to establish a Operation and the establishment of the EU “Althea
multi-nationalized EU planning Operation.”
unit that would comprise “a core European defense grouping distinct from the EU's
collective endeavour.”xxxiv Britain, meanwhile, wanted planning for particular
operations to be directed by a leading ‘framework’ nation and supported by
‘seconded’ staff from other countries, with the whole operation closely tied to
planners at NATO headquarters. Planning, in the British model, would be much
more ad hoc and operational; in the French, more permanent and strategic.
Negotiations settled on the UK model, eliciting a “significant concession from those
EU governments which had long resisted the idea that the EU’s strategic ambitions
should somehow be tied to or dependent on NATO.”xxxv This concession was
“considered a triumph for those governments—particularly the British—which had
been uneasy about…an alternative, full-scope European strategic and operational
planning organization.”xxxvi
As of 2003, one could say that the UK and its supporters ‘won.’ The nations of
the EU agreed that ERRF would be closely linked to NATO for the foreseeable
future. The United States’ support for increased EU capabilities bolstered the British
faction and its model of cooperative action. France, meanwhile, found the costs of
excluding the U.S. from any collective security arrangement prohibitive and
conceded to Britain on this matter. Rather than investing its political and financial
resources in an autonomous EU force, France would pursue greater influence within
the existing security regime.xxxvii Political and strategic ERRF autonomy were only
important so far as the ERRF was capable of physical and tactical independence—
which it was not. If the EU wanted to act independently in a crisis, but had no way
of flying its personnel there, autonomous decision making became a moot point.
Going forward, the ERRF would depend on NATO capabilities. After four years of
Vol. 5, Ed. 2 84
Defense Concepts
The EU now has operational capability across the full range of Petersberg
tasks, limited and constrained by recognised shortfalls. These limitations
and/or constraints are on deployment time and high risk may arise at the
upper end of the spectrum of scale and intensity, in particular when
conducting concurrent operations.xl
Reading this statement, one might have assumed that the EU was actually capable
of executing tasks for which it claimed operational capability. This assumption
would be incorrect. In fact, “the notion of becoming ‘operational’ referred primarily
to the organisational set-up of the PSC [Political and Security Committee], the MC
[Military Committee] and the EUMS [Military Staff].”xli Though these institutions
represented bureaucratic victories, they were not yet capable of achieving military
ones. Despite the EC’s assertion of operational capability, the functional value of the
ERRF as a joint force capable of warfighting and stability operations was overstated.
The EU had good reason to be proud of its 2003 peace-support operations in
Macedonia and DPR Congo—but these small-scale, low-intensity efforts were not
85 Vol. 5, Ed. 2
Defense Concepts
Headline Goal 2010 decapitates the Helsinki Headline Goal and extends the
time required for the realisation of a force a third the size, by roughly three
times as long. Indeed, thirteen times 1,500 [the size of an ERRF
Battlegroup] equals 19,500, which is roughly one third of the original
Headline Goal…Helsinki Goal 2010 is, therefore a sub-division of a sub-
division.xliii
The ERRF vision thus shrank from fifteen brigades to thirteen battalion-sized
Battlegroups of roughly 1,500 men. A 2009 EU document declares that on “1
January 2007 the EU Battlegroup Concept reached Full Operational Capability.”xliv
Alhough the new Headline Goal is markedly less ambitious, since 2007, a six-month
rotation of Battlegroups has successfully placed two of its number ‘on call’ to
respond to crises. These smaller, lighter forces certainly have value. They are
well-suited for the sort of actions the EU has found itself undertaking: police
training, rule-of-law promotion, and disaster relief chief among them. In light of
September 11th, the 2010 goal also states that ERRF tasks “might also include joint
disarmament operations, support for third countries in combating terrorism and
security sector reform.”xlv The past two decades suggest that crises can occur at any
time. EU institutions and Member States agree that “to respond rapidly to emerging
crises... [they] need to be ready.”xlvi This desire to enhance preparedness explains EU
progress—limited but real—in certain areas of ERRF capability.
Political support for continued, though circumscribed, ERRF progress appears
genuine. In 2008, French President Nicholas Sarkosy presented the acquisition of a
British carrier for the ERRF “a central plank of [his] plans for his EU presidency.”xlvii
Even the neutral countries have warmed up to the 2010 goal; Sweden now leads an
operational Nordic Battlegroup. Influential Swedish Defense Minister Sten Tolgfors
believes “there is so much to gain. It allows us to reach a greater depth in capability.
Such supportive rhetoric suggests awareness that future humanitarian, if not
existential, crises merit attention. In a later speech justifying Sweden’s military
Vol. 5, Ed. 2 86
Defense Concepts
cooperation with the EU and defense modernization efforts, Tolgfors warned that “If
anyone were to act against a Baltic State—the way Russia acted against Georgia—
that would have fundamental security policy implications.”xlviii
The rhetoric of cooperative action, however, has been belied by the reality of
cooperative restraint when it comes to high-end asset acquisitions. Sarkosy’s carrier
ambitions elicited a curt response from the UK Defense Ministry: “We have no plans
to use an aircraft carrier in this way.” xlix The capability gap that needs to be
addressed through cooperative action most urgently is airlift capability, which is
currently provided only by a revealing stop-gap measure. The ERRF’s Strategic
Airlift Interim Solution (SALIS) depends on leased, privately-owned Russian and
Ukrainian planes, with two “on full-time charter, two more on six days notice and
another two on nine days notice.” lReliance on private firms in the former Soviet
Union (Volga-Dnepr and ADB, respectively) for timely delivery of lift services
stands in stark contrast to the Helsinki vision of autonomous action, credible forces,
and Europe playing its ‘full role on the international stage.’ But continued access to
http://www.life.com
An Antonov AN-124-100 giant caro transport jet stands with its front cargo door open at the
Leipzig-Halle international airport March 23, 2006 in Leipzig, Germany. Two of the
Antonovs is stationed at Leipzig as part of the Strategic Airlift Interim Solution (SALIS),
whereby NATO and the European Union will use the giant planes for military and
humanitarian missions.
87 Vol. 5, Ed. 2
Defense Concepts
NATO and U.S. resources provides a critical safety-net should SALIS fail or an
emergency demand use of an aircraft carrier. European awareness of America’s
ongoing commitment to its security regime continues to stunt EU progress toward
autonomous crisis-response capability.
Alternative Explanations
There are other possible means of explaining ERRF shortcomings besides a
robust security regime and dynamic between cooperative action and cooperative
restraint posited by the author. Notably, realist pessimism about the prospects for
genuine peace and security cooperation render this major theoretical school silent on
the subject of successful security regimes. For neoliberal institutionalists,
meanwhile, information is everything. When mutual gains are to be had, improved
awareness of those gains and of other players’ intentions can help achieve them.
According to this line of thought, greater public disclosure of state security policies
and stronger institutions would aid ERRF development. For example, a neoliberal
might suggest that the more ad hoc British model of EU military planning indicates
a resistance to more involved institutional cooperation. But at no point have EU
states questioned the benign intent of fellow members. I have found no evidence
suggesting that some states are predisposed to making sizeable individual
contributions, but elect not to do so based exclusively on their that other states will
fail to reciprocate.
Uncertainty after crises, rather than assurance, has thus far been the key to
progress. Inadequate information regarding American commitments did not spark
competition and balancing, but did incite calls for deeper, more active cooperation.
The British planning model ‘won’ only because proponents of an independent
strategic planning unit—France, Germany, Belgium, and Luxembourg—found the
costs of this provision prohibitive and unnecessary, especially in light of the
endurance of post-9/11 U.S. commitments to Europe and NATO. Had anxiety
regarding American intentions persisted, perhaps the French faction would have had
a stronger case. The strength of the European security regime allows it to dispel
uncertainty with impressive speed. The myriad diplomatic and institutional conduits
of U.S.-European communication have been vital to the rapidity of this reassurance.
A neoliberal might also argue that if sufficient information is available, perhaps
the mutual gains of the ERRF are simply not worth its considerable short-term costs.
But these gains are hard to ignore. Though EU defense expenditures equate to 65%
of America’s, what Member States do spend is riddled with duplication and waste,
leaving Europe “only packing about 10% of the U.S. punch” [emphasis mine]. liJoint
forces and sustained cooperative action would almost certainly reduce waste,
promote economies of scale, and allow for national specialization. If EU states are,
contrary to much IR thinking, favoring other spending priorities over security-
Vol. 5, Ed. 2 88
Defense Concepts
related ones, such action demands an explanation. The enduring, reassuring nature
of the European security regime offers a potentially powerful account.
Rather than information, a constructivist interpretation of ERRF development
might instead emphasize the importance of identity and social roles. Initially,
Jennifer Mitzen’s insights regarding ontological security appear instructive. As
Mitzen puts it, states’ “first response to uncertainty is thus not necessarily
‘information search’, but to reduce psychological stress.”liiliii This stress can be
reduced by routinizing relations with other states, relations that individual states
may ultimately use to define their identities. Mitzen largely focuses on how states in
conflict can create identities contingent upon continued struggle. But European
identities—and indeed, the much discussed ‘European identity’—are predicated
upon peaceful relations. For Mitzen, Europe’s ability to learn from previous positive
interactions and pursue higher Maslowian needs would suggest its members’
internationalization of a healthy “basic trust system.”liv A “rigid or maladaptive basic
trust,”lv however, causes actors to perceive all disruptions as threatening. The
healthy-maladaptive dichotomy implies that the former is positive, the latter
undesirable.
What Mitzen does not consider is the potential of a healthy basic trust to
undermine state capacity for threat response. Enduring U.S. support has allowed
Europe to ‘bracket’ a wide array of potential threats, perhaps too wide. Generally
healthy ties with the U.S. have created a yawning gap in military capabilities. In
1999, Europe found itself unable to respond to a relatively predictable provocation
by Slobodan Milosevic. A decade later, the tenuous state of SALIS, ongoing NATO
dependence, and the stripped down Battlegroup model suggest more inability than
capability. If Europe has engaged in excessive bracketing, then its basic trust system
may be so rigid as to render it incapable of adapting to potential threats. In other
words, Europe’s trust system may be too healthy for the ERRF’s future viability.
This is not to say that European security absolutely demands a rapid reaction force,
only that the way Europe perceives and produces its ontological security is likely to
preclude major success in ERRF development. Overly healthy basic trust thus has
its downsides. Mitzen’s conceptualization is not necessarily inaccurate, but in light
of the unprecedented nature of European inter-state cooperation and basic trust, it
appears incomplete.
Conclusion
Barring a massive shock with ongoing effects or a sudden retreat of U.S.
primacy, it is hard to imagine a serious and sustained European commitment to a
muscular ERRF. Ironically, it is in just such instances that Europe would wish it had
a strong, capable joint force on hand. Despite the EU’s ability to articulate grand
integrative visions, the Union’s successful security regime favors cooperative re-
89 Vol. 5, Ed. 2
Defense Concepts
straint over cooperative action. Limited progress continues, but only in proportion
to the level of uncertainty perceived by Member States. Without renewed uncertain-
ty, the ERRF, already ten years in the making, is likely to remain inert for years to
come.
iKagan, Robert. 2003. Of Paradise and Power: America and Eur ope in the New World
Order. New York: Alfred A. Knopf.
ii
Kollias, Christos, George Manolas, and Suzanna-Maria Paleologou. July 2004. “Defence
expenditure and economic growth in the European Union: A causality analysis” Journal of
Policy Modeling 26, No. 5: 553-569.
iiiJervis, Robert. Spring 1982. “Security Regimes” International Organization 36, No. 2,
International Regimes: 359.
iv Mearshimer, John. Winter 1994-1995. The False Promise of International Institutions”
3: 51.
vii Kupchan, Charles and Clifford Kupchan. Summer 1991. “Concerts, Collective Security,
<http://www.weu.int/History.htm>
xVan Eekelen. From Words to Deeds, Brussels: Center for European Policy Studies Press:
11.
xi Ibid: 27.
xii
Kollias, Christos, George Manolas, and Suzanna-Maria Paleologou. July 2004. “Defence
expenditure and economic growth in the European Union: A causality analysis” Journal of
Policy Modeling 26, No. 5: 553-569.
xiii Both rankings from Staff, 2009. Central Intelligence Agency (U.S.). “CIA World Fact-
book.” <https://www.cia.gov/library/publications/the-world-factbook/index.html>
xiv Staff, 2006. European Defense Agency, “2006 National Breakdowns of European De-
fense Expenditures”
<http://farm4.static.flickr.com/3027/2544647319_7edc746761.jpg?v=0>
xv Jesse, Neal G. “Choosing to Go It Alone: Irish Neutrality in Theoretical and Compara-
tive Perspective.” International Political Science Review, 27: 7 (2006), pp. 17.
<http://ips.sagepub.com/cgi/content/abstract/27/1/7>
Vol. 5, Ed. 2 90
Defense Concepts
xviVan Eekelen. From Words to Deeds, Brussels: Center for European Policy Studies
Press: 11.
xvii
Pagedas, Constantine. Fall 2001. “Post-Ismay Europe: Britain and the Rebalance of Eu-
ropean Security” Mediterranean Quarterly: 114.
xviii
Ibid: 115.
xixPlanken, Stephan. 1999. “Timeline”
<http://planken.org/images/balkans/map_kfor_troops.gif>
xx Staff, 1999. Human Rights Watch. “Federal Republic of Yugoslavia: Human Rights De-
velopments” <http://www.hrw.org/wr2k/Eca-26.htm>.
xxi Staff, 4 June 1999. European Council. “European Council declaration on strengthening
the Common European Policy on Security and Defence” Quoted in European Union.
“Development of European Military Capabilities” June 2009.
<http://www.consilium.europa.eu/esdp>
xxii Staff, European Union. “Europa Glossary”
<http://europa.eu/scadplus/glossary/petersberg_tasks_en.htm>
xxiii Ulriksen, Stale. August 2003 “Military Europe: Capabilities and Constraints.” NUPI,
<http://www.arena.uio.no/ecsa/papers/StaleUlriksen.pdf>
xxiv“Joint Declaration on European Defence.” 18 December 1998. British-French Summit,
St. Malo, France<http://www.fco.gov.uk/resources/en/news/2002/02/joint-declaration-on-
eu-new01795>
xxvPagedas, Constantine. Fall 2001. “Post-Ismay Europe: Britain and the Rebalance of Eu-
ropean Security” Mediterranean Quarterly: 115.
xxvi
Pagedas, Constantine. Fall 2001. “Post-Ismay Europe: Britain and the Rebalance of Eu-
ropean Security” Mediterranean Quarterly: 117..
xxvii Ibid.
xxviii
Van Eekelen. From Words to Deeds, Brussels: Center for European Policy Studies
Press: 62
xxix
Van Eekelen. From Words to Deeds, Brussels: Center for European Policy Studies
Press: 62
xxx Cornish, Paul and Geoffrey Edwards. 2005. “The Strategic Culture of the European
Union: A Progress Report” International Affairs, 81, No. 4: 816.
<http://www3.interscience.wiley.com/cgi-bin/fulltext/118735024/PDFSTART>
xxxi Eliasson. “Traditions, Identity and Security” pp. 10
xxxii Wivel, Anders. 2005 “The Security Challenge of Small EU Member States: Interests,
Identity and the Development of the EU as a Security Actor” Journal of Common Market
Studies, 43, No. 2: 404.
xxxiii Anon. 30 May 2001. “Turkey drops veto on EU-NATO defence agreement” EurActiv
<http://www.euractiv.com/en/enlargement/turkey-drops-veto-eu-nato-defence-
agreement/article-110804>
xxxivAnon. December 2003. “EU operational planning: the politics of defence” Strategic
91 Vol. 5, Ed. 2
Defense Concepts
xxxvii Howorth, Jolyon. October 2002. “France, NATO and European Security: Status Quo
Unsustainable, New Balance Unattainable?” IFRI
<www.ifri.org/files/PEhiver2002howorth.pdf> AOriginally published in French: “La Fran-
ce, l’OTAN et la sécurité européenne: statu quo ingérable, rééquilibre introuvable” April
2002 Politique Etrangère; 1001-1016.
xxxviii Van Eekelen. From Words to Deeds, Brussels: Center for European Policy Studies
Press: 66.
xxxix Cornish, Paul and Geoffrey Edwards. 2005. “The Strategic Culture of the European
<http://www.consilium.europa.eu/uedocs/cmsUpload/2010%20Headline%20Goal.pdf>
xlvi Staff, July 2009. European Union. “EU Battlegroups”
<http://www.consilium.europa.eu/showPage.aspx?id=1349&lang=EN>
xlvii
Pascoe-Watson, George. 18 June 2008 “French President Nicholas Sarkosy has plans to
use British aircraft carrier for EU navy when he takes over EU presidency” The Sun
xlviiiO’Dwyer, Gerard. 17 May 2009. “Interview: Sten Tolgfors” Defense News, 17 May
2009. <http://www.defensenews.com/story.php?i=4094490&c=FEA&s=INT>
xlix Ministry of Defence (Sweden), 3 July 2009. “Speech by the Minister for Defence Sten
li Staff, 23 March 2006. North Atlantic Treaty Organization. “Strategic airlift agreement
enters into force” NATO Update <http://www.nato.int/docu/update/2006/03-
march/e0323a.htm>
lii Howorth. “France, NATO and European Security” pp. 8.
Vol. 5, Ed. 2 92
Defense Concepts
liii
Mitzen, Jennifer. “Ontological Security in World Politics: State Identity and the Security
Dilemma” European Journal of International Relations, 2006, Vol 12, No. 3, pp. 349.
liv Ibid. pp. 350.
lv Ibid. pp. 350.
93 Vol. 5, Ed. 2
Quick Diagnostics for Outbreaks,
Epidemics, and Pandemics.
Cubit, designed and implemented
by TETRADYN, is a cutting edge
technology suite that incorporates
hardware and software to rapidly
assess, diagnose, respond, and catalog
the biothreats of today's pathogenic crisis
www.tetradyn.com
Defense Concepts
95 Vol. 5, Ed. 2
Defense Concepts
Vol. 5, Ed. 2 96
Defense Concepts
His staff noted that personnel from lead civilian agencies often become over-
whelmed with the requirements of coordinating with the DOD. One civilian official
reported spending fully one-third of her time coordinating with DOD personnel
while her office was already stretched thin in resources and personnel. With the
seriousness of African security concerns—including violent extremism, ethnic
conflicts and HIV/AIDS—Chairman Tierney urged us to “ask whether the continent
of Africa is the right place to experiment with a new U.S. interagency model.”
Representative Tierney stressed the importance of the U.S. Government unify-
ing its message about AFRICOM’s goals, strategies, and its role in foreign policy.
He emphasize the continuing uncertainty about whether AFRICOM is designed to
be a purely military outfit or a venture to tackle broader security challenges. “Before
we are able to clearly and effectively communicate to Africans what our plans are
for AFRICOM,” he urged, “we need to figure them out for ourselves.”
In closing, Representative Tierney underscored how “the AFRICOM experi-
ence” might be instructive to future interagency efforts. The U.S. government can
learn lessons about cases where agency-specific expertise should be preserved. The
AFRICOM example also demonstrates how the National Security Council can
manage the interagency at an operations level. Ultimately, Representative Tierney
recognized the emergence of a new national security environment where failed
states are more dangerous than strong ones. He stressed the need to “show leadership
and foresight” in coordinating a broader policy toolkit while heeding the “troubling
implications for the civilian-military balance of U.S. foreign policy.”
97 Vol. 5, Ed. 2
Defense Concepts
Ambassador Lyman, however, clarified that although the security of oil supplies
represents a joint security concern—and an important one—it is not just a military
problem and thus it should not necessarily be AFRICOM’s job to lead the effort.
With regards to terrorism, Ambassador Lyman questioned the efficacy of the
Trans-Sahara Counterterrorism Program (TSCTP), and asked “whether the United
States is (a) exaggerating the threats in this area, and (b) creating demands upon
these states that create problems for them greater than they had before.” In poor
states like Mali and Niger, counterterrorism programs have, in some cases, exacer-
bated tensions between ethnic groups. Ambassador Lyman ultimately questioned
the premise that AFRICOM should and would be able to address insecurity and
terrorism in the Sahel, especially when many of the terrorist groups have a purely
domestic agenda.
Vol. 5, Ed. 2 98
Defense Concepts
99 Vol. 5, Ed. 2
Defense Concepts
within the government, it is important for AFRICOM to be vocal about issues like
governance, development and health without insisting on leading these activities:
AFRICOM can be a very important advocate for these programs, but I think
it ought to be very careful about the degree that it gets involved with them
beyond its traditional roles—and very welcome roles in most African
countries—of working with and strengthening the security and defense
capabilities of African countries.
While AFRICOM’s structure and character differs from that of the unified
commands as historically implemented…the role of the U.S. military in U.S.
foreign policy on the continent basically has not changed.
He went on to argue that the State Department continues to take the lead on the
development and execution of U.S. policy in Africa. This leadership requires that
U.S. representation in Africa, through its embassies retains a civilian face. He
conveyed the State Department view that the creation of AFRICOM was “an
important and natural part of the evolution of our strategic vision in Africa.” At the
same time, the creation of AFRICOM will give Africa greater visibility within the
DOD. DOD officials will now regard Africa as a major strategic center of gravity,
thus, DOD will be more inclined to support U.S. foreign policy in Africa. In time,
the creation of AFRICOM will allow DOD to appreciate Africa’s importance as a
major supplier of important resources, a potential haven for terrorism and the source
of other security challenges like narcotics and human trafficking and piracy.
Mr. Mazel described his organization’s perception of AFRICOM as “an oppor-
tunity to strengthen and deepen the U.S. and African military relationships in such
a way that our combined efforts will generate more sustainable peace and security
on the continent.” He reiterated the State Department’s strong support of
AFRICOM’s military-to military security cooperation mission and repeated State’s
encouragement for AFRICOM’s contributions to defense sector reform and for the
formation of partnerships in peacekeeping, military professionalization, coastal and
border security and counterterrorism.
He then outlined some of the specific regionally-based AFRICOM efforts that
the State Department sees as especially valuable:
He then clarified how the State Department works with AFRICOM specifically.
Initially, the State Department offered input to AFRICOM’s theater security cam-
paign plan and the DOD’s global employment of forces. State has also sent and will
continue to send representatives from its African embassies to the security coopera-
tion meetings and conferences in Germany “to shape AFRICOM’s engagement on
the continent.”
Challenges to effective cooperation with AFRICOM still exist, however. These
challenges are primarily based on the “tremendous imbalances in personnel resourc-
es [between State and DOD].” AFRICOM has 1300 personnel in Stuttgart, more
than all of State’s political, economic and public affairs officers in Africa. The
challenge then for State is to “exert political and civilian oversight of DOD and
AFRICOM’s activities [in
Africa].” State’s primary
“Challenges to effective cooperation method to ensure such over-
with AFRICOM still exist, however. sight is to make certain that
These challenges are primarily based all of AFRICOM’s activi-
on the “tremendous imbalances in ties are military-to-military
and are coordinated with
personnel resources” between State and country teams. “No DOD
DOD—AFRICOM has 1300 personnel activities,” Mr. Mazel
in Stuttgart, more than all of State’s stressed, “are to be carried
political, economic and public affairs out in a country without the
full knowledge and concur-
officers in Africa.” rence of our chief of mis-
sion and other elements of
the country teams.”
He explained the necessity that AFRICOM defer to State’s authority specifical-
ly in the areas of counternarcotics, counterterrorism, and humanitarian activities.
Alhough AFRICOM has authorities and funding for counternarcotics programs,
State has the lead on international law enforcement programs in Africa through its
Bureau for International Narcotics and Law Enforcement Affairs (INL Bureau). Mr.
Mazel explained that the test “is to ensure that they follow the State lead in terms of
counternarcotics activities to be conducted particularly in West Africa.” Concerning
counterterrorism, he urged that those activities should be closely coordinated with
the country team and that the chief of mission must be fully aware of all initiatives.
On the humanitarian front, AFRICOM’s activities through the CJTF-HOA and
Africa Partnership Station must be coordinated with the country team to ensure that
USAID is “setting the focus and tone for community relations, humanitarian and
other development-type activities.” He then pointed out the importance of
AFRICOM’s humanitarian work being synchronized with host-country militaries so
that African populations can see their own militaries doing positive and productive
government model for interagency national security efforts and for conflict preven-
tion strategy. Other questions included:
Ÿ How does AFRICOM engage civil society?
Ÿ How does AFRICOM determine the political will of African partners in
leadership?
Ÿ How can AFRICOM be successful without a similar push to increase U.S.
government capacity?
Ÿ How can contractors become involved in AFRICOM’s initial planning
stages as opposed to just being an afterthought?
Ÿ Can AFRICOM address gaps in governance and institutions? How do you
balance when to intervene with when to resist intervention?
Ÿ What are and what will be AFRICOM’s metrics for success?
Ÿ How can AFRICOM leverage its relatively scarce resources to “build state
capacity and help secure the global commons?”
Mr. Pendleton ended his remarks by noting that any reform on the same scale as
the establishment of AFRICOM’s will be a long process. It will probably take
around five years to create a mature organizational culture. He placed AFRICOM’s
challenges within the context of a “profound shift that’s happening right now while
the Department of Defense tries to figure out what its role is in the future.” The
DOD, Mr. Pendleton commented, is still trying to figure out the role of Stability
Operations within the larger organization.
Ultimately, Mr. Pendleton shared his feeling that DOD probably set its expecta-
tions for AFRICOM too high. “AFRICOM is not going to create whole-of-govern-
ment approach for Africa,” he said. But, he ended his remarks on an optimistic note:
“By working with other agencies, they can build a better-informed Department of
Defense plan.”
has only $50 million in their own DOD-led Title X security assistance programs.
The discrepancy that she mentioned—which Mr. Mazel also echoed in his
remarks—concerns the number of personnel.
Ms. Ploch elaborated upon the personnel involved with AFRICOM. She clari-
fied that AFRICOM does not have standing forces to draw from for an engagement.
They have only about 300 people at CJTF-HOA in Djibouti that they can draw for
only certain types of training exercises—contingent upon proper skill sets and only
in East Africa. Ms. Ploch predicted that the Pentagon and Congress would wrestle
with whether or not to devote standing forces to AFRICOM in upcoming years.
She then examined the issue of AFRICOM’s collaboration with other govern-
ment agencies, describing her experience with the Theater Security Working Group
(TSWG)—the same example Mr. Mazel had used to highlight AFRICOM/State
cooperation. “There had been a lot of skepticism as to why the State Department
was being allowed into the planning process, and it gave me the impression that this
was a rather unprecedented step that AFRICOM had taken.”
Ms. Ploch then spoke about Dr. Diana Putnam, the head of AFRICOM’s
humanitarian affairs branch, to provide an example of the level of AFRICOM’s
civilian oversight that has been executed. Dr. Putnam is a USAID employee and an
embedded anthropologist who—as chief of humanitarian affairs—has mandated
that all of AFRICOM’s humanitarian affairs activities must be approved by both the
ambassador and the USAID chief of mission in a given country. Each activity,
before it is carried out, must fit three-requirements: 1) it must meet U.S. foreign
policy objectives, 2) it must fit in with AFRICOM’s objectives, and 3) it must fit in
line with the mission’s strategic plan (the embassy’s plans and goals for activities
for the coming year). Dr. Putnam’s new regulations require that USAID and the
State Department, buy into AFRICOM’s humanitarian affairs activities, Ms. Ploch
pointed out.
Ms. Ploch cited the the chairman of the Kenyan parliament’s foreign affairs and
defense committee, who maintains that AFRICOM’s humanitarian affairs activities
in Northern Kenya have since been very well received. “We’ve found that the
Kenyan people see a tangible benefit to the U.S. military being in the area, which I
thought was interesting.”
To close, Ms. Ploch shared AFRICOM’s budget numbers: in 2010 AFRICOM
requested about $300 million, which doesn’t included CJTF-HOA’s costs. CJTF-
HOA requested about $250 million for operating expenses alone, and $60 million
for operations. “It’s challenging to figure out…how much benefit you get out of
$300 million plus $250 million plus $60 million in terms of increasing the stability
on the continent and building the capacity of African militaries. It’s [ultimately] an
open-ended question for Congress to deal with.”
In that vein, Dr. Barnes described the “history of U.S. support for military rules
and military action [as] sorely blemished.” Dr. Barnes cited the figure of $1.5
billion worth of weaponry sold from the U.S. to Africa between 1950 and 1989,
much of which went to brutal regimes in the DRC, Liberia, Somalia and Sudan. The
U.S., Dr. Barnes insisted, continues to back the same types of authoritarian military
regimes it did during the Cold War, in support of narrowly-defined and short-term
goals. These actions “can be self-defeating when it is not consistent with the
democratic ideals and practices that are central to U.S. foreign-policy rhetoric.”
Dr. Barnes offered three examples in support of her claim. The first example
that she provided was Equatorial Guinea, where the U.S. Government offered
military aid to build up the nation’s coast guard to President Nguema (who seized
power in a military coup). Although the U.S. had closed its embassy in 1996 to
protest President Nguema’s human rights record, tit subsequently reopened its
embassy when it was pressured by oil companies with an interest in the region. At
the same time, U.S. military spending in Equatorial Guinea has remained and
continues to stay at a constant level.
http://www.imf.com
Dr. Barnes’s second example focused on Mali. She pointed out that Mali’s
internal dissonant group, the Tuareg rebels who the U.S. claims have ties to al-
Qaeda, inhabit the areas surrounding oil deposits (similarly, Tuareg rebels in Niger
are situated near uranium mines and deposits). And while the U.S. has trained the
Malian and Niger militaries to combat these groups, Dr. Barnes questioned these
rebels’ connections to al-Qaeda, adding that governments may be using the “specter
of al-Qaida to gain U.S. support for their long-standing efforts to bring the Tuareg
finally under state control.”
Dr. Barnes’s third example focused on Somalia. She claimed that the presence
of U.S.-backed Ethiopian troops in Somalia served to further radicalize the Islamist
opposition movements, thereby exacerbating rather than ameliorating the threat. She
also stated that the Ethiopian intervention “curtail[ed] some nascent state-building
activities that [were] occurring in Somalia.” These examples, in which U.S. short-
term strategic interests were put above state development issues, emphasize the
inherent problems with both the direct and indirect U.S. influence that often sustains
military leadership in the region.
Dr. Barnes’s offered two main policy recommendations to halt the cycle of U.S.
assistance bolstering the power of military regimes. Her first was that U.S. policy in
the region should not revolve around “short term goals…based on the vague notion
of national security.” Secondly, Dr. Barnes emphasized that “it is naïve to think that
soft power, interagency cooperation, training programs in democratic processes or
practices will have effective, real reform.” Instead, she argued, the U.S. should look
into longer-term infrastructural development (taken from the Chinese approach in
Africa). This kind of development has a real impact on transferring economic power
from the state to the people, thus removing what she called the “structural straitjack-
et left over from the colonial era.”
Dr. Barnes continued her compelling reproach by questioning the future effica-
cy and even the necessity of AFRICOM, asking “can we truly justify the extraordi-
nary amount of money that goes into AFRICOM and near-invisible endeavors that
intensify the militarization of those states?” Finally, she concluded her remarks with
another thought-provoking inquiry, this time wondering whether it is possible for
the fulfillment of U.S. national interests and the enrichment of African lives to occur
simultaneously:
Is it possible then, to step back and rethink our long-term goals and priorities
and assess how better the U.S. can take part in building the kinds of
institutions and practices that improve the lives of the majority of African
people, improve the lives of people in civil society while doing no harm to
our own people and our own national interests?
kind of work that can be done: products are “developed using research and develop-
ment and DOD contracts over the years that [the] military-industrial complex
produces that can then be used in the developmental and diplomatic arenas to good
effect.”
Mr. Callahan’s fourth recommendation focused on logistical readiness for rapid
disaster response. He cited the example of the 1994 Rwandan Genocide when
humanitarian disaster was occurring, but the DOD was unable to respond logistically.
He stated that now, even “with forward-operating sites in Djibouti up here and
Ascension Island out there in the middle of the Atlantic, there’s got to be a lot more
capability so that material and transportation can be brought in as needed.”
Mr. Callahan’s final recommendation was to continue incorporating industry—
“the research-and-development pool”—into the State Department and AFRICOM
arena. With the shift in DOD culture (mentioned earlier) from hard to soft power,
Mr. Callahan argued “that soft power matters and things like appropriate technolo-
gies and remote communications and remote power sources and transportable
logistical factors – that these things do matter in any contingency operation.” And
while the DOD has been doing well at articulating its needs to R&D firms, Mr.
Callahan urged that the State Department and the civilian agencies in particular
should provide “incentive and direction” for the research and development industry
so that they can create useful, relevant technologies.
He concluded by reiterating this sentiment, stating that “I don’t think the State
Department has ever done cooperative research-and-development agreements with
industry or folks like that. That’s an area in which, I think, whole-of-government
solutions could be brought together in a faster way.”
oped a degree of internal stability through improved governance and political and
economic liberalization that allows them to employ or even export their security
capacity for the greater good of their region and the continent as a whole.” This
peacekeeping approach, he added, can only be successful with effective multi-
national cooperation—this model has been proven successful in the DRC, where
many non-African states are involved in ongoing peacekeeping operations.
In the spirit of cooperation, Col. Daniels also reemphasized the importance of
interagency collaboration. In this regard, AFRICOM has been making improve-
ments: “Rather than the problematic historical model of DOD planning and then
asking for input on a plan, many agencies were involved from the very beginning.”
Col. Daniels concluded that, “Africa Command was a pilot case for more inclusive
planning…and we think this kind of planning will be directed to other commands to
plan in the same way…”
Daniel Lawner joined the CADS team as a researcher in 2007 and now directs the
Initiative for a Comprehensive Approach to National Security (ICANS) . A graduate
of Northwestern University, Dan conducted independent research on African history,
which culminated in a research grant for travel to the National Archives in London
and a paper entitled “Gateway to Africa: Exoticism, Commercialism and British
Perceptions of Colonial Zanzibar.”
Adam Elkus
its long-term impact on the war’s outcome was marginal at best. General Robert E.
Lee sent the 2nd Corps under the Command of Jubal Early, a force of only 12,000
men toward D.C. While the Union army ultimately compelled them to retreat,
Early’s troops achieved some victories along the way causing confusion and conster-
nation amongst the Union army.
in Lebanon in 1982 and 2006, the West Bank in 2002, and Gaza in 2008-2009.
Historically, Israel also participated in the French and British punitive expedition
against the Suez Canal in 1956. Evidence indicates that the strategic payoff for these
operations has also been mixed. As Amos Harel and Avi Issacharoff pointed out in
Foreign Policy, American strategic commentators may misinterpret Israeli
strategy.xii We should also be careful not to extrapolate Israeli success or failure
with raiding and punitive expeditions to analyze our own situation since Israel
enjoys advantages we do not when engaging in operations inside its own territory
and operating in neighboring regions. Control and isolation of the battlefield in an
environment such as 2008-2009 Gaza is unlikely to be replicated in any American
expeditionary contest.
analyzed in RAND Corporation studies such as 2007’s Entering the Dragon’s Lair:
Chinese Antiaccess Strategies and Their Implications for the United States.xv
If we look farther
back we can see an even
“Those who argue for an emphasis greater continuity of re-
on raiding and punitive expeditions search into what we con-
are wise to point out that COIN is sider modern threats.
Fifty years earlier, the
usually wasteful and does not utilize French strategist Gener-
America’s strategic advantages. The al André Beaufre used
United States is a maritime power that the concepts of
finds sustaining expeditionary forces in “exterior” and “interior”
far-off environments logistically difficult.” maneuver to address a
problem that many
American strategists
would find very familiar. Beaufre divides “indirect strategy” into “exterior” and
“interior” maneuvers. Both of these maneuvers are integrated parts of the indirect
campaign that should be used when resources are limited. The first maneuver
provides “maximum freedom of action” in the international arena while paralyzing
the enemy through psychological, economic, or diplomatic means like negotiations
and propaganda.xvi Once exterior cover has been obtained, interior maneuver is then
executed in the geographic area of question to achieve a policy-driven objective.
Beaufre argued that the enemy would respond by utilizing strategies ranging from a
short but violent attempt to affect a fait accompli to protracted guerrilla warfare.xvii
This concept, while inelegant, is eerily prescient in the context of present discussions
about American strategy and asymmetric warfare, as well as attempts to discuss
combinations of irregular and conventional warfare.
Those who argue for an emphasis on raiding and punitive expeditions are wise
to point out that COIN can be wasteful and may not utilize America’s strategic
advantages. The United States is a maritime power that finds sustaining expedition-
ary forces in far-off environments logistically difficult. COIN also does not allow
U.S. military forces to exploit our advantages in firepower, airpower, or large-unit
maneuver. It does not take a strategic genius to realize that COIN is difficult to
sustain politically as well, since domestic support is a perennial problem in democ-
racies. Critics of COIN protest that it is based on outdated theoretical models. Frank
Hoffman, for example, has noted that modern irregular conflict defies the often
simplistic 1960s Maoist revolutionary model involving guerilla war tactics. Howev-
er, American COIN theory heavily extracts from this model to describe the contem-
porary battlespace.xviii While “classic” COIN is still painfully difficult, modern
insurgency is likely to be more fractured and feature more protracted political
problems that proscribe a more limited American approach.xix Conversely, the
successful. However, the Goldstone Report, which harshly condemned Israel for
killing civilians has lowered the Israeli Defense Force’s freedom of action in the
international arena. There are also thorny legal issues surrounding combat with
non-state actors that have not been resolved satisfactorily, as the dispute over the
Goldstone Report reveals.
The elephant in the room, of course, is planning for Phase IV (stabilization)
operations in the case of a punitive expedition that fully incapacitates a nation’s
government. What should be the protocol for such a situation if long-term occupa-
tion and stabilization is ruled out? The Powell “pottery barn” rulexxiii is not an
infallible law, but is one that many will expect the United States to uphold should a
punitive expedition unseat a “rogue state” government.
It is also difficult to reliably calibrate the level of force needed to accomplish
limited objectives. Here, raiding runs into the same problems as the now-defunct
doctrine of Effects-Based Operations (EBO)—problems of perception, mispercep-
tion, and knowledge of our enemy (especially in a vastly different cultural context)
make mirror imaging tempting. Political scientists endlessly dissected this issue
during the Cold War and developed sophisticated formal models of adversarial
behavior, but these calculations are likely to remain crude and impressionistic in
policy practice outside the context of the bipolar system.
Even if we could develop a metric for the requisite amount of force to be
employed, we would still encounter objections to raiding based on an awareness of
political affairs and bureaucratic infighting. Defense pundits discussing proposed
strategies seem to implicitly assume that the United States is a state with strong
executive planning organs and a political culture capable of digesting sophisticated
strategies; a kind of 21st century version of Moltke’s Prussia. Instead, we live in a
political culture more aptly chronicled by the creators of South Park. The executive
branch, though highly powerful, is not known for its ability to carry out long-range
planning. Moreover, the interplay of interest groups frustrates the execution of
strategy.
by some realists, like an “offshore balancing” grand strategy and the paring back of
strategic commitments.xxiv With some effort, both raiding and punitive expeditions
could be integrated with the “indirect” COIN theory put forth by those advocating a
more pared-down global counterinsurgency effort. A synthesis of “indirect ap-
proaches” could heavily emphasize the traditional (and largely nonmilitary) Special
Forces, police, and intelligence approaches to combating radicalism with high-end
combat assets utilized for the “repetitive raiding.” In order to operationalize
“repetitive raiding” capabilities, planners need to think strategically and operationally
about modernizing the concept of the “descent” and punitive expedition. Additional-
ly, the current drone/special operations direct action campaign needs to be subject
to a means-testing before it drifts into policy inertia.
Mark Safranski
argues quite percep- “...the lack of grand strategic foundations
tively that the lack in current American foreign policy may
of grand strategic
foundations in cur-
ensure that any kind of military doctrine
rent American for- —COIN or anti-COIN—could be used to
eign policy may justify purposes at variance with its original
ensure that any kind intent.”
of military
doctrine—COIN or anti-COIN—could be used to justify purposes at variance with
its original intent. It is also useful to point out that both partisans in the COIN and
anti-COIN debate seem to operate with an implicit framework that continuing global
military operations are likely in the near future. The strategy or political aims behind
such military operations, however, or the assumption that American participation in
military operations is a permanent feature of the security environment, has not been
explored in great depth. It is largely without dispute that 21st century operational
conditions are associated with certain forms of conflict. But it is one thing to point
out that slums in West Africa will be difficult for military forces to control and
another to spell out in convincing detail the political rationale that would put
American boots on the ground in Lagos.xxv
We are unlikely to break any new ground in policy discussions about military
operations without undertaking a review of the United States’ global posture,
commitments, and our process of determining “vital interests.” While a rich but
sometimes circular conversation ensues about military operations, tactics, and
strategies, discussions of the deeper, foundational issues that explain the prevalence
(or absence) of force in American grand strategy remain political landmines. One
unfortunate result of this inertia is that nearly everything is seen as a “vital interest”
that must be resolved through the application of military force. Bernard Finel
correctly responded to criticism of his article on “repetitive raiding” by noting that
while his military concept is narrow in application, we expect military operations to
solve too many of our foreign policy issues.xxvi Observers such as The Washington
Post’s Dana Priest have observed that one of the most important reasons for the
impoverishment of civilian capacity is the structure of regional commands that adopt
a role assumed more traditionally by diplomats.xxvii
The correct answers regarding counterinsurgency, raiding, and punitive expedi-
tions are likely to emerge when put in grand strategic context. It is our resistance to
having an honest conversation about these foundational issues that keeps us in a loop
of increasingly circular discourse over the use of force. These deliberations do not
comprehensively address the premises by which certain operational or strategic
approaches derive their explanatory power.xxviii Until we inquire on a more abstract
level, our strategic dysfunction is likely to continue regardless of whether our forces
hobnob with tribes in Anbar or raid from offshore.
Adam Elkus is an analyst specializing in foreign policy and security. His articles
have been published in Small Wars Journal, Athena Intelligence Journal, Defense
and the National Interest, Foreign Policy in Focus, SWAT Digest, GroupIntel, and
other publications. He blogs at Rethinking Security.
The Barbary Pirates and the Tripolitan War of 1801,” Military Review
vi Finell, Bernard, February 2010. “An Alternative to COIN,” Armed Forces Journal
http://www.afji.com/2010/02/4387134
vii See Maj Gen. Charles J. Dunlap Jr., September 2006. “America’s Asymmetric Advan-
http://www.foreignpolicy.com/articles/2010/02/22/in_praise_of_aerial_bombing
ix Will, George F.1 Sept. 2009, “Time to Get Out of Afghanistan,” Washington Post
http://www.washingtonpost.com/wp-
dyn/content/article/2009/08/31/AR2009083102912.html
x See Dr. James S. Corum, Winter 2000 “The Myth of Air Control: Reassessing The Histo-
xii See Amos Harel and Avi Issacharoff, 20 January 2010 “A New Kind of War,” Foreign
Policy, http://www.foreignpolicy.com/articles/2010/01/20/a_new_kind_of_war?page=0,0.
Also see Ariel Siegelman, March 2009 “From Lebanon to Gaza: A New Kind of War,” U.S.
Army Combined Center Counterinsurgency Colloquium, Vol. 2, no.1.2.
xiii Staff, February 2010 Joint Operating Environment 2010, Norfolk: U.S. Joint Forces
Command, 6-8.
xiv See, for example, Robert Bunker (ed), 2002 Non-State Threats and Future War, Lon-
don: Cass,
xv Roger, Cliff and Mark Burles, Michael S. Chase, Derek Eaton, and Kevin L. Pollpeter,
2007. Entering the Dragon’s Lair: Chinese Antiaccess Strategies and Their Implications
for the United States, Santa Monica: RAND
xvi Andre Beaufre, 1965. An Introduction to Strategy, New York: Praeger, 111.
ters, 71–87.
xix See Steven Metz, 2007. Rethinking Insurgency, Carlisle Barracks: Strategic Studies Insti-
tute
xx See Kim Sengupta, 9 July 2009“David Kilcullen: The Australian Helping to Shape a
http://zenpundit.com/?p=3116
xxiiKrepinevich Jr., Andrew F. July-August 2009. “The Pentagon’s Wasting Assets: The
mony before the U.S. House Armed Services Committee, Subcommittee on Oversight and
Investigations. Available at
http://web.mit.edu/ssp/people/posen/A_Grand_Strategy_of_Restraint_and_Renewal_testim
ony_for_congress_july_ 15.pdf
xxv Metz, Steven 20 March 2009 “Trends, Threats, and Expectations”
http://smallwarsjournal.com/blog/2009/03/trends-theats-and-expectations/
xxvi Finel, “An Alternative to COIN.”
xxvii See Dana Priest, 2003 The Mission: Waging War and Keeping Peace With America’s
I Learned to Stop Worrying and Love NSC-68,” Defense Concepts, January 2010, 66-79.