Question (R6.6): How does USCENTCOM, working within a whole of government approach, coordinate military operations in support of the change in approach towards Iran from the previous to the current administration? Author | Editor: Jafri, A. (NSI, Inc). Executive Summary As battlefield successes actualize, decision makers have an opportunity to align tactical and operational policies […]
Continue ReadingQuestion (R6.10): What can the U.S. and Coalition partners realistically do to enable Iraqi Security Forces (ISF) to combat a long-term ISIS insurgency? Recognizing the enormous resources the U.S. poured into the ISF from 2003 until 2011, only to see much of the force collapse in 2014, what can we do to avoid making the […]
Continue ReadingQuestion (R6.1): What conditions (demographic, political, etc.) should exist on the ground in the Middle Euphrates River Valley and the tri border (Syria/Jordan/Iraq) region to deny the seeds of future conflict from being planted – particularly taking into account the assumed intention of Iranian proxy forces to establish a Shia “land bridge?” Which of these […]
Continue ReadingQuestion (R6.7): Are there examples from US history of competition short of open conflict1 with a regional power? What lessons exist that may be applied to resolving competing US/Iran objectives short of open conflict? Which examples are most relevant—pre- or post-World War II? Author | Editor: Polansky (Pagano), S. (NSI, Inc.) Executive Summary The experts […]
Continue ReadingQuestion (R6.2): In the event that the US/Coalition is challenged by another global power [Russia for the purposes of this response], what are the second and third order effects in the USCENTCOM area of responsibility? Author | Editor: Jafri, A. (NSI, Inc). Executive Summary As Russia continues to challenge United States’ power and influence around […]
Continue ReadingTerrorism and Technological Innovation: The High Tech / Low Tech Paradox Panel Discussion Speakers: Braniff, B. (University of Maryland START); Ligon, G. (University of Nebraska, Omaha); Rassler, D. (Counterterrorism Center [CTC]) Date: 28 February 2018 Speaker Session Preview SMA hosted a panel discussion as a part of its SMA DHS NCTC CENTCOM START Speaker Series, […]
Continue Reading[Q18] What are the principles (e.g., flexible vs. controlled response; proportionality, etc.) upon which international policy makers should develop response options for aggression in space? A Virtual Think Tank (ViTTa)® Report. Author(s): Dr. John Stevenson (NSI, Inc.) Summary Response Upon considering the question of focus, several expert contributors argue that it is confusing or even […]
Continue Reading[Q22] Can international agreements effectively protect high-value space assets in time of crisis and/or conflict? How could such a treaty be sufficiently verified? How would it be enforced? How would dual- use technologies be treated? A Virtual Think Tank (ViTTa)® Report. Author(s): Dr. John Stevenson (NSI, Inc.) Summary Response The expert contributors divided nearly evenly […]
Continue Reading[Q12] Will major commercial space entities likely serve as disruptors or solid partners in terms of state national security interests? In the short-term (5-10 years), mid-term (15-20 years), and long-term (25+ years)? A Virtual Think Tank (ViTTa)® Report. Author(s): Dr. Allison Astorino-Courtois (NSI, Inc.) and Dr. Belinda Bragg (NSI, Inc.) Summary Response There was considerable […]
Continue ReadingBio Threats Panel Discussion Speakers: Ackerman, G. (University of Maryland START); Earnhardt, R. (University of Maryland START); Gronvall, G. (Center for Health Security at Johns Hopkins University); Casagrande, R. (Gryphon Scientific) Date: 23 February 2018 Speaker Session Preview This speaker session covered the environment in which non-state actor adversaries are currently operating and how that […]
Continue Reading