Transitioning to Afghan-Led Counterinsurgency 2011
Testimony presented before the Senate Foreign Relations Committee on May 10, 2011.
NSRD Publications by Year:
Latest |
2020 |
2019 |
2018 |
2017 |
2016 |
2015 |
2014 |
2013 |
2012 |
2011 |
2010 |
2009 |
2008 |
2007 |
2006 |
2005 |
2004 |
2003 |
2002
Testimony presented before the Senate Foreign Relations Committee on May 10, 2011.
Testimony presented before the House Homeland Security Committee, Subcommittee on Counterterrorism and Intelligence on May 3, 2011.
A phone survey of Iranian public opinion revealed considerable opposition to the reestablishment of U.S.-Iranian ties and significant support for development of nuclear weapons. Negative attitudes toward the Iranian economy were less prevalent than expected, and many respondents did not consider sanctions to have had a significant negative impact on the economy.
This article examines ISAF (International Security Assistance Force) operations in Afghanistan as a way to get at the strategic disconnects in ends, ways, and means that the author believes are endemic to large-scale protracted stability and COIN (counterinsurgency) operations against adversaries who do not pose palpable existential threats to the members of an alliance.
Geoengineering is risky, but could transform the portfolio of options for limiting future climate change. Some geoengineering approaches could prove fast acting and inexpensive and could be deployed by one or a few nations without global cooperation. This report provides an initial examination and comparison of the risks associated with alternative international approaches the United States might pursue to governing geoengineering research and deployment.
Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) — which combines something you know (e.g., a PIN), something you have (e.g., a token), and/or something you are (e.g., a fingerprint) — is increasingly being required. This report investigates why organizations choose to adopt or not adopt MFA — and where they choose to use it.
Testimony presented before the House Permanent Select Committee on Intelligence, subcommittee on Terrorism, HUMINT, Analysis, and Counterintelligence on April 13, 2011.
On November 7, 2009, the conference "Cross-Strait Relations: New Opportunities and Challenges for Taiwan's Security" brought together leading experts on political and military issues from both the United States and Taiwan to consider how a range of political, economic, and military factors are likely to shape Taiwan's security over the coming decade. The panelists' papers, included in these proceedings, represent a variety of views and analyses.
Some recent shipbuilding programs in the United States and Europe have involved multiple shipyards constructing major modules of each ship for final integration and testing at one shipyard. The Navy needs to decide what it wants from a shared-build strategy, then monitor and manage the program to ensure that it delivers the required outcome, as well as the vessels called for in the program.
An assessment of China's aerospace manufacturing capabilities and how China's participation in commercial markets and supply chains contributes to their improvement. It examines China's aviation and space manufacturing capabilities, government efforts to encourage foreign participation, transfers of foreign technology to China, the extent to which U.S. and foreign aerospace firms depend on supplies from China, and their implications for U.S. security interests.
Describes the creation of developmentally appropriate criteria used to identify and screen Arabic-language works for children that promote tolerance and critical thinking and the characteristics of the materials that were found. The authors present several examples of works that met the criteria, discuss barriers that prevent the development and dissemination of more such works, and suggest ways to address and overcome these barriers.
A discontinuity in U.S. defense planning may be looming because of diffusion of inexpensive military technology, geostrategic changes, and the need to prepare forces for diverse adversary types. The way ahead is not yet clear, and economic constraints are a problem. It also seems that the nation needs a comprehensive rebalancing of national security strategy, not just of military capabilities.
The Secretary of Defense plans to shift Navy aircraft carrier acquisition to every five years. This shift should have little impact on force structure and the industrial base in the next decade. After that, the force structure shrinks, as does the chance of meeting goals for the number of deployed aircraft carriers. The plan could have a larger effect on any later desire to increase the number of aircraft carriers in the fleet.
The U.S. Department of Homeland Security is responsible for controlling the flow of goods and people across the U.S. border, but compelling methods for producing estimates of the total flow of illicit goods or border crossings do not yet exist. This paper describes four innovative approaches to estimating the total flow of illicit border crossings between ports of entry. Each approach is sufficiently promising to warrant further attention.
This paper asks whether there has been any diminution in the traditional role of U.S. financial markets in leading movements in other financial markets. It examines daily movements in three major equity indexes, how daily changes in one market are correlated with immediately subsequent changes in the other two, and the size of movements in each market after a given change in the other markets before and after the onset of the crisis.