Documente Academic
Documente Profesional
Documente Cultură
Security Paradigm
and Security Agenda
NATIONAL STRATEGY
INFORMATION CENTER
NAtioNAl StrAtegy iNformAtioN CeNter
1730 Rhode Island Avenue, NW • Suite 500
Washington, DC 20036-3117
Tel: 202 429 0129 • Fax 202 659 5429
www.strategycenter.org
b | R. Godson a n d R . Sh ult z
ADAPTING AMERICA’S
SECURITY PARADIGM
AND SECURITY
AGENDA
Key Findings iv
Strategic Communication 28
Kevin McCarty
Key Findings
1. Although the 21st-century environment is more complex, some patterns are discernable.
Among them are the predominant security challenges arising from weak states, armed groups
(even without weapons of mass destruction), other super-empowered nonstate actors and
authoritarian regimes using irregular techniques.
2. These are certainties of the security landscape, and they will persist for years to come.
3. The seriousness of these challenges is further magnified by the fact that these state and
nonstate actors often do not act alone. Rather, they develop cooperative relationships ranging
from de facto coalitions to loose affiliations.
6. The key capabilities that we will need are NOT super-enhanced technology and more
divisions and firepower—although we do need to retain robust U.S. conventional and
nuclear forces.
7. The U.S. now needs dedicated units of civilian and military professionals with skill sets
focused on the certain challenges. There are creative public servants and soldiers with
these exceptional skills. We need many more.
T
o say the world is changing is to state the ob- that will likely—in one form or another—consti-
vious. The security environment is becom- tute the major security challenge in the early 21st
ing more complex, with shadowy and seem- century.
ingly unpredictable threats around the globe.
What is much less understood is exactly how the
As surprising as it may seem, pirate attacks
environment has changed, why it is evolving so
off Somalia, militias in Lebanon, and criminal
rapidly, and what can be done to meet the new
armies in Mexico are part of a global pattern
national security challenges that arise as a result.
and not anomalies.
Understanding these trends and patterns is criti-
cal, since these new challenges are likely to persist Critical to making sense of this new state of affairs—
for decades. and to creating significant security capabilities—is
As this report documents, one key factor in the the realization that wars between nation-states, all
evolution now under way is that half of the nearly too common in the last century, are becoming an
200 countries in the world are weak, failing, or anomaly. Rather, events such as insurgent attacks
failed states. These states often have little control in Afghanistan and Pakistan, atrocities in Darfur,
over major parts of their territory. They cannot terrorist plots in and around Yemen, weapons deal-
provide security or deliver major services to large ing by rogue individuals, the use of the Internet to
segments of their population. They are vulner- instill fear and influence politics, proxy wars in the
able to whoever can mobilize the population and Middle East, and kidnappings of civilians in doz-
armed groups—terrorists, criminals, insurgents ens of nations continue. These are not isolated inci-
and militias—within their territories. Afghanistan dents but rather examples of what is becoming the
and Pakistan are among the most dramatic ex- norm for conflict in far-flung corners of the world.
amples, but many other regions face similar prob- This new environment poses dangerous and
lems. evolving threats. Yet these are threats that the
To further complicate matters, major authori- world’s stable democracies—now a minority of
tarian states and extremist movements seek re- today’s expanded roster of countries—can suc-
gional dominance and even global influence. In cessfully deal with if they first understand exactly
those pursuits, they often use the territory of what they are facing.
weak states and the armed groups within them to
advance their global interests and aims.
An important way to combat threats emanating
This is the landscape the United States and
from weak and fragile states is to strengthen
other democracies will confront for years to come.
legitimate government and the rule of law to
These events are not a temporary disruption of
alleviate pressures that lead to instability.
the ordinary state of world affairs or a short-lived
distraction from a normal state of peace and order. Beyond threats, the new situation also presents op-
Rather, they are symptoms of a new environment portunities. Fragile states are at the core of the new
2 | R. Godson a n d R . Shu lt z
Part 1
Confrontation and Conflict in
the 21st Century
T
he 9/11 attacks alerted America—if belatedly— about how to guard against the threat. Neither side
to the dangers of the battle being waged against wanted to risk retaliation from the other.
the West by irregular, extremist forces. Other Now, the relative stability that dominated the
ominous threats demand our attention as well: A na- second half of the 20th century has been replaced
tion run by religious zealots with nuclear arms ambi- by an increasingly decentralized world in which
tions that talks of wiping another country off the conflicts and hostilities—some new and others long
map; the indiscriminate killing of schoolchildren; frozen in place by the big-power showdown—man-
hostage-taking; criminal armies who possess more ifest themselves. In this and other ways, as will be
sophisticated weaponry than the police; the world- explained, the events we watch unfold are less ran-
wide trafficking of women and children; or ship inva- dom than might at first appear. While that may
sions and seizure by pirates off the coast of Somalia— seem counterintuitive in a world that suddenly ap-
something we thought belonged to a bygone era. pears chaotic, understanding the links in these out-
These events occur against a continual back- wardly disparate attacks and threats is paramount
drop of roadside and suicide bombings, the massa- to building the capacity to meet them.
cre of civilians, and the just-in-time disruption of Some spring from religious strife, others are eth-
terrorist plots leading to arrests, all appearing on nic or territorial in nature. What they have in com-
the media like a monotonous rerun documentary— mon is a disregard for the value of human life; a
punctuated by occasional spectaculars like the breach of the traditional norms of warfare or even of
Madrid train attack or mayhem in Mumbai. criminal activity; an embrace of extreme violence; a
rejection of democratic principles, and a proclivity
not only to ignore the distinction between military
What, it’s natural to wonder, is going on? What
and civilian targets but often to intentionally focus
happened? Is the world falling apart? Is there
on the latter. In many but not all instances, the pro-
some conspiratorial thread in all of this?
tagonists are willing—and sometimes eager—to die
A key point to be made at the outset is that these for their cause. That makes their assaults harder to
events are related—not in the conspiratorial sense— prevent, while their zealotry renders negotiations
but because they share several characteristics. Each or compromises almost impossible.
event springs from the profound changes that mark
our world in this century. The U.S.-Soviet rivalry
A decade into the 21st century we are able
that for 40 years featured army vs. army, industrial
to see that these often decentralized low-level
might vs. industrial might ended. While it lasted,
yet intense confrontations across the globe
the strength of the two adversarial blocs, made for
are here to stay.
a dangerous world. But it was a largely predictable
situation in which U.S. policymakers and their al- Many of those who orchestrate these acts, while
lies understood a great deal about the opponent and ruthless in the present, simultaneously take a pa-
4 | R. Godson a n d R . Shu lt z
Fifth, to achieve their aims, armed groups, political • Delineation of the varied means and instru-
movements and (through proxies) authoritarian ments these actors are employing to achieve
regimes are waging irregular conflict and some- their objectives.
times warfare. There is no clear beginning of or
end to this kind of conflict. It can continue for
years or even decades. It is not fought on battle- Actors Who Will Dominate
fields between armies. There are no front lines to the 21st-Century Security
identify and attack. In this type of warfare, the en- Environment
emy uses many nontraditional tactics—assassina-
tions and roadside bombs, suicide attacks, bribery, In the period 2010–2025, the chief sources of in-
propaganda in the new and old media—to gain stability, conflict, and war at the local, regional,
power slowly over territory and populations. The and global levels will be a diverse frequently de-
theater of irregular conflict includes streets, neigh- centralized set of actors. They are grouped into
borhoods, villages, websites, schools, and televi- strong, weak, or failing/failed states; local, region-
al, or global armed groups; and super-empowered
sion—settings where the local governments are
individuals, groups, and institutions.
often weak, targets are highly vulnerable, and the
effectiveness of U.S. military superiority is dimin-
ished or nonexistent. Authoritarian, Weak, and Failing States
Unless Americans grasp that these transforma-
The proliferation of weak states will be among the
tive developments not only make for uncertainty
preponderant sources of instability, conflict, and
but that they are here to stay for decades, they war over the next decade or two, at the very least.
won’t be prepared to meet the challenges to U.S. They already outnumber strong states. Although
security interests in the short and long term. This the boundary lines are somewhat blurred, states
deficit could inflict a heavy toll on the United States can be classified by strength and by system of gov-
and its allies. ernment. The approximate breakdown is:
What follows are the “known knowns” of the A majority of states today are weak, including
21st-century security environment, grouped into roughly one in five that are failing or failed. To vary-
three principal categories: ing degrees, weak states—whether democratic or
authoritarian—are unable to control all their terri-
• Identification of the major actors—both state
tory, maintain a monopoly over the instruments of
and nonstate—who are poised to dominate.
force or perform core functions beginning with pro-
• Description of these actors’ visions and strate- viding security for significant sections of their pop-
gic cultures and how these shape their goals ulations. When these conditions become severe, a
and actions. state’s legitimacy seriously erodes, or even vanishes.
6 | R. Godson a n d R . Shu lt z
These groups are very adept, very skilled in the use
operational and organizational pro-
of cyberspace, but what we haven’t seen yet is the
file. But it can morph into a criminal
enterprise. Also, an armed group can major use of cyber attacks by terrorists. It’s inevitable
simultaneously fit more than one that there will be in the future.
subtype. Many of their leaders are Peter Clark, former Director of UK Anti-Terrorist Branch
skillful and cunning. Hezbollah, for
example, operates as a political party,
but at the same time it is a terrorist
organization, a highly trained militia, and a clan- war with each other engage in terrorist, insurgent,
destine criminal organization with illegal enter- and criminal practices to attack U.S. and allied forc-
prises in Lebanon and abroad. es in S.W. Asia in an attempt to force their with-
The capacity of armed groups to adapt, trans- drawal and thus inflict a strategic defeat on the
form themselves and to establish linkages with world’s sole superpower.
other armed groups, political movements, and Finally, armed groups pose indirect threats by
states greatly complicates the ability of security destabilizing states that are important to major
services to understand these actors, particularly powers, even short of the violence taking place in
when their activities are largely clandestine. This Afghanistan and Pakistan. These tactics include
was true for the United States following the inva- subversion, corruption, criminal enterprise, in-
sion of Iraq—and helps explain the difficulties U.S. timidation, murder, and assassination. Mexico
policymakers and strategists encountered there and Central America share some of these charac-
after initial military successes. Chaos, internal teristics and vulnerabilities. Major transnational
conflict, and societal breakdown ensued, as armed criminal groups and many smaller local and re-
groups multiplied, many with the help of other gional gangs of extortionists, kidnappers, and
state and nonstate actors. drug dealers are having an impact on a daily basis
Since the 1980s, armed groups have evolved rap- on the quality of life in the region and even in
idly from local to regional standing. Some have some cities and local communities in parts of the
even become global players. They have proven ad- United States.
ept at acclimating and adapting, with their flexibil-
ity and command structures often allowing them to
Super-Empowered Individuals, Groups,
outpace far larger and more powerful states. In do-
and Institutions
ing so, armed groups have used violence strategi-
cally to undermine the authority, power, and Although it may seem like the stuff of movies, the
legitimacy not only of weak states but even of the security landscape of the 21st century is also being
most powerful ones. shaped by super-empowered individuals. Operat-
Bold actions have enabled some armed groups to ing separately, or at times through or aligned with
pose direct strategic challenges to major states. For armed groups, these micro actors have the capacity
example, al-Qaeda’s 9/11 and subsequent attacks on to affect the security environment by facilitating
a global superpower had a profound impact on conflict and instability. Conversely, some super-
America and on U.S. policy. In 2004, a decentralized empowered nonstate actors play very positive roles
combination of armed group attacks caused a Euro- in the world. Their empowerment flows from per-
pean power—Spain—to withdraw from Iraq. sonal wealth; financial or other material resources
Armed groups can also present regional threats and technologies; access to weapons; and their
to major powers that likewise have potentially stra- ability to influence directly or serve as a conduit for
tegic consequences. For example, armed groups at influence.
Any group which has global reach has to have some backing,
whether it’s a state or a super-empowered individual. A. Q. Kahn,
for example, sold nuclear technology to the Shias and the
Sunnis on different sides.
ikram Sood, former Chief, Research and Analysis Wing,
V
India’s external intelligence service
8 | R. Godson a n d R . Shu lt z
These limitations persist today, as seen in the mined by armed groups and their allies. In neither
splintering of NATO over the International Se- case do many strong democracies typically regard
curity Assistance Force (ISAF) mission in Af- weak states and the extremist or criminal groups
ghanistan—a splintering all the more worrisome exploiting them as a priority requiring prompt, se-
because it is taking place on several levels. In the rious action. Some democracies are willing to help
most practical sense, a plethora of varying rules of by providing money and other types of assistance—
engagement limits the nature of the military par- such as Spain in the case of Colombia—but they are
ticipation of many NATO members. That not only generally less willing to go outside their perceived
reduces the effectiveness of individual nations, it area of interest or influence to provide signifi-
also complicates coordination within the overall cant assistance. However, by not helping early on
force. More broadly, divergent views exist among through soft power/non-kinetic means, they and
NATO members, and importantly their citizens, the U.S. may end up later employing military force
over whether, and if so to what extent, Afghanistan to curtail mushrooming violence. In the 21st cen-
should even be considered a serious security threat tury, similar scenarios are unfolding, for example,
and worth risking the lives of their soldiers. Within in the energy-crossroads region of Eurasia.
some countries, including the United States, there In sum, a major 21st-century security chal-
are significant differences over this issue, and, as a lenge for the United States will be both to reach
result, over the allocation of resources and deploy- and maintain consensus and to persuade other
ment of troops. Thus, even in the community of stable democracies to work together to assist frag-
strong democracies, the conflict is not universally ile states—especially democratic ones—that are
understood in the context of the 21st-century secu- threatened by hostile alliances of armed groups
rity challenges described in this report. and states. Doing so can be a key to avoiding the
What makes this all the more remarkable is that need for major military intervention later on.
it concerns the status of a failed state that just eight
years ago provided the launching pad for the worst
Competent Authoritarian States:
attack on the American homeland in history, and
Working through proxies, they are a
is adjacent to a weak nuclear armed state. While
destabilizing force and a challenge to
NATO nations have long differed over Afghani-
U.S. interests.
stan, until very recently— particularly while Iraq
appeared to be almost a lost cause—there was con- In the security environment of the 21st century,
sensus among U.S. lawmakers and policymakers certain authoritarian states will challenge the U.S.
that Afghanistan was a vital engagement that had role in their region as well as American global influ-
to be won. ence and the democratic values to which the Unit-
Beyond the issue of Afghanistan, some stable ed States and its allies subscribe. Of these states,
democracies have provided assistance to weak China, Russia, and Iran notably perceive Washing-
states making a transition to democracy, for ex- ton—both militarily and because of the ideas it rep-
ample, Australia’s leadership (with U.S. support) of resents—as a major threat to their power base and
the multinational intervention in East Timor. Many to their geopolitical ambitions.
others have for the most part been unwilling to ac- Leaders of these authoritarian states have a
cept or undertake, as part of their national security unique vision of themselves and of the world,
policy, significant protection of and assistance to shaped by a historical narrative. They also have
weak states attempting to make the transition. This something in common that is very important. Un-
reluctance even extends to weak democratic states like the United States, where peace is seen as the
whose stability and institutions are being under- norm, and conflict and war as the anomaly, the
10 | R . Godson a n d R . S hu lt z
critique the existing political system and propose
an alternative vision and system to replace it. To
achieve these ends armed groups are willing to em- The new concept of operations defines
ploy unrestrained means and cause macro geopo- the fight at two levels—confrontation and
litical damage. conflict. Confrontation is won by providing
Such armed groups often align with, or indeed
security and assistance to the population,
are created as part of a larger political and social
movement. An examination of al-Qaeda and its conflict by destroying enemy forces.
associated movements (AQAM) reveals how this eneral Sir Rupert Smith,
G
transnational armed group has developed and em- former Deputy Supreme Allied Commander Europe
12 | R . Godson a n d R . S hu lt z
Fragile Democratic and Authoritarian States: U.S. interests. Resorting to such means is tempting.
In a fight for survival, weak states relying on They may prolong a regime’s life but at the same
coercive solutions often increase their own time they also impede progress toward legitimacy
vulnerabilities; they need other means of and long-term stability.
bringing stability.
14 | R . Godson a n d R . S hu lt z
Part 2
Security Agenda
T
o meet and manage the serious
challenges of the 21st century, the
“Military action is not enough alone . . .
United States needs to adapt and
improve its security capabilities. We are Most modern conflicts don’t end with a
at one of those crossroads in history. Just victory on the field of battle, so political
as horses were sent back to the stables in and development work is essential.”
1914 and tanks became the new cavalry, a
U.S. Secretary of State Hillary Clinton
new set of tools and tactics will need to
be developed and employed. In today’s
complex world there is no one solution,
no silver bullet. Managing the security environment that environment. The first part of this report was
for the next several decades will require a security devoted to making sense of the new security envi-
focus led by military, intelligence, and civilian op- ronment confronting the United States and other
erators. The political, developmental, and local in- democracies. This second part of the report ad-
telligence components to security can no longer be dresses specific professional instruments and capa-
on the periphery—they must be major ingredients. bilities that the United States requires to manage
The ad hoc, and sometimes excellent improvisa- this environment—regardless of who is elected to
tions that the United States has created to patch lead the nation in executive and legislative capaci-
around its 20th- century capabilities are insuffi- ties—between now and at least 2025.
cient. It should not take another crisis or commis-
sion of inquiry to tell us that. It should also be noted
One size does not fit all—different conflict
that while major U.S. policy statements from elect-
zones will have different requirements.
ed leaders and government officials have called for
some version of these capabilities—and even fund- The specific configuration and deployment of these
ed some—they are not functioning regularly and capabilities must be adapted based on the political
professionally as they need to be. and security context or conflict zone in which the
It is important to be clear about what is being United States is engaged. These will range from
proposed in this report, and what is not. This is small-scale advisory missions, to those involving
not a call for a new grand strategy for the United limited U.S. presence “on the ground”—such as in
States. Such policy overviews may well be needed, Pakistan and in Colombia— to war zones where the
and the President and Congress are charged with U.S. military is or was the main security force, as in
their formulation. Rather, this report deals with Afghanistan and Iraq.
something both broader than policy prescription— The first—small advisory missions—are mainly
about the evolving security environment—and also preventative in scope and have as their objective
more concrete, the specific tools needed to manage assisting or building local capacity, particularly in
2. L
ocal intelligence will be a critical factor
in determining dominance in 21st-century
The ad hoc, and sometimes excellent conflicts.
improvisations that the United States In order to make sense of the new “battlefield”—
has created to patch around its which usually lacks a front line and often in-
20th-century capabilities are insufficient. volves civilians as players—U.S. and allied forces
need much better intelligence at the local level.
This is critical, for example, to help distinguish
who is part of an armed group, who is assisting
16 | R . Godson a n d R . S hu lt z
them, who is engaging only in political dissent,
and who can work effectively locally against the
armed group networks. The top U.S. intelligence Strategic communication should be
officer in Afghanistan has acknowledged that we central to policy making and strategy
lack sufficient relevant information about who in Washington and across the broad
the “power brokers” are in a given area—knowl- spectrum of policy implementation
edge that is critical to knowing how to proceed.
overseas.
More simply put, we need and can obtain more
reliable and sophisticated information about
who the good and bad guys are—and aren’t. Such
focused intelligence can be provided by trained
frontline foreign police, military and security • preventive mode in weak states, especially
collectors, analysts, and others who operate fragile democracies (e.g., Central America)
adaptively at the local level, even in the most
• high-intensity support (e.g., S.W. Asia)
hostile circumstances, to complement the formi-
dable U.S. and other national capabilities. This • less-intensive conflicts (e.g., Africa)
combination is necessary to strengthen decisive
operations and efforts by U.S., allied, and local
4. T
he U.S. currently lacks the strategic
forces—or some combination thereof—against
communication compentency to support
armed groups, and bolster the capabilities and
U.S. interests.
legitimacy of the local government.
There is consensus in Washington that this ca-
pability would greatly enhance the effectiveness
3. S
ecurity, Stability, Reconstruction, and
of U.S. policy. Effective strategic communication
Rule of Law Teams need to be further profes-
would increase support from friends and allies,
sionalized and in greater numbers to prevent
and positively influence adversarial state and
the outbreak of conflict and to strengthen
nonstate actors. Strategic communication is not
weak governments and civil society.
just about public affairs (policy PR) and public
The goal here is to help build governments whose diplomacy (exchanges between U.S. and foreign
legitimacy is recognized by citizens, and to in- leaders and citizens and better use of interna-
culcate rule of law principles and understanding tional broadcasting and new media). It is about
in the population. Rather than waiting for weak how senior U.S. leaders, national security man-
states to slip into critical conditions, we need to agers, and local implementers understand and
employ the 21st-century security equivalents of manage their words and actions to resonate with
“wellness programs” to bolster and support them. and influence the perceptions and behavior of
Repeated full-scale military operations to rescue foreign audiences. This can be accomplished
failing states are too costly in money and human by making strategic communications central to
terms for the U.S. to shoulder. policy making and strategy in Washington and
Building a comprehensive capability will re- across the broad spectrum of policy implementa-
quire the U.S.—alone or with partners—to develop tion overseas.
systematic plans, personnel, and resources. We
will need the standing (or reserve) professional
capabilities to act in diverse environments:
In the 21st -century security environment what U.S. struction, and Rule of Law Operations; Unconven-
military commanders will have to accomplish and tional Warfare; and Foreign Internal Defense.
how they use military forces to do so has changed. Regardless of the ways each of these doctrines
The concept of operations (CONOPS) for conflict is identifies the opponent, executes specific missions,
different. Rather than decisive victory, the objec- and achieves core goals, military forces executing
tive will be to establish local security and law and them will need—in varying quantities—the follow-
order in conflict zones. This serves as a “table set- ing competencies/capabilities:
ter” enabling civil agencies to execute activities
• Commanders who can lead in battle, and who
ranging from humanitarian aid to development.
have an understanding of a range of civil disci-
plines and an ability to fulfill specific roles tra-
The New CONOPS ditionally seen as civilian.
The new concept of operations defines the fight at • Combat brigades reconfigured to secure the
two levels—confrontation and conflict. Confronta- population in conflict zones. Forces organized
tion is won by providing security and assistance to on a self-contained modular basis. 21st-century
the population, conflict by destroying enemy forces. war is usually small unit dominated and hence
Confrontation activities establish local security for the basic module will be one or a few companies.
the people; isolate the enemy from them; and pro-
• Military units with greater civil proficiencies to
vide civil agencies with secure space to carry out
meet the needs of the population that are a fu-
humanitarian and developmental activities, mak-
sion of civil and military elements. Military and
ing the desired end state attainable. Conflict actions,
civil activities run in parallel.
by destroying enemy forces, support civil activities
but are not a substitute for them. • Proactive special operations units to target
armed group’s clandestine organization. These
operations will be intelligence-led and use
Required Doctrine, Tools, and Techniques
force in precise ways.
In the 21st-century security environment, U.S. mili-
• Information and intelligence are essential for
tary forces, together with civil agencies, will defeat
all civil and military actions. And they serve as
enemies by winning the battle for legitimacy with
the basis for devising a convincing narrative,
the population. The new doctrines that guide mili-
the foundation for the overall campaign.
tary forces provide for versatile and adaptable forc-
es. Those doctrines include: Counterinsurgency; • A training system is crucial. Home bases pre-
Counterterrorism; Stabilization, Security, Recon- pare core forces for specific missions abroad.
*General Sir Rupert Smith (Ret), UK was Deputy Supreme Allied Commander Europe, 1998–2001.
*Dr. Ilana Bet-El is a writer, historian, and political analyst based in Brussels.
2 0 | R . Godso n a n d R . S hu lt z
The training system’s deployable unit will ac- • Additionally, the information staff in the com-
company the core forces to provide similar manders’ HQ must be elevated to a core func-
training to the host country’s forces. tion and provide the driving logic for all opera-
tions to include the campaign narrative. This
• A networked command structure is needed to
necessitates changes in the people selected;
link military forces to civil agencies, allies, and
reorganization of the staff itself; and provision
local forces to facilitate collaboration and inte-
of appropriate training.
gration.
• The training system and networked command
structure also have to be created and crafted to
Re-shaping Existing Capabilities and
meet the requirements of the three security en-
Crafting New Ones for Three Security
vironments.
Environments
To effectively deal with armed conflict “amongst laboration with multiple local indigenous sectors.
the people,” the United States must develop new In pursuing these end-states, it is vital to recognize
concepts of operations for what should be called that adversarial political players—both indigenous
SSRR operations. The capability to conduct such and regional—will be competing to disrupt these ef-
operations effectively is a crucial—and inadequate- forts and to achieve alternative end-states.
ly developed—requirement for competing at the
sub-state level in weak and failed states, either as
New Needed Capabilities
part of major operations or in stand-alone stability
and preventive operations. The United States needs to develop six discrete
At present the U.S. has very few full-time, civil- capabilities:
ian and military trained professionals whose career
1. Senior-Level Military Assistance and Advi-
is devoted to these tasks. The U.S. often operates
sory Groups (MAAG), at headquarters in the
in an ad hoc manner in reaction to crises and mili-
U.S. and in Embassy operations, are configured
tary operations, with little recognition of the need
to serve as not just the military commands but
to prepare the people, equipment, and logistics to
also serve as the political brain of the SSRR op-
meet its needs in contested parts of the world.
eration. Most important, the MAAG will have
The U.S. needs to focus on achieving four end-
strategic planning and political action cells to
states through political shaping operations, constab-
develop and lead the implementation of a tai-
ulary-type security operations, and state building.
lored political-military strategy for achieving
The first is security for the host nation population
stability and progress in the host country, based
at the local level, produced through a combination
on detailed political mapping and interaction
of foreign and indigenous forces. The second is po-
with local leaders and social groups.
litical stability, which is a function of creating le-
gitimacy for the new political order and an effective 2. U.S. Foreign Liaison and Assistance Groups
process for inclusion and collective decision making (FLAG) will be brigade-sized military combat
for the society. The third is reconstruction, both of units optimized for classic population-centric
state institutions and a framework and system for security operations based on securing areas of
wealth generation. The fourth is the rule of law, strength and then expanding security outward
creating institutions to provide impartial enforce- in incremental steps (i.e., an “ink spot” security
ment of the law and conflict resolution of private campaign). This will require that several of U.S.
disputes, strengthening systems to ensure integrity Army and Marine combat brigades and regi-
of personnel within state institutions, and propagat- ments are re-equipped and re-trained for this
ing a positive ethos and culture of lawfulness, in col- kind of irregular warfare.
*Dr. Marin Strmecki is Senior Vice President of the Smith Richardson Foundation,
and adviser to the U.S. Department of Defense.
22 2 2| |
R. R
Godson
. GodsoannadnRd. R
S.hu lt zlt z
S hu
3. Security Training and Equipping Groups • For high intensity (Phase IV) operations, all
(STEG) will be a near-brigade-sized unit that the SSRR capabilities—MAAG, FLAGs, STEGs,
will be a standing part of the U.S. force structure CORDS Groups, Advisory Corps, and ROLS—
designed to rapidly train and equip indigenous will be needed.
police, intelligence, and military institutions. It
• For a limited presence mission, such as in Paki-
will have major dedicated stockpiles of equip-
stan or Colombia, the configuration of deploy-
ment—arms, ammunition, mobility assets, com-
ments will vary. All will require a MAAG, which
munications, etc.—to outfit host-country security
designs the strategy, carries out political en-
and police forces without procurement delays.
gagement, and commands all deployed U.S.
4. Advisory Corps will be U.S. military officers forces. If host-country security forces require
qualified to serve as embedded advisors or men- enhancements, STEGs and elements of the
tors of host-country forces, playing the key role Advisory Corps would be deployed. If unit-
of facilitating the partnering of U.S. and local partnering is required, FLAGs would be used.
forces and moving local partners up the learn- For governance, particularly at the local level,
ing curve as quickly as possible. CORDS Groups and ROLS would be employed.
5. Civilian Operations, Reconstruction, and De- • For a small advisory mission, the most appropri-
velopment Support (CORDS) Groups will be a ate deployment would be MAAG commanding
brigade-sized unit (or smaller depending on the a small Advisory Corps, supported by limited
context) that will be a standing part of the U.S. components of the CORDS Groups and ROLS.
force structure and designed to create parallel
advisory offices to the host-country civil admin-
Resources and Costs
istration structure at the national, provincial,
and local levels. These units, which exist within The most significant resource required is dedicated
Army Civil Affairs brigades, will facilitate the U.S. force and civilian structure to this purpose. The
improvement of governance and delivery of ser- United States should convert several of the Army’s
vices through indigenous institutions. combat brigades and Marine regiments into SSRR-
optimized capabilities. This will still allow for an
6. Rule of Law Support (ROLS) will entail a new adequate capability to deal with the legacy threat
deployable capability within the U.S. Army Re- of major conventional combat while providing the
serve Legal Command and its civilian agency necessary forces for the far-more-likely-to-occur
counterparts. They will strengthen Host Nation SSRR operations. Most of the converted brigades
institutions supportive of the rule of law, both and/or regiments should become FLAGs, while a
by providing integrity training and security sec- few others should be converted into STEGs, CORDS
tor reform for law enforcement and security Groups and Rule of Law Support capabilities. The
agencies, and by working with multiple civil Advisory Corps is not a separate organization, but
sectors within the country to create a culture it may require building a larger U.S. officer corps.
The STEGs will require POMCUS-like stockpiles
supportive of the rule of law.
(storage of light infantry equipment and logistics)
to equip host-country forces.
Configuring Capabilities for Rule of Law Support will require professional
Varying Scenarios experts on legal and security sector reform as well
as those schooled in working with key civil society
The configuration of deployed SSRR capabilities sectors—the media, education, and centers of moral
should vary based on the nature of the intervention. authority.
The world has seen a shift from the Cold War era, national compact among key actors and commu-
in which two opposing ideological blocs vied for nities on the initial sharing of power, the political
power, to a period in which multifarious, substate structure of the state, and the rules for future polit-
and transnational security threats rooted in weak ical competition. The third is to develop a political
or failed states pose the principal challenge to process to transition from a period in which armed
groups are the coin of the realm for acquiring po-
world order. To address this challenge, the United
litical power to one in which participatory politics
States must improve the capability of its politi-
is the path to achieving influence. The fourth is to
cal instruments of power, particularly to catalyze
build up local state institutions, including not only
constructive internal political development within security forces but also those that secure popular
countries such as Afghanistan and Iraq. This might legitimacy by delivering services and fostering eco-
be characterized as developing greater capability to nomic growth. In post-conflict settings, opportu-
engage in expeditionary political entrepreneurship nities need to be effectively created to demobilize
in fragile or post-conflict states. and reintegrate former combatants, giving them
The problem set confronting U.S. leaders in- constructive options to avoid their evolution into
volves the transformation of the local political criminal organizations. The fifth is to engage dip-
context. In these settings, political power is typi- lomatically with neighboring states to secure their
cally personalized, factionalized, and underwrit- tacit or active support for stability and progress.
ten by nonstate armed groups, some of which are The fifth is to engage diplomatically with neigh-
supported by neighboring countries. The desired boring states to secure their tacit or active support
transformation entails a political effort to enable for stability and progress.
local leaders and social groups to arrive at a na-
tional compact—an agreement on power sharing
and the rules of the game—and to jump-start local New Needed Capabilities
institutional building and economic development,
The United States needs to develop or improve its
while managing the policies of neighboring pow-
ers to prevent destabilizing interventions. Success capabilities in six areas:
requires an intensive engagement—both in terms 1. Making and signaling enduring commitments:
of leadership time and resources—and therefore Even though the duration of U.S. involvement
should be undertaken selectively in the service of
in Europe, Japan, South Korea, the Balkans, Af-
genuine strategic priorities.
ghanistan, and Iraq demonstrates an ability to
The U.S. needs to focus on five lines of action in
such political transformations. The first is to posi- fulfill long-term and expensive commitments,
tion the United States as a trusted political inter- the United States is profoundly hampered by
mediary among internal factions. The second is to a reputation for abandoning allies or curtail-
use this position to catalyze negotiations to forge a ing interventions when difficulties arise. Yet,
*Dr. Zalmay Khalilzad was U.S. Ambassador to Afghanistan (November 2003–June 2005),
Iraq (June 2005–March 2007), and the United Nations (February 2007–January 2009).
24 2 4| |
R. R
Godson
. GodsoannadnRd. R
S.hu lt zlt z
S hu
the willingness of local actors to compromise eties develop a process to achieve stable power
among themselves—and to take risks in doing sharing arrangements, build trust and confi-
so—depends on convincing them of U.S. stay- dence in order to rise above zero-sum struggles
ing power, often including a third-party guar- for power, and crafting inclusive constitutional
antee of power sharing arrangements. At one orders that produce stability and enable ef-
level, this means political leaders should en- fective collective decision making. Among the
sure that U.S. interventions have broad-based skills U.S. diplomats and officers must possess
domestic support. However, more generally, are abilities to assess the political culture and
the U.S. must become more effective in signal- landscape of host nations to craft realistic goals
ing, through its actions and words to local and and strategies, to manage and marginalize po-
regional actors, that it is irrevocably commit- litical spoilers, to shape and enforce compro-
ted to success. mises on core political questions among local
actors, to strengthen politically local individu-
2. Developing diplomats, military, and intel-
als and groups whose success is integral to U.S.
ligence officers skilled at mediation and
political strategy, and to develop networks and
shaping local politics: It is vital that the U.S.
coalitions among constructive political actors
embrace the need to take a “hands-on” ap-
and international partners. It is vital that the
proach in shaping the local political context.
United States have mechanisms to strengthen
This mediation and shaping role should seek
good political actors, particularly if spoilers or
not to impose American-made solutions but
extremists are receiving external support.
rather to use U.S. influence to help local lead-
ers agree on local solutions to local challenges. 4. Demobilizing and reintegrating nonstate arm-
Though American history has many examples ed groups and developing new legitimate secu-
of politically skilled expeditionary diplomats rity forces: The instruments of the U.S. and the
and officers, the dominant cultures of the State international community to demobilize and
Department, the military services, and the op- reintegrate armed groups are weak and the ca-
erational branches of intelligence agencies fo- pabilities to build new and legitimate security
cus on managing government-to-government forces are slow and uneven in their effective-
or multilateral relations, kinetic operations, ness. Key political aspects of these challenges
and intelligence collection, respectively. Conse- are to find positive political and economic roles
quently, these departments and agencies must for former militia leaders and members, to re-
develop cadres of officials and officers with form or create security ministries that all politi-
deep area expertise and a talent for political cal groups and communities view as trustwor-
action to shape the orientation and conduct of thy and reliable, and to develop strategies in
local leaders and communities. In addition, the partnership with local actors to isolate and de-
U.S. government must develop mechanisms to feat those armed groups that cannot be recon-
hire such talent laterally from the private sec- ciled to the new political order. A major weak-
tor as needed. ness that the United States must overcome is
the ineffectiveness of approaches to reintegrate
3. Catalyzing progress in the domestic politics
fighters meaningfully into civilian life.
of foreign societies: U.S. civilian and military
institutions, as well as agencies of the interna- 5. Delivering results in service delivery and eco-
tional community, need to develop a general nomic development in the “golden hour” after
doctrine or concept of operations for helping an intervention or major political transition:
local leaders in fragile and post-conflict soci- Unless a new government can start deliver-
26 | R . Godson a n d R . S hu lt z
Intelligence Dominance Consistent with
Rule of Law Principles
Dr. Roy Godson*
Armed group threats to fragile democracies can be 5. U.S. technical support to the phased plan
largely neutralized and some eliminated by the (2–4 years)
development of intelligence dominance in these so-
6. U.S. and HN evaluation and adaptation of the
cieties. The UK, Israel, Australia, and others have
plan as it is implemented.
demonstrated that this unique approach produces
spectacular results. Experience has shown that The U.S. would need resources and authority to de-
many of these relatively inexpensive techniques can velop the foreign capability in three types of politi-
be embedded in a host nation’s security force. Devel- cal environments:
oping the capability to do this in fragile and new de-
• War zones where the U.S. is the principal
mocracies will be an effective tool in strengthening
military security force, e.g., Iraq 2003–09,
democratic governance in these societies. There are
Afghanistan (now).
many opportunities to do so, if the U.S. equips itself.
Achieving dominance means that host nations • Non-war zones with significant U.S. presence
(HN) develop sufficient local knowledge to map (20–30 countries)
the infrastructure of armed groups, and gather the
• Zones receiving security assistance with little
evidence to arrest and neutralize the support struc-
U.S. presence (40–50 countries).
ture and leadership of the groups.
To build this capability in HNs, the U.S. (and In addition to U.S. interagency accord and support,
allies) need to develop: this would require a specialized U.S. unit capable
of collaborating with HN police, military, or intel-
1. An unclassified doctrine or model of domi-
ligence services. The U.S. unit could be housed in
nance that is consistent with rule of law prin-
State, Defense, or DOJ, or in a nongovernmental
ciples
entity designed or adapted for this purpose.
2. Mentors who can adapt and pass on the doc- Costs would vary with the type and size of the
trine to the HN geopolitical environment, assuming the HN con-
tributes personnel. The minimum cost per country
3. HN support for the principles of dominance
would be $20 million/year, maximum $100 mil-
consistent with rule of law, and a clear deci-
lion/year for four years.
sion on the lead agency
*Dr. Roy Godson is President of the National Strategy Information Center, and
Emeritus Professor of Government, Georgetown University.
Through their foreign policies, strategies, and the Strategic communication as used in the formula-
implementation thereof, governments attempt to tion of the Marshall Plan to counter communism in
persuade a person, persons, or organizations of in- post-World War II Europe is an excellent example
terest (National Security audiences) to behave in of its successful application to National Security.
ways that are conducive to their National Security The approach crafted by the U.S. policymakers was
goals. Governments use many tools of persuasion to appeal for European reconstruction and create
to do this, from coercion to diplomacy, to sanctions, confidence in their current forms of government,
development, communications, and other activities. and not just to stop the spread of Communism, or
Usually, more than one activity is used at a time, and promote U.S. power and interests. Lack of effective
multiple segments of a National Security audience strategic communication was evident in the con-
are targeted. Strategic communication is more than clusion of the Versailles Treaty which ended World
the “standard” communications usually associated War I and laid the foundational causes of World
with governmental public affairs, public diplomacy, War II.
international broadcasting, and information opera- Unlike discussions on more traditional govern-
tions, for example. Strategic communication is how mental roles such as military force, intelligence, and
you integrate foreign audience understanding to international aid et al., strategic communication is
develop and manage persuasive foreign policies, not now a core competency of the U.S. government.
strategies, and implementation plans. This absence greatly hinders the development of
The goal is ultimately to persuade foreign lead- this capability. Education and understanding in-
ers or populations to change their behavior. To do side the government are the keys to improving U.S.
so successfully with effective tools, the government strategic communication.
must understand how the audience perceives the There are three steps the United States could
world and the government’s actions; what their take now to improve this capability in the govern-
attitudes are towards the behavior change the gov- ment. These measures do not require new legisla-
ernment is seeking; and how those attitudes have tion to adjust authorities; they are not expensive;
been formed. It is not so much the action itself, or and they do not require building new bureaucra-
how well it is performed, but how they are per- cies or entities.
ceived in the mind of the intended audience that
1. Senior leadership education: Strategic com-
matters—so words and actions must be gauged to
munication is a top down capability—if it is
be effective there. If they are not, the goal will likely
not working at the top, it probably cannot be
not be reached. Strategic communication is about
fixed from the bottom up. Senior leadership
managing these perceptions.
in the National Security policymaking arena
*Kevin McCarty, a former naval aviator and National Clandestine Services officer, served on the
National Security Council as Director for Global Outreach under Presidents Bush and Obama.
28 2 8| |
R. R
Godson
. GodsoannadnRd. R
S.hu lt zlt z
S hu
must have a strong conceptual understanding approach is needed to shift the culture of stra-
of strategic communication. A major first step tegic communication within the government to
to implement this conceptual understanding enhance its capability and prevent “accidents,”
and to provide senior leadership with the tools or negatives.
to oversee how strategic communication is de-
3. Build an audience understanding capabil-
signed and implemented, would be a focused
ity: In order to persuade foreigners of concern
two-day course/workshop with a defined cur-
to us to change their behavior and attitudes,
riculum on what strategic communication is
the United States must understand how they
and how it must be integrated into policies and
think about and perceive the priority issues
implementation. This can be done by use of
we desire change in, and how our actions af-
case studies and tabletop exercises that high-
fect those perceptions. Again, it is not so much
light how the use of strategic communication
the action or its accomplishment, but how it is
can make or break policies and their execution.
perceived that matters. Many believe that this
Initial efforts, such as the State Department’s
“audience understanding capability” means
Foreign Service Institute Marketing College,
that we should appease the audience by doing
can be built upon to provide this training.
what they want. To get them to change, how-
2. Create a culture of strategic communication: ever, we need to know how to reach them in
The United States government needs to create ways that they care about, and in ways that will
a culture within its National Security opera- resonate with them. The more you know about
tional ranks of what strategic communication how someone you want to persuade thinks and
is, the important role it plays, and how it affects perceives, the higher the chance of successfully
everyone’s mission. Just creating additional persuading them—it’s not about appeasement.
tools or programs alone will not enhance our This is not as difficult as it seems. The most
capability sufficiently, as it often takes just a robust industry that has expertise and infor-
few negatives to offset many positives. To il- mation in this area at present is in the market
lustrate, the United States Navy faced a similar research community. We need to capitalize on
problem in the 1980s when it was dealing with this knowledge and expertise to create a center
a severe safety issue within its aviation com- of excellence to support United States govern-
munity. Many attempts were made to improve ment agencies and departments to meet this
procedures, training, equipment, and other ap- critical need.
proaches to fix the serious losses of aircraft and
aircrew. They had little overall effect. Then the
Navy instituted a strong safety culture pro-
gram which altered the way safety was treated,
placed new emphasis on it, and introduced Op-
erational Risk Management procedures. These
steps had a dramatic effect on the way the
culture of safety was treated within the Navy.
Within a few short years, major accident-free
deployments became the norm. This type of
T
his report would not have been possible without the assistance
and contributions of some of the leading security practitioners
from democracies around the world. These highly qualified in-
dividuals have shared their first-hand experience in the contempo-
rary security environment—all having held senior-level positions in
their nation’s military, diplomatic, or intelligence services. They were
invited to participate based on their recent contributions to the de-
velopment of effective capabilities in their countries and regions. All
have distinguished records of command responsibility, and have en-
hanced their country’s security policies in a manner consistent with
democratic principles and the rule of law.
The International Practitioner Working Group meets periodical-
ly to review and collaborate on NSIC’s research findings. Its mem-
bers are:
Peter Clarke, UK
Former Head of Counter Terrorism Command,
2002–2008; Deputy Assistant Commissioner,
Metropolitan Police, 2005–2007; Acting As-
sistant Commissioner for Specialist Operations
2007–2008
30 | R . Godson a n d R . S hu lt z
Ambassador Henry Crumpton, USA General Sir Rupert Smith (Ret.), UK
Coordinator for Counterterrorism, Deputy Supreme Allied Commander Europe,
U.S. Department of State, 2005–2007; 1998–2001
Former senior CIA official
Vikram Sood, India
Dr. Paula Dobriansky, USA Chief, Research and Analysis Wing (India’s
Under Secretary of State for Democracy external intelligence service), 2001–2003
and Global Affairs, 2001–2009
Ing. Jorge Tello Peón, Mexico
Randall Fort, USA Director, CISEN (Mexico’s intelligence service),
Assistant Secretary of State for Intelligence 1986–1999; Undersecretary of Public Safety,
and Research, 2006–2009 1999–2001
General Lord Charles Guthrie (Ret.), UK General Sir John Wilsey (Ret.), UK
Chief of the UK Defense Staff, 1997–2001 Commander in Chief, UK Land Command,
Northern Ireland, 1994–1996
Lieutenant General Pat Hughes (Ret.), USA
Director, Defense Intelligence Agency,
1995–1999; Assistant Secretary, Department
of Homeland Security, 2003–2005
The primary authors of this report are Dr. Roy Godson and Dr. Richard Shultz. Dr. God-
son is Professor Emeritus of Government, Georgetown University and president of the
National Strategy Information Center. Dr. Shultz is Director, International Security
Studies Program and Professor of International Politics, The Fletcher School, Tufts Uni-
versity; and Research Director at the National Strategy Information Center.
Dr. Querine Hanlon and Dr. Samantha Ravich assisted in the research and preparation
of this report. Dr. Hanlon is Associate Professor, College of International Security Af-
fairs, National Defense University, and a Fellow at the National Strategy Information
Center. Dr. Samantha Ravich was formerly Deputy National Security Adviser to the Vice
President of the United States. The report has also benefitted from the comments, cri-
tiques, and meetings of the International Practitioner Working Group.
The Capabilities papers in Part II of the report have been prepared by the named au-
thors. They have also benefitted from the comments, critiques, and discussion of the
International Practitioner Working Group.
Disclaimer: The views expressed in this report are those of the authors in their personal
capacities and do not reflect the official policy or positions of any U.S. or other govern-
ment department or agency.
32 | R . Godson a n d R . S hu lt z
Glossary of Key Terms
ADAPTING AMERICA’S SECURITY PARADIGM AND SECURITY AGENDA
Adapting the Security Paradigm. Adaptation refers to undermine or co-opt them. To do so, they employ a
to changes in previously held assumptions about val- clandestine infrastructure as their key organizational
ues, actors, interests, threats, and capabilities that no method, although they may maintain overt political
longer adequately explain the security environment. fronts. Their leaders believe in the use of violence to
This project seeks to identify previous U.S. assump- achieve their aims, challenging the state’s monopoly
tions, and those that need revision to address the se- over coercive power. Armed groups employ multidi-
curity challenges of the contemporary era. mensional strategies to secure the loyalty or compli-
ance of relevant populations. They operate within and
• A Paradigm is an interrelated set of assumptions,
across state boundaries, may exercise some degree of
concepts, values, and practices that comprise the
territorial control, and have at least a minimum de-
way a professional community, discipline, or or-
gree of independence from state control.
ganization views itself and the environment in
which it operates and carries out activities. Para- • Criminal Organizations are a type of armed group
digms establish a framework and mindset that that possess a clandestine or secret hierarchical
shape a way of thinking and a set of practices for structure and leadership infrastructure and whose
acting during a particular period of time. primary purpose is to operate with impunity out-
side the law in one or more criminal enterprises.
• A Security Paradigm consists of a security com-
Such groups frequently engage in more than one
munity’s operating assumptions, concepts, and
type of criminal activity and can operate over large
practices with respect to: One, the community’s
areas of a region and globally. Often, these groups
core values. Two, how that community under-
have a family or ethnic base that enhances the co-
stands the strategies employed by the actors that
hesion and security of its members. These types
are perceived to threaten these core values. Three,
of armed groups typically maintain their position
how that community understands the means and
through the threat or use of violence, corruption of
instruments—regular, irregular, catastrophic—
public officials, graft, or extortion.
used by those actors. Four, the assumptions the
security community makes about the capabilities • Insurgents are a type of armed group that employ
it needs to protect and defend against these chal- protracted political and military activities with
lenges and how best to organize, recruit, train, and the objective of gaining partial or complete con-
educate to develop the most effective capabilities. trol over the territory of a state through the use
of irregular military tactics and illegal political
• A Paradigm Change/Shift is the process by which
activities. Insurgents engage in actions ranging
a professional community changes its paradigm,
from guerrilla operations, terrorism, and sabo-
often in responses to the accumulation of anoma-
tage to political mobilization, political action,
lies and contradictions to the existing operating
intelligence and counterintelligence activities,
assumptions, concepts, values, and practices. The
propaganda, and psychological warfare. These
shift or change is neither simple nor sudden. Par-
instruments are employed to weaken or destroy
adigm paralysis—the inability or refusal to see be-
the power and legitimacy of a ruling government,
yond the current framework and mindset—often
while at the same time increase the power and le-
undermines a needed change or shift.
gitimacy of the insurgent group.
Armed Groups are a category of nonstate actor con- • Militias are a type of armed group with recogniz-
sisting of four subtypes: insurgents, terrorists, mili- able irregular armed forces that operate within
tias, and criminal organizations. All armed groups the territory of a weak and/or failing state. The
challenge the power and legitimacy of states, seeking members of militias often come from the disad-
34 | R . Godson a n d R . S hu lt z
founded on a shared consensus about the political and A Political Movement is a social grouping that seeks
moral values that define the state and its society. As to convince segments of the population to take action
well, a state’s legitimacy is also derived from its ability to support one or more issues. Political movements
to perform core functions for its citizens—functions can be local, national, or transnational, coercive or
such as infrastructure, health, food, education, as well noncoercive. Leaders shape issues and the move-
as safety and border security. ment’s identity, and sometimes create organizations,
Nonstate actors (e.g., armed groups, tribes, war- networks, and infrastructure for fundraising, commu-
lords, political movements, and charismatic leaders) nication, and mobilization for their causes.
have legitimacy because they have, or are believed to
have, a just cause or a moral or legal right to act. Non- Rule of Law. While there are many definitions of the
state actors win legitimacy through tangible actions rule of law most contain the following elements: Ev-
taken in furtherance of a cause or through a vision of ery citizen has an opportunity to participate in mak-
the future that is perceived as being more just. Non- ing, overseeing, and modifying the laws and the legal
state actors may also exploit their legitimacy to un- system; the laws apply to everyone, including the rul-
dermine states, to influence or control populations on ers; and laws protect each individual as well as society
a regional or global scale, or to justify a global struggle. as a whole. As much as any factor, the rule of law sepa-
[In the U.S. Army Stability Operations Manual (FM rates societies where citizens feel secure and are free
3-07), October 2008, the United States defines the to develop their individual potential from those where
highest stage of legitimacy in terms of the state. A people live in fear of the state’s arbitrary actions or of
state’s legitimacy is based on a legal framework found- criminals enabled or emboldened by corruption and
ed on the rule of law and the consent of the governed. public apathy. It is the glue that holds together the
Legitimacy “reflects, or is a measure of, the percep- structural elements of democracy—elections and the
tions of several groups: the local populace, individuals institutions of the state.
serving within the civil institutions of the host nation,
The U.S. interagency (U.S. Agency for Internation-
neighboring states, the international community, and
al Development, U.S. Department of Defense, and
the American public.” Using this standard of legiti-
U.S. Department of State) definition reads: “Rule
macy, the Army defines the conditions under which
of Law is a principle under which all persons, in-
it considers U.S. intervention in a host nation as legiti-
stitutions, and entities, public and private, includ-
mate. The first condition is that the U.S. must have the
ing the state itself, are accountable to laws that are
full consent of the “host nation,” “external actors with
publicly promulgated, equally enforced, and inde-
a vested interest in the intervention,” and the inter-
pendently adjudicated, and which are consistent
national community. The manual also acknowledges
with international human rights law. The desired
an important exception to the requirement for con-
outcome of SSR programs is an effective and legiti-
sent. U.S. intervention is legitimate when it aims to
mate security sector that is firmly rooted within
depose a regime that significantly threatens national
the rule of law.” Supplemental Reference: Foreign
or international security or willfully creates condi-
Assistance Standardized Program Structure and
tions that foment humanitarian crises. A second con-
Definitions, Program Area 2.1 “Rule of Law and
dition for this type of intervention is that the mandate
Human Rights,” U.S. Department of State, October
for intervention must win the broad approval of the
15, 2007.
international community and be multilateral in its
composition. Third, U.S. forces must conduct them- Strategic Culture is a state or nonstate actor’s shared
selves in accordance with national and international beliefs and modes of behavior, derived from com-
law. Fourth, particularly where intervention is likely mon experiences and narratives, which shape ends
to be protracted, expectations must be realistic, con- and means for achieving national security objectives.
sistent, and achievable in terms of U.S. goals, time, and These beliefs and modes of behavior give strategic
resources. Without the sustained will of the people— culture its core characteristics and constitute the
of the host nation, the international community, and framework through which capabilities are organized
the American people—the legitimacy of any mission and employed. Strategic culture can resist changing
will gradually decrease.] even as the security environment undergoes systemic
36 | R . Godson a n d R . S hu lt z