Making Strategy : an Introduction to National Security Processes and Problems / by Dennis M

Total Page:16

File Type:pdf, Size:1020Kb

Making Strategy : an Introduction to National Security Processes and Problems / by Dennis M Library of Congress Cataloging-in-Publication Data Drew, Dennis M. Making Strategy : An Introduction to National Security Processes and Problems / by Dennis M. Drew, DonaldM. Snow. p. cm "August 1988 ." Includes bibliographies . 1. United States-National security. 2. United States-Military policy. 3. Strategy. I. Snow, DonaldM., 1943- :11. Title. UA23.D691988 88-21065 355' .03 - do 19 CIP ISBN 1-58566-021-3 First Printing August 1988 Second Printing October 1989 Third Printing May 1991 Fourth Printing March 1995 Fifth Printing April 1998 Sixth Printing September 1999 Seventh Printing July 2001 Eighth Printing September 2002 DISCLAIMER This publication was produced in the Department of Defense school environment in the interest of academic freedom and the advancement of national defense-related concepts. The views expressed in this publication are those of the authorsanddo notreflecttheofficial policy or position of the Department of Defense or the United States government. This publication has been reveiwed by security and policy review authorities and is cleared for public release. ii CONTENTS Chapter Page DISCLAIMER . u FOREWORD . ix ABOUT THE AUTHORS . xi PREFACE. xiii INTRODUCTION . xv SECTION I FRAMING THE PROBLEM 1 STRATEGY IN PERSPECTIVE . .. 1 Warfare in the Eighteenth Century . 2 Foundations of Modern Warfare . 5 Contrasts in the Nuclear Age . 8 2 THE STRATEGYPROCESS . 13 Step 1-Determining National Security Objectives . 14 Step 2-Formulating Grand Strategy . 16 Step 3-Developing Military Strategy . 18 Step 4-Designing Operational Strategy . 19 Step 5-Formulating Battlefield Strategy (Tactics) . 20 Influences on the Strategy Process . 21 Continuing the Investigation . 23 Chapter Page SECTION II THE POLITICAL DIMENSION 3 GRAND NATIONAL STRATEGY . 27 Vital National Interests . 27 Instruments of National Power . 36 Summary and Conclusion . 43 4 POLITICAL ENVIRONMENT OF GRAND STRATEGY . 45 Influences on Grand Strategy . 46 Fundamental Nature . 47 External Objectives . 48 Negative Objectives . 49 Conservative Bias . 51 Technological Nature . 52 Economic Constraints . 55 Strategic Culture . 57 Conclusion . 62 5 GRAND STRATEGY ACTORS AND INSTITUTIONS . 63 Executive Branch . 65 Legislative Branch . 73 Other Actors . 74 Conclusion . 78 Chapter Page SECTION III THE MILITARY DIMENSION 6 MILITARY STRATEGY . 81 Force Employment Strategy . 81 Where Would Forces Be Employed? . 81 Against Whom Would Forces Be Employed? . 83 Force Development Strategy . 85 Force Deployment Strategy . 87 Coordination of Military Strategy . 89 7 OPERATIONAL STRATEGY . 93 Orchestrating Campaigns . 94 Combined Campaigns . 95 Joint Campaigns . 97 Component Campaigns . 101 Essence of Operational Strategy: Orchestrating Theater Campaigns . 102 8 INSURGENT WARFARESTRATEGY . 109 Nature of Insurgent Warfare . 110 Fundamental Differences . 116 Counterinsurgency Concepts . 118 9 NUCLEAR STRATEGY . 121 Dynamics of Nuclear Evolution . 123 Atomic Bomb . 124 Hydrogen Bomb . 125 Intercontinental Ballistic Missile . 126 Multiple Independently Targetable Reentry Vehicle . 127 Chapter Page Basic Concepts and Relationships . 128 Definition . 128 Relationships between Concepts . 131 Nuclear Stability . 136 Strategy Debate . 138 Conclusion . 145 SECTION IV INFLUENCES ON THE PROCESS 10 FOG, FRICTION, CHANCE, MONEY, POLITICS, AND GADGETS . 149 Clausewitzian Trio . 149 Fog of War . 150 Friction in War . 150 Chance in War . 151 Strategy and the Clausewitzian Trio . 153 Economic Influences on Strategy . 154 Political Influences on Strategy . 156 Impact of Technology on Strategy . 158 11' MILITARY DOCTRINE . 163 What Is Doctrine? . 163 Sources . 164 Development Problems . 165 Types of Doctrine . 167 Fundamental. 168 Environmental . 169 Organizational . 169 Interrelationships . 170 Relationship of Doctrine and Strategy . 171 Chapter Page SECTION V CONTINUING DILEMMAS 12 CONVENTIONAL WAR DILEMMAS . 177 HowMuch Effort? . 177 Getting There versus Being There . 179 Qualityversus Quantity . 181 Expansion and Escalation . 183 13 INSURGENT WARFARE DILEMMAS . 185 How Much Effort? . 185 Deterring and Assisting . 187 Role of an Intervenor . 189 Waging a Counterinsurgent War . 190 14 NUCLEAR ISSUES . 195 Perspective on Nuclear Issues . 195 Current Issues . 199 Offensive Force Modernization . 197 Strategic Defense . 201 Arms Control andArms Reduction . 203 15 INTERESTS, RISK, AND STRATEGY . 205 Vii ILLUSTRATIONS Figure Page 1 The Strategy Process . 23 2 National Interest Matrix . 29 3 Capability/Strategy Relationships . 134 4 Doctrine Tree . 171 5 Viewpoint/Emphasis Matrix . ... 198 viii FOREWORD National security strategy is a vast subject involving a daunting array of interrelated subelements woven in intricate, sometimes vague, and ever-changing patterns . Its processes are often irregular and confusing and are always based on difficult decisions laden with serious risks. In short, it is a subject understood by few and confusing to most. It is, at the same time, a subject of overwhelming importance to the fate of the United States and civilization itself. Col Dennis M. Drew and Dr Donald M. Snow have done a considerable service by drawing together many of the diverse threads of national security strategy into a coherent whole. They consider political and military strategy elements as part of a larger decisionmaking process influenced by economic, technological, cultural, and historical factors. I know of no other recent volume that addresses the entire national security milieu in such a logical manner and yet also manages to address current concerns so thoroughly. It is equally remarkable that they have addressed so many contentious problems in such an evenhanded manner. Although the title suggests that this is an introductory volume-and it is-I am convinced that experienced practitioners in the field ofnational security strategy would benefit greatly from a close examination of this excellent book. SIDNEY 7. WISE Colonel, USAF Commander Center for Aerospace Doctrine, Research, and Education ix THIS PAGE INTENTIONALLY LEFT BLANK ABOUT THE AUTHORS Colonel Dennis M. Drew is the director of the Airpower Research Institute at the Air University Center for Aerospace Doctrine, Research, and Education, Maxwell AFB, Alabama. A veteran of 23 years service, he has been on extended faculty appointment at Air University since 1978. He is a member of the Section on Military Studies of the International Studies Association and is a fellow of the Inter-University Seminar on Armed Forces and Society. He holds a BA from Willamette University, an MS from the University of Wyoming, and an MA from the University of Alabama. Since 1981, Colonel Drew has authored or coauthored four books and numerous book chapters, monographs, and articles dealing with military strategy, air power doctrine, and insurgent warfare. Dr Donald M. Snow is professor of political science and director of the International Studies Program at the University ofAlabama. He is a past chairman of the Section of Military Studies of the International Studies Association and is a fellow of the Inter-University Seminar on Armed Forces and Society. He holds a BA and MA from the University of Colorado and a PhD from Indiana University. Dr Snow has published several books and numerous articles on defense and nuclear issues, including Nuclear Strategy in a Dynamic World: American Policy in the 1980s and The Nuclear Future : Toward a Strategy of Uncertainty. XI THIS PAGE INTENTIONALLY LEFT BLANK PREFACE This volume has been seven years in the making. In 1980 the authors began working on a textbook for Air University's Air Command and Staff College that would introduce the concept of strategy and the vagaries of strategymaking to midcareer Air Force officers . The outcome of that effort was Introduction to Strategy, a rather rudimentary volume that, surprisingly, has remained in constant use for the past seven years. The current work is an outgrowth of Introduction to Strategy and it incorporates all that we have learned about writing and organizing an introductory text that examines the most fundamental and yet arcane military art. The authors owe a great debt of gratitude to the outstanding production staff of the Air University Press for their considerable labors in bringing this volume to fruition. We also owe a monumental debt to our editor, John E. Jordan, Jr., whose considerable skill, great insight, and limitless patience have turned onr scrihhlings into a readable text. ,. xiii THIS PAGE INTENTIONALLY LEFT BLANK INTRODUCTION This book is about national security strategy : what it is, what its objectives are, what problems it seeks to solve or at least manage, and whatkinds of influences constrain and create opportunities for the development and implementation of strategies. The heart of the problem with which national security strategy deals is the series of military threats that the nation must confront. Thus, the making and implementing of strategy are largely an exercise in risk management and risk reduction. The notion of risk requires definition at the outset. In a more or less traditional manner, risk is defined as the difference between the threats posed to our security by adversaries and potential adversaries and our capabilities to counter those threats. In circumstances where adequate resources (manpower, materiel, perceived will, etc.) are available, risk can be reduced and security increased. When there is a gap between the amount of threat and capability to counter it, the difference is the risk one incurs. In thebest
Recommended publications
  • Axis Blitzkrieg: Warsaw and Battle of Britain
    Axis Blitzkrieg: Warsaw and Battle of Britain By Skyla Gabriel and Hannah Seidl Background on Axis Blitzkrieg ● A military strategy specifically designed to create disorganization in enemy forces by logical firepower and mobility of forces ● Limits civilian casualty and waste of fire power ● Developed in Germany 1918-1939 as a result of WW1 ● Used in Warsaw, Poland in 1939, then with eventually used in Belgium, the Netherlands, North Africa, and even against the Soviet Union Hitler’s Plan and “The Night Before” ● Due to the non-aggression pact with the Soviet Union, once the Polish state was divided up, Hitler would colonize the territory and only allow the “superior race” to live there and would enslave the natives. ● On August 31, 1939 Hitler ordered Nazi S.S. troops,wearing Polish officer uniforms, to sneak into Poland. ● The troops did minor damage to buildings and equipment. ● Left dead concentration camp prisoners in Polish uniforms ● This was meant to mar the start of the Polish Invasion when the bodies were found in the morning by Polish officers Initial stages ● Initially, one of Hitler’s first acts after coming to power was to sign a nonaggression pact (January 1934) with Poland in order to avoid a French- Polish alliance before Germany could rearm. ● Through 1935- March 1939 Germany slowly gained more power through rearmament (agreed to by both France and Britain), Germany then gained back the Rhineland through militarization, annexation of Austria, and finally at the Munich Conference they were given the Sudetenland. ● Once Czechoslovakia was dismembered Britain and France responded by essentially backing Poland and Hitler responded by signing a non-aggression with the Soviet Union in the summer of 1939 ● The German-Soviet pact agreed Poland be split between the two powers, the new pact allowed Germany to attack Poland without fear of Soviet intervention The Attack ● On September 1st, 1939 Germany invaded Warsaw, Poland ● Schleswig-Holstein, a German Battleship at 4:45am began to fire on the Polish garrison in Westerplatte Fort, Danzig.
    [Show full text]
  • Thoughts on Grand Strategy and the United States in the Twenty-First Century
    Journal of Military and Strategic VOLUME 13, ISSUE 1, FALL 2010 Studies Thoughts on Grand Strategy and the United States in the Twenty-first Century Williamson Murray One might begin an examination of the issues involved in grand strategy with an effort to describe what we mean by the term. Over the centuries, some governments and leaders have attempted to chart a course for their nations that has involved something more than simply reacting to the course of events. In most cases they have confronted sudden and major changes in the international environment, often resulting from the outbreak of great conflicts, but at times involving economic, strategic, or political alterations that threaten the stability or even existence of their polities. Yet, grand strategy is a matter of great states and great states alone. No small states, and few medium size states, possess the possibility of crafting a grand strategy. For the most part their circumstances condemn them to suffer what Athens negotiators suggested to their Melian counterparts in 416 BC about the nature of international relations: "The standard of justice depends on the equality of power to compel and that in fact the strong do what they have the power to do and the weak accept what they have to accept."1 1 Thucydides, History of the Peloponnesian War, trans. by Rex Warner (London, 1954), p. 402. There are two exceptions to the rule. Both the Swiss and the Finns were able to exercise a certain independence that allowed them to maintain a grand strategic frame work: the former by balancing great powers off against each other; the latter by creating the distinct impression in the minds of the Soviets that they were willing to fight to the last man and woman in defense of their independence.
    [Show full text]
  • Stability and Arms Control in Europe: the Role of Military Forces Within a European Security System
    Stability and Arms Control in Europe: The Role of Military Forces within a European Security System A SIPRI Research Report Edited by Dr Gerhard Wachter, Lt-General (Rtd) and Dr Axel Krohn sipri Stockholm International Peace Research Institute July 1989 Copyright © 1989 SIPRI All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN 91-85114-50-2 Typeset and originated by Stockholm International Peace Research Institute Printed and bound in Sweden by Ingeniörskopia Solna Abstract Wachter, G. and Krohn, A., eds, Stability and Arms Control in Europe: The Role of Military Forces within a European Security System, A SIPRI Research Report (SIPRI: Solna, Sweden, 1989), 113 pp. This report presents the outcome of a project which was initiated at SIPRI in 1987. It was supported by a grant from the Volkswagen Stiftung of the Federal Republic of Germany. The introductory chapter by the editors presents a scenario for a possible future European security system. Six essays by active NATO and WTO military officers focus on the role of military forces in such a system. Various approaches to the tasks and size of military forces in this regime of strict non-provocative defence are presented with the intent of providing new ideas for the debate on restructuring of forces in Europe. There are 3 maps, 7 tables and 11 figures. Sponsored by the Volkswagen Stiftung. Contents Preface vi Acknowledgements viii The role of military forces within a European security system 1 G.
    [Show full text]
  • American Grand Strategy for an Emerging World Order Scott Lawless
    STRATEGIC STUDIES QUARTERLY - PERSPECTIVE American Grand Strategy for an Emerging World Order SCOTT LAWLESS Abstract Since the end of the Second World War, the United States has secured its core national interests primarily through the creation and maintenance of the liberal international order. Today, this order is being challenged in ways that will define the twenty- first century context. America’s most pressing foreign policy challenge is finding strategies to counter a poten- tially illiberal global order. Neo-authoritarian states are seeking to establish spheres of influence by violating territorial norms, undermining the liberal order via coercive economic measures, and weakening democratic regimes through unconventional political warfare. The current liberal order is ill- equipped to face these challenges because of two global trends: the erosion of its legitimacy and the shifting global balance of power. In a changing environment such as this, where the ends of American grand strategy re- main fixed while its relative means are eroding, the US must revise the ways in which it seeks to achieve its strategic objectives. The shifts in geopolitics today necessitate a revitalization of American grand strategy and the estab- lishment of a new security order—namely, a Concert of Democracies—to secure American interests, reestablish liberal legitimacy, and shape the emerging international order toward a stable future. ***** he liberal international order that emerged triumphant over fas- cism and communism during the twentieth century is a testament to the institutions, alliances, and norms US statesmen established Tto avoid the revival of great power conflict. Though these structures have granted the United States and its allies several decades of unparalleled security and prosperity, it is unclear as to what is invoked by the term lib- eral international order.
    [Show full text]
  • Architecture in the Era of Terror: the Security Dilemma
    Safety and Security Engineering 805 Architecture in the era of terror: the security dilemma G. Zilbershtein Department of Architecture, Texas A&M University, U.S.A. Abstract The growing public concern over the proliferation of terrorism has made protection of the physical environment of potential targets and terror interdiction a salient issue. The objective to secure the built environment against terrorism introduces a complex dilemma. At one level, the extent of investments in security in terms of cost-effectiveness is not proportional to the relatively rare threat of terrorism. Another level of the dilemma is rooted in the complex psychological implications of using security measures, that is, how to physically secure a building, while psychologically deter potential terrorists; more importantly is the question of how to accomplish those and yet not scare the users, i.e., the public. The latter part of the dilemma has been relatively ignored in the analysis of architectural measures against terrorism. And since catering to the psychological comfort of the users of the built environment has always been one of the greatest challenges of architecture, this paper focuses on that portion of the security dilemma of terrorism. Specifically, the study examines the threat characteristics and analyzes design recommendations that address the threat of terror for their contribution to the psychological comfort of the end users. Keywords: architecture, built environment, terrorism, risk assessment, security perception, security measures, design recommendations. 1 Introduction The post–cold war, as defined by John Lewis Gaddis [1], began with the collapse of one structure, the Berlin wall on November 9, 1989, and ended with the collapse of another, the World Trade Center on September 11, 2001.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • On Strategy: a Primer Edited by Nathan K. Finney
    Cover design by Dale E. Cordes, Army University Press On Strategy: A Primer Edited by Nathan K. Finney Combat Studies Institute Press Fort Leavenworth, Kansas An imprint of The Army University Press Library of Congress Cataloging-in-Publication Data Names: Finney, Nathan K., editor. | U.S. Army Combined Arms Cen- ter, issuing body. Title: On strategy : a primer / edited by Nathan K. Finney. Other titles: On strategy (U.S. Army Combined Arms Center) Description: Fort Leavenworth, Kansas : Combat Studies Institute Press, US Army Combined Arms Center, 2020. | “An imprint of The Army University Press.” | Includes bibliographical references. Identifiers: LCCN 2020020512 (print) | LCCN 2020020513 (ebook) | ISBN 9781940804811 (paperback) | ISBN 9781940804811 (Adobe PDF) Subjects: LCSH: Strategy. | Strategy--History. Classification: LCC U162 .O5 2020 (print) | LCC U162 (ebook) | DDC 355.02--dc23 | SUDOC D 110.2:ST 8. LC record available at https://lccn.loc.gov/2020020512. LC ebook record available at https://lccn.loc.gov/2020020513. 2020 Combat Studies Institute Press publications cover a wide variety of military topics. The views ex- pressed in this CSI Press publication are those of the author(s) and not necessarily those of the Depart- ment of the Army or the Department of Defense. A full list of digital CSI Press publications is available at https://www.armyu- press.army.mil/Books/combat-studies-institute. The seal of the Combat Studies Institute authenticates this document as an of- ficial publication of the CSI Press. It is prohibited to use the CSI’s official seal on any republication without the express written permission of the director. Editors Diane R.
    [Show full text]
  • The Russian Integration of Cyber Power Into Grand Strategy by James J
    Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy by James J. Wirtz Chapter 3 in Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015 In Chapter 3, James J. Wirtz, Dean of the Naval Postgraduate School in California, describes the global context surrounding these events. Today, nation-states are integrating cyber tactics into their political and military strategies. Professor Wirtz posits that when it comes to the use of cyber, ‘national styles’ might be emerging as states attempt to use cyber capabilities to achieve strategic objectives. He suggests that it is wrong to treat cyber attacks as a silver bullet, and that it is better to consider how a sort of combined arms approach will prevail. On a positive note, the need for legal and bureaucratic integration of policies and programmes should produce national idiosyncrasies on the cyber battlefield that can help with the vexing challenge of attribution. Disclaimer This publication is a product of the NATO Cooperative Cyber Defence Centre of Ex- cellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publica- tion. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non-profit and non-commercial purpose, provided that copies bear a full citation.
    [Show full text]
  • Coping with the Security Dilemma: a Fundamental Ambiguity of State Behaviour Andras Szalai Central European University
    Volume 2 (2), 2009 AMBIGUITIES Coping with the Security Dilemma: A Fundamental Ambiguity of State Behaviour Andras Szalai Central European University Abstract he wording of international treaties, the language and actions of statesmen are often T ambiguous, even controversial. But there is a different, more fundamental ambiguity underlying international relations; one that is independent of human nature or the cognitive limitations of decision makers but instead results from the correct adjustment of state behaviour to the uncertainties of an anarchical international system. Due to the anarchical nature of the international system — the lack of a sovereign — states can only rely on their own strength for self-defence. But self-protection often threatens other states. If a state purchases armaments, even if it claims not to have aggressive intents, there is no sovereign to enforce these commitments and there is no way of being certain that the purchasing state is telling the truth, or that it will not develop such intents in the future. The so- called security dilemma has a number of effects on state behaviour. First, states often worry about implausible threats (see e.g. British defence plans against a possible French invasion in the 1930s) and/or get caught in arms races. Second, states develop an inherent mistrust in the language of the other, requiring commitments to be firm and unambiguous in order to be credible, since ambiguity invites conflicts and renders cooperation more difficult. Still, on the one hand, instead of a world of constant mistrust, we register instances of institutionalized inter-state cooperation. On the other hand, states often choose to make commitments that are deliberately ambiguous and outperform more transparent commitments.
    [Show full text]
  • The Pillars of American Grand Strategy in World War II by Tami Davis Biddle
    Leveraging Strength: The Pillars of American Grand Strategy in World War II by Tami Davis Biddle Tami Davis Biddle is the Hoyt S. Vandenberg Chair of Aerospace Studies at the U.S. Army War College in Carlisle, PA. She is the author of Rhetoric and Reality in Air Warfare: The Evolution of British and American Thinking about Strategic Bombing, 1914–1945, and is at work on a new book titled, Taking Command: The United States at War, 1944–1945. This article is based on a lecture she delivered in March 2010 in The Hertog Program on Grand Strategy, jointly sponsored by Temple University’s Center for Force and Diplomacy, and FPRI. Abstract: This article argues that U.S. leaders navigated their way through World War II challenges in several important ways. These included: sustaining a functional civil-military relationship; mobilizing inside a democratic, capitalist paradigm; leveraging the moral high ground ceded to them by their enemies; cultivating their ongoing relationship with the British, and embra- cing a kind of adaptability and resiliency that facilitated their ability to learn from mistakes and take advantage of their enemies’ mistakes. ooking back on their World War II experience from the vantage point of the twenty-first century, Americans are struck, first of all, by the speed L with which everything was accomplished: armies were raised, fleets of planes and ships were built, setbacks were overcome, and great victories were won—all in a mere 45 months. Between December 1941 and August 1945, Americans faced extraordinary challenges and accepted responsibilities they had previously eschewed.
    [Show full text]
  • The Evolution of U.S. Military Policy from the Constitution to the Present
    C O R P O R A T I O N The Evolution of U.S. Military Policy from the Constitution to the Present Gian Gentile, Michael E. Linick, Michael Shurkin For more information on this publication, visit www.rand.org/t/RR1759 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9786-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2017 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface Since the earliest days of the Republic, American political and military leaders have debated and refined the national approach to providing an Army to win the nation’s independence and provide for its defense against all enemies, foreign and domestic.
    [Show full text]
  • Correspondence Ronan Tse-Min Fu David James Gill Eric Hundman
    Correspondence: Looking for Asia’s Security Dilemma Correspondence Ronan Tse-min Fu David James Gill Looking for Asia’s Security Dilemma Eric Hundman Adam P. Liff and G. John Ikenberry To the Editors (Ronan Tse-min Fu writes): In “Racing toward Tragedy? China’s Rise, Military Competition in the Asia Paciªc, and the Security Dilemma,” Adam Liff and John Ikenberry claim that “a number of recent developments suggest that the region is ripe for, or may already be experiencing, severe security dilemma–driven dynamics, even arms races.”1 They portray China’s rise as the main cause of this dilemma and assert that states must adopt measures to reduce mili- tary competition in the region while they still can. I applaud Liff and Ikenberry for the policy relevance of their research, but their fun- damental claim about the prevalence of severe military competition in the Asia Paciªc region does not match the empirical reality. The real puzzle is why over the last thirty years Asian countries have shown a surprising lack of interest in boosting their military expenditures in response to China’s massive increases, whether these expenditures are measured in absolute or proportional terms, and whether they are measured over the past generation or the last few years. is there “severe military competition” in the asia paciªc? Liff and Ikenberry ground their analysis in the empirical observation that Asia might already be engaged in severe military competition, but they never deªne what they mean by “military competition” (pp. 65–82). They imply that such competition exists when parties seek to enhance their military capabilities in response to an external threat (p.
    [Show full text]