<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="http://webfeeds.brookings.edu/feedblitz_rss.xslt"?><rss xmlns:content="http://purl.org/rss/1.0/modules/content/"  xmlns:a10="http://www.w3.org/2005/Atom" version="2.0" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0"><channel xmlns:dc="http://purl.org/dc/elements/1.1/"><title>Brookings Series - 21st Century Defense Initiative Policy Papers</title><link>http://www.brookings.edu/about/centers/security-and-intelligence/21cdi-policy-papers?rssid=21CDI+policy+papers</link><description>Brookings Series - 21st Century Defense Initiative Policy Papers</description><language>en</language><lastBuildDate>Thu, 24 Sep 2015 00:00:00 -0400</lastBuildDate><a10:id>http://www.brookings.edu/series.aspx?feed=21CDI+policy+papers</a10:id><a10:link rel="self" type="application/rss+xml" href="http://www.brookings.edu/series.aspx?feed=21CDI+policy+papers" /><pubDate>Thu, 28 Jul 2016 21:24:52 -0400</pubDate>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2015/09/goldwater-nichols-american-foreign-policy-hein?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{8DB98090-C9F1-4FC2-9C78-33367D3EC53A}</guid><link>http://webfeeds.brookings.edu/~/113334156/0/brookingsrss/series/21cdipolicypapers~What-if-before-the-war-everyone-came</link><title>What if before the war, everyone came?</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/ca%20ce/carter_kerry001/carter_kerry001_16x9.jpg?w=120" alt="U.S. Secretary of Defense Ash Carter and U.S. Secretary of State John Kerry" border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2015/09/goldwater-nichols-american-foreign-policy-hein/goldwater_nichols_final.pdf?la=en" name="&lid={EE19C35F-397C-4812-BCAD-5D279E96BB3D}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2015/09/goldwater-nichols-american-foreign-policy-hein/Hein-cover.jpg?h=231&amp;w=178&la=en" style="height: 231px; width: 178px; float: left; margin: 5px 15px 10px 5px; border-width: 1px; border-style: solid;"></a>Organizations routinely struggle and disagree when determining goals and how to achieve those goals. Families often disagree over whether to eat in or go out, and if they go out, where. Corporations struggle over whether to increase funding for marketing, research, or expansion. Likewise, governments struggle with issues such as foreign policy: Should the emphasis be on national security? Expanding the economy? Spreading democracy? Ensuring human rights? &nbsp;And what tools should be used to achieve those ends? </p>
<p>While America relies on the president to put forth a vision and allows the president to staff his cabinet with like-minded persons, the number of officials involved in foreign policy just in the government reaches into the thousands. However, even those philosophically like-minded executives can disagree. Those directly tasked in the execution of foreign policy, such as ambassadors, generals, and admirals, often feel they are on the front lines and may bemoan meddling from Washington, while those back in D.C. are often concerned about field leaders not getting the &ldquo;big picture.&rdquo;</p>
<p>There are other forces at work as well. The government wields the four main instruments of power: diplomacy, information, military, and economic (DIME). Since the early 1990s, the United States has arguably favored military power over all others. The increase in the power of combatant commanders and shrinking budgets within the State Department has caused a shift toward the military away from diplomatic, information, and economic tools. Legislation, such as the Goldwater-Nichols Department of Defense Reorganization Act of 1986 may have unwittingly tipped the scales toward the use of military power.</p>
<p>Without the full DIME, the United States has shortchanged itself in the development and execution of its foreign policy. Much of the analysis of how to bring whole-of-government power to bear recommends adding layers of bureaucracy or requires large amounts of financing, neither of which is particularly viable in today&rsquo;s legislative environment.</p>
<p>So what can be done? There are simple steps that can be taken by the Department of Defense (DOD) and Department of State (DOS) to better align policy development and execution. </p>
<p>&bull; Expand the use of representatives from the State Department&rsquo;s Conflict Stability Office to the combatant commanders. This model is currently used at United States Africa Command with success.<br>
&bull;&nbsp;Expand the use of foreign policy advisors at the combatant commands. Rather than solely serving in an advisory capacity, their responsibilities should expand to include those of assistant deputy regional secretaries.<br>
&bull;&nbsp;Align how DOS and DOD divide up the geographic regions of the world.<br>
&bull;&nbsp;Continue to enhance training of State Department members in areas where they can meet with and work with other members of the government from different departments.</p>
<p>Streamlining the foreign policy process is also its own industry. There is no shortage of think tanks, journalists, and assorted policy entrepreneurs ready to offer up solutions, but often those solutions come with large price tags or wholesale realignments that would require massive legislation. This paper attempts to examine the problem, identify where and why schisms within the government occur, and offer simple solutions to better align foreign policy development and execution that could be implemented in an environment that is both fiscally constrained and legislatively challenging.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2015/09/goldwater-nichols-american-foreign-policy-hein/goldwater_nichols_final.pdf">What if before the war, everyone came? Goldwater-Nichols, contradicting policies, political appointees, and misalignment in American foreign policy</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Robert N. Hein</li>
		</ul>
	</div><div>
		Image Source: &#169; Kevin Lamarque / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/113334156/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2015%2f09%2fgoldwater-nichols-american-foreign-policy-hein%2fHein-cover.jpg%3fh%3d231%26amp%3bw%3d178%26la%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Thu, 24 Sep 2015 00:00:00 -0400</pubDate><dc:creator>Robert N. Hein</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/ca%20ce/carter_kerry001/carter_kerry001_16x9.jpg?w=120" alt="U.S. Secretary of Defense Ash Carter and U.S. Secretary of State John Kerry" border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2015/09/goldwater-nichols-american-foreign-policy-hein/goldwater_nichols_final.pdf?la=en" name="&lid={EE19C35F-397C-4812-BCAD-5D279E96BB3D}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2015/09/goldwater-nichols-american-foreign-policy-hein/Hein-cover.jpg?h=231&amp;w=178&la=en" style="height: 231px; width: 178px; float: left; margin: 5px 15px 10px 5px; border-width: 1px; border-style: solid;"></a>Organizations routinely struggle and disagree when determining goals and how to achieve those goals. Families often disagree over whether to eat in or go out, and if they go out, where. Corporations struggle over whether to increase funding for marketing, research, or expansion. Likewise, governments struggle with issues such as foreign policy: Should the emphasis be on national security? Expanding the economy? Spreading democracy? Ensuring human rights? &nbsp;And what tools should be used to achieve those ends? </p>
<p>While America relies on the president to put forth a vision and allows the president to staff his cabinet with like-minded persons, the number of officials involved in foreign policy just in the government reaches into the thousands. However, even those philosophically like-minded executives can disagree. Those directly tasked in the execution of foreign policy, such as ambassadors, generals, and admirals, often feel they are on the front lines and may bemoan meddling from Washington, while those back in D.C. are often concerned about field leaders not getting the &ldquo;big picture.&rdquo;</p>
<p>There are other forces at work as well. The government wields the four main instruments of power: diplomacy, information, military, and economic (DIME). Since the early 1990s, the United States has arguably favored military power over all others. The increase in the power of combatant commanders and shrinking budgets within the State Department has caused a shift toward the military away from diplomatic, information, and economic tools. Legislation, such as the Goldwater-Nichols Department of Defense Reorganization Act of 1986 may have unwittingly tipped the scales toward the use of military power.</p>
<p>Without the full DIME, the United States has shortchanged itself in the development and execution of its foreign policy. Much of the analysis of how to bring whole-of-government power to bear recommends adding layers of bureaucracy or requires large amounts of financing, neither of which is particularly viable in today&rsquo;s legislative environment.</p>
<p>So what can be done? There are simple steps that can be taken by the Department of Defense (DOD) and Department of State (DOS) to better align policy development and execution. </p>
<p>&bull; Expand the use of representatives from the State Department&rsquo;s Conflict Stability Office to the combatant commanders. This model is currently used at United States Africa Command with success.
<br>
&bull;&nbsp;Expand the use of foreign policy advisors at the combatant commands. Rather than solely serving in an advisory capacity, their responsibilities should expand to include those of assistant deputy regional secretaries.
<br>
&bull;&nbsp;Align how DOS and DOD divide up the geographic regions of the world.
<br>
&bull;&nbsp;Continue to enhance training of State Department members in areas where they can meet with and work with other members of the government from different departments.</p>
<p>Streamlining the foreign policy process is also its own industry. There is no shortage of think tanks, journalists, and assorted policy entrepreneurs ready to offer up solutions, but often those solutions come with large price tags or wholesale realignments that would require massive legislation. This paper attempts to examine the problem, identify where and why schisms within the government occur, and offer simple solutions to better align foreign policy development and execution that could be implemented in an environment that is both fiscally constrained and legislatively challenging.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2015/09/goldwater-nichols-american-foreign-policy-hein/goldwater_nichols_final.pdf">What if before the war, everyone came? Goldwater-Nichols, contradicting policies, political appointees, and misalignment in American foreign policy</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Robert N. Hein</li>
		</ul>
	</div><div>
		Image Source: &#169; Kevin Lamarque / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/113334156/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/113334156/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2015%2f09%2fgoldwater-nichols-american-foreign-policy-hein%2fHein-cover.jpg%3fh%3d231%26amp%3bw%3d178%26la%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/113334156/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2015/07/08-military-industrial-complex-silicon-valley-tama?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{3F577E87-E555-42FC-96EB-F54F8D40DC82}</guid><link>http://webfeeds.brookings.edu/~/99901030/0/brookingsrss/series/21cdipolicypapers~Theres-no-app-for-that-Disrupting-the-militaryindustrial-complex</link><title>There's no app for that: Disrupting the military-industrial complex</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/v/vf%20vj/virginia_obamasequester001/virginia_obamasequester001_16x9.jpg?w=120" alt="U.S. President Barack Obama speaks at Newport News Shipbuilding in Newport News, Virginia" border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2015/07/08-disrupting-military-industrial-complex-innovative-technology-silicon-valley-tama/No-app-for-that_final-7815.pdf?la=en" target="_blank" name="&lid={C2545FD3-F6A4-4B0E-87FA-7703C6DEE0EA}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2015/07/08-disrupting-military-industrial-complex-innovative-technology-silicon-valley-tama/No-app-for-that_final-cover-7815.jpg?h=231&amp;w=178&la=en" style="height: 231px; width: 178px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>The Digital Revolution is not over. Rapidly emerging technologies continue to disrupt manufacturing and services across global markets. Despite the pace of change, the United States&rsquo; military-industrial complex (MIC) remains dominated by a highly consolidated base of &ldquo;traditional&rdquo; prime contractors and has proven to be nearly impervious to smaller, and in many cases more agile and more diversified, &ldquo;non-traditional&rdquo; companies. </p>
<p>Indeed it is difficult to overstate how formidable the barriers to entry are for &ldquo;non-traditional&rdquo; companies in the context of evolving 21st century global markets. These barriers significantly limit the government&rsquo;s access to human capital, intellectual property, and potentially disruptive innovation in other more agile segments of the economy. </p>
<p>In order to sustain long-term global technological advantage, the future MIC must leverage the full strength and depth of the rapidly evolving U.S. technology sector, particularly in places like Silicon Valley, which by almost all measures remains the world&rsquo;s leading innovation ecosystem.</p>
<p>Current leadership in both the Pentagon and Congress seem to acknowledge this imperative and have spoken of the need to diversify the MIC with faster-moving, more commercially diversified companies from places like Silicon Valley. Unfortunately, this is easier said than done.</p>
<p>Considering this context, what are the most significant barriers to entry for &ldquo;non-traditional&rdquo; companies, and how can they be lowered in order to attract new entrants, increase competition, and help ensure future military technological superiority? How do &ldquo;non-traditional&rdquo; companies in Silicon Valley view prospects for doing business with the federal government in defense, and how can this inform efforts inside the beltway to reform defense acquisitions? &nbsp;</p>
<p>While much has been written on the federal government&rsquo;s attempts to increase competition through acquisition reform, little research has been done to assess this issue from the perspective of Silicon Valley executives and venture capitalists. This paper offers a comprehensive overview of barriers to entry from the perspective of Silicon Valley technology executives and venture capitalists. &nbsp;</p>
<p>Findings suggest Silicon Valley executives see exceptionally high barriers to entry in defense, not because of ideological objections, but rather because of an acquisitions system and culture heavily biased in favor of larger, &ldquo;traditional&rdquo; defense contractors. The current system neither works in their favor nor is remotely consistent with the speed and agility these companies need to simultaneously compete in broader and in many cases more liquid global technology markets. Sadly, most executives and venture capitalists interviewed do not see a way to &ldquo;win&rdquo; in the current system. </p>
<p>This paper concludes with a number of policy recommendations, including more comprehensive and politically difficult initiatives, as well as those that can be executed by better leveraging existing authorities and capabilities.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2015/07/08-disrupting-military-industrial-complex-innovative-technology-silicon-valley-tama/no-app-for-that_final-7815.pdf">There's no app for that: Disrupting the military-industrial complex</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Jason Tama</li>
		</ul>
	</div><div>
		Image Source: &#169; Kevin Lamarque / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/99901030/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2015%2f07%2f08-disrupting-military-industrial-complex-innovative-technology-silicon-valley-tama%2fNo-app-for-that_final-cover-7815.jpg%3fh%3d231%26amp%3bw%3d178%26la%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Wed, 08 Jul 2015 00:00:00 -0400</pubDate><dc:creator>Jason Tama</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/v/vf%20vj/virginia_obamasequester001/virginia_obamasequester001_16x9.jpg?w=120" alt="U.S. President Barack Obama speaks at Newport News Shipbuilding in Newport News, Virginia" border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2015/07/08-disrupting-military-industrial-complex-innovative-technology-silicon-valley-tama/No-app-for-that_final-7815.pdf?la=en" target="_blank" name="&lid={C2545FD3-F6A4-4B0E-87FA-7703C6DEE0EA}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2015/07/08-disrupting-military-industrial-complex-innovative-technology-silicon-valley-tama/No-app-for-that_final-cover-7815.jpg?h=231&amp;w=178&la=en" style="height: 231px; width: 178px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>The Digital Revolution is not over. Rapidly emerging technologies continue to disrupt manufacturing and services across global markets. Despite the pace of change, the United States&rsquo; military-industrial complex (MIC) remains dominated by a highly consolidated base of &ldquo;traditional&rdquo; prime contractors and has proven to be nearly impervious to smaller, and in many cases more agile and more diversified, &ldquo;non-traditional&rdquo; companies. </p>
<p>Indeed it is difficult to overstate how formidable the barriers to entry are for &ldquo;non-traditional&rdquo; companies in the context of evolving 21st century global markets. These barriers significantly limit the government&rsquo;s access to human capital, intellectual property, and potentially disruptive innovation in other more agile segments of the economy. </p>
<p>In order to sustain long-term global technological advantage, the future MIC must leverage the full strength and depth of the rapidly evolving U.S. technology sector, particularly in places like Silicon Valley, which by almost all measures remains the world&rsquo;s leading innovation ecosystem.</p>
<p>Current leadership in both the Pentagon and Congress seem to acknowledge this imperative and have spoken of the need to diversify the MIC with faster-moving, more commercially diversified companies from places like Silicon Valley. Unfortunately, this is easier said than done.</p>
<p>Considering this context, what are the most significant barriers to entry for &ldquo;non-traditional&rdquo; companies, and how can they be lowered in order to attract new entrants, increase competition, and help ensure future military technological superiority? How do &ldquo;non-traditional&rdquo; companies in Silicon Valley view prospects for doing business with the federal government in defense, and how can this inform efforts inside the beltway to reform defense acquisitions? &nbsp;</p>
<p>While much has been written on the federal government&rsquo;s attempts to increase competition through acquisition reform, little research has been done to assess this issue from the perspective of Silicon Valley executives and venture capitalists. This paper offers a comprehensive overview of barriers to entry from the perspective of Silicon Valley technology executives and venture capitalists. &nbsp;</p>
<p>Findings suggest Silicon Valley executives see exceptionally high barriers to entry in defense, not because of ideological objections, but rather because of an acquisitions system and culture heavily biased in favor of larger, &ldquo;traditional&rdquo; defense contractors. The current system neither works in their favor nor is remotely consistent with the speed and agility these companies need to simultaneously compete in broader and in many cases more liquid global technology markets. Sadly, most executives and venture capitalists interviewed do not see a way to &ldquo;win&rdquo; in the current system. </p>
<p>This paper concludes with a number of policy recommendations, including more comprehensive and politically difficult initiatives, as well as those that can be executed by better leveraging existing authorities and capabilities.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2015/07/08-disrupting-military-industrial-complex-innovative-technology-silicon-valley-tama/no-app-for-that_final-7815.pdf">There's no app for that: Disrupting the military-industrial complex</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Jason Tama</li>
		</ul>
	</div><div>
		Image Source: &#169; Kevin Lamarque / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/99901030/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/99901030/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2015%2f07%2f08-disrupting-military-industrial-complex-innovative-technology-silicon-valley-tama%2fNo-app-for-that_final-cover-7815.jpg%3fh%3d231%26amp%3bw%3d178%26la%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/99901030/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2015/06/23-effective-leadership-geographically-dispersed-organizations-kieffer?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{B414C50C-D2AB-47F7-9671-F4E8812C1D34}</guid><link>http://webfeeds.brookings.edu/~/97490446/0/brookingsrss/series/21cdipolicypapers~Proximity-to-the-flagpole-Effective-leadership-in-geographically-dispersed-organizations</link><title>Proximity to the flagpole: Effective leadership in geographically dispersed organizations</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/g/gk%20go/gouaillard_demonstration001/gouaillard_demonstration001_16x9.jpg?w=120" alt="Temasys Communications' Chief Technology Officer Alexandre Gouaillard runs a demonstration of WebRTC " border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2015/06/23-effective-leadership-geographically-dispersed-organizations-kieffer/Proximity-to-the-flagpole-FINAL2.pdf?la=en" name="&lid={5935B3F0-CEF5-4A83-808A-1818D6747D67}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2015/06/23-effective-leadership-geographically-dispersed-organizations-kieffer/Proximity-to-the-flagpole-cover.jpg?h=231&amp;w=178&la=en" style="height: 231px; width: 178px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>The workplace is changing rapidly, and more and more leaders in government and private industry are required to lead those who are geographically separated. Globalization, economic shifts from manufacturing to information, the need to be closer to customers, and improved technological capabilities have increased the geographic dispersion of many organizations. While these organizations offer many exciting opportunities, they also bring new leadership challenges that are amplified because of the separation between leaders and followers. Although much has been researched and written on leadership in general, relatively little has been focused on the unique leadership challenges and opportunities presented in geographically separated environments. Furthermore, most leaders are not given the right tools and training to overcome the challenges or take advantage of the opportunities when leading in these unique settings.</p>
<p>A survey of leaders within a geographically dispersed military organization confirmed there are distinct differences in how remote and local leaders operate, and most leadership tasks related to leading those who are remote are more difficult than with those who are co-located. The tasks most difficult for remote leaders are related to communicating, mentoring and building personal relationships, fostering teamwork and group identity, and measuring performance. To be effective, leaders must be aware of the challenges they face when leading from afar and be deliberate in their engagement.</p>
<p>Although there are unique leadership challenges in geographically dispersed environments, most current leadership literature and training is developed on work in face-to-face settings. Leading geographically dispersed organizations is not a new concept, but technological advances over the last decade have provided leaders with greater ability to be more influential and involved with distant teams than ever before. This advancement has given leaders not only the opportunity to be successful in a moment of time but ensures continued success by enhancing the way they build dispersed organizations and grow future leaders from afar.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2015/06/23-effective-leadership-geographically-dispersed-organizations-kieffer/proximity-to-the-flagpole-final2.pdf">Proximity to the flagpole: Effective Leadership in geographically dispersed organizations</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Scott M. Kieffer</li>
		</ul>
	</div><div>
		Image Source: &#169; Edgar Su / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/97490446/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2015%2f06%2f23-effective-leadership-geographically-dispersed-organizations-kieffer%2fProximity-to-the-flagpole-cover.jpg%3fh%3d231%26amp%3bw%3d178%26la%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Tue, 23 Jun 2015 00:00:00 -0400</pubDate><dc:creator>Scott M. Kieffer</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/g/gk%20go/gouaillard_demonstration001/gouaillard_demonstration001_16x9.jpg?w=120" alt="Temasys Communications' Chief Technology Officer Alexandre Gouaillard runs a demonstration of WebRTC " border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2015/06/23-effective-leadership-geographically-dispersed-organizations-kieffer/Proximity-to-the-flagpole-FINAL2.pdf?la=en" name="&lid={5935B3F0-CEF5-4A83-808A-1818D6747D67}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2015/06/23-effective-leadership-geographically-dispersed-organizations-kieffer/Proximity-to-the-flagpole-cover.jpg?h=231&amp;w=178&la=en" style="height: 231px; width: 178px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>The workplace is changing rapidly, and more and more leaders in government and private industry are required to lead those who are geographically separated. Globalization, economic shifts from manufacturing to information, the need to be closer to customers, and improved technological capabilities have increased the geographic dispersion of many organizations. While these organizations offer many exciting opportunities, they also bring new leadership challenges that are amplified because of the separation between leaders and followers. Although much has been researched and written on leadership in general, relatively little has been focused on the unique leadership challenges and opportunities presented in geographically separated environments. Furthermore, most leaders are not given the right tools and training to overcome the challenges or take advantage of the opportunities when leading in these unique settings.</p>
<p>A survey of leaders within a geographically dispersed military organization confirmed there are distinct differences in how remote and local leaders operate, and most leadership tasks related to leading those who are remote are more difficult than with those who are co-located. The tasks most difficult for remote leaders are related to communicating, mentoring and building personal relationships, fostering teamwork and group identity, and measuring performance. To be effective, leaders must be aware of the challenges they face when leading from afar and be deliberate in their engagement.</p>
<p>Although there are unique leadership challenges in geographically dispersed environments, most current leadership literature and training is developed on work in face-to-face settings. Leading geographically dispersed organizations is not a new concept, but technological advances over the last decade have provided leaders with greater ability to be more influential and involved with distant teams than ever before. This advancement has given leaders not only the opportunity to be successful in a moment of time but ensures continued success by enhancing the way they build dispersed organizations and grow future leaders from afar.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2015/06/23-effective-leadership-geographically-dispersed-organizations-kieffer/proximity-to-the-flagpole-final2.pdf">Proximity to the flagpole: Effective Leadership in geographically dispersed organizations</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Scott M. Kieffer</li>
		</ul>
	</div><div>
		Image Source: &#169; Edgar Su / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/97490446/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/97490446/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2015%2f06%2f23-effective-leadership-geographically-dispersed-organizations-kieffer%2fProximity-to-the-flagpole-cover.jpg%3fh%3d231%26amp%3bw%3d178%26la%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/97490446/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2015/06/01-getting-active-army-end-strength-right-evans?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{357AE9A0-D5E5-462F-B219-E85233BF21E0}</guid><link>http://webfeeds.brookings.edu/~/93843576/0/brookingsrss/series/21cdipolicypapers~Getting-it-right-Optimal-active-Army-end-strength</link><title>Getting it right: Optimal active Army end strength</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_army_soldiers001/us_army_soldiers001_16x9.jpg?w=120" alt="U.S. army soldiers take part in the "Wind Spring 15" military exercises at Smardan shooting range (REUTERS/Radu Sigheti). " border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2015/06/01-getting-active-army-end-strength-right-evans/Army-End-Strength.pdf?la=en" name="&lid={F3ADEA32-2443-4D51-B260-F56020970333}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2015/06/01-getting-active-army-end-strength-right-evans/Army-End-Strength-Cover.jpg?h=231&amp;w=178&la=en" style="width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>Thirteen years of sustained combat in Iraq and Afghanistan has wearied our citizens and civilian leaders and placed significant strain on our national budget. Sequestration triggered by the Budget Control Act of 2011 has created an environment where substantial reductions must be made across all services. As a &ldquo;people-centric&rdquo; force, the United States Army&rsquo;s principle currency for reducing the operating budget is force structure, i.e. people. While other services look to meaningful reductions of high cost weapons systems, the Army must reduce the number of soldiers in its active and reserve components to achieve a fiscally sustainable end strength. Accepting that the Army force structure construct (operating and generating force components) is the best construct to train and ready the force for the future, how large does the U.S. Army active component need to be in order to meet the demands of the 2012 Defense Strategic Guidance in the volatile, uncertain, complex and ambiguous security environment of the 21st century?</p>
<p>The active Army requires manning at the 480,000 to 490,000 soldier level to meet all of its operational and force generation requirements. An expectation that trained, ready, and well-equipped forces can be created after an emergency occurs is misguided.&nbsp; Arresting the reduction of active Army end strength at the end of FY 2015 is the best strategy to ensure that our nation maintains its competitive advantage, can prevent conflict before it arises, shape the security environment for successful employment of our elements of national power, and win decisively in a complex world.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2015/06/01-getting-active-army-end-strength-right-evans/army-end-strength.pdf">Getting it right: Determining the optimal active component end strength of the all-volunteer Army to meet the demands of the 21st century</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>John Evans</li>
		</ul>
	</div><div>
		Image Source: &#169; Radu Sigheti / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/93843576/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2015%2f06%2f01-getting-active-army-end-strength-right-evans%2fArmy-End-Strength-Cover.jpg%3fh%3d231%26amp%3bw%3d178%26la%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Mon, 01 Jun 2015 00:00:00 -0400</pubDate><dc:creator>John Evans</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_army_soldiers001/us_army_soldiers001_16x9.jpg?w=120" alt="U.S. army soldiers take part in the "Wind Spring 15" military exercises at Smardan shooting range (REUTERS/Radu Sigheti). " border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2015/06/01-getting-active-army-end-strength-right-evans/Army-End-Strength.pdf?la=en" name="&lid={F3ADEA32-2443-4D51-B260-F56020970333}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2015/06/01-getting-active-army-end-strength-right-evans/Army-End-Strength-Cover.jpg?h=231&amp;w=178&la=en" style="width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>Thirteen years of sustained combat in Iraq and Afghanistan has wearied our citizens and civilian leaders and placed significant strain on our national budget. Sequestration triggered by the Budget Control Act of 2011 has created an environment where substantial reductions must be made across all services. As a &ldquo;people-centric&rdquo; force, the United States Army&rsquo;s principle currency for reducing the operating budget is force structure, i.e. people. While other services look to meaningful reductions of high cost weapons systems, the Army must reduce the number of soldiers in its active and reserve components to achieve a fiscally sustainable end strength. Accepting that the Army force structure construct (operating and generating force components) is the best construct to train and ready the force for the future, how large does the U.S. Army active component need to be in order to meet the demands of the 2012 Defense Strategic Guidance in the volatile, uncertain, complex and ambiguous security environment of the 21st century?</p>
<p>The active Army requires manning at the 480,000 to 490,000 soldier level to meet all of its operational and force generation requirements. An expectation that trained, ready, and well-equipped forces can be created after an emergency occurs is misguided.&nbsp; Arresting the reduction of active Army end strength at the end of FY 2015 is the best strategy to ensure that our nation maintains its competitive advantage, can prevent conflict before it arises, shape the security environment for successful employment of our elements of national power, and win decisively in a complex world.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2015/06/01-getting-active-army-end-strength-right-evans/army-end-strength.pdf">Getting it right: Determining the optimal active component end strength of the all-volunteer Army to meet the demands of the 21st century</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>John Evans</li>
		</ul>
	</div><div>
		Image Source: &#169; Radu Sigheti / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/93843576/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/93843576/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2015%2f06%2f01-getting-active-army-end-strength-right-evans%2fArmy-End-Strength-Cover.jpg%3fh%3d231%26amp%3bw%3d178%26la%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/93843576/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2014/09/30-air-power-reach-access-persistence-fueling-knepper?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{A9E9AF4E-04E1-4DE0-9BD0-88F4BC815AFB}</guid><link>http://webfeeds.brookings.edu/~/75761537/0/brookingsrss/series/21cdipolicypapers~Addressing-Air-Power-Reach-Persistence-and-Fueling-Limitations-for-Contested-and-Permissive-Air-Operations</link><title>Addressing Air Power Reach, Persistence and Fueling Limitations for Contested and Permissive Air Operations</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/a/af%20aj/airplanes_refuelling001/airplanes_refuelling001_16x9.jpg?w=120" alt="A U.S. F-15E fighter plane approaches a U.S. KC-135 tanker plane for refuelling over southeastern Turkey." border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2014/09/30-air-access-reach-persistence-fueling-knepper/Access-Assured_Knepper_Formatted-101414.pdf?la=en" name="&lid={AF472001-F738-43B7-92A4-0B2193B7A079}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/09/30-air-access-reach-persistence-fueling-knepper/Cover-Image.jpg?la=en" style="width: 178px; height: 232px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>In any future strategic environment, air power will be a critical component of U.S. military strategy. However, U.S. air power faces deep constraints in two divergent areas: range limits in contested airspace and persistence limits in permissive airspace. While the issues of fuel and refueling have not received as much attention as the growth of advanced threats to air assets, their combination threatens to undercut the effectiveness of future air operations and access into potentially denied airspace. At the other end of the combat spectrum, air supremacy in uncontested airspace allows for greater persistence in providing crucial intelligence, surveillance and reconnaissance, which similarly relies on the sustainment of fuel  resources.&nbsp;</p>
<p>Bisecting the future operating environment into distinct domains, contested and permissive airspace, this paper seeks to address the impact of current range and persistence limitations in conjunction with fuel and refueling resources. To meet the range requirements in contested airspace, the Department of Defense (DOD) should mitigate existing vulnerabilities relative to potential threats to ensure not only a credible conventional deterrent, but when necessary, the ability to project power against a progressive adversary. In achieving persistence requirements in permissive airspace, the DOD should evaluate greater efficiencies in providing longer endurance  options.</p>
<h2>Range limitations in contested airspace:</h2>
<p>
</p>
<ul>
    <li>Increase survivability of airborne refueling tanker aircraft;</li>
    <li>Plan for defense of tanker aircraft in the same manner as other high value airborne assets;</li>
    <li>Incorporate tactical airborne refueling connectors using current inventory of manned aircraft;</li>
    <li>Develop tactical airborne refueling connectors leveraging unmanned aerial systems (drones);</li>
    <li>Ensure that the requests for proposals for next air systems address both combat capability and radius to achieve the necessary reach dictated by the assessed threats in the future operating environment.</li>
</ul>
<h2>Persistence inefficiencies and endurance limits in permissive airspace:</h2>
<ul>
    <li>Acquire a long-endurance, self-sustaining air system that does not require refueling.</li>
</ul>
<ol>
    <br>
</ol><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2014/09/30-air-access-reach-persistence-fueling-knepper/access-assured_knepper_formatted-101414.pdf">Addressing Air Power Reach, Persistence and Fueling Limitations for Contested and Permissive Air Operations</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Gregory Knepper</li>
		</ul>
	</div><div>
		Image Source: &#169; Fatih Saribas / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/75761537/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f09%2f30-air-access-reach-persistence-fueling-knepper%2fCover-Image.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Tue, 30 Sep 2014 00:00:00 -0400</pubDate><dc:creator>Gregory Knepper</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/a/af%20aj/airplanes_refuelling001/airplanes_refuelling001_16x9.jpg?w=120" alt="A U.S. F-15E fighter plane approaches a U.S. KC-135 tanker plane for refuelling over southeastern Turkey." border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2014/09/30-air-access-reach-persistence-fueling-knepper/Access-Assured_Knepper_Formatted-101414.pdf?la=en" name="&lid={AF472001-F738-43B7-92A4-0B2193B7A079}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/09/30-air-access-reach-persistence-fueling-knepper/Cover-Image.jpg?la=en" style="width: 178px; height: 232px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>In any future strategic environment, air power will be a critical component of U.S. military strategy. However, U.S. air power faces deep constraints in two divergent areas: range limits in contested airspace and persistence limits in permissive airspace. While the issues of fuel and refueling have not received as much attention as the growth of advanced threats to air assets, their combination threatens to undercut the effectiveness of future air operations and access into potentially denied airspace. At the other end of the combat spectrum, air supremacy in uncontested airspace allows for greater persistence in providing crucial intelligence, surveillance and reconnaissance, which similarly relies on the sustainment of fuel  resources.&nbsp;</p>
<p>Bisecting the future operating environment into distinct domains, contested and permissive airspace, this paper seeks to address the impact of current range and persistence limitations in conjunction with fuel and refueling resources. To meet the range requirements in contested airspace, the Department of Defense (DOD) should mitigate existing vulnerabilities relative to potential threats to ensure not only a credible conventional deterrent, but when necessary, the ability to project power against a progressive adversary. In achieving persistence requirements in permissive airspace, the DOD should evaluate greater efficiencies in providing longer endurance  options.</p>
<h2>Range limitations in contested airspace:</h2>
<p>
</p>
<ul>
    <li>Increase survivability of airborne refueling tanker aircraft;</li>
    <li>Plan for defense of tanker aircraft in the same manner as other high value airborne assets;</li>
    <li>Incorporate tactical airborne refueling connectors using current inventory of manned aircraft;</li>
    <li>Develop tactical airborne refueling connectors leveraging unmanned aerial systems (drones);</li>
    <li>Ensure that the requests for proposals for next air systems address both combat capability and radius to achieve the necessary reach dictated by the assessed threats in the future operating environment.</li>
</ul>
<h2>Persistence inefficiencies and endurance limits in permissive airspace:</h2>
<ul>
    <li>Acquire a long-endurance, self-sustaining air system that does not require refueling.</li>
</ul>
<ol>
    
<br>
</ol><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2014/09/30-air-access-reach-persistence-fueling-knepper/access-assured_knepper_formatted-101414.pdf">Addressing Air Power Reach, Persistence and Fueling Limitations for Contested and Permissive Air Operations</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Gregory Knepper</li>
		</ul>
	</div><div>
		Image Source: &#169; Fatih Saribas / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/75761537/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/75761537/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f09%2f30-air-access-reach-persistence-fueling-knepper%2fCover-Image.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/75761537/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2014/09/25-unmanned-aerial-systems-japan-air-self-defense-force-shirai?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{D3428791-0E03-4B3D-B26B-28D39F0F11E0}</guid><link>http://webfeeds.brookings.edu/~/75347683/0/brookingsrss/series/21cdipolicypapers~Incorporating-Unmanned-Aerial-Systems-Into-The-Japan-Air-SelfDefense-Force</link><title>Incorporating Unmanned Aerial Systems Into The Japan Air Self-Defense Force</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/d/dp%20dt/drone004/drone004_16x9.jpg?w=120" alt="Undated file photo courtesy of the U.S. Navy shows a RQ-4 Global Hawk unmanned aerial vehicle conducting tests over Naval Air Station Patuxent River, Maryland. (REUTERS)" border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2014/09/25-incorporating-unmanned-aerial-systems-japan-air-self-defense-force-shirai/Incorporating-UAS-Into-JASDF-Formatted-91914.pdf?la=en" name="&lid={1B5B6D96-C975-433C-A664-696A37B5F61A}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/09/25-incorporating-unmanned-aerial-systems-japan-air-self-defense-force-shirai/Incorporating-UAS-Into-JASDF-Cover.jpg?la=en" style="width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a></p>
<p>This paper seeks to provide military policy makers and planners with constructive suggestions for the acquisition of unmanned aerial systems (UAS) given the regional strategic environment in East Asia and Japanese military culture. The strategic environment around Japan in particular has grown more complicated with the rapid expansion of military activity in the sea and airspace surrounding Japan, including incursions into Japanese territory.</p>
<p>
</p>
<p><strong>Three key concepts related to doctrine, leadership and culture in Japan&rsquo;s military: </strong></p>
<ol>
    <li>It is critical that the doctrine highlight the need to adapt to increased missions without extra cost and overloads. When formulating unmanned aerial vehicle (UAV) doctrine, Japan must include an operational concept for the future mission and alternative plans for delayed modernization programs. An autonomously controlled UAV, such as an unmanned combat aerial vehicle, could compensate for conventional air power. <br>
    &nbsp; </li>
    <li>In order to implement UAVs effectively, leaders must be fluent in UAV capabilities and have a future vision for UAV contributions to war. The Japan Air Self-Defense Force (JASDF) also needs to create a new UAV culture. All JASDF members should learn about UAVs to help eliminate prejudices against them. The Japanese military should create a joint operations research team for UAVs in the Joint Chiefs of Staff, cooperate with the Joint UAS Center of Excellence to learn from U.S. military expertise and enhance interoperability. <br>
    &nbsp; </li>
    <li>The JASDF should expand UAV culture outside their organization in order to execute intelligence, surveillance and reconnaissance missions efficiently with allied forces. NATO already has similar kinds of organizations, known as the Joint Capability Group for Intelligence, Surveillance and Reconnaissance and the Joint Capability Group UAV.</li>
</ol><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2014/09/25-incorporating-unmanned-aerial-systems-japan-air-self-defense-force-shirai/incorporating-uas-into-jasdf-formatted-91914.pdf">Incorporating Unmanned Aerial Systems Into The Japan Air Self-Defense Force</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Ryoji Shirai</li>
		</ul>
	</div><div>
		Image Source: HANDOUT
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/75347683/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f09%2f25-incorporating-unmanned-aerial-systems-japan-air-self-defense-force-shirai%2fIncorporating-UAS-Into-JASDF-Cover.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Thu, 25 Sep 2014 00:00:00 -0400</pubDate><dc:creator>Ryoji Shirai</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/d/dp%20dt/drone004/drone004_16x9.jpg?w=120" alt="Undated file photo courtesy of the U.S. Navy shows a RQ-4 Global Hawk unmanned aerial vehicle conducting tests over Naval Air Station Patuxent River, Maryland. (REUTERS)" border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2014/09/25-incorporating-unmanned-aerial-systems-japan-air-self-defense-force-shirai/Incorporating-UAS-Into-JASDF-Formatted-91914.pdf?la=en" name="&lid={1B5B6D96-C975-433C-A664-696A37B5F61A}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/09/25-incorporating-unmanned-aerial-systems-japan-air-self-defense-force-shirai/Incorporating-UAS-Into-JASDF-Cover.jpg?la=en" style="width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a></p>
<p>This paper seeks to provide military policy makers and planners with constructive suggestions for the acquisition of unmanned aerial systems (UAS) given the regional strategic environment in East Asia and Japanese military culture. The strategic environment around Japan in particular has grown more complicated with the rapid expansion of military activity in the sea and airspace surrounding Japan, including incursions into Japanese territory.</p>
<p>
</p>
<p><strong>Three key concepts related to doctrine, leadership and culture in Japan&rsquo;s military: </strong></p>
<ol>
    <li>It is critical that the doctrine highlight the need to adapt to increased missions without extra cost and overloads. When formulating unmanned aerial vehicle (UAV) doctrine, Japan must include an operational concept for the future mission and alternative plans for delayed modernization programs. An autonomously controlled UAV, such as an unmanned combat aerial vehicle, could compensate for conventional air power. 
<br>
    &nbsp; </li>
    <li>In order to implement UAVs effectively, leaders must be fluent in UAV capabilities and have a future vision for UAV contributions to war. The Japan Air Self-Defense Force (JASDF) also needs to create a new UAV culture. All JASDF members should learn about UAVs to help eliminate prejudices against them. The Japanese military should create a joint operations research team for UAVs in the Joint Chiefs of Staff, cooperate with the Joint UAS Center of Excellence to learn from U.S. military expertise and enhance interoperability. 
<br>
    &nbsp; </li>
    <li>The JASDF should expand UAV culture outside their organization in order to execute intelligence, surveillance and reconnaissance missions efficiently with allied forces. NATO already has similar kinds of organizations, known as the Joint Capability Group for Intelligence, Surveillance and Reconnaissance and the Joint Capability Group UAV.</li>
</ol><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2014/09/25-incorporating-unmanned-aerial-systems-japan-air-self-defense-force-shirai/incorporating-uas-into-jasdf-formatted-91914.pdf">Incorporating Unmanned Aerial Systems Into The Japan Air Self-Defense Force</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Ryoji Shirai</li>
		</ul>
	</div><div>
		Image Source: HANDOUT
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/75347683/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/75347683/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f09%2f25-incorporating-unmanned-aerial-systems-japan-air-self-defense-force-shirai%2fIncorporating-UAS-Into-JASDF-Cover.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/75347683/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2014/08/04-rethinking-marine-corps-officer-promotion-retention-marx?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{BFC44A81-2861-4712-AEE5-A39B0157E1CA}</guid><link>http://webfeeds.brookings.edu/~/71061150/0/brookingsrss/series/21cdipolicypapers~Rethinking-Marine-Corps-Officer-Promotion-And-Retention</link><title>Rethinking Marine Corps Officer Promotion And Retention</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/m/ma%20me/marines001/marines001_16x9.jpg?w=120" alt="The U.S. Marine Corps rifle team stands at attention during a ceremony in Honolulu, Hawaii." border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2014/08/04-rethinking-marine-corps-officer-promotion-marx/Rethinking-Marine-Corps-Officer-Promotion-73014x2.pdf?la=en" name="&lid={94078FB6-0C0E-41EB-9110-3E3050E2FD68}&lpos=loc:body"><img alt="" style="width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/08/04-rethinking-marine-corps-officer-promotion-marx/August-Cover.jpg?la=en"></a>The United States Marine Corps is the vanguard for many forward-thinking policies, but it has not demonstrated progressive thinking on officer promotions. Despite working under the same authorization and rules, there are vast differences between United States military services on their policies to promote their most competitive officers. Within the Marine Corps, current practice allows lieutenant colonels and colonels to stay longer than they are needed, which hinders promotion opportunities for junior officers. Due to the Marine Corps&rsquo; handling of manpower selection and promotion, officers are leaving the service prematurely.</p>
<p>This paper argues that the Marine Corps should adopt a merit-based promotion system instead of using the current seniority-based method. Specifically, two changes should be made to ensure more effective promotion policies:</p>
<ul>
    <li>First, the Marine Corps should make continuous use of the Selective Early Retirement Boards and install a more effective performance evaluation system that clearly identifies the top 10 percent of performers.<br>
    &nbsp; </li>
    <li>Second, the Marines Corps should create a system that forces reviewing officers to identify promising leaders who should be promoted ahead of their peers by selecting them from the Below Zone.&nbsp;&nbsp;</li>
</ul><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2014/08/04-rethinking-marine-corps-officer-promotion-marx/rethinking-marine-corps-officer-promotion-73014x2.pdf">Rethinking Marine Corps Officer Promotion</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Aaron Marx</li>
		</ul>
	</div><div>
		Image Source: &#169; Hugh Gentry / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/71061150/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f08%2f04-rethinking-marine-corps-officer-promotion-marx%2fAugust-Cover.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Mon, 04 Aug 2014 00:00:00 -0400</pubDate><dc:creator>Aaron Marx</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/m/ma%20me/marines001/marines001_16x9.jpg?w=120" alt="The U.S. Marine Corps rifle team stands at attention during a ceremony in Honolulu, Hawaii." border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2014/08/04-rethinking-marine-corps-officer-promotion-marx/Rethinking-Marine-Corps-Officer-Promotion-73014x2.pdf?la=en" name="&lid={94078FB6-0C0E-41EB-9110-3E3050E2FD68}&lpos=loc:body"><img alt="" style="width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/08/04-rethinking-marine-corps-officer-promotion-marx/August-Cover.jpg?la=en"></a>The United States Marine Corps is the vanguard for many forward-thinking policies, but it has not demonstrated progressive thinking on officer promotions. Despite working under the same authorization and rules, there are vast differences between United States military services on their policies to promote their most competitive officers. Within the Marine Corps, current practice allows lieutenant colonels and colonels to stay longer than they are needed, which hinders promotion opportunities for junior officers. Due to the Marine Corps&rsquo; handling of manpower selection and promotion, officers are leaving the service prematurely.</p>
<p>This paper argues that the Marine Corps should adopt a merit-based promotion system instead of using the current seniority-based method. Specifically, two changes should be made to ensure more effective promotion policies:</p>
<ul>
    <li>First, the Marine Corps should make continuous use of the Selective Early Retirement Boards and install a more effective performance evaluation system that clearly identifies the top 10 percent of performers.
<br>
    &nbsp; </li>
    <li>Second, the Marines Corps should create a system that forces reviewing officers to identify promising leaders who should be promoted ahead of their peers by selecting them from the Below Zone.&nbsp;&nbsp;</li>
</ul><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2014/08/04-rethinking-marine-corps-officer-promotion-marx/rethinking-marine-corps-officer-promotion-73014x2.pdf">Rethinking Marine Corps Officer Promotion</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Aaron Marx</li>
		</ul>
	</div><div>
		Image Source: &#169; Hugh Gentry / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/71061150/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/71061150/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f08%2f04-rethinking-marine-corps-officer-promotion-marx%2fAugust-Cover.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/71061150/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2014/07/30-gender-conflict-prevention-countering-violent-extremism-couture?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{B433CE36-C6AE-46A0-BAF6-EDA5F0B6C70D}</guid><link>http://webfeeds.brookings.edu/~/70597296/0/brookingsrss/series/21cdipolicypapers~A-Gendered-Approach-To-Countering-Violent-Extremism</link><title>A Gendered Approach To Countering Violent Extremism</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/m/mk%20mo/morocco_congress001/morocco_congress001_16x9.jpg?w=120" alt="Women attend the opening of the first congress of Morocco's Party of Justice and Development in Rabat." border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2014/07/30-gender-conflict-prevention-countering-violent-extremism-couture/Women-CVE-Formatted-72914-Couture-FINAL2.pdf?la=en" name="&lid={2BCD31D5-DA70-4A3D-AC8C-667979CCCAE1}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/07/30-gender-conflict-prevention-countering-violent-extremism-couture/cover.jpg?la=en" style="width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>As the United States and world transition from a reflexive and hard approach in counterterrorism to a more reflective and soft one for the <em>prevention</em> of terrorism, the search for best practices and lessons learned is more critical than ever. While programming related to countering violent extremism (CVE) continues to grapple with the adoption of official definitions, priorities, evaluation methodologies, and qualitative and quantitative metrics, there is a growing awareness of the importance of harnessing female actors as positive, operational agents of change. Women continue to be an underutilized and under-tapped resource in the fight against extremism. This research identifies best practices through lessons learned from efforts that utilize women to encouragingly affect catalysts and circumstances that drive individuals to engage in terrorism.</p>
<p>The empowerment of women not only makes practical sense, but also is a good investment in economics, business, and counterterrorism. In micro lending, for every $1US a woman earns, she reinvests 90 percent back into her family and/or community; men re-invest only 40 percent. When a woman has an education, she marries <em>on average</em> four years later, enters into non-abusive relationships, and has 2.2 children who are healthier and better educated. Extremism is most effectively countered through increased education, better critical thinking, and enhanced opportunities. These empowerment scenarios and positive outcomes become manifest in the impact a woman has within her family and community. In the words of former Secretary to the United Nations Kofi Annan, &ldquo;There is no development strategy more beneficial to society as a whole&mdash;women and men alike&mdash;than the one which involves women as central players.&rdquo;</p>
<p>While originally intended to only bring awareness of the role of women in preventing terrorism, this research reveals several additional important findings. Most notably, as is the case with their impact on peace and stability, women play a critical role in the security realm, and CVE is no exception. Empowering women in culturally and country-specific ways enables them to be valuable players in the extremism paradigm.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2014/07/30-gender-conflict-prevention-countering-violent-extremism-couture/women-cve-formatted-72914-couture-final2.pdf">A Gendered Approach to Countering Violent Extremism: Lessons Learned from Women in Peacebuilding and Conflict Prevention Applied Successfully in Bangladesh and Morocco</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Krista Couture</li>
		</ul>
	</div><div>
		Image Source: &#169; Stringer . / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/70597296/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f07%2f30-gender-conflict-prevention-countering-violent-extremism-couture%2fcover.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Wed, 30 Jul 2014 00:00:00 -0400</pubDate><dc:creator>Krista Couture</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/m/mk%20mo/morocco_congress001/morocco_congress001_16x9.jpg?w=120" alt="Women attend the opening of the first congress of Morocco's Party of Justice and Development in Rabat." border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2014/07/30-gender-conflict-prevention-countering-violent-extremism-couture/Women-CVE-Formatted-72914-Couture-FINAL2.pdf?la=en" name="&lid={2BCD31D5-DA70-4A3D-AC8C-667979CCCAE1}&lpos=loc:body"><img alt="" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/07/30-gender-conflict-prevention-countering-violent-extremism-couture/cover.jpg?la=en" style="width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px; border: 1px solid #000000;"></a>As the United States and world transition from a reflexive and hard approach in counterterrorism to a more reflective and soft one for the <em>prevention</em> of terrorism, the search for best practices and lessons learned is more critical than ever. While programming related to countering violent extremism (CVE) continues to grapple with the adoption of official definitions, priorities, evaluation methodologies, and qualitative and quantitative metrics, there is a growing awareness of the importance of harnessing female actors as positive, operational agents of change. Women continue to be an underutilized and under-tapped resource in the fight against extremism. This research identifies best practices through lessons learned from efforts that utilize women to encouragingly affect catalysts and circumstances that drive individuals to engage in terrorism.</p>
<p>The empowerment of women not only makes practical sense, but also is a good investment in economics, business, and counterterrorism. In micro lending, for every $1US a woman earns, she reinvests 90 percent back into her family and/or community; men re-invest only 40 percent. When a woman has an education, she marries <em>on average</em> four years later, enters into non-abusive relationships, and has 2.2 children who are healthier and better educated. Extremism is most effectively countered through increased education, better critical thinking, and enhanced opportunities. These empowerment scenarios and positive outcomes become manifest in the impact a woman has within her family and community. In the words of former Secretary to the United Nations Kofi Annan, &ldquo;There is no development strategy more beneficial to society as a whole&mdash;women and men alike&mdash;than the one which involves women as central players.&rdquo;</p>
<p>While originally intended to only bring awareness of the role of women in preventing terrorism, this research reveals several additional important findings. Most notably, as is the case with their impact on peace and stability, women play a critical role in the security realm, and CVE is no exception. Empowering women in culturally and country-specific ways enables them to be valuable players in the extremism paradigm.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2014/07/30-gender-conflict-prevention-countering-violent-extremism-couture/women-cve-formatted-72914-couture-final2.pdf">A Gendered Approach to Countering Violent Extremism: Lessons Learned from Women in Peacebuilding and Conflict Prevention Applied Successfully in Bangladesh and Morocco</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Krista Couture</li>
		</ul>
	</div><div>
		Image Source: &#169; Stringer . / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/70597296/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/70597296/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f07%2f30-gender-conflict-prevention-countering-violent-extremism-couture%2fcover.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/70597296/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2014/05/07-winning-peace-through-defense-cost-imposition-china-ekman?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{91F0CD95-ACBD-4A74-98AD-9BB500E33493}</guid><link>http://webfeeds.brookings.edu/~/65486797/0/brookingsrss/series/21cdipolicypapers~Winning-The-Peace-Through-Cost-Imposition</link><title>Winning The Peace Through Cost Imposition</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_fighter_jet001/us_fighter_jet001_16x9.jpg?w=120" alt="A U.S. Marine F-35B Joint Strike Fighter Jet sits in a hangar after the roll-out Ceremony at Eglin Air Force Base in Florida (REUTERS/Michael Spooneybarger). " border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2014/05/07-winning-peace-through-defense-cost-imposition-ekman/Winning-the-Peace-Cost-Imposition_040714.pdf?la=en" name="&lid={0A18A036-A2D3-4A37-B700-4A407D08C481}&lpos=loc:body"><img alt="" style="border:1px solid #7f7f7f;width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px;" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/05/07-winning-peace-through-defense-cost-imposition-ekman/Paper-Cover-Image.jpg?la=en"></a>This paper seeks to clarify cost imposing strategies for defense decision-makers. America&rsquo;s financial challenges and China&rsquo;s rise have prompted new interest in the approach. Focused on eliciting an adversary response creating a hardship differential favoring the initiating nation, cost imposition falls at the most beneficial end of a cost-based competitive spectrum as an element of competitive strategy. Last employed against the Soviet Union, the approach holds many similarities and some key differences when leveraged against China.</p>
<p>To institutionalize the practice, the Department of Defense should revive the competitive strategies structure and methods developed in the 1980s. Implementation will require overcoming institutional resistance, short time horizons and significant fiscal constraints. America should focus its cost imposing efforts on China first, and specifically on those capability contests offering the most lucrative advantage. Far East security partner participation and impacts should be considered. </p>
<p>Cost imposing strategies can succeed when based on correct predictions of Chinese responses and accurate accounting for the monetary and other security costs involved. Part of the challenge involves bounding each contest. In the air domain, competition involving China&rsquo;s ballistic and cruise missiles, surface-to-air missiles and fighters offer the U.S. different degrees of advantage and hardship. Decision-makers will find that cost imposition is not a panacea. However, they should understand the concept beyond its current level of misuse both for the disproportionate advantage it offers and for the liability it poses when used against America.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2014/05/07-winning-peace-through-defense-cost-imposition-ekman/winning-the-peace-cost-imposition_040714.pdf">Winning the Peace Through Cost Imposition</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Colonel Kenneth Ekman</li>
		</ul>
	</div><div>
		Image Source: &#169; Michael Spooneybarger / Reute
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486797/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f05%2f07-winning-peace-through-defense-cost-imposition-ekman%2fPaper-Cover-Image.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Wed, 07 May 2014 15:50:00 -0400</pubDate><dc:creator>Colonel Kenneth Ekman</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_fighter_jet001/us_fighter_jet001_16x9.jpg?w=120" alt="A U.S. Marine F-35B Joint Strike Fighter Jet sits in a hangar after the roll-out Ceremony at Eglin Air Force Base in Florida (REUTERS/Michael Spooneybarger). " border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2014/05/07-winning-peace-through-defense-cost-imposition-ekman/Winning-the-Peace-Cost-Imposition_040714.pdf?la=en" name="&lid={0A18A036-A2D3-4A37-B700-4A407D08C481}&lpos=loc:body"><img alt="" style="border:1px solid #7f7f7f;width: 178px; height: 231px; float: left; margin: 5px 15px 10px 5px;" src="http://www.brookings.edu/~/media/Research/Files/Papers/2014/05/07-winning-peace-through-defense-cost-imposition-ekman/Paper-Cover-Image.jpg?la=en"></a>This paper seeks to clarify cost imposing strategies for defense decision-makers. America&rsquo;s financial challenges and China&rsquo;s rise have prompted new interest in the approach. Focused on eliciting an adversary response creating a hardship differential favoring the initiating nation, cost imposition falls at the most beneficial end of a cost-based competitive spectrum as an element of competitive strategy. Last employed against the Soviet Union, the approach holds many similarities and some key differences when leveraged against China.</p>
<p>To institutionalize the practice, the Department of Defense should revive the competitive strategies structure and methods developed in the 1980s. Implementation will require overcoming institutional resistance, short time horizons and significant fiscal constraints. America should focus its cost imposing efforts on China first, and specifically on those capability contests offering the most lucrative advantage. Far East security partner participation and impacts should be considered. </p>
<p>Cost imposing strategies can succeed when based on correct predictions of Chinese responses and accurate accounting for the monetary and other security costs involved. Part of the challenge involves bounding each contest. In the air domain, competition involving China&rsquo;s ballistic and cruise missiles, surface-to-air missiles and fighters offer the U.S. different degrees of advantage and hardship. Decision-makers will find that cost imposition is not a panacea. However, they should understand the concept beyond its current level of misuse both for the disproportionate advantage it offers and for the liability it poses when used against America.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2014/05/07-winning-peace-through-defense-cost-imposition-ekman/winning-the-peace-cost-imposition_040714.pdf">Winning the Peace Through Cost Imposition</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Colonel Kenneth Ekman</li>
		</ul>
	</div><div>
		Image Source: &#169; Michael Spooneybarger / Reute
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486797/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486797/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2014%2f05%2f07-winning-peace-through-defense-cost-imposition-ekman%2fPaper-Cover-Image.jpg%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486797/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2013/09/24-candor-the-missing-element-of-army-professionalism-paolozzi?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{A6A86567-49EF-47D4-B830-9C2F3454539F}</guid><link>http://webfeeds.brookings.edu/~/65486798/0/brookingsrss/series/21cdipolicypapers~Closing-the-Candor-Chasm-The-Missing-Element-of-Army-Professionalism</link><title>Closing the Candor Chasm: The Missing Element of Army Professionalism</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_soldiers022/us_soldiers022_16x9.jpg?w=120" alt="Three US soldiers laugh while preparing to depart from Iraq at Camp Adder, now known as Imam Ali Base." border="0" /><br /><p><i><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2013/09/24-candor-the-missing-element-of-army-professionalism-paolozzi/Download-the-paper.pdf?la=en" name="&lid={766C09D2-C07C-4563-AC27-808AE653A825}&lpos=loc:body"><img alt="" style="width: 187px; margin-bottom: 4px; float: left; height: 235px;  margin-right: 8px;border: 1px solid;" src="http://www.brookings.edu/~/media/Research/Files/Papers/2013/09/24-candor-the-missing-element-of-army-professionalism-paolozzi/Closing-the-Candor-Chasm-Cover.png?la=en"></a>Editor&rsquo;s Note: In a <a href="http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1178">Strategic Studies Institute Professional Military Ethics Monograph</a>, Paul Paolozzi concludes that the U.S. Army must learn to use and appreciate candor. The practice of authentic, honest, and sincere communication remains largely neglected in discussions of Army values, but by making candor a core component of training and doctrine, the Army will improve its own trust, cohesion, and strength of purpose.</i></p>
<p>Expressing openness and transparency is something we all say that we want but often choose to forego. Candor intimidates and creates discomfort; consequently, its presence is most often inversely proportional to rank and organizational size. There is no shortage of reasons why authentic communication is not used, but it is difficult to find precisely where candor stops being important or why it seems to be so undervalued. It is tough to measure, cannot be legislated, and is often organizationally absent, even when everyone seems to want it desperately.</p>
<p>Candor stands as the keystone element in creating the foundation of trust in the Army, yet the topic is muted. The difficult issues of balance in the Army between competing demands and, equally important, the maintenance and development of the people who make up the Army in a decade of expected budget cuts, requires plain-spoken leaders at all levels. But these leaders do not express authentic communication because the time is right; they do it because they are loyal stewards of the Army Profession. It is time to discuss what is missing in Army Values. Resurrecting candor requires a new taxonomy that is simple and explains the relationship with honesty. Previously, the Army incorporated candor in doctrine, yet nearly no mention of it currently exists in education, training, and professional discourse. Could this be the reason it is not as prevalent as it should be throughout the Army?</p>
<p>Fully developing the topic of candor involves exposure, risk, and possibly contention to embody authenticity. Two examples&mdash;the demands placed on the Army Reserve Components and a review of the Army&rsquo;s counseling and evaluation environment&mdash;serve as areas where candor requires revitalization. The Army now has an opportunity to reevaluate how trust, the bedrock of the profession, can be bolstered through leadership and an infusion of candor at all levels, revisiting the sacrosanct seven Army Values, and by bolstering education and training with forthright communication at the earliest levels of leader development.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2013/09/24-candor-the-missing-element-of-army-professionalism-paolozzi/download-the-paper.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Paul Paolozzi</li>
		</ul>
	</div><div>
		Publication: Strategic Studies Institute
	</div><div>
		Image Source: &#169; POOL New / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486798/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2013%2f09%2f24-candor-the-missing-element-of-army-professionalism-paolozzi%2fClosing-the-Candor-Chasm-Cover.png%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Tue, 24 Sep 2013 14:24:00 -0400</pubDate><dc:creator>Paul Paolozzi</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_soldiers022/us_soldiers022_16x9.jpg?w=120" alt="Three US soldiers laugh while preparing to depart from Iraq at Camp Adder, now known as Imam Ali Base." border="0" />
<br><p><i><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2013/09/24-candor-the-missing-element-of-army-professionalism-paolozzi/Download-the-paper.pdf?la=en" name="&lid={766C09D2-C07C-4563-AC27-808AE653A825}&lpos=loc:body"><img alt="" style="width: 187px; margin-bottom: 4px; float: left; height: 235px;  margin-right: 8px;border: 1px solid;" src="http://www.brookings.edu/~/media/Research/Files/Papers/2013/09/24-candor-the-missing-element-of-army-professionalism-paolozzi/Closing-the-Candor-Chasm-Cover.png?la=en"></a>Editor&rsquo;s Note: In a <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1178">Strategic Studies Institute Professional Military Ethics Monograph</a>, Paul Paolozzi concludes that the U.S. Army must learn to use and appreciate candor. The practice of authentic, honest, and sincere communication remains largely neglected in discussions of Army values, but by making candor a core component of training and doctrine, the Army will improve its own trust, cohesion, and strength of purpose.</i></p>
<p>Expressing openness and transparency is something we all say that we want but often choose to forego. Candor intimidates and creates discomfort; consequently, its presence is most often inversely proportional to rank and organizational size. There is no shortage of reasons why authentic communication is not used, but it is difficult to find precisely where candor stops being important or why it seems to be so undervalued. It is tough to measure, cannot be legislated, and is often organizationally absent, even when everyone seems to want it desperately.</p>
<p>Candor stands as the keystone element in creating the foundation of trust in the Army, yet the topic is muted. The difficult issues of balance in the Army between competing demands and, equally important, the maintenance and development of the people who make up the Army in a decade of expected budget cuts, requires plain-spoken leaders at all levels. But these leaders do not express authentic communication because the time is right; they do it because they are loyal stewards of the Army Profession. It is time to discuss what is missing in Army Values. Resurrecting candor requires a new taxonomy that is simple and explains the relationship with honesty. Previously, the Army incorporated candor in doctrine, yet nearly no mention of it currently exists in education, training, and professional discourse. Could this be the reason it is not as prevalent as it should be throughout the Army?</p>
<p>Fully developing the topic of candor involves exposure, risk, and possibly contention to embody authenticity. Two examples&mdash;the demands placed on the Army Reserve Components and a review of the Army&rsquo;s counseling and evaluation environment&mdash;serve as areas where candor requires revitalization. The Army now has an opportunity to reevaluate how trust, the bedrock of the profession, can be bolstered through leadership and an infusion of candor at all levels, revisiting the sacrosanct seven Army Values, and by bolstering education and training with forthright communication at the earliest levels of leader development.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2013/09/24-candor-the-missing-element-of-army-professionalism-paolozzi/download-the-paper.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Paul Paolozzi</li>
		</ul>
	</div><div>
		Publication: Strategic Studies Institute
	</div><div>
		Image Source: &#169; POOL New / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486798/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486798/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fResearch%2fFiles%2fPapers%2f2013%2f09%2f24-candor-the-missing-element-of-army-professionalism-paolozzi%2fClosing-the-Candor-Chasm-Cover.png%3fla%3den"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486798/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&nbsp;<div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2013/08/06-air-force-drone-pilot-development-hoagland?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{D85883E4-4115-474F-86A4-CB876CEC8368}</guid><link>http://webfeeds.brookings.edu/~/65486800/0/brookingsrss/series/21cdipolicypapers~Manning-the-Next-Unmanned-Air-Force-Developing-RPA-Pilots-of-the-Future</link><title>Manning the Next Unmanned Air Force: Developing RPA Pilots of the Future</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_drone003/us_drone003_16x9.jpg?w=120" alt="Drone operators fly an MQ-9 Reaper training mission from a ground control station at Holloman Air Force Base, New Mexico, in this U.S. Air Force handout photo taken October 3, 2012" border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2013/08/06-Air-Force-Drone-Pilot-Development-Hoagland/manning-unmanned-air-force.pdf?la=en" name="&lid={B0B01B87-25D7-44A5-A134-80BA529D9BD3}&lpos=loc:body"><img alt="" src="%7E/media/C0D22CA551234D61AAF6E8AE0A44CAED.ashx" style="border:1px solid #c6d9f0;width: 178px; height: 230px; float: left; margin: 5px 15px 10px 5px;"></a>As a nation, we are in the middle of discussions and debates regarding the current and future use of unmanned systems. Whether it&rsquo;s the ethical or legal debates regarding &ldquo;drone&rdquo; strikes in the Middle East and Northern Africa, or the safety, security and privacy concerns with the use of domestic drones (or unmanned systems) in the Federal Aviation Administration (FAA) airspace, the debate will continue. However, leading drone experts inside and outside of government all agree that drones are here to stay, and the proliferation of these systems will continue to explode over the next decade.</p>
<p>But in order for the U.S. Air Force to stay innovative and relevant in the furtherance of unparalleled Remotely Piloted Aircraft (RPA) operations, it must immediately take a new approach and reevaluate the personnel programs that most effectively contribute to this vital mission. A robust RPA community begins with a more deliberate accessions process and carries through to a continuum of education and training opportunities later in an officer&rsquo;s career. The Air Force cannot wait another decade to ensure the RPA community gets professionally developed, recognized, and promoted on par with other officers in the Air Force.</p>
<p>The recommendations presented here are pragmatic changes that should be implemented to more effectively identify and develop future RPA pilots. They are based on the range of education and learning from day one taking place at the various commissioning sources all the way until promotion into the senior leadership ranks within the Air Force. The sooner the Air Force fully integrates these aviators into its professional developmental plans, the more effective the RPA community will be in recruiting, training, and retaining high potential officers.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2013/08/06-air-force-drone-pilot-development-hoagland/manning-unmanned-air-force.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Bradley T. Hoagland</li>
		</ul>
	</div><div>
		Image Source: &#169; US AIR FORCE / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486800/BrookingsRSS/series/21CDIpolicypapers,%257E%2fmedia%2fC0D22CA551234D61AAF6E8AE0A44CAED.ashx"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Tue, 06 Aug 2013 12:24:00 -0400</pubDate><dc:creator>Bradley T. Hoagland</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_drone003/us_drone003_16x9.jpg?w=120" alt="Drone operators fly an MQ-9 Reaper training mission from a ground control station at Holloman Air Force Base, New Mexico, in this U.S. Air Force handout photo taken October 3, 2012" border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2013/08/06-Air-Force-Drone-Pilot-Development-Hoagland/manning-unmanned-air-force.pdf?la=en" name="&lid={B0B01B87-25D7-44A5-A134-80BA529D9BD3}&lpos=loc:body"><img alt="" src="%7E/media/C0D22CA551234D61AAF6E8AE0A44CAED.ashx" style="border:1px solid #c6d9f0;width: 178px; height: 230px; float: left; margin: 5px 15px 10px 5px;"></a>As a nation, we are in the middle of discussions and debates regarding the current and future use of unmanned systems. Whether it&rsquo;s the ethical or legal debates regarding &ldquo;drone&rdquo; strikes in the Middle East and Northern Africa, or the safety, security and privacy concerns with the use of domestic drones (or unmanned systems) in the Federal Aviation Administration (FAA) airspace, the debate will continue. However, leading drone experts inside and outside of government all agree that drones are here to stay, and the proliferation of these systems will continue to explode over the next decade.</p>
<p>But in order for the U.S. Air Force to stay innovative and relevant in the furtherance of unparalleled Remotely Piloted Aircraft (RPA) operations, it must immediately take a new approach and reevaluate the personnel programs that most effectively contribute to this vital mission. A robust RPA community begins with a more deliberate accessions process and carries through to a continuum of education and training opportunities later in an officer&rsquo;s career. The Air Force cannot wait another decade to ensure the RPA community gets professionally developed, recognized, and promoted on par with other officers in the Air Force.</p>
<p>The recommendations presented here are pragmatic changes that should be implemented to more effectively identify and develop future RPA pilots. They are based on the range of education and learning from day one taking place at the various commissioning sources all the way until promotion into the senior leadership ranks within the Air Force. The sooner the Air Force fully integrates these aviators into its professional developmental plans, the more effective the RPA community will be in recruiting, training, and retaining high potential officers.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2013/08/06-air-force-drone-pilot-development-hoagland/manning-unmanned-air-force.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Bradley T. Hoagland</li>
		</ul>
	</div><div>
		Image Source: &#169; US AIR FORCE / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486800/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486800/BrookingsRSS/series/21CDIpolicypapers,%257E%2fmedia%2fC0D22CA551234D61AAF6E8AE0A44CAED.ashx"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486800/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2013/07/03-cyber-ports-security-kramek?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{D5EA8769-00EC-4E3A-8D95-943D65296274}</guid><link>http://webfeeds.brookings.edu/~/65486802/0/brookingsrss/series/21cdipolicypapers~The-Critical-Infrastructure-Gap-US-Port-Facilities-and-Cyber-Vulnerabilities</link><title>The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/ca%20ce/cali_portla001/cali_portla001_16x9.jpg?w=120" alt="A general view of the Port of Los Angeles, California November 29, 2012" border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2013/07/02-cyber-port-security-kramek/03-cyber-port-security-kramek.pdf?la=en" name="&lid={6722051E-345B-464C-8BB0-614E5E6C10F7}&lpos=loc:body"><img alt="" src="%7E/media/E37E7452D7294F8CB411CAA408CB25BE.ashx" style="border: 1px solid #c6d9f0; width: 178px; height: 230px; float: left; margin: 5px 15px 10px 5px;"></a>Today, U.S. port facilities rely as much upon networked computer and control systems as they do upon stevedores to ensure the flow of maritime commerce that the economy, homeland, and national security depend upon.&nbsp; Yet, unlike other sectors of critical infrastructure, little attention has been paid to the networked systems that undergird port operations.&nbsp; No cybersecurity standards have been promulgated for U.S. ports, nor has the U.S. Coast Guard, the lead federal agency for maritime security, been granted cybersecurity authorities.</p>
<p>The potential consequences of even a minimal disruption of the flow of goods in U.S. ports would be high. The zero-inventory, just-in-time delivery system that sustains the flow of U.S. commerce would grind to a halt in a matter of days; shelves at grocery stores and gas tanks at service stations would run empty.&nbsp; A cyber disruption affecting energy supplies would likely send a shockwave through the U.S. and global economy.</p>
<p>Given the absence of standards and authorities, this paper explores the current state of cybersecurity awareness and culture in selected U.S. port facilities.&nbsp; The use of the post-9/11 Port Security Grant Program (PSGP), administered by the Federal Emergency Management Agency, is also examined to see whether these monies are being used to fund cybersecurity projects.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2013/07/02-cyber-port-security-kramek/03-cyber-port-security-kramek.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Joseph Kramek</li>
		</ul>
	</div><div>
		Image Source: &#169; Lori Shepler / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486802/BrookingsRSS/series/21CDIpolicypapers,%257E%2fmedia%2fE37E7452D7294F8CB411CAA408CB25BE.ashx"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Wed, 03 Jul 2013 00:00:00 -0400</pubDate><dc:creator>Joseph Kramek</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/ca%20ce/cali_portla001/cali_portla001_16x9.jpg?w=120" alt="A general view of the Port of Los Angeles, California November 29, 2012" border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2013/07/02-cyber-port-security-kramek/03-cyber-port-security-kramek.pdf?la=en" name="&lid={6722051E-345B-464C-8BB0-614E5E6C10F7}&lpos=loc:body"><img alt="" src="%7E/media/E37E7452D7294F8CB411CAA408CB25BE.ashx" style="border: 1px solid #c6d9f0; width: 178px; height: 230px; float: left; margin: 5px 15px 10px 5px;"></a>Today, U.S. port facilities rely as much upon networked computer and control systems as they do upon stevedores to ensure the flow of maritime commerce that the economy, homeland, and national security depend upon.&nbsp; Yet, unlike other sectors of critical infrastructure, little attention has been paid to the networked systems that undergird port operations.&nbsp; No cybersecurity standards have been promulgated for U.S. ports, nor has the U.S. Coast Guard, the lead federal agency for maritime security, been granted cybersecurity authorities.</p>
<p>The potential consequences of even a minimal disruption of the flow of goods in U.S. ports would be high. The zero-inventory, just-in-time delivery system that sustains the flow of U.S. commerce would grind to a halt in a matter of days; shelves at grocery stores and gas tanks at service stations would run empty.&nbsp; A cyber disruption affecting energy supplies would likely send a shockwave through the U.S. and global economy.</p>
<p>Given the absence of standards and authorities, this paper explores the current state of cybersecurity awareness and culture in selected U.S. port facilities.&nbsp; The use of the post-9/11 Port Security Grant Program (PSGP), administered by the Federal Emergency Management Agency, is also examined to see whether these monies are being used to fund cybersecurity projects.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2013/07/02-cyber-port-security-kramek/03-cyber-port-security-kramek.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Joseph Kramek</li>
		</ul>
	</div><div>
		Image Source: &#169; Lori Shepler / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486802/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486802/BrookingsRSS/series/21CDIpolicypapers,%257E%2fmedia%2fE37E7452D7294F8CB411CAA408CB25BE.ashx"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486802/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2013/06/24-us-strategic-access-middle-east-bahrain-mcdaniel?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{9CCC28D6-39F4-4A7D-9619-99714EF95815}</guid><link>http://webfeeds.brookings.edu/~/65486803/0/brookingsrss/series/21cdipolicypapers~US-Strategic-Access-in-the-Middle-East-and-the-Question-of-Bahrain</link><title>U.S. Strategic Access in the Middle East and the Question of Bahrain</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/b/ba%20be/bahrain_military001/bahrain_military001_16x9.jpg?w=120" alt="USS Riverine gun-boat patrols the Middle East Gulf near Bahrain during the International Mine Countermeasures Exercise (IMCMEX)" border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2013/06/24-us-strategic-access-middle-east-bahrain-mcdaniel/24-us-strategic-access-middle-east-bahrain-mcdaniel.pdf?la=en" name="&lid={52E3BBAE-CFFF-484B-BF70-F9DEFFC0B2CF}&lpos=loc:body"><img alt="" src="%7E/media/7ABD08274813417A97CDBBC446EE6214.ashx" style="border: 1px solid #c6d9f0; float: left; margin: 5px 15px 10px 5px;"></a>Arguably, the most important U.S. strategic base in the heart of the Middle East lies in the small island country of Bahrain.  Over the past two years, Bahrain has seen dramatic increases in Shia Muslim sectarian protests and political unrest resulting from a lack of democratic reforms with the ruling Al-Khalifa family.  To date, the Bahraini government has controlled the protests, sometimes harshly.</p>
<p>In view of the ongoing political unrest, the possibility of losing strategic basing rights in Bahrain is something that should be carefully considered.  Unfortunately, military leaders state there is no &ldquo;Plan B&rdquo; if strategic basing in Bahrain is jeopardized.</p>
<p>While losing Bahrain is not a foregone conclusion, it remains a distinct possibility. The absence of a U.S. presence could potentially create a power vacuum, destabilize the region, and eliminate the moderating effect of U.S. influence in any Bahraini crisis. Therefore, the United States must investigate viable alternatives as a hedge strategy.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2013/06/24-us-strategic-access-middle-east-bahrain-mcdaniel/24-us-strategic-access-middle-east-bahrain-mcdaniel.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Richard McDaniel</li>
		</ul>
	</div><div>
		Image Source: &#169; Hamad I Mohammed / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486803/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fb%2fba%2520be%2fbahrain_military001%2fbahrain_military001_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Mon, 24 Jun 2013 00:00:00 -0400</pubDate><dc:creator>Richard McDaniel</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/b/ba%20be/bahrain_military001/bahrain_military001_16x9.jpg?w=120" alt="USS Riverine gun-boat patrols the Middle East Gulf near Bahrain during the International Mine Countermeasures Exercise (IMCMEX)" border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2013/06/24-us-strategic-access-middle-east-bahrain-mcdaniel/24-us-strategic-access-middle-east-bahrain-mcdaniel.pdf?la=en" name="&lid={52E3BBAE-CFFF-484B-BF70-F9DEFFC0B2CF}&lpos=loc:body"><img alt="" src="%7E/media/7ABD08274813417A97CDBBC446EE6214.ashx" style="border: 1px solid #c6d9f0; float: left; margin: 5px 15px 10px 5px;"></a>Arguably, the most important U.S. strategic base in the heart of the Middle East lies in the small island country of Bahrain.  Over the past two years, Bahrain has seen dramatic increases in Shia Muslim sectarian protests and political unrest resulting from a lack of democratic reforms with the ruling Al-Khalifa family.  To date, the Bahraini government has controlled the protests, sometimes harshly.</p>
<p>In view of the ongoing political unrest, the possibility of losing strategic basing rights in Bahrain is something that should be carefully considered.  Unfortunately, military leaders state there is no &ldquo;Plan B&rdquo; if strategic basing in Bahrain is jeopardized.</p>
<p>While losing Bahrain is not a foregone conclusion, it remains a distinct possibility. The absence of a U.S. presence could potentially create a power vacuum, destabilize the region, and eliminate the moderating effect of U.S. influence in any Bahraini crisis. Therefore, the United States must investigate viable alternatives as a hedge strategy.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2013/06/24-us-strategic-access-middle-east-bahrain-mcdaniel/24-us-strategic-access-middle-east-bahrain-mcdaniel.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Richard McDaniel</li>
		</ul>
	</div><div>
		Image Source: &#169; Hamad I Mohammed / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486803/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486803/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fb%2fba%2520be%2fbahrain_military001%2fbahrain_military001_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486803/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2012/08/13-japan-kageura?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{B51C37F3-9B15-4AF4-AA07-D55257E6F901}</guid><link>http://webfeeds.brookings.edu/~/65486805/0/brookingsrss/series/21cdipolicypapers~Japan%e2%80%99s-Defense-Policy-The-View-From-Washington-DC</link><title>Japan’s Defense Policy: The View From Washington, DC</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/j/ja%20je/japan_troops001/japan_troops001_16x9.jpg?w=120" alt="Rifle-carrying Japan Ground Self-Defense Force (GSDF) troops in camouflage march in an urban area of Tokyo's Itabashi Ward as part of their training as rangers. (Reuters/Kyodo)" border="0" /><br /><p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2012/8/13-japan-kageura/japan-kageura.pdf?_lang=en" name="&lid={6BA198F8-339C-48BD-951A-F48C6115F222}&lpos=loc:body"><img alt="" style="margin-bottom: 10px; float: left; margin-left: 10px; margin-right: 15px;" src="http://www.brookings.edu/~/media/Research/Files/Papers/2012/8/13-japan-kageura/Kageura-paper-cover.jpg?la=en"></a>When it comes to Japan&rsquo;s defense, the Japanese political system and the Japan Self-Defense Force independently decide the national policies as they are ultimately responsible for the country&rsquo;s safety and security. However, due to the crucial nature of the U.S.-Japan alliance to Japan&rsquo;s overall security, it is impractical not to take into account American thinking. As a result, it is important to better understand where and how American thinking on Japanese security is influenced.</p>
<p>The scope of this research goes beyond the official statements of the legislative and executive branches of the U.S. government. The author sought to explore the role that experts and think tanks play in American discourse and opinion of Japanese security. This included extensive research of American media reports on Japanese security issues as well as interviews of key American experts and opinion leaders on Japan, mostly located in and around Washington, DC.</p>
<p>This project is therefore unique and novel in its approach to this key topic in Japan and the U.S. A number of Japanese reports have been published in the past about American experts&rsquo; views towards Japan, yet few incorporate both a survey of media and interviews with key current figures or focus exclusively on Japanese defense. Moreover, such viewpoints and thoughts are always changing; therefore, it is meaningful to spot the current status at such a crucial time of change, both in the U.S. and Japan, not to mention the wider Asia-Pacific region.</p>
<p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2012/8/13-japan-kageura/japan-kageura.pdf?_lang=en" name="&lid={6BA198F8-339C-48BD-951A-F48C6115F222}&lpos=loc:body">Download &raquo; (PDF)</a></p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2012/8/13-japan-kageura/japan-kageura.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Colonel Seiki Kageura</li>
		</ul>
	</div><div>
		Image Source: Kyodo / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486805/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fj%2fja%2520je%2fjapan_troops001%2fjapan_troops001_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Mon, 13 Aug 2012 00:00:00 -0400</pubDate><dc:creator>Colonel Seiki Kageura</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/j/ja%20je/japan_troops001/japan_troops001_16x9.jpg?w=120" alt="Rifle-carrying Japan Ground Self-Defense Force (GSDF) troops in camouflage march in an urban area of Tokyo's Itabashi Ward as part of their training as rangers. (Reuters/Kyodo)" border="0" />
<br><p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2012/8/13-japan-kageura/japan-kageura.pdf?_lang=en" name="&lid={6BA198F8-339C-48BD-951A-F48C6115F222}&lpos=loc:body"><img alt="" style="margin-bottom: 10px; float: left; margin-left: 10px; margin-right: 15px;" src="http://www.brookings.edu/~/media/Research/Files/Papers/2012/8/13-japan-kageura/Kageura-paper-cover.jpg?la=en"></a>When it comes to Japan&rsquo;s defense, the Japanese political system and the Japan Self-Defense Force independently decide the national policies as they are ultimately responsible for the country&rsquo;s safety and security. However, due to the crucial nature of the U.S.-Japan alliance to Japan&rsquo;s overall security, it is impractical not to take into account American thinking. As a result, it is important to better understand where and how American thinking on Japanese security is influenced.</p>
<p>The scope of this research goes beyond the official statements of the legislative and executive branches of the U.S. government. The author sought to explore the role that experts and think tanks play in American discourse and opinion of Japanese security. This included extensive research of American media reports on Japanese security issues as well as interviews of key American experts and opinion leaders on Japan, mostly located in and around Washington, DC.</p>
<p>This project is therefore unique and novel in its approach to this key topic in Japan and the U.S. A number of Japanese reports have been published in the past about American experts&rsquo; views towards Japan, yet few incorporate both a survey of media and interviews with key current figures or focus exclusively on Japanese defense. Moreover, such viewpoints and thoughts are always changing; therefore, it is meaningful to spot the current status at such a crucial time of change, both in the U.S. and Japan, not to mention the wider Asia-Pacific region.</p>
<p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2012/8/13-japan-kageura/japan-kageura.pdf?_lang=en" name="&lid={6BA198F8-339C-48BD-951A-F48C6115F222}&lpos=loc:body">Download &raquo; (PDF)</a></p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2012/8/13-japan-kageura/japan-kageura.pdf">Download the paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Colonel Seiki Kageura</li>
		</ul>
	</div><div>
		Image Source: Kyodo / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486805/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486805/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fj%2fja%2520je%2fjapan_troops001%2fjapan_troops001_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486805/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2012/07/10-china-us-defense?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{C77488AA-B00E-4BC4-9194-BDA93FE3E0C9}</guid><link>http://webfeeds.brookings.edu/~/65486806/0/brookingsrss/series/21cdipolicypapers~Exploring-the-Possibilities-for-Collaboration-Between-the-US-and-Chinese-Navies-in-the-Western-Hemisphere</link><title>Exploring the Possibilities for Collaboration Between the U.S. and Chinese Navies in the Western Hemisphere</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/cf%20cj/china_flag004/china_flag004_16x9.jpg?w=120" alt="Chinese national flags are tied to fences at Chaoyang Hospital" border="0" /><br /><p>The end of World War II marked the beginning of a global system of commerce installed and protected by United States maritime forces. This model of free trade laid the foundation for the People&rsquo;s Republic of China&rsquo;s inexorable rise in global affairs. The U.S. supported China&rsquo;s industrialization by granting it near limitless access to American capital and consumer and financial markets, while it benefited equally from a vast and ever growing supply of consumer goods that have kept the cost of living in America nearly flat for a decade. </p>
<p>Now, however, both nations are expanding their economic interests and military commitments into each other&rsquo;s regional neighborhoods. To complicate matters, this is happening at a time when both nations are finding themselves stymied by political and territorial challenges within their own hemispheres. </p>
<p>In this paper, U.S. Navy Lieutenant Commander Audry Oxley argues that managing future international issues between the countries will require a commitment to cooperation and a sturdy diplomatic platform.</p>
<p><a href="http://www.brookings.edu/~/media/Research/Files/Papers/2012/7/10-china-us-defense/10-china-us-defense.pdf" name="&lid={DDC23D4B-4D2B-432F-A05B-471E7E034C05}&lpos=loc:body">Download &raquo; (PDF)</a></p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2012/7/10-china-us-defense/10-china-us-defense.pdf">Download the full paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Audry Oxley</li>
		</ul>
	</div><div>
		Image Source: Jason Lee / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486806/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fc%2fcf%2520cj%2fchina_flag004%2fchina_flag004_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Tue, 10 Jul 2012 11:00:00 -0400</pubDate><dc:creator>Audry Oxley</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/cf%20cj/china_flag004/china_flag004_16x9.jpg?w=120" alt="Chinese national flags are tied to fences at Chaoyang Hospital" border="0" />
<br><p>The end of World War II marked the beginning of a global system of commerce installed and protected by United States maritime forces. This model of free trade laid the foundation for the People&rsquo;s Republic of China&rsquo;s inexorable rise in global affairs. The U.S. supported China&rsquo;s industrialization by granting it near limitless access to American capital and consumer and financial markets, while it benefited equally from a vast and ever growing supply of consumer goods that have kept the cost of living in America nearly flat for a decade. </p>
<p>Now, however, both nations are expanding their economic interests and military commitments into each other&rsquo;s regional neighborhoods. To complicate matters, this is happening at a time when both nations are finding themselves stymied by political and territorial challenges within their own hemispheres. </p>
<p>In this paper, U.S. Navy Lieutenant Commander Audry Oxley argues that managing future international issues between the countries will require a commitment to cooperation and a sturdy diplomatic platform.</p>
<p><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/Research/Files/Papers/2012/7/10-china-us-defense/10-china-us-defense.pdf" name="&lid={DDC23D4B-4D2B-432F-A05B-471E7E034C05}&lpos=loc:body">Download &raquo; (PDF)</a></p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2012/7/10-china-us-defense/10-china-us-defense.pdf">Download the full paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Audry Oxley</li>
		</ul>
	</div><div>
		Image Source: Jason Lee / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486806/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486806/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fc%2fcf%2520cj%2fchina_flag004%2fchina_flag004_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486806/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2012/06/28-centcom-china-abisellan?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{341CAB20-0DAA-43D6-B0A3-B8DA3936B806}</guid><link>http://webfeeds.brookings.edu/~/65486807/0/brookingsrss/series/21cdipolicypapers~CENTCOM%e2%80%99s-China-Challenge-AntiAccess-and-Area-Denial-in-the-Middle-East</link><title>CENTCOM’s China Challenge: Anti-Access and Area Denial in the Middle East</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/a/aa%20ae/abdullah_jintao001/abdullah_jintao001_16x9.jpg?w=120" alt="Saudi King Abdullah (2nd R) and China's President Hu Jintao (L) review a guard of honour upon Hu's arrival at Riyadh airport February 10, 2009. (Reuters)" border="0" /><br /><p><strong>Executive Summary</strong></p>
<p>In the last year, America has sought to refocus its diplomatic and military attention to East, rather than Middle East. This makes perfect sense. The last decade of wars in the greater Middle East have been draining in terms of both blood and treasure, while the Asia-Pacific region appears to be the new center of future world politics and economy. The region has been described as &ldquo;the demographic hub of the 21st century global economy, where 1.5 billion Chinese, nearly 600 million Southeast Asians and 1.3 billion inhabitants of the Indian subcontinent move vital resources and exchange goods across the region and globe.&rdquo;<a href="#_edn1" name="_ednref1">[1]</a></p>
<p>Yet, there is an irony. While the US is looking more towards the Pacific, China&rsquo;s needs are driving it more towards the Middle East. To fuel and sustain economic growth, China is heavily reliant on Middle Eastern oil.&nbsp; The resource rich and volatile Middle East is a critical center of gravity for the Asia-Pacific and the key for China&rsquo;s continued economic prosperity.</p>
<p>Therefore, despite the rebalancing of U.S. efforts away from the Middle East to the Asia-Pacific, the Middle East today is fast becoming an arena for another &ldquo;Great Game,&rdquo; one that may inevitably pit the U.S. against China in a regional competition for influence and power.&nbsp; China, through its economic ties to the region, has already achieved influence parity with the U.S. &nbsp;Now it could very well leverage this growing influence to gain further concessions and achieve a future positional advantage to counter U.S. regional hegemony and naval supremacy in both the Middle East and within the Asia-Pacific region&mdash; all the way from the source of its energy supplies through its long and vulnerable sea lines of communications (SLOCs) and to home ports in China.</p>
<p>The purpose of this paper is to illustrate how China could leverage its use of soft power and regional allies as a strategy within the Middle East of an asymmetric anti-access and area denial (A2/AD) through other means. This novel approach may allow China to &ldquo;circumvent America&rsquo;s traditional military strengths,&rdquo;<a href="#_edn2" name="_ednref2">[2]</a> during a crisis. Thus, the monograph note the limits of any strategic rebalancing that ignores ongoing political and economic dynamics across regions. The U.S. may want to pivot away from the Middle East, but in reality the Middle East remains the focal point for the continued economic prosperity of the Asia-Pacific region, U.S. national interests, and U.S allies&rsquo; energy needs in the Middle East.&nbsp; A continued presence in the region will be of critical value to strategic efforts in the Asia-Pacific, serve to assure allies, safeguard the flow of oil and thus promote global economic and political stability.</p>
<p><hr align="left" size="1" width="33%" /></p>
<div>
<div id="edn1">
<p><a href="#_ednref1" name="_edn1">[1]</a> Kaplan, Robert D. and Cronin, Patrick M. &ldquo;Cooperation from Strength: U.S. Strategy in the South China Sea.&rdquo; P.9.</p>
</div>
<div id="edn2">
<p><a href="#_ednref2" name="_edn2">[2]</a> Greenert, Jonathan and Schwartz, Norton. &ldquo;Air-Sea Battle Doctrine: A Discussion with the Chief of Staff of the Air Force and Chief of Naval Operations.&rdquo; (Brookings Institution, 16 May 2012). P.9. Available from: <a href="http://www.brookings.edu/~/media/events/2012/5/16%20air%20sea%20battle/20120516_air_sea_doctrine_corrected_transcript.pdf">http://www.brookings.edu/~/media/events/2012/5/16%20air%20sea%20battle/20120516_air_sea_doctrine_corrected_transcript.pdf</a><a href="http://www.brookings.edu/~/media/events/2012/5/16%20air%20sea%20battle/20120516_air_sea_doctrine_corrected_transcript.pdf"></a>&nbsp;Internet accessed 12 June 2012.</p>
</div>
</div><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2012/6/28-centcom-china-abisellan/28-centcom-china-abisellan.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Lieutenant Colonel Eduardo A. Abisellan</li>
		</ul>
	</div><div>
		Image Source: Ho New / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486807/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fa%2faa%2520ae%2fabdullah_jintao001%2fabdullah_jintao001_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Thu, 28 Jun 2012 00:00:00 -0400</pubDate><dc:creator>Lieutenant Colonel Eduardo A. Abisellan</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/a/aa%20ae/abdullah_jintao001/abdullah_jintao001_16x9.jpg?w=120" alt="Saudi King Abdullah (2nd R) and China's President Hu Jintao (L) review a guard of honour upon Hu's arrival at Riyadh airport February 10, 2009. (Reuters)" border="0" />
<br><p><strong>Executive Summary</strong></p>
<p>In the last year, America has sought to refocus its diplomatic and military attention to East, rather than Middle East. This makes perfect sense. The last decade of wars in the greater Middle East have been draining in terms of both blood and treasure, while the Asia-Pacific region appears to be the new center of future world politics and economy. The region has been described as &ldquo;the demographic hub of the 21st century global economy, where 1.5 billion Chinese, nearly 600 million Southeast Asians and 1.3 billion inhabitants of the Indian subcontinent move vital resources and exchange goods across the region and globe.&rdquo;<a href="#_edn1" name="_ednref1">[1]</a></p>
<p>Yet, there is an irony. While the US is looking more towards the Pacific, China&rsquo;s needs are driving it more towards the Middle East. To fuel and sustain economic growth, China is heavily reliant on Middle Eastern oil.&nbsp; The resource rich and volatile Middle East is a critical center of gravity for the Asia-Pacific and the key for China&rsquo;s continued economic prosperity.</p>
<p>Therefore, despite the rebalancing of U.S. efforts away from the Middle East to the Asia-Pacific, the Middle East today is fast becoming an arena for another &ldquo;Great Game,&rdquo; one that may inevitably pit the U.S. against China in a regional competition for influence and power.&nbsp; China, through its economic ties to the region, has already achieved influence parity with the U.S. &nbsp;Now it could very well leverage this growing influence to gain further concessions and achieve a future positional advantage to counter U.S. regional hegemony and naval supremacy in both the Middle East and within the Asia-Pacific region&mdash; all the way from the source of its energy supplies through its long and vulnerable sea lines of communications (SLOCs) and to home ports in China.</p>
<p>The purpose of this paper is to illustrate how China could leverage its use of soft power and regional allies as a strategy within the Middle East of an asymmetric anti-access and area denial (A2/AD) through other means. This novel approach may allow China to &ldquo;circumvent America&rsquo;s traditional military strengths,&rdquo;<a href="#_edn2" name="_ednref2">[2]</a> during a crisis. Thus, the monograph note the limits of any strategic rebalancing that ignores ongoing political and economic dynamics across regions. The U.S. may want to pivot away from the Middle East, but in reality the Middle East remains the focal point for the continued economic prosperity of the Asia-Pacific region, U.S. national interests, and U.S allies&rsquo; energy needs in the Middle East.&nbsp; A continued presence in the region will be of critical value to strategic efforts in the Asia-Pacific, serve to assure allies, safeguard the flow of oil and thus promote global economic and political stability.</p>
<p><hr align="left" size="1" width="33%" /></p>
<div>
<div id="edn1">
<p><a href="#_ednref1" name="_edn1">[1]</a> Kaplan, Robert D. and Cronin, Patrick M. &ldquo;Cooperation from Strength: U.S. Strategy in the South China Sea.&rdquo; P.9.</p>
</div>
<div id="edn2">
<p><a href="#_ednref2" name="_edn2">[2]</a> Greenert, Jonathan and Schwartz, Norton. &ldquo;Air-Sea Battle Doctrine: A Discussion with the Chief of Staff of the Air Force and Chief of Naval Operations.&rdquo; (Brookings Institution, 16 May 2012). P.9. Available from: <a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/events/2012/5/16%20air%20sea%20battle/20120516_air_sea_doctrine_corrected_transcript.pdf">http://www.brookings.edu/~/media/events/2012/5/16%20air%20sea%20battle/20120516_air_sea_doctrine_corrected_transcript.pdf</a><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/events/2012/5/16%20air%20sea%20battle/20120516_air_sea_doctrine_corrected_transcript.pdf"></a>&nbsp;Internet accessed 12 June 2012.</p>
</div>
</div><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2012/6/28-centcom-china-abisellan/28-centcom-china-abisellan.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Lieutenant Colonel Eduardo A. Abisellan</li>
		</ul>
	</div><div>
		Image Source: Ho New / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486807/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486807/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fa%2faa%2520ae%2fabdullah_jintao001%2fabdullah_jintao001_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486807/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2012/06/06-defense-practices-duvall?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{AF5AF9BD-9684-48E6-8300-A51F7BB348A3}</guid><link>http://webfeeds.brookings.edu/~/65486808/0/brookingsrss/series/21cdipolicypapers~Be-Quick-Be-Useable-Be-On-Time-Lessons-in-Agile-Delivery-of-Defense-Analytic-Tools</link><title>Be Quick, Be Useable, Be On Time: Lessons in Agile Delivery of Defense Analytic Tools</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/cu%20cz/cybersecurity005/cybersecurity005_16x9.jpg?w=120" alt="A cyber security analyst works in a watch and warning center at a Department of Homeland Security cyber security defense lab. (Reuters/Jim Urquhart)" border="0" /><br /><p><strong>Executive Summary</strong></p>
<p>When faced with urgent national security needs, the Department of Defense (DoD) has historically bypassed conventional processes and allowed a greater degree of agility to flourish for critical programs. Over the past decade of combat operations, this again has held true. For all the criticism of defense acquisition, there have been examples of extremely successful efforts that quickly delivered new capabilities responsive to urgent warfighter needs.</p>
<p>These efforts were characterized by an intense focus on the user, a commitment to rapid delivery, and an acceptance of an incremental approach to improving capabilities. Instead of seeking the ideal solution, programs adopted a continuous cycle of deliver, learn, adapt, and improve.</p>
<p>As our active war fighting commitments draw down, and budgets tighten, we risk losing important lessons. The urgency behind these agile efforts will decline at the very time when we may need them most. The importance of agile practices for the Department is growing. These practices need to expand beyond urgent combat needs to be the norm for more mission capabilities, including analytic tools.</p>
<p>Four key factors are driving this need for increased agility. They include: the rate and unpredictability of advances in technology; the difficulty specifying requirements early in a program; the wide range of future potential conflicts and adversaries; and the rapid expansion of data sources and data volumes. Taken in concert, these factors call for alternative approaches for how systems, specifically those heavily dependent on information technology, are developed and acquired.</p>
<p>There are significant differences between agile and conventional processes that pose challenges to more widespread adoption of agile methods. Historical cases, contemporary experience, and commercial lessons can inform DoD efforts to scale up existing agile pockets to institutional processes. To be successful, efforts need to be coordinated across functional and process boundaries and cannot be left to the acquisition community alone, or instituted in isolation.</p>
<p>This analysis identified three critical pre-conditions that need greater attention in the ongoing discussions on transitioning to more agile methods in DoD. First, recognize the central role of user collaboration throughout development. Second, create mechanisms to easily bring together multifunctional teams to fuel the cycle of deliver, learn, adapt, and improve. Finally, foster a culture characterized by agility as a routine, vice requiring senior leader intervention to break down barriers, through consistency in what is stated as important and valued, such as agility and adaptability, with what is measured and incentivized.</p>
<p>Fortunately, there is contemporary experience within defense organizations with agile methods. There are successful practitioners with years of experience that can seed expansion of these practices. Areas such as intelligence analysis and cyber require this agility now. Continuing to view these practices as exceptions limited to urgent national security needs is ill advised.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2012/6/06-defense-practices-duvall/06_defense_practices_duvall.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Lourdes M. Duvall</li>
		</ul>
	</div><div>
		Image Source: Jim Urquhart / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486808/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fc%2fcu%2520cz%2fcybersecurity005%2fcybersecurity005_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Wed, 06 Jun 2012 00:00:00 -0400</pubDate><dc:creator>Lourdes M. Duvall</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/cu%20cz/cybersecurity005/cybersecurity005_16x9.jpg?w=120" alt="A cyber security analyst works in a watch and warning center at a Department of Homeland Security cyber security defense lab. (Reuters/Jim Urquhart)" border="0" />
<br><p><strong>Executive Summary</strong></p>
<p>When faced with urgent national security needs, the Department of Defense (DoD) has historically bypassed conventional processes and allowed a greater degree of agility to flourish for critical programs. Over the past decade of combat operations, this again has held true. For all the criticism of defense acquisition, there have been examples of extremely successful efforts that quickly delivered new capabilities responsive to urgent warfighter needs.</p>
<p>These efforts were characterized by an intense focus on the user, a commitment to rapid delivery, and an acceptance of an incremental approach to improving capabilities. Instead of seeking the ideal solution, programs adopted a continuous cycle of deliver, learn, adapt, and improve.</p>
<p>As our active war fighting commitments draw down, and budgets tighten, we risk losing important lessons. The urgency behind these agile efforts will decline at the very time when we may need them most. The importance of agile practices for the Department is growing. These practices need to expand beyond urgent combat needs to be the norm for more mission capabilities, including analytic tools.</p>
<p>Four key factors are driving this need for increased agility. They include: the rate and unpredictability of advances in technology; the difficulty specifying requirements early in a program; the wide range of future potential conflicts and adversaries; and the rapid expansion of data sources and data volumes. Taken in concert, these factors call for alternative approaches for how systems, specifically those heavily dependent on information technology, are developed and acquired.</p>
<p>There are significant differences between agile and conventional processes that pose challenges to more widespread adoption of agile methods. Historical cases, contemporary experience, and commercial lessons can inform DoD efforts to scale up existing agile pockets to institutional processes. To be successful, efforts need to be coordinated across functional and process boundaries and cannot be left to the acquisition community alone, or instituted in isolation.</p>
<p>This analysis identified three critical pre-conditions that need greater attention in the ongoing discussions on transitioning to more agile methods in DoD. First, recognize the central role of user collaboration throughout development. Second, create mechanisms to easily bring together multifunctional teams to fuel the cycle of deliver, learn, adapt, and improve. Finally, foster a culture characterized by agility as a routine, vice requiring senior leader intervention to break down barriers, through consistency in what is stated as important and valued, such as agility and adaptability, with what is measured and incentivized.</p>
<p>Fortunately, there is contemporary experience within defense organizations with agile methods. There are successful practitioners with years of experience that can seed expansion of these practices. Areas such as intelligence analysis and cyber require this agility now. Continuing to view these practices as exceptions limited to urgent national security needs is ill advised.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2012/6/06-defense-practices-duvall/06_defense_practices_duvall.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Lourdes M. Duvall</li>
		</ul>
	</div><div>
		Image Source: Jim Urquhart / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486808/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486808/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fc%2fcu%2520cz%2fcybersecurity005%2fcybersecurity005_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486808/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2012/02/military-compensation-gingrich?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{A5301348-CDE9-4CD7-8E80-E7FB977A6F0B}</guid><link>http://webfeeds.brookings.edu/~/65486809/0/brookingsrss/series/21cdipolicypapers~Making-It-Personnel-The-Need-for-Military-Compensation-Reform</link><title>Making It Personnel: The Need for Military Compensation Reform</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_soldiers012_16x9.jpg?w=120" alt="" border="0" /><br /><p><strong>Executive Summary:</strong> The United States is facing a significant financial crisis. The national debt is fast approaching $15 trillion and is expected to continue to grow at an alarming rate for the foreseeable future. Mandatory programs, such as entitlements and obligations on the debt, are largely responsible for the increasing debt and continued deficits, but escalating defense spending over the last decade has also contributed to the problem. To address the current economic situation, the Department of Defense is working to reduce spending by $450 billion over the next decade and, depending on how the debt ceiling issue is ultimately resolved, may face an additional reduction of $600 billion.</p>
<p>A reduction of this magnitude requires a reassessment of U.S. strategy with a discerning eye toward realistic goals and long-term fiscal sustainability. In addition to the efforts to rethink and potentially reset grand strategy, there is a critical need to focus on internal reforms as well. An assessment of how we are doing things is just as important as an assessment of whether they are the right things. DoD appears to be attempting to do both, as evidenced by the release of preliminary 2013 budget decisions. But while all the details have not yet been revealed, the initial assessment is that DoD may not have gone far enough to reform one of its biggest budgetary challenges: military compensation.</p>
<p>Military compensation costs are trending much the way of federal entitlements, effectively crowding out other elements of the defense budget. Even more worrisome, they are accounting for an ever increasing portion of the budget, meaning that painful cuts today will be less effective tomorrow if not accompanied by long overdue compensation reform. Unfortunately, military pay and benefits are one of the most controversial elements of the defense budget and DoD surely faces an uphill battle to see these reforms implemented. If recent history is any guide, DoD will face a daunting challenge to garner the congressional support required to enact reform. Ironically, DoD faces a significant battle to implement reforms that don&rsquo;t go far enough to address the real issues with military pay and benefits. The context today has changed to the point where Congress must seriously consider DoD&rsquo;s proposed reforms instead of treating them like a third rail issue as it has in the past.<br />
<br />
Military compensation is composed of a series of cash compensations, noncash benefits, and deferred benefits. The roots of the current compensation system can be found in law dating back to the late 1790s. The Department seeks to provide competitive pay and benefits as part of the human capital strategy while also being fiscally responsible. It is important to recognize that the defense of the entire nation has been underwritten by only a small percentage of the US population. Today, less than one percent serves, and about 23 million veterans and beneficiaries receive benefits for prior service. Military compensation must reflect this fact. Ultimately, the effectiveness of military compensation is measured through the achievement of recruiting and retention goals, which ensure the force is manned with sufficient numbers of personnel with the appropriate skill sets. However, many critics of military compensation identify issues with its efficiency, equitability, and flexibility. <br />
<br />
This paper evaluates the various components of military compensation using a construct of transparency, sustainability and perception. For any needed reform to be successful, first, the costs and benefits of compensation must be explicitly stated, easily accessible, and understandable. Second, compensation must be affordable, achieve recruiting and retention goals, and provide an appropriate level of quality of life for the service member throughout his/her career and retirement. And, finally, military compensation must be perceived as fair and effective not just by Congress and the public, but by the individual service member, targeting what he/she values most within the compensation strategy.<br />
<br />
Based on this evaluation, a series of policy recommendations are provided for how the current military compensation system might be reformed and updated. Whereas DoD&rsquo;s current proposed reforms will likely generate up to an estimated $70 billion in savings over the next decade, this paper advocates a more robust&mdash;not radical&mdash;series of policy recommendations that could garner an additional $40 billion dollars of savings over the same period, or $101-$112 billion of total savings. Perhaps more important than the immediate savings generated, these recommendations will also place military personnel costs on a more sustainable path for the future. DoD&rsquo;s less aggressive approach may not adequately control pay and benefit costs in the long run and may lead to additional capability and capacity reductions in the future to offset personnel costs.<br />
<br />
In sum, the recommendations slow cash compensation growth and reduce the value of non-cash and deferred benefits by transferring costs to the service member, retiree and their dependents. The recommended reforms were generated within the context of the human capital strategy and do not compromise effectiveness for the sake of efficiencies. The military compensation system will continue to provide competitive pay and benefits and allow the Department to continue to meet its recruiting and retention goals, but will now do so in a more fiscally-responsible manner. The proposed recommendations will also maintain the nation&rsquo;s commitment to the All Volunteer Force by continuing to compensate it at levels commensurate with its sacrifice and commitment to the nation. While the Department&rsquo;s system of compensation may look differently in the coming decade, the United States will still retain a strong and capable defense and trust will be preserved with those who serve the nation.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2012/2/military-compensation-gingrich/02_military_compensation_gingrich.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Karl Gingrich</li>
		</ul>
	</div><div>
		Image Source: © Oleg Popov / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486809/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fu%2fup%2520ut%2fus_soldiers012_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Mon, 13 Feb 2012 16:49:00 -0500</pubDate><dc:creator>Karl Gingrich</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/u/up%20ut/us_soldiers012_16x9.jpg?w=120" alt="" border="0" />
<br><p><strong>Executive Summary:</strong> The United States is facing a significant financial crisis. The national debt is fast approaching $15 trillion and is expected to continue to grow at an alarming rate for the foreseeable future. Mandatory programs, such as entitlements and obligations on the debt, are largely responsible for the increasing debt and continued deficits, but escalating defense spending over the last decade has also contributed to the problem. To address the current economic situation, the Department of Defense is working to reduce spending by $450 billion over the next decade and, depending on how the debt ceiling issue is ultimately resolved, may face an additional reduction of $600 billion.</p>
<p>A reduction of this magnitude requires a reassessment of U.S. strategy with a discerning eye toward realistic goals and long-term fiscal sustainability. In addition to the efforts to rethink and potentially reset grand strategy, there is a critical need to focus on internal reforms as well. An assessment of how we are doing things is just as important as an assessment of whether they are the right things. DoD appears to be attempting to do both, as evidenced by the release of preliminary 2013 budget decisions. But while all the details have not yet been revealed, the initial assessment is that DoD may not have gone far enough to reform one of its biggest budgetary challenges: military compensation.</p>
<p>Military compensation costs are trending much the way of federal entitlements, effectively crowding out other elements of the defense budget. Even more worrisome, they are accounting for an ever increasing portion of the budget, meaning that painful cuts today will be less effective tomorrow if not accompanied by long overdue compensation reform. Unfortunately, military pay and benefits are one of the most controversial elements of the defense budget and DoD surely faces an uphill battle to see these reforms implemented. If recent history is any guide, DoD will face a daunting challenge to garner the congressional support required to enact reform. Ironically, DoD faces a significant battle to implement reforms that don&rsquo;t go far enough to address the real issues with military pay and benefits. The context today has changed to the point where Congress must seriously consider DoD&rsquo;s proposed reforms instead of treating them like a third rail issue as it has in the past.
<br>
<br>
Military compensation is composed of a series of cash compensations, noncash benefits, and deferred benefits. The roots of the current compensation system can be found in law dating back to the late 1790s. The Department seeks to provide competitive pay and benefits as part of the human capital strategy while also being fiscally responsible. It is important to recognize that the defense of the entire nation has been underwritten by only a small percentage of the US population. Today, less than one percent serves, and about 23 million veterans and beneficiaries receive benefits for prior service. Military compensation must reflect this fact. Ultimately, the effectiveness of military compensation is measured through the achievement of recruiting and retention goals, which ensure the force is manned with sufficient numbers of personnel with the appropriate skill sets. However, many critics of military compensation identify issues with its efficiency, equitability, and flexibility. 
<br>
<br>
This paper evaluates the various components of military compensation using a construct of transparency, sustainability and perception. For any needed reform to be successful, first, the costs and benefits of compensation must be explicitly stated, easily accessible, and understandable. Second, compensation must be affordable, achieve recruiting and retention goals, and provide an appropriate level of quality of life for the service member throughout his/her career and retirement. And, finally, military compensation must be perceived as fair and effective not just by Congress and the public, but by the individual service member, targeting what he/she values most within the compensation strategy.
<br>
<br>
Based on this evaluation, a series of policy recommendations are provided for how the current military compensation system might be reformed and updated. Whereas DoD&rsquo;s current proposed reforms will likely generate up to an estimated $70 billion in savings over the next decade, this paper advocates a more robust&mdash;not radical&mdash;series of policy recommendations that could garner an additional $40 billion dollars of savings over the same period, or $101-$112 billion of total savings. Perhaps more important than the immediate savings generated, these recommendations will also place military personnel costs on a more sustainable path for the future. DoD&rsquo;s less aggressive approach may not adequately control pay and benefit costs in the long run and may lead to additional capability and capacity reductions in the future to offset personnel costs.
<br>
<br>
In sum, the recommendations slow cash compensation growth and reduce the value of non-cash and deferred benefits by transferring costs to the service member, retiree and their dependents. The recommended reforms were generated within the context of the human capital strategy and do not compromise effectiveness for the sake of efficiencies. The military compensation system will continue to provide competitive pay and benefits and allow the Department to continue to meet its recruiting and retention goals, but will now do so in a more fiscally-responsible manner. The proposed recommendations will also maintain the nation&rsquo;s commitment to the All Volunteer Force by continuing to compensate it at levels commensurate with its sacrifice and commitment to the nation. While the Department&rsquo;s system of compensation may look differently in the coming decade, the United States will still retain a strong and capable defense and trust will be preserved with those who serve the nation.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2012/2/military-compensation-gingrich/02_military_compensation_gingrich.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Karl Gingrich</li>
		</ul>
	</div><div>
		Image Source: © Oleg Popov / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486809/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486809/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fu%2fup%2520ut%2fus_soldiers012_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486809/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2011/09/01-coast-guard-randall?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{08858BC3-E895-4564-AB79-06140B8A3B57}</guid><link>http://webfeeds.brookings.edu/~/65486810/0/brookingsrss/series/21cdipolicypapers~The-US-Coast-Guard-and-st-Century-Law-Enforcement-on-the-High-Seas</link><title>The U.S. Coast Guard and 21st Century Law Enforcement on the High Seas</title><description><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/ck%20co/coastguard_officer001_16x9.jpg?w=120" alt="" border="0" /><br /><p><strong>Executive Summary:</strong> Performing the functions of eleven agencies in one service, the Coast Guard has capably served the American public for nearly 220 years. Small, yet highly adaptive and flexible, the Coast Guard has always risen to the challenge. However, the threats and challenges presented by the future maritime security environment necessitate that the Coast Guard make some changes to its law enforcement program to continue being a viable instrument of the federal government in this area. <br></p><p>Following 9/11, the Coast Guard added many tactical law enforcement capabilities to its inventory. While these capabilities filled needed gaps, a majority of the Coast Guard&rsquo;s law enforcement work continues to be performed by regular Coast Guard personnel, often on a collateral duty basis. As vigilance atrophies and questions are raised about the long-term sustainability of the Coast Guard&rsquo;s high-end law enforcement capabilities, the time is right for a close examination of the Coast Guard&rsquo;s law enforcement program in the aggregate. <br>
<br>
The recently released Commandant&rsquo;s Direction and other Coast Guard strategic planning processes have tangentially addressed future law enforcement challenges, but individual strategic plans for various aspects of Coast Guard law enforcement look at only a small slice of the law enforcement picture. Global trends and the changing nature of the maritime security environment and law enforcement threats facing this nation require a holistic and introspective look at the Coast Guard&rsquo;s law enforcement program to ensure that it is ready for the future environment. <br>
<br>
A comprehensive evaluation requires an understanding of criminal behavior, the role of deterrence in law enforcement, and incorporation of an intelligence-led policing model into Coast Guard law enforcement operations. Combined with several recommended changes to the Coast Guard organizational structure and law enforcement training, technologies, and partnerships, the Coast Guard can prepare itself for the future and continue to be a highly utilitarian component of the federal government.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2011/9/01-coast-guard-randall/0901_coast_guard_randall.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Jeffrey Randall</li>
		</ul>
	</div><div>
		Image Source: Â© Andrea De Silva / Reuters
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486810/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fc%2fck%2520co%2fcoastguard_officer001_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Thu, 01 Sep 2011 00:00:00 -0400</pubDate><dc:creator>Jeffrey Randall</dc:creator><content:encoded><![CDATA[<div>
	<img src="http://www.brookings.edu/~/media/research/images/c/ck%20co/coastguard_officer001_16x9.jpg?w=120" alt="" border="0" />
<br><p><strong>Executive Summary:</strong> Performing the functions of eleven agencies in one service, the Coast Guard has capably served the American public for nearly 220 years. Small, yet highly adaptive and flexible, the Coast Guard has always risen to the challenge. However, the threats and challenges presented by the future maritime security environment necessitate that the Coast Guard make some changes to its law enforcement program to continue being a viable instrument of the federal government in this area. 
<br></p><p>Following 9/11, the Coast Guard added many tactical law enforcement capabilities to its inventory. While these capabilities filled needed gaps, a majority of the Coast Guard&rsquo;s law enforcement work continues to be performed by regular Coast Guard personnel, often on a collateral duty basis. As vigilance atrophies and questions are raised about the long-term sustainability of the Coast Guard&rsquo;s high-end law enforcement capabilities, the time is right for a close examination of the Coast Guard&rsquo;s law enforcement program in the aggregate. 
<br>
<br>
The recently released Commandant&rsquo;s Direction and other Coast Guard strategic planning processes have tangentially addressed future law enforcement challenges, but individual strategic plans for various aspects of Coast Guard law enforcement look at only a small slice of the law enforcement picture. Global trends and the changing nature of the maritime security environment and law enforcement threats facing this nation require a holistic and introspective look at the Coast Guard&rsquo;s law enforcement program to ensure that it is ready for the future environment. 
<br>
<br>
A comprehensive evaluation requires an understanding of criminal behavior, the role of deterrence in law enforcement, and incorporation of an intelligence-led policing model into Coast Guard law enforcement operations. Combined with several recommended changes to the Coast Guard organizational structure and law enforcement training, technologies, and partnerships, the Coast Guard can prepare itself for the future and continue to be a highly utilitarian component of the federal government.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2011/9/01-coast-guard-randall/0901_coast_guard_randall.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>Jeffrey Randall</li>
		</ul>
	</div><div>
		Image Source: Â© Andrea De Silva / Reuters
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486810/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486810/BrookingsRSS/series/21CDIpolicypapers,http%3a%2f%2fwww.brookings.edu%2f~%2fmedia%2fresearch%2fimages%2fc%2fck%2520co%2fcoastguard_officer001_16x9.jpg%3fw%3d120"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486810/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>http://www.brookings.edu/research/papers/2011/07/15-cyber-forces-hathaway?rssid=21CDI+policy+papers</feedburner:origLink><guid isPermaLink="false">{77D525F9-5585-47D1-A73F-70E7F05ACB9D}</guid><link>http://webfeeds.brookings.edu/~/65486811/0/brookingsrss/series/21cdipolicypapers~The-Battle-Over-Command-and-Control-of-the-Pentagons-Cyber-Forces</link><title>The Battle Over Command and Control of the Pentagon's Cyber Forces</title><description><![CDATA[<div>
	<p><strong>Abstract:</strong> <br>
<br>
The dramatic increase in reliance on cyberspace over the last decade for U.S. military operations resulted in the creation of the sub-unified command, U.S. Cyber Command (USCYBERCOM). Its mission is to operate and defend the global information grid and conduct full-spectrum cyberspace operations, if required. However, the regional combatant commands (COCOMs) see cyberspace as another operational domain that they want and need to integrate with the physical domains of air, land, sea and space. These two perspectives are at odds with each other with respect to the optimal command and control (C2) structure for cyberspace. The challenge is to develop a command and control structure that allows USCYBERCOM to execute its global responsibilities while also allowing the geographic commanders the ability to effectively integrate cyber operations into their plans and operations.</p><p>Two predominant models have emerged: the USSOCOM model and the USTRANSCOM model, the former being a very regionally focused structure while the latter is very centrally focused. In order to determine the best command and control structure for cyberspace within DoD, the author conducted interviews throughout USCYBERCOM, its service components, and several of the unified commands. Additionally, the author observed a tabletop cyber exercise in preparation for U.S. Pacific Command&rsquo;s (USPACOM) annual Exercise Terminal Fury. The author concludes that a hybrid model with features of the regional USSOCOM model and the centralized USTRANSCOM model best takes into account the global nature of cyberspace, while enabling integration of regional cyber effects.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://www.brookings.edu/~/media/research/files/papers/2011/7/15-cyber-forces-hathaway/0715_cyber_forces_hathaway.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>David C. Hathaway</li>
		</ul>
	</div>
</div><div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486811/BrookingsRSS/series/21CDIpolicypapers,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</description><pubDate>Fri, 15 Jul 2011 00:00:00 -0400</pubDate><dc:creator>David C. Hathaway</dc:creator><content:encoded><![CDATA[<div>
	<p><strong>Abstract:</strong> 
<br>
<br>
The dramatic increase in reliance on cyberspace over the last decade for U.S. military operations resulted in the creation of the sub-unified command, U.S. Cyber Command (USCYBERCOM). Its mission is to operate and defend the global information grid and conduct full-spectrum cyberspace operations, if required. However, the regional combatant commands (COCOMs) see cyberspace as another operational domain that they want and need to integrate with the physical domains of air, land, sea and space. These two perspectives are at odds with each other with respect to the optimal command and control (C2) structure for cyberspace. The challenge is to develop a command and control structure that allows USCYBERCOM to execute its global responsibilities while also allowing the geographic commanders the ability to effectively integrate cyber operations into their plans and operations.</p><p>Two predominant models have emerged: the USSOCOM model and the USTRANSCOM model, the former being a very regionally focused structure while the latter is very centrally focused. In order to determine the best command and control structure for cyberspace within DoD, the author conducted interviews throughout USCYBERCOM, its service components, and several of the unified commands. Additionally, the author observed a tabletop cyber exercise in preparation for U.S. Pacific Command&rsquo;s (USPACOM) annual Exercise Terminal Fury. The author concludes that a hybrid model with features of the regional USSOCOM model and the centralized USTRANSCOM model best takes into account the global nature of cyberspace, while enabling integration of regional cyber effects.</p><h4>
		Downloads
	</h4><ul>
		<li><a href="http://webfeeds.brookings.edu/~/t/0/0/brookingsrss/series/21cdipolicypapers/~www.brookings.edu/~/media/research/files/papers/2011/7/15-cyber-forces-hathaway/0715_cyber_forces_hathaway.pdf">Download Full Paper</a></li>
	</ul><div>
		<h4>
			Authors
		</h4><ul>
			<li>David C. Hathaway</li>
		</ul>
	</div>
</div><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0" hspace="0" src="http://webfeeds.brookings.edu/~/i/65486811/0/brookingsrss/series/21cdipolicypapers">
<div style="clear:both;padding-top:0.2em;"><a title="Like on Facebook" href="http://webfeeds.brookings.edu/_/28/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Share on Google+" href="http://webfeeds.brookings.edu/_/30/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/googleplus20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Pin it!" href="http://webfeeds.brookings.edu/_/29/65486811/BrookingsRSS/series/21CDIpolicypapers,"><img height="20" src="http://assets.feedblitz.com/i/pinterest20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="http://webfeeds.brookings.edu/_/24/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="http://webfeeds.brookings.edu/_/19/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="http://webfeeds.brookings.edu/_/20/65486811/BrookingsRSS/series/21CDIpolicypapers"><img height="20" src="http://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a><div style="padding:0.3em;">&nbsp;</div>&#160;</div>]]>
</content:encoded></item>
</channel></rss>

