• United States
    Guest Post: Setting the Boundaries in the South China Sea
    Bogdan Belei is an intern in the Center for Preventive Action at the Council on Foreign Relations. Tensions between China and Vietnam over the South China Sea are rising and a miscalculation or miscommunication risks an outbreak of hostilities. Earlier this month, satellite imagery revealed that China is constructing its third airstrip in the disputed Spratly Islands, an archipelago of 750 reefs, cays, and islands claimed—in whole or in part—by China, Vietnam, the Philippines, Malaysia, Brunei, and Taiwan. This news follows a tense summer, during which China deployed oil rigs in disputed waters and naval standoffs between China and Vietnam culminated in a ship ramming. Beijing’s construction establishes a permanent Chinese base in disputed waters, with airstrips that could be used to launch military missions against regional rivals. China has so far only used them to conduct surveillance missions, but this alone has increased tensions and resulted in political disagreements with the United States. As the intensity and frequency of disputes over territory in the South China Sea increase, the situation has the potential to escalate into militarized conflict. In a new Center for Preventive Action (CPA) Contingency Planning Memorandum, “A China-Vietnam Military Clash,” Joshua Kurlantzick, senior fellow for Southeast Asia at the Council on Foreign Relations, explores the conditions that could escalate tensions between China and Vietnam, and identifies recommendations for how the United States and involved parties could prevent or mitigate such a crisis. For much of recent history, Vietnam has dominated mainland Southeast Asia while China has taken a less assertive approach. More recently, their roles have seemingly reversed. Economic growth has allowed China to develop its military capabilities, and subsequently expand its influence and maritime presence. Kurlantzick says that as the South China Sea has grown in perceived economic value, China has reemerged as a contender for land reclamation and disputed territory, claiming 90 percent of the sea as an exclusive economic zone. In order to exert dominance, China and Vietnam have both increased the quantity of naval vessels and military exercises with their strategic regional partners. The conflict has resulted in exchanges of fire across the China-Vietnam land border and sparked protests from diplomatic officials and nationalists. On both land and sea, the potential for conflict escalation and miscalculation presents risks not only for the region, but also for the United States. Over $5 trillion in trade passes through the South China Sea annually and the disruption of shipping in a region with few alternative routes would have negative consequences for the international economy. Additionally, conflict could disrupt the fragile relationship between China and a host of smaller states in East Asia. Paranoia and strategic ambitions may lead to an expanded regional arms race, further heightening the potential for military crisis. If U.S. regional allies that claim territory in the Spratly Islands, such as the Philippines, are drawn into the conflict, the United States would be required to uphold its mutual defense commitments. In an effort to subdue tensions and prevent militarization of the conflict the South China Sea, Kurlantzick proposes several preventive U.S. policy recommendations: • Strengthen the Association of Southeast Asian Nations (ASEAN) to foster multilateral trust-building and mediation capabilities • Make establishing a South China Sea code of conduct a priority of U.S. diplomacy • Clarify U.S. defense commitments in the case of an unprovoked attack against the Philippines in the South China Sea • Bolster the defense capabilities of Vietnam and other Southeast Asian partners to deter increasingly assertive Chinese activities • Minimize U.S. involvement in any China-Vietnam land border conflict by limiting future U.S.-Vietnam joint exercises to naval exercises and air exercises in the South China Sea For a more in-depth analysis of the fragile relationship and what conflict escalation could mean for the United States, read Joshua Kurlantzick’s report, “A China-Vietnam Military Clash.”
  • International Organizations
    Guest Post: Closing the Rhetoric-Reality Gap on R2P
    Bruce W. Jentleson is a professor at Duke University’s Sanford School of Public Policy and the 2015-16 Kissinger chair at the Kluge Center in the Library of Congress. Jenna Karp is a Duke University senior studying public policy and global health and an intern in the State Department Foreign Service Internship Program. As the UN General Assembly (UNGA) opens its seventieth session, you’ll hear “never again” rhetoric regarding genocide and other mass atrocities, while witnessing the “yet again” reality. The UNGA passed a resolution two weeks ago establishing an International Day of Commemoration and Dignity for past victims of genocide. One week before, it had held a dialogue marking the tenth anniversary of the adoption of the Responsibility to Protect (R2P). Unfortunately, while R2P was reaffirmed as “a vital and enduring commitment,” the gap between rhetoric and reality is all too evident in Syria, South Sudan, Myanmar, Sri Lanka, and the Democratic Republic of the Congo, among other countries. Closing the gap between rhetoric and reality is going to take a three-part strategy involving military intervention (when necessary), crisis diplomacy (when possible), and early prevention (steadily, systematically). Military intervention will continue to be necessary in certain situations. This was the only means by which to stop Libyan dictator Muammar al-Qaddafi in 2011 from delivering on his threat to slaughter civilians. Although the immediate objective was achieved in the Libya case, the post-intervention dilemma—what R2P cofounder Gareth Evans calls the “responsibility to rebuild”—has been an abject failure. Libya thus shows both what late-stage military intervention can and cannot achieve. Crisis diplomacy, also largely a late-innings effort, is a second strategy for prevention. In Kenya’s 2013 elections, coordinated diplomacy by the United States, Europe, and the UN helped to prevent replays of the mass violence witnessed in the 2008 elections. More frequent, though, have been cases like Burundi, South Sudan, and Guinea, in which crisis diplomacy has been too little too late—arriving only after atrocities are unfolding, subsequently having limited impact. The final component to closing the gap is early prevention: acting when the number of options are greater, risks are smaller, and potential costs are lower. This basic logic underlies the original conceptualization of R2P put forth by the International Commission on Intervention and State Sovereignty. Even though such logic runs counter to the political reality of postponing action until the bodies begin to pile up, more progress is being made by individual states, international institutions, regional bodies, and even non-governmental organizations (NGOs) to build capacities for R2P early prevention than is often acknowledged. In 2012, the Obama administration established the Atrocities Prevention Board (APB), based in the White House, which is charged with coordinating the State Department, Department of Defense, U.S. Agency for International Development, and other federal agencies to ensure the steady attention needed for policy development and pre-establishing a mechanism for crises and other urgent situations. While short on resources and prey to bureaucratic turf battles, the APB has made a positive impact on U.S. preventive policies. Within the UN system, spurred particularly by the 2009 mass killings in Sri Lanka, Secretary-General Ban Ki-moon launched the Human Rights Up Front initiative in 2013, seeking to make human rights and atrocities prevention more of a “system-wide core responsibility…to act with moral courage to prevent serious and large-scale violations.” Here, too, the results have been limited thus far, but provide the basis upon which further progress can be built. Regional institutions have also made their mark. The European Union (EU) has a number of initiatives including the EU Situation Room, which monitors the global political climate and assesses current crisis awareness. Individual EU member states like Denmark have developed their own R2P-related national action plans. The African Union’s (AU) Peace and Security Council provides a regional decision-making mechanism linked to the Continental Early Warning System, a data collection and analysis center tasked with monitoring potential conflicts and threats to peace and security. Its “Panel of the Wise” draws on a group of distinguished African leaders who focus on conflict prevention. In West Africa, the Economic Community of West African States (ECOWAS) Conflict Prevention Framework and the Early Warning and Response Network (EWARN) came into play in Guinea in 2008, Niger in 2010, and Mali and Cote d’Ivoire in more recent years. Countries have also taken initiative independently. Ghana has its own National Peace Council, and Kenya, Tanzania, Rwanda, and Zambia all have their own national committees. In Asia, there has been less region-wide initiative, although the Association of Southeast Asian Nations (ASEAN) convened a high-level advisory panel in 2014 that issued recommendations for “mainstreaming” R2P in Southeast Asia. Australia has been especially active, regionally and internationally, by adapting its civilian corps from a solely natural disasters mission to a conflict prevention one, for example. For its part, China has been showing more flexibility than is often acknowledged by Western states, with an increasingly conditional rather than absolutist approach to intervention and state sovereignty. Latin America has a Network for Genocide and Mass Atrocity Prevention, which includes Argentina, Bolivia, Brazil, and fourteen other countries. Brazil has also formulated its own variation of R2P, “Responsibility while Protecting” (RwP). While initially somewhat of a dilution of R2P, it has evolved into a serious component of the policy mix. The NGO community has played a useful and creative role. The Focal Points Initiative led by the Global Centre for R2P now has fifty-one country members with broad, geographic representation. Each is developing internal capacity for promoting R2P at the national level and collectively serving as a like-minded network. The Obama administration must use its remaining time in office to assure the continuity and effectiveness of the APB—Washington is full of doubts about its future—as well as of the State Department Bureau of Conflict and Stabilization Operations (CSO) and other executive branch counterparts. At the UN, as Ban Ki-moon finishes his final term, strengthening the Human Rights Up Front Initiative provides a sorely needed opportunity to leave more of a legacy. Regional bodies also have much work to do, including the EU, both directly and in its assistance to Africa and other regions, the AU and the other African initiatives, ASEAN, and Latin American initiatives. And as is so often the case in twenty-first century global affairs, NGOs have their own crucial role to play, as has been the case with the Global Centre’s Focal Points Initiative. To be sure, such early prevention measures will not resolve the Syria of 2015; that requires targeted, more immediate initiatives. But they can help prevent the next Syria. If there is one thing that the world can be sure of, it is that there will be more Syrias unless greater R2P early prevention capacity is built full-spectrum. The world may not achieve “never again,” but it is certainly possible and necessary to have fewer “yet agains”—and to narrow, even if not fully close, the rhetoric-reality gap.
  • International Organizations
    President Obama Tackles UN Peacekeeping
    Few global summits can compete with the opening of the United Nations General Assembly (UNGA). All the world’s a stage, but the spotlight shines brightest each September in Manhattan, as global leaders gather for UN’s “back to school” night. But while most attention will focus on speeches from the green marble podium, the real action will occur offstage. This year’s most important side event is a special Monday afternoon session on UN peacekeeping, convened by President Barack Obama himself and involving leaders of fifty countries. Its outcome will help determine whether the United Nations gets serious about updating the most important weapon in its arsenal to the realities of the twenty-first century. Surprisingly, “peacekeeping” wasn’t even mentioned in the UN Charter of 1945. The concept was invented to describe so-called “Chapter 6 ½” operations falling between pacific settlement of disputes (under Chapter 6) and coercive enforcement action (under Chapter 7). By now, peacekeeping is the UN’s bread and butter. The UN Department of Peacekeeping Operations (UNDPKO) commands the world’s largest globally deployed military force—more than 105,000 “blue helmets” and another 15,000 police and civilians, scattered across sixteen operations. These complex and multidimensional missions bear scant resemblance to the UN’s early peacekeeping forays, which tended to involve the insertion of lightly armed observers between parties who had already laid down their weapons. Today’s peacekeepers often find themselves drawn into combat with, and outgunned by, heavily armed groups, even as they try to protect civilian populations from slaughter. Unfortunately, UN peacekeeping is in deep crisis. The heavy demand for missions is outstripping the UN’s capacity to mobilize adequate funding, troops, equipment, and logistical support. Individual operations are repeatedly undermined by unrealistic UN Security Council mandates, unclear rules of engagement, weak mission leadership, and unprofessional—even criminal—conduct by UN troops themselves. The shortcomings have been on display in flailing UN operations from South Sudan to Mali to the Central African Republic. The president’s message on Monday afternoon will be clear: these gaps can and must be closed. Strengthening UN peacekeeping is no humanitarian act of charity, no mere expression of global “social work.” It is of fundamental importance to U.S. and international security. This is particularly true when it comes to the “arc of instability” that now spans west and central Africa, the Sahel, the Horn, the Middle East, and southwest Asia. Across this broad expanse, states are failing, humans are suffering, conflict is erupting, and extremists are plotting, generating regional instability, aiding criminals and terrorists, and even facilitating diseases like Ebola. And increasingly, peacekeeping is the instrument of choice for addressing these threats. President Obama’s commitment to UN peacekeeping runs deep. Six years ago at his first UN peacekeeping summit, he convened a meeting of major troop contributing countries (TCCs) like Rwanda and Bangladesh, the unsung heroes who place their own soldiers on the line in peacekeeping missions. Last year he asked Vice President Biden to convene a similar meeting. This year, the president has asked each of his fifty counterparts to show up with specific national pledges to improve UN peacekeeping, including offers to contribute more soldiers, increase funding levels, provide airlift and other logistics, or help train peacekeepers. As an initial down payment, Secretary of State Kerry and his Indian counterpart on September 22 announced a joint initiative to train troops in six African nations, as part of the African Peacekeeping Rapid Response Partnership launched at last year’s U.S.-Africa Leaders Summit.  On Monday, the president plans to announce a far more comprehensive package of U.S. commitments. Still, the president will stress that the shared threats cry out for burden-sharing among UN member states. The summit’s success will depend not just on the individual contributions countries bring to the table, but on their collective commitment to structural reforms. To equip peacekeepers with the tools and training required to fulfill their mandates, the peacekeeping summit should begin by implementing the needed reforms identified by the High-level Independent Panel on Peace Operations (HIPPO), which delivered its report to UN Secretary-General Ban Ki-Moon in June. Top reform priorities include: persuading more nations to become troop contributing countries; increasing the number of troops that current TCCs provide; improving pre-deployment training of national contingents; ensuring that UN Security Council mandates are clear and realistic, particularly when it comes to protecting civilians; specifying rules of engagement that are aligned with the conflict situation; providing peacekeepers with high-end military capabilities to defend themselves and thwart “spoilers”; adapting peacekeeping doctrine to counterinsurgency and counterterrorist threats; and holding TCCs accountable both for their performance in the field and any misconduct—particularly when it comes to crimes of sexual violence. The beauty of UN peacekeeping, if properly managed and resourced, is that it can deliver the stability that the world wants without having any one country (including the United States) bear all the costs and risks. But peacekeeping will only succeed if UN member states redouble their commitment to give the United Nations the tools it needs to do the job in a professional and accountable manner.
  • Ukraine
    Rebuilding Economic and Political Stability in Ukraine
    Overview Ukraine faces two severe and immediate challenges: armed pro-Russian separatists in the eastern part of the country and a sharp, nationwide economic deterioration stemming in no small part from that military threat. Ukraine’s economy has contracted violently over the past year, and it is still burdened by a legacy of corruption and inefficiency that strains its fiscal balances, limits growth, and undermines fragile political unity. Reinforcing and sustaining the economic reform process currently underway is a crucial step toward consolidating the political gains that Ukraine has made since the Maidan uprising in late 2013, and presents a nonmilitary route for the United States and other countries to push back against Russia. In that context, the Maurice R. Greenberg Center for Geoeconomic Studies at the Council on Foreign Relations (CFR) convened an international group of roughly thirty experts, including government officials, market participants and other practitioners in international finance, political economy, and Eurasian security for a half-day workshop in Washington, DC, in late June. This report summarizes the highlights of the discussion and the views of the workshop participants. Participants sought to understand Ukraine’s economic challenges, explored obstacles impeding economic reform, and identified possible ways for outside actors to support Ukrainian policymakers more effectively during a vital period in the months ahead. The United States has a profound interest in supporting the emergence of a new, reform-minded government in Ukraine—not just for the sake of the Ukrainian people, but for the sake of the broader American-led international system and for perceptions of the United States’ ability to lead it. In the years ahead, U.S. leadership, not just in Europe, is likely to be tested in terms of its ability to enforce international norms in the face of abuses and coercion comparable to what is currently unfolding in Ukraine. Participants argued that by helping Ukraine’s leaders catalyze Ukrainian economic recovery, the United States could help mount a robust defense of the existing order against revisionist threats—an effort that would pay geopolitical dividends across broad geographical regions. This report, which you can download here, summarizes the discussion’s highlights. The report reflects the views of workshop participants alone; CFR takes no position on policy issues. Framing Questions for the Workshop Defining the Problem What are economic prospects for Ukraine? What are the critical decision points in the next twelve months? What are different security scenarios or variables that may alter this economic outlook? Identifying "Success" in Ukraine and Obstacles to Progress What are the identifiers of ‘success’ twelve months hence? Twenty four months hence? What are the conditions necessary to return Ukraine to the markets? What interests are at odds (U.S., EU, Ukraine, and International Financial Institutions)?  Are there significant gaps in the landscape of international institutions that need to be filled? How successful have our efforts been to date? What has worked well? Less well? Outlining Paths to Improvement Are there lessons from experience on how to navigate various tensions? Are there new approaches worth trying? What would these approaches require of all sides? What are appropriate next steps? Charts From This Report
  • Conflict Prevention
    The Realities of Using Force to Protect Civilians in Syria
    Yesterday, the New York Times published an infographic, “Death in Syria,” that presents the more than 200,000 combatants and noncombatants who have been killed in the four-and-a-half-year Syrian civil war. The Times’ website relies upon estimates “provided by the Violations Documentation Center [VDC] and are as of Sept. 9, 2015.” This non-governmental organization (NGO) claims to use a three-stage process for gathering and documenting information from within Syria, and verifying its accuracy to the best extent possible. The VDC notes that it strives for “conveying the truth as it is on the condition that those data and information are being regularly reviewed, checked and revised.” These fatality estimates used by the Times should therefore be viewed with an understanding of the inherent difficulties of reporting from within Syria, and the conscious or unconscious biases often found within NGOs. The VDC categorization and numbers conflict significantly with those published by the Syrian Observatory for Human Rights (SOHR), a human rights NGO based in London—as you can see from the SOHR chart at the very bottom of this post. Even the UN Office of the High Commissioner for Human Rights decided to stop providing public estimates of casualties in January 2014, because it could no longer guarantee that the source material for its estimates was accurate. Nevertheless, the Times’ presentation of the VDC data is illuminating for policy discussions about whether and how to intervene militarily in Syria. Consistent with earlier analyses, most people who have tragically lost their lives in Syria are not civilians, but rather active combatants. This is worth bearing in mind when U.S. Senators repeat the inaccurate statement that Syrian President Bashar al-Assad has “massacred” 200,000 of his own people. The Syrian security forces under Assad’s authority have perpetrated an untold number of war crimes and crimes against humanity, and as the head of state he must be held accountable by a post-conflict special tribunal for Syria. However, those advocating the use of force to protect civilians should recognize that there first must be an end to the fighting between the combatants, within which civilians have suffered and died tremendously. More specifically, as I wrote almost two years ago, any proposal for using force to protect civilians in Syria must take into account how noncombatants are actually being killed and injured. Note that of the 85,404 civilians estimated to have been killed (by both regime and rebel forces) by the VDC, just 22 percent were killed by Syrian government air attacks. (This includes over one hundred civilians killed by air-launched missiles while shopping in a Douma marketplace on August 16.) Those who propose a no-fly-zone (NFZ) or “cratering” Syrian Air Force runways should recognize that these tactical responses will do nothing to save the lives of most Syrian civilians. Moreover, as was the case with other NFZs throughout history, the Assad regime will simply reprioritize its offensive operations from air power to infantry and artillery attacks, which combined are already killing most Syrian civilians. Of course, the United States and a coalition of outside states could intervene in Syria to protect civilians from such infantry and artillery attacks, as well as the many disappearances by the regime and rebel forces. I have written about what these time-tested military countermeasures consist of: counter-sniper tactics, counter-battery radars and fire, and infantry “movement to contact” operations to clear out Syrian and pro-government militia ground forces that threaten civilian populations. Yet, these operations require a level of cost, commitment, risk, and uncertainty that intervention proponents are apparently unwilling to accept, including a significant number of the unthinkable—“boots on the ground.” So when policymakers and pundits advocate intervening in the Syrian civil war to save civilians, consider whether their proposals would actually achieve this intended objective. Sources: Violations Documentation Center, September 14, 2015; Syrian Observatory for Human Rights, August 5, 2015.
  • United States
    Guest Post: Preventing the Third Intifada
    Patrick Romano is an intern in the Center for Preventive Action at the Council on Foreign Relations. If tensions escalate further, the West Bank could erupt in a violent uprising—sometimes referred to as the third intifada—for the first time since 2005. The death of a Palestinian toddler in an arson attack by Jewish extremists on July 31 was the latest example of an increasingly violent situation. Recent flare-ups between Israeli police and Palestinians over the al-Aqsa mosque, sometimes deadly arrest raids by Israeli forces on West Bank homes, and continued discord over Israeli settlements all underscore growing Palestinian frustration with the perceived status quo: lack of political independence, a depressed economy, encroaching Israeli settlements, and an increasingly divided Palestinian Authority (PA). In a new Center for Preventive Action (CPA) Contingency Planning Memorandum, “A Violent Uprising in the West Bank,” Steven Simon, a visiting lecturer at Dartmouth College and former senior director for Middle Eastern and North African affairs at the White House, explores the conditions that could lead to the third intifada and lays out U.S. policy recommendations for preventing or mitigating such a crisis. While the second intifada ended over a decade ago, Simon asserts that recent developments have increased the risk of a third intifada. Progress toward political independence has stalled, resulting in mounted frustrations among Palestinians. This has amplified attacks—such as the June 2014 kidnapping and murder of three Israeli teenagers, which was summarily followed by the retaliatory slaying of a Palestinian youth by Israeli extremists. The expansion of Israeli settlements in the West Bank and their encroachment on holy areas like the Temple Mount/Haram al-Sharif have further increased tensions. Additionally, Hamas’ rising popularity in the West Bank, along with the PA’s more frequent internal disputes, could lead Hamas to attempt to challenge the PA or the Israeli state itself through military force, Simon warns. Finally, there is a growing trend of jihadist groups, such as the self-proclaimed Islamic State and al-Qaeda affiliates, trying to radicalize Muslims in the West Bank by urging them to act against Israel. This threat of jihadist penetration and other tension-inducing developments have created a combustible situation in the West Bank. To prevent these conditions from leading to an outbreak of sustained violence, Simon proposes the following preventive recommendations for the United States: • Renew hope in and progress toward a two-state solution by making official, public statements that signal the U.S. belief in the necessity of returning to peace negotiations • Persuade the Palestinian Authority and Israel to desist from potentially provocative actions • Support Palestinians with economic, political, and security assistance • Help counter external provocations by increasing U.S. support to Israeli and Palestinian intelligence on jihadist threats But why should the United States care or act? A third intifada would impact U.S. interests in numerous ways. Another violent uprising would make it more difficult for Washington to broker a two-state solution—a longstanding core U.S. foreign policy objective. Renewed strife would also place more stress on the troubled U.S.-Israel relationship, making it even harder for the two countries to cooperate on issues such as the regional rise of Iran or the fight against the Islamic State. More broadly, European governments, whose populations are increasingly anti-Israeli, would likely respond sympathetically toward the Palestinians in the event of a third intifada, further fracturing trilateral relations between the United States, Israel, and Europe. Worse yet, if an uprising breaks out in coming weeks, insecurity in Israel could undermine congressional support for the recent P5+1 agreement with Iran over its nuclear program, which the U.S. Congress will vote on in September. For more in-depth analysis on why the West Bank may be heading toward a third intifada and what the United States can do to prevent that crisis or mitigate its consequences, read Steven Simon’s Contingency Planning Memorandum, “A Violent Uprising in the West Bank.”
  • International Organizations
    The Good, the Bad, and the Sad of the High-Level Report on UN Peace Operations
    The following is a guest post by Charles T. Call, associate professor in American University’s School of International Service and author of Why Peace Fails: The Causes and Prevention of Civil War Recurrence (Georgetown University Press, 2012). Last month, an independent panel of experts released a much-anticipated review of United Nations peace operations—and not a moment too soon. The panel was the first to examine the future of UN peacekeeping since the landmark Report of the Panel on United Nations Peace Operations, commonly known as the Brahimi Report, published in 2000. Appointed by Secretary-General Ban Ki-moon in October 2014 amidst questions about the effectiveness of UN peacekeeping operations, the panel was charged with evaluating the current state of peace operations and their future needs. UN peacekeepers routinely confront new security challenges even as peacekeeping operations have grown to over one hundred thousand troops at a cost of $8.2 billion per year. The report combines sound analysis of the current problems of peacekeeping with a comprehensive package of specific recommendations concerning conflict prevention, protecting civilians, and more effective use of UN troops in the face of diverse security challenges. In contrast to most prior UN reports, however, the panelists acknowledge that the main problems of peace operations lie with the political and budgetary jockeying of member states. The report criticizes stingy Western countries that focus on overly militarized solutions, repressive governments that endanger UN troops, and irresponsible troop-contributing countries that turn a blind eye to abuses. Below is a tour d’horizon of the good, the bad, and the sad of the report. The Good Adapting to New Strategic Contexts In recent decades, the conditions in which peacekeepers operate have undergone dramatic changes. The report makes apt distinctions between traditional ceasefire missions, post-Cold War peace implementation missions, and post-9/11 “conflict management” missions. All three types confront unique challenges, but the latter are especially difficult: oftentimes, peacekeepers are deployed to places where there is no peace to keep, are threatened by terrorists, or are given unclear mandates in the absence of a political process. Increasingly, the UN is pressed to assume a counterinsurgent or counterterrorist role alongside Western forces, contradicting the principle of neutrality. The report strikes a balance between cautioning against peacekeepers becoming combatants, while supporting offensive actions so long as a political process is being pursued. Investing in civilian state-building in the absence of a viable political process is indeed wasteful. The report suggests new combat capabilities, but doesn’t offer a full vision for effective involvement in thorny Middle East situations—one of the reasons the panel was formed in the first place. Stating that UN peacekeeping missions are “not suited to engage in military counterterror operations,” the report seeks to preserve the legitimacy of the UN and its security, but in doing so, glosses over the political realities that future missions are likely to confront. The report’s emphasis on conflict prevention is refreshing and overdue. The panelists write that the “avoidance of war rather than its resolution should be at the centre of national, regional and international effort and investment.” They call for marshaling all of the UN’s tools—going beyond reactive peacekeeping missions toward strengthening diplomatic and preventive political missions, elections support, human rights work, peacemaking and mediation support, and postwar peacebuilding efforts. Tough words The report has tough words for multiple constituencies, from the Secretariat and the Security Council to troop-contributing member states that fail to hold their troops accountable for sexual exploitation and abuse. The panelists highlight the shortcomings of “headquarters-focused policies, administrative procedures and practices” that are often unresponsive to the quick-changing needs of field offices. The panel also takes the P5 to task for mandating peace operations as a substitute for addressing underlying causes of mass violence where entrenched parties have links to one or another member of the P5. The report also includes a welcome call for greater accountability all around. The panelists highlight the outrageous lack of accountability for sexual exploitation and abuse by UN personnel, UN member states that obfuscate and drag their feet, and a Secretariat that takes sixteen months on average to investigate complaints. Moreover, they call on the Secretariat to bar troop-contributing member states that do nothing to hold their peacekeepers accountable for sexual exploitation, rape, and other abuses. Flexible Funding The review recognizes that peacekeeping does require some money to actually do programs on the ground. The panel thus calls for permitting some resources from the assessed budget be used to support mission mandates that the Security Council has already deemed important. Peacekeeping desperately needs this flexibility. The report also makes a welcome call for UN missions to buy goods from national markets and producers to strengthen, rather than undermine, local economies. The Bad Too Military-Centric The Security Council and most troop-contributing countries have focused on the military component of peacekeeping as the main instrument of influence, rather than as the security umbrella under which national actors—with external civilian expert support—can safely do the work of forging sustainable peace in their country. This problem plagues the U.S. approach to peacebuilding and stabilization more broadly. The report could have emphasized the need for greater civilian focus and civilian expertise in supporting political settlements in conflict-affected states. Unfortunately, despite calls for enhanced unarmed actions to protect civilians and a more preventive approach, the report does not shift away from this military-centric model. People-Centered? The report may include “people” in its title, but it doesn’t adequately place local populations at the center of its vision for peace operations. Instead, the report focuses predominantly on fixing the internal UN machinery. The report acknowledges how hard it is for quick-moving peace operations to engage in participatory methods in the field, but the UN must go further and institutionalize methods to involve local populations. Though it should go without saying, successful approaches to include local populations require women’s inclusion. The report’s recommendations advocate the role of women and gender, although mainly in the context of UN structures and staffing. It could have gone beyond the UN bureaucracy itself to consider how the UN engages with, supports, and empowers local women in decisions and processes and incorporates gender into its programs. Deeper Changes to Leadership and UN Agencies On leadership, there are sound calls (with lengthy precedent elsewhere) for merit-based selection, more orientation up front, and greater empowerment of field leadership. But the underlying problem of incentives is not directly addressed. The selection, performance reviews, and promotion of UN peacekeeping and development officials should involve greater emphasis on peace and security issues. The Sad The above criticisms notwithstanding, the report should be lauded for grappling with the complex challenges facing peace operations in a thoughtful and honest fashion. The panelists don’t shy from recognizing the “root causes” of the issues at hand, and governments from Washington to Khartoum to New Delhi are bound to find something to dislike. Most experts will concur with the panel’s exhortation for more of just about everything—more recognition that peacekeeping and peacebuilding require political solutions rather than military ones; more effort to improve coordination, anticipate crises, act preventively, protect civilians, and work with regional organizations; and more attention to the voices of local populations, particularly those of women. At the same time, the panel recognizes member states’ persistent shortsightedness in failing to dedicate the time and resources necessary to prevent armed conflicts and to adequately respond to them when they do break out. The report skims over this contradiction. The sad fact is that without some force majeure, member states are unlikely to adopt most of the panel’s recommendations—just as they did with the Brahimi Report fifteen years ago. Many real dilemmas are unlikely to be resolved. For instance, how can the Secretariat bar unaccountable member states from contributing troops when the UN is in desperate need of more personnel? How can the UN devote more resources to conflict prevention when doing so could anger the host government in question? The panel’s new report has plenty to commend. It could go further in addressing the underlying challenges of building sustainable peace and placing people front and center. But it remains a good starting point—if UN member states adopt even half of its recommendations.
  • Israeli-Palestinian Conflict
    A Violent Uprising in the West Bank
    Introduction There is growing risk of a violent uprising in the West Bank that could be costly to Israelis and Palestinians and harmful to U.S. interests. Violence could be ignited in various ways and escalate rapidly, further shrinking the space for a two-state solution and complicating U.S. efforts on other regional challenges. It would also necessitate humanitarian and reconstruction assistance from already burdened allies. Moreover, a West Bank crisis could elicit punitive responses from Europe, possibly driving a wedge between the United States and its European allies, and enable unhelpful regional states, particularly Qatar and Turkey, to meddle. An uprising would also stress an already troubled U.S.-Israeli relationship and possibly increase congressional opposition to any nuclear deal with Tehran. Thus, despite the seemingly isolated nature of an outbreak of violence confined to the West Bank, the United States should, especially in the wider frame of increasingly violent regional politics, take measures in the next eighteen months to reduce the probability of West Bank violence and minimize—to the extent possible—its consequences should such conflict prove unavoidable. The Contingency While Gaza under Hamas has experienced repeated wars with Israel since 2008, the West Bank has been relatively quiescent since the end of the second intifada in 2005. Yet the risk of a violent uprising in the West Bank has increased recently because of the following developments: Accumulating Palestinian frustration with the status quo and the receding prospects for political independence. Many Palestinians are disenchanted with the prospects for independence, with some turning to violence in frustration. Several dramatic "motivated lone wolf" attacks have occurred in Jerusalem, most notably the June 2014 kidnapping and murder of three Israeli teenagers, which precipitated the beating and immolation of an Arab youth by Israeli extremists shortly afterward. Incidents of stone throwing and Molotov cocktails, which stood at two hundred per month before the 2014 Gaza war, surged to five thousand per month later in 2014, while over one thousand Palestinians have been detained in Jerusalem since 2014—quadruple the number detained between 2000 and 2008. Increasing Israeli encroachment on Palestinian territories including into sensitive areas like the Temple Mount/Haram al-Sharif. Tensions surrounding the Temple Mount/Haram al-Sharif persist. Although many Jews regard the Temple Mount as holy, most have acquiesced to long-standing restrictions on Jewish worship atop the platform near the two mosques situated there. Some devout activists, however, recently challenged these constraints, sparking confrontations. The expansion of West Bank settlements, in combination with other irritants, could also spur renewed violence. A deteriorating Palestinian economy that reduces job opportunities and incomes resulting from the imposition of additional punitive measures. Israeli actions to cut off funds for the Palestinian Authority (PA), especially import duties that Israel collects on behalf of the PA under a provision of the Oslo Accords, could worsen the plight of many Palestinians. Growing friction within the PA and between the PA and Hamas. Factional fighting within the PA could spill over into clashes with the Israel Defense Forces (IDF). Hamas's rising stature within the West Bank—notwithstanding its decreasing popularity in Gaza—could embolden it to confront the PA or Israel itself. Israel arrested more than ninety Hamas operatives across the West Bank in May and June 2014, disrupting a plot to bomb the Temple Mount/Haram al-Sharif and incite a third intifada. Increasing involvement by the self-proclaimed Islamic State group and/or al-Qaeda. Al-Qaeda has attempted to infiltrate Israel, and the Islamic State has proximity, access, and a reservoir of willing volunteers. Israel would likely perceive any jihadist attack penetrating Israel's dense perimeter as having been facilitated by Palestinian sympathizers in the West Bank, which could precipitate an IDF operation in the West Bank. In January 2014, Israel disclosed that it had disrupted a jihadist conspiracy in Hebron run by senior al-Qaeda leaders. These developments are creating a combustible situation. A wide range of potential events could trigger an uprising in the West Bank. On the Palestinian side, the PA could successfully petition the International Criminal Court to investigate and indict Israelis for war crimes. This action would almost certainly precipitate an Israeli reaction, probably in the form of economic sanctions, or new or expanded settlement construction that closes off Jerusalem from the West Bank. Following the September 2012 UN General Assembly vote on observer status for Palestine, Israel ended a long-standing moratorium on settlement construction in the so-called E-1 corridor, the remaining contiguous zone linking the West Bank and Arab Jerusalem. On the Israeli side, renewed attempts to appropriate the Temple Mount/Haram al-Sharif for regular worship services, or perceived attempts to encroach on the village of Silwan, a predominantly Palestinian village in East Jerusalem, could result in violence. By 2014, the so-called silent intifada had impelled Israeli authorities to augment the current force in Jerusalem with one thousand special operations personnel, four additional border guard units, and a volunteer force of armed civilians. The Israelis have also substantially increased foot and vehicle patrols, checkpoints, and barricading of police stations; reinstated a policy of destroying the homes of Palestinian offenders; and instituted longer sentences for crimes such as stone throwing. The situation in the West Bank is not identical and should be distinguished from circumstances in Jerusalem. The latter is more sensitive to both sides. Fighting, should it erupt, will play out differently in the two locations owing to the differences in the proximity of the populations and the types of forces that would be utilized by both sides. A third round of fighting could grind on for months, entailing considerable violence and large-scale destruction. During the second intifada from 2000 to 2005, when Palestinian security forces clashed with the IDF, Israeli forces destroyed the PA's physical law enforcement and security infrastructure. As in subsequent clashes with Hamas in 2008, 2009, 2012, and 2014, the IDF deployed a combined-arms approach, using air power, armor, and infantry to subdue Palestinian combatants. The Palestinian side in the West Bank is now more heavily armed and better trained, factors that could drive violence to even higher levels. Warning Indicators Rising Palestinian frustration with the status quo and apparently receding prospects for political independence. This would be signaled by more frequent and provocative statements by Fatah; lingering protests and demonstrations; social media agitation that goes viral; sermons or other forms of incitement; a decline in Palestinian security cooperation with Israel; and increases in lone-wolf attacks, kidnappings, or similar crimes. Increasing Israeli encroachment in the West Bank. Indicators would include an increase in construction permits; Israeli public commitments to settlement expansion or construction in sensitive areas like the Temple Mount/Haram al-Sharif, Silwan, or the E-1 corridor; public endorsements by Israeli politicians or opinion leaders of altered arrangements for broader Jewish access to the Temple Mount; new closures; added checkpoints; raids into West Bank Area A; house demolitions; and settler-related violence. Violent provocations by either side that resonate emotionally would also serve as indicators. Downturn in the Palestinian economy. The major indicator would be a prolonged period during which the PA could not pay salaries, due either to steeply declining foreign donor contributions or Israeli withholding of tax revenues, alone or in combination with extended closures or roadblocks. Growing friction within the PA and with Hamas. This would include open dissent, assassinations, delegitimation of President Mahmoud Abbas by influential opposition leaders on social media and through demonstrations, loss of support for Fatah, friction with Hamas, and spillover of factional fighting leading to confrontations with the IDF. Al-Qaeda video remarks by jihadist leaders urging individual Muslims to act against Israel or an "apostate" PA. Jihadist penetration of the West Bank, whether though their prodigious social media or the insertion or recruitment of operatives, would constitute a potential precursor of renewed violence. The Islamic State could radicalize elements within Hamas and the Palestinian Authority—as it has inspired admirers in other countries—as a prelude to or as a result of a crisis. Implications for U.S. Interests Renewed violence in the West Bank would reduce Washington's already diminished ability to advance a two-state solution, which has long been a core U.S. foreign policy objective. The second intifada persuaded many Israelis that a two-state solution could not be effectively secured, and the subsequent diplomatic stalemate has made many Palestinians equally dismissive of a two-state solution. Renewed fighting, given the probable loss of life, destruction of physical infrastructure—much of it rebuilt after the second intifada—and the likely reimposition of comprehensive controls on movement within the West Bank would compound their doubts. Another violent uprising could also strain an already fraught U.S.-Israeli relationship and pit the United States against its European allies at a time when their cooperation on a range of other important issues is required. At this stage, relations between Washington and Jerusalem are likely to remain turbulent owing to differences over issues—Iran's regional role and nuclear ambitions and the peace process—regarded as strategic by one or both sides. The gap between increasingly anti-Israeli European public opinion and European governments' tolerance for Israeli policies is widening. Israeli actions to suppress an uprising in the West Bank would be assessed internationally as very different from Israel's periodic confrontations with Hamas in Gaza. Unlike Hamas, the PA has rejected violence; its success in the United Nations is a sign of growing legitimacy. Several European governments have recognized Palestinian statehood and others are likely to follow. In the context of a third uprising, European leaders would try to narrow the gap between their policy and European public opinion by intensifying international, multilateral, and bilateral diplomatic pressure on the United States to rein in Israel's response. Regional states, particularly Qatar and Turkey, which have long been accused of supporting Hamas, could also undermine efforts to resolve the crisis. Finally, heightened insecurity in Israel could increase congressional opposition to the P5+1 agreement on Iran's nuclear program. Preventive Options A range of policy options is available to help avert a major uprising. These options aim to address the various developments and risk factors that make an uprising more likely. Renew hope in and progress toward a two-state solution. The United States could signal that it intends to resume the search for a path forward on a two-state solution. However, conditions for another round of negotiations might well be unripe, given the Israeli government's skepticism about Palestinian interest in a deal, and Palestinian mistrust of Israeli intentions. The space to reactivate talks might simply be too narrow for a statement of intention to be credible, especially given the unsettled state of bilateral relations, in part because of this very issue. Anarchic or brittle conditions on Israel's borders, burgeoning Jihadist activity, and Iranian assertiveness have lowered Israel's risk tolerance—probably also the Palestinian Authority's—and have further reduced interest in renewed talks. Failure or lack of progress in negotiations could increase the risk of violence. Persuade the Palestinian Authority and Israel to desist from potentially provocative actions. Washington has long tried this with only varying degrees of success. Specifically, the United States could continue to insist that Palestinian leadership avoid provocative actions, especially in the United Nations or through incitement at home, while condemning acts of violence directed against Israelis. Israel could be urged to enforce preexisting rules for access to the Temple Mount/Haram al-Sharif, avoid settlement construction activities in areas that are especially sensitive such as Silwan, scale back or refrain from house demolitions, and pursue investigation and prosecution of settler provocateurs. The United States could encourage both sides to devise stabilizing themes for dissemination via social media and discourage verbal attacks through the application of existing legal sanctions. The United States could also try to broker agreement between the two sides identifying specific provocative actions they would avoid and coordinate steps they would take should tensions escalate. Support Palestinians with economic, political, and security assistance. The United States generally tries to dissuade Israel from withholding tax revenues, which, from an Israeli perspective, is one of the few nonviolent sanctions available to deter Palestinian provocations. Washington could continue to discourage financial coercion based on the risks flowing from Palestinian economic collapse. Through diplomatic efforts and the direct involvement of the U.S. Security Coordinator for Israel and the Palestinian Authority, Washington could continue to help both sides' security services maintain close cooperation while encouraging donors to step up financing, training, and equipping of Palestinian security forces and urging Israel to expedite such assistance. Help counter external provocations. To the extent it is not already doing so, the United States could increase its support to Israeli, Palestinian, and Jordanian intelligence and security services to identify and interdict jihadist threats to stability in the West Bank. Mitigating Options If renewed large-scale violence does erupt, the U.S. objective should be to achieve a cease-fire as quickly as possible to preserve lives and infrastructure, establish arrangements that reduce the potential for renewed crisis, and preserve space for a resumption of final-status negotiations. This will be difficult because of competing pressures on both the Israelis and Palestinians to escalate. The Israeli government will want to reestablish deterrence through punitive action and demonstrate to the Israeli public that it is responding to security threats. Palestinians will want to increase the cost of occupation to Israel and internationalize the conflict, bringing external pressure on the Israeli government. In addition, Israel will control the ground and therefore determine whether and how third parties can intervene. And in a West Bank uprising, Jordan would not have the leverage on the PA that Egypt enjoyed over Hamas during the 2014 Gaza conflagration to accede to a cease-fire arrangement acceptable to Israel. Alongside constraining domestic political dynamics on both sides and the momentum of large-scale military operations, these factors will make a swift cease-fire harder to achieve. As for other interested actors, Arab governments now caught up in Syria and concerned about Iranian regional aggression would likely avoid direct involvement beyond symbolic diplomatic or rhetorical condemnation of Israel. Jordan and possibly Egypt might attempt to press the Palestinian leadership to agree to a swift cease-fire, but the PA might not have the requisite influence on Palestinian combatants. Most west European governments would oppose an Israeli military campaign in the West Bank and could urge UN action that could conceivably lead to sanctions against Israel. By default, primary responsibility for containing the situation would fall to the United States, which would work closely with both sides to arrange a cease-fire. Judging from Israel's reluctance to work with Secretary of State John Kerry during the 2014 Gaza war, however, U.S. efforts might not bear fruit until the two sides conclude that the marginal return on hostilities has begun to diminish. Given these unpropitious conditions, the United States would have a range of options, where the impact of the intervention would likely be inversely proportional to its feasibility: Limited diplomatic involvement. At the low end of the spectrum, the United States could urge restraint and affirm the objective of a timely cease-fire but avoid getting dragged into the crisis directly. This would likely entail working with and through other multilateral actors—the United Nations and the European Union—and/or through other states that wield a degree of influence on both sides, such as Egypt in the Gaza conflict of 2014 and Jordan in the wake of the Temple Mount crisis in November 2014. By working through others, U.S. diplomatic resources can be employed without squandering prestige in search of a swift resolution that may not be attainable. At the higher end of this spectrum, the White House could dispatch a presidential envoy to present options for winding down the fighting and consolidating a cease-fire. By virtue of real-time, high-level access in Washington, this envoy could authorize incentives the parties might request to facilitate a cease-fire. Direct involvement. Under this approach, the United States would essentially lead and orchestrate efforts to bring an end to the violence, including defining an acceptable end state, mediating directly between the parties, and mobilizing outside actors in the service of the U.S. approach. This could conceivably involve the offer of a limited U.S.-North Atlantic Treaty Organization (NATO) military presence to play a monitoring role and dispute resolution along the lines proposed by French Foreign Minister Hubert Vedrine in 2002 during the second intifada, or proposed by then U.S. National Security Advisor James L. Jones in 2009. Establish third-party control of the security situation in the West Bank. The UN Security Council, with U.S. backing and consent of the parties, could authorize a limited monitoring and/or interposition force to separate combatants on both sides and assist the PA in restoring and maintaining civil order. Such a force would also assume responsibility for, or contribute to, the reconstitution of Palestinian security forces and the resumption of a train-and-equip program. Even assuming NATO agrees to carry out this mission and Israel is persuaded that outside intervention is in its interest, negotiating the scope of the mission and forming and deploying the force would require substantial lead time. Moreover, expectations of a strongly adverse domestic reaction would probably deter the administration from voting for such a resolution. Thus, despite the theoretical utility of such a force and therefore the need at least to consider the option, such a deployment would have to be regarded a real-world impossibility. Create a UN- or coalition-centered initiative to restore administrative infrastructure in the West Bank. Given the likelihood that combat operations in the West Bank would result in the destruction of much of the PA's administrative infrastructure, a rapid multilateral effort to rebuild it would be essential to the stabilization of the situation once a cease-fire has been consolidated. Support a UN Security Council resolution (UNSCR) that establishes the framework for an eventual peace agreement. European diplomatic and material support would hinge on U.S. backing for a UN Security Council resolution, like UNSCR 242, that establishes the parameters of a final-status accord and shapes a renewed push for a peace agreement. U.S. support for even a very general resolution would be perceived by Israel and its supporters in Congress as a dramatic departure from the customary U.S. position, which stipulates that final-status issues must be resolved solely through negotiation between the parties. The most durable approach to the problem of renewed West Bank violence—short of swift acceptance on both sides of the need for a final-status accord entailing a high level of Israeli-Palestinian security cooperation—would be some sort of international deployment of troops. Yet, in the event of the PA's demonstrated incapacity, Israeli officials, who have already expressed deep skepticism about the PA's ability to counter threats to Israeli interests, would oppose measures to delegate responsibility to third parties on the ground that such actions would constrain Israel's ability to react rapidly and decisively to threats. Accordingly, any effort to protect civilians or facilitate military-to-military dispute resolution by a third party would have to reflect a serious, long-term commitment—based on strong consensus—to build and sustain Israel's confidence in such measures and marshal the necessary forces. This would require a commitment of top-tier, professionalized military forces from NATO countries to be credible. NATO already deploys fifty-five thousand personnel worldwide and is upgrading its capabilities in light of Russia's recent provocations in Ukraine. It is highly improbable that parliaments would be willing to commit their national forces to such a complex challenge. Recommendations The United States should focus, in the near term, on the full range of preventive measures: Tamp down provocative actions on both sides. Washington has been only intermittently successful on this score. Nonetheless, the Israeli government has frequently been self-deterred from carrying out actual building in sensitive areas and from actions that would inflict serious long-lasting damage to the Palestinian economy. Likewise, the PA continues to be deterred from serious provocation by the harm that renewed conflict would inflict on the West Bank and on the legitimacy of the PA itself. The United States should reinforce the two sides' tendency toward restraint in tense circumstances through public statements and private messages highlighting the risk of escalation to their respective interests. At the same time, the United States should encourage Israeli and Palestinian leaders to agree on a code of conduct to avoid provocative actions, as former U.S. Middle East Envoy Dennis Ross has suggested. Help preserve Palestinian economic health, political stability, and security capabilities. President Abbas's commitment to a UN strategy, lack of confidence in U.S. diplomacy, and growing fatigue makes cooperation difficult. Moreover, certain Palestinian actions could jeopardize existing U.S. financial support for the PA even as European funding has declined. But the United States should capitalize on European symbolic actions in favor of Palestinian statehood by pressuring capitals to substantially increase their economic assistance to the PA. Washington should also ask Arab donors to increase and honor their pledges, avoiding problematic donors such as Qatar in favor of the United Arab Emirates. These donors harbor their own skepticism about the PA and Israeli policy—and are already fully occupied with Syria—but they might be receptive to this proposal nonetheless, given the stakes entailed by renewed fighting in the West Bank. Help counter external provocations. Some governments might be reluctant to dilute their focus on the Islamic State or al-Qaeda threats elsewhere, especially in Europe, the United States, the Persian Gulf, or Jordan, which are higher-priority targets for jihadists. Given the escalatory potential for a jihadist attack against Israel emanating from the West Bank, however, security services should be sufficiently motivated to devote as much attention as they can to this threat. Signal a return to negotiations. The salience of bread-and-butter issues, the spotlight on Iran, and systemic skepticism about Palestinian intentions will probably continue to blunt Israeli public interest in the peace process. In addition, U.S. rejection of the Jordanian-Palestinian UNSCR in January 2015 and a temporary European reluctance to criticize Israel in the wake of the Charlie Hebdo massacre, respectively, will likely suggest that U.S. and European pressure is not an immediate concern for Israel. Yet clear but low-key official statements that signal continued U.S. concern and an intention to renew negotiations would reassure Palestinians that they have not reached the end of the road, even if the way forward is presently blocked. In the event of major unrest in the West Bank, mitigating efforts will have to conform to the tight constraints set by the attitudes of the parties as well as the downturn in U.S. relations with Israel and the PA, in addition to the fact that European partners are preoccupied with Russia's behavior and other distractions closer to home. The following actions could help mitigate the consequences: Urge a halt to the fighting via high-level U.S. coordination with both sides. Given the bilateral tensions over Secretary Kerry's mediation efforts during the most recent Gaza conflict, prospects for high-level diplomacy in this scenario are somewhat clouded. Nevertheless, there is no substitute for sustained and intensive involvement by the White House, secretary of state, senior U.S. military commanders, and the Central Intelligence Agency director, who interact regularly with the Israel Defense Forces, Mossad, and Military Intelligence Directorate counterparts. In preparation, the White House should consider appointing a Middle East envoy sooner rather than later. Convoke relevant outside actors. Tensions surrounding the Temple Mount/Haram al-Sharif in 2014 were defused in part by the involvement of King Abdullah II of Jordan in trilateral talks with the United States and Israel. The United States should begin informal discussion now with the king on how Jordan could help in defusing major hostilities in the West Bank. If these mitigating options fail to secure a cease-fire and withdrawal of Israeli forces, the United States should consider the following steps: Table a UNSCR that urges the two sides to cease hostilities, establishes the parameters of a final-status accord, and calls for a new round of final-status negotiations under U.S. auspices. If the mitigating steps described above failed to secure a cease-fire and withdrawal of Israeli combat forces from the West Bank, Washington should attempt to leverage the fighting to lay the basis for renewed diplomacy grounded in the observable reality that Israel's control of the West Bank had become unsustainable in the absence of large-scale military operations. The most effective platform would be the UN Security Council. Israel would strongly object as it views the United Nations with suspicion and has argued, with U.S. support, that UN action cannot substitute for direct negotiations between Israel and the PA. The possibility of UN involvement, however, could dispose the Israeli government toward cooperation with efforts to deescalate the situation on the West Bank. If not, and the Security Council were to proceed with a resolution, it would be essential that the United States maintain tight control over the drafting and final text of a UNSCR to protect Israel's security. The difficulties involved in this approach cannot be minimized: despite tacit U.S.-Israeli agreement on certain territorial issues, Israeli and Palestinian positions on other issues—security, refugees, and Jerusalem—remain resistant to compromise. Moreover, conflict on the West Bank would be as likely to harden positions as to persuade the parties to negotiate. Yet a profound crisis would require a U.S. response that aims to resolve the conflict without jeopardizing Israel's safety. Conclusion The United States has a significant interest in maintaining stability in the West Bank. Widespread violence could further shrink prospects for a two-state solution, strain bilateral relations with Israel, and seriously damage Israel's European relationships. As the United States would inevitably be the primary actor tasked with mitigating a crisis, it would be prudent for the United States to address the risk factors before a major uprising breaks out.
  • United States
    Book Review – “The Hillary Doctrine: Sex & American Foreign Policy”
    During her confirmation hearing to become secretary of state, Hillary Clinton told the Senate Foreign Relations Committee in no uncertain terms, “I want to pledge to you that as secretary of state I view [women’s] issues as central to our foreign policy, not as adjunct or auxiliary or in any way lesser than all of the other issues that we have to confront.” A thoughtful and nuanced new book by Valerie M. Hudson and Patricia Leidl, The Hillary Doctrine: Sex & American Foreign Policy, evaluates to what extent Secretary Clinton has fulfilled this pledge. Unsurprisingly, they find many examples where Clinton’s rhetoric does not meet U.S. foreign policy reality. Rather than simply denounce the former secretary of state for this, they try to understand what explains this reoccurring disconnect. For example, the authors contend that a component of Clinton’s hawkish support for intervening in Afghanistan, Iraq, and Libya was the belief that women’s lives would be markedly improved. Hudson and Leidl disagree, noting, “Military action in and of itself against regimes violating human rights will not protect women. If anything, it unleashes new and usually even more vicious male-bonded groups intent on stripping them of even the most basic human rights.” It is this sort of refreshing analysis that makes this book so important, and one that I highly recommend to anybody interested in elevating women’s voices in world affairs, as well as the practicalities of day-to-day U.S. foreign policymaking. The “doctrine” comes from a proposition that Clinton made at the TEDWomen Conference in December 2010: “The subjugation of women is, therefore, a threat to the common security of our world and to the national security of our country.” In countries where women are chronically mistreated, or systematically excluded from leadership roles, there tends to be far greater state fragility, outbreaks and reoccurrences of conflict, and environments where extremists can flourish, including even terrorist organizations. The quantitative and anecdotal evidence supporting Clinton’s proposition has grown stronger over the past five years. For example, we now know that the participation of women’s groups in peace negotiations increases the likelihood of reaching an agreement and implementing it, and the probability that it will last longer. When women were included in peace processes between 1989 and 2011, agreements were 20 percent more likely to last as long as two years, and 35 percent more likely to last fifteen years. Additionally, women’s leadership and political participation enhances  a community’s ability to resist violent extremism, and women play the most critical family role in influencing young people who are susceptible to radicalization. The first part of the book—based on interviews with government officials like Swanee Hunt, Andrew Natsios, Paula Dobriansky, and Melanne Verveer—consists of a helpful history of how women’s issues became prominent in U.S. foreign policymaking during the 1990s. This included milestones like UN Security Council Resolution 1325, the first resolution to address the disproportionate and unique impact of armed conflict on women, as well as the role of women in conflict prevention and resolution; the publication of the first U.S. National Action Plan on Women, Peace, and Security; and the difficulties and haphazard manner that the military and USAID have experienced in incorporating women’s issues into foreign operations. This is crystallized in an anecdote from Charlotte Ponticelli, the State Department’s senior coordinator for international women’s issues in the era after Iraqi President Saddam Hussein was toppled. Ponticelli received an email from an aide to Paul Bremer, director of the Coalition Provisional Authority: “If I gave you 15 minutes to tell me how you would spend $10 million on behalf of Iraqi women, could you send me an email in that 15 minutes?” Ponticelli quickly drafted something, sent it to Bremer’s aide, and later received the $10 million. The authors later struggle to square Clinton’s “conspicuous silence” in the face of the brutal treatment of women by Saudi Arabia, or China’s perpetration of sex-selective abortions among Tibetans. The authors write, “one possible interpretation is that the Hillary Doctrine is in fact merely a rhetorical stance on the part of U.S. foreign policy makers, including, apparently, Hillary Clinton herself—a position that may be jettisoned if its tenants would undermine ‘real’ American national interests in any particular case.” The authors offer several potential explanations, including that Clinton expressing more public disapproval for the mistreatment of women might be counterproductive, draw unwanted attention to local NGOs, or result in current autocrats being replaced by worse and more backward-thinking leaders. However, the more plausible explanation comes from a quote provided by Verveer, who was Clinton’s chief of staff and later led the development of the U.S. National Action Plan: “You know, they are sovereign nations under their own." The authors later note that the most important and elusive ingredient for implementing the Hillary Doctrine “can only come from the White House itself.” If a President Hillary Clinton is sworn into office on January 20, 2017, then there will be no more bureaucratic hurdles preventing the fuller implementation of the Hillary Doctrine. We would only learn if it is indeed a rhetoric, or the basis upon which U.S. foreign policy is developed and implemented.
  • United States
    Guest Post: Preventing Conflict Escalation and State Collapse in Libya
    Samantha Andrews is an intern in the Center for Preventive Action at the Council on Foreign Relations. On Sunday, the United States carried out an airstrike in Libya that reportedly killed Mokhtar Belmokhtar, a commander of al-Qaeda in the Islamic Maghreb and mastermind behind the 2013 seizure of an Algerian gas plant that killed thirty-eight hostages. Since the collapse of the Muammar al-Qadaffi regime in 2011, Libya has experienced an unprecedented level of instability and violence, fostering a safe haven for international terrorists like Belmokhtar. In a new Center for Preventative Action (CPA) Contingency Planning Memorandum Update, “Libya’s Escalating Civil War,” Daniel P. Serwer, professor at Johns Hopkins School of Advanced International Studies, discusses the implications of Libyan instability for U.S. interests and provides policy recommendations. Serwer says that the threat of chaos that existed after the 2011 intervention has “come to fruition,” and now the United States must address the growing presence of jihadists in Libya, some of whom have joined the self-declared Islamic State. With two opposing military coalitions—Libya Dawn and Operation Dignity divided roughly along geographical lines, with each declaring their own parliament, government, and military chiefs—the loyalties of fighters are difficult to characterize. Though foreign media often associates Dawn with Islamists and Dignity with non-Islamists, both groups have overlapping support. These divisions are just as unclear to the government, whose Finance Ministry in Tripoli continues paying combatants from both coalitions. This indistinctness has undermined UN efforts to negotiate a comprehensive political settlement. In addition to the Dawn and Dignity coalitions, a growing presence of jihadists affiliated with Ansar al-Sharia and the Islamic State are also gaining a foothold in Libya. Taking advantage of the widespread political instability, jihadists are using the country as a hub to coordinate broader regional violence and launch attacks. Since these terrorist groups regard Dawn and Dignity as enemies, their growth only threatens to further escalate the violence and fracture warring parties. Libya is critical to U.S. allies in Europe that rely on the country as a gas and oil supplier and face a steady influx of Libyan refugees. Currently, Libya receives less attention than countries where the United States is directly engaged militarily, such as Iraq and Syria. However, the devolution of stability in Libya threatens a collapse of the state and territorial fragmentation. Additionally, at odds with the United States’ efforts to counter violent extremism, the inflow of international terrorists is expected to drive radicalization in the region. What policy options could help steer Libya toward a more stable outcome? Skewer emphasizes that, since European interests in Libya overshadow those of the United States, the European Union (EU) should take the lead. Washington should encourage and provide support to EU-led efforts, rather than undertaking a new initiative. Other specific recommendations that Serwer details are: • Supporting an inclusive national political solution that devolves as much authority as possible to Libya’s three regions and twenty-two districts. • Encouraging Italy and France to form a coalition of the willing to provide peacekeeping forces with a UN mandate in support of a national political settlement, including substantial Arab contributions of police and military personnel. • Providing logistical, intelligence, and air support for this mission, but without boots on the ground. • Coordinating with and funding the Libyan government develop counterterrorism and internal security capabilities. For more of Serwer’s analysis of and recommendations for addressing the conflict, read CPA’s report, “Libya’s Escalating Civil War.”
  • Libya
    Libya's Escalating Civil War
    The potential chaos highlighted by a 2011 Council on Foreign Relations (CFR) Contingency Planning Memorandum, "Post-Qaddafi Instability in Libya," has come to fruition. Libya today is in the midst of a civil war—one as confusing as it is ferocious. Atrocities against civilians are mounting. The collapse of the Libyan state and the country's division is possible. This could threaten Libya's remaining oil and gas production and spark new waves of migration to Europe and neighboring countries in North Africa. Libya's transitional road map fell apart in 2012, as the elected parliament and several subsequent governments failed to demobilize, disarm, and reintegrate revolutionary brigades that had fought against the Qaddafi regime. As a result, the brigades aligned with political factions and began to fight each other, killing thousands of Libyans, internally displacing about 400,000 people, and creating a refugee population of one to two million abroad. New Concerns The conflict pits the Dawn coalition, which controls Tripoli and much of western Libya, against the Dignity coalition, which controls parts of Cyrenaica in the east, in particular Beida and Tobruk, as well as parts of Benghazi. But the geographical division is not neat: combatants from Zintan in the west are an important component of the Dignity coalition while Dawn claims the loyalty of some fighters in the east. Source: New York Review of Books. Each coalition has its own self-declared parliament and government, as well as nominal military chiefs. Although the press often associates Dawn with Islamists and Dignity with non-Islamists, both groups have Islamist and non-Islamist support, and the Finance Ministry in Tripoli continues to pay combatants in both coalitions. Egypt and the United Arab Emirates (UAE) provide substantial aid to Dignity, including occasional air strikes on its behalf. Most other countries regard the Dignity-affiliated Beida/Tobruk government as legitimate but want to see a negotiated political settlement. A United Nations (UN) proposal for a national unity government would reinstall the Dignity-affiliated parliament in Tripoli along with a mostly Dawn-affiliate consultative body, but it is still unclear whether either Dawn or Dignity will accept the proposal. In addition to the Dawn and Dignity coalitions, a growing presence of jihadists (especially in Derna and Sirte) greatly complicates the situation. Extremists associated with Ansar al-Sharia and the self-declared Islamic State regard both Dignity and Dawn as enemies. Libya is particularly important for the United States' European Union (EU) allies, both as a gas and oil supplier and as a source of illegal migrants (Libyan and non-Libyan), who are crossing the Mediterranean in unprecedented numbers. As for others in the region, Egypt and Tunisia are hosting large numbers of Libyans, straining their already struggling economies and limited social services. Tuareg fighters returning from Libya have contributed to the ongoing secessionist strife in northern Mali. Policy Implications An escalation of the fighting in Libya will likely result in further radicalization, risking partition and even complete state collapse, with consequences across North Africa and Europe. Were it not for the even greater chaos in Iraq, Syria, and Yemen, where the Islamic State and al-Qaeda-linked forces are more prominent, the United States would be more concerned about the potential for Libya to provide safe haven to international terrorists. Also at risk is Libya's remaining oil production of several hundred thousand barrels per day, as well as its gas supply to Europe, which will be important next winter if Russia cuts off supply to Ukraine, through which most of Europe's Russian supplies of gas flows. UN efforts at a political settlement will be fruitless without strong backing from its members, including support for the peacekeeping forces required to protect a national unity government and restore law and order in major population centers. In the absence of a political settlement, possible scenarios include a win for Dignity, backed by Egypt and the UAE, or fragmentation of the country. A Dignity win would create serious risks of retributive violence, including attacks against civilians. Fragmentation could also further escalate violence, since substantial oil and gas resources would be at stake. While a settlement is being negotiated, local stabilization efforts could relieve parts of Libya from violence, but on the national level it could take time and a great deal of effort. Recommendations As European interests in Libya overshadow those of the United States, the EU should take the lead in helping the country out of its current predicament. Arab countries—including Egypt and the UAE, as well as the more neutral Algeria and Morocco—should also make substantial contributions. Washington's role should be one of encouraging and facilitating UN, EU, and Arab efforts, rather than undertaking a major new initiative. Washington should support, including in a UN Security Council resolution, an inclusive national political solution, which allows the return of a single, legitimate governing authority to Tripoli that is willing and able to fight extremist Islamists. The constitution, prepared with U.S. assistance, should devolve as much authority as possible over other issues to Libya's three regions and twenty-two districts. Washington should support, through the UN or Libyan nongovernmental organizations (NGOs), local stabilization and traditional mediation efforts among tribes, municipal councils, and local militias to end fighting, especially in western Libya. Such UN and NGO efforts should include facilitation of meetings and training as well as visits to other countries (Lebanon, Bosnia, and Albania) that have suffered civil conflict. Washington should encourage Italy and France to form a coalition of the willing to provide peacekeeping forces with a UN mandate in support of a national political settlement, including substantial Arab contributions of police and military personnel. A force of ten to fifteen thousand peacekeepers—more than currently under consideration by the Europeans—would be necessary to protect a national unity government. Washington should support this mission from the air and sea with logistics, intelligence, and air strikes, but without boots on the ground. The United States, Europe, and Arab countries should coordinate to help the Libyan government develop counterterrorism and internal security capabilities. This approach would entail a major effort to disarm, demobilize, and reintegrate militias as well as create effective Libyan forces under civilian control. At least six to eight thousand troops—once envisioned for the now-abandoned Libyan General Purpose Force—would be required, possibly organized on a regional basis. The United States needs to be ready to spend at least the $600 million over eight years targeted for that program. 
  • Conflict Prevention
    You Might Have Missed: Airpower in Iraq, Sanctions Effectiveness, and Military Intervention
    Department of Defense, Lt. Gen. John W. Hesterman III, Combined Forces Air Component commander (CFACC) press briefing, June 5, 2015. About the only thing airpower doesn’t do is take, hold, and govern territory. The Iraqis are going to have to do that. And this airpower campaign is going to give them the time and space to do that... Let’s not give [IS] credit for strategic victory, that’s not what’s happening…I didn’t say that they haven’t made tactical advances, I said they haven’t made strategic victories. (3PA: This press briefing, the Pentagon’s first one focused on the air campaign since December 14, is worth watching for Lt. Gen. Hesterman’s staunch defense of airpower. In addition, he consistently downplayed IS’ momentum because they are not able to achieve a strategic victory, which the United States did not achieve in Afghanistan or Iraq.) White House, “On-the-Record Conference Call on the President’s Travel to Germany for the G7 Summit,” June 4, 2015. Press Secretary Ben Rhodes: Sanctions are a tool that can have an immediate impact in deterring actions by governments like Russia.  But over the longer term, they need to be sustained to steadily inform the calculus of countries like Russia that are acting outside of international norms. (3PA: There is a great deal of social science research that shows sanctions do not have an immediate effect. Moreover, it was notable that Rhodes did not mention the lack of long term impact that sanctions had on Cuba. Just two months ago, the White House began pursuing normal diplomatic relations with Cuba on the premise that over fifty years of sanctions and isolation had failed to change the calculus of the Castro regime.) Gen. Hawk Carlisle, Air Force Breakfast Program, Air Force Association, June 1, 2015. Gen. Hawk Carlisle: We’re taking a serious toll on their morale and their capability, the Daesh [self-declared Islamic State]. About 4,200 strikes so far and about 14,000 weapons have been dropped. We’ve taken about 13,000 enemy fighters off the battlefield since the September/October time frame. And despite what again is a lot of talk, we have regained territory, about 25 percent in Iraq—the territory that was lost initially has been gained back. Thomas Szayna, Paul Dreyer, Derek Eaton, and Lisa Saum-Manning, “Army Global Basing Posture,” RAND Corporation, 2015, p. 57. To assess responsiveness of existing and potential Army bases, we evaluated the ability of current and potential bases to support the deployment of Army forces on a variety of specific (scenario-based) short-warning missions, including deployment for deterrence purposes, response to state failure, humanitarian relief, and counterterrorism. Using the RAND Arroyo Center–developed GPM, we found that there are many good choices for basing Army forces in all regions of the world and that small adjustments to Army posture can improve response time for short-warning contingencies and provide for greater robustness within the overall global posture. The adjustments include greater presence at existing facilities and locations and additional contingency access and rotational bases in states currently not hosting U.S. Army forces. Comparing the improvements in responsiveness with current posture, we found that potential gains are small, usually measured in hours rather than days. Choices regarding new bases depend on assessment of trade-offs between the costs associated with upgrading the facilities at proposed locations and the marginal benefits in responsiveness. Given the limited gains in responsiveness, robustness and strengthening defense relationships provide a more valid justification for the infrastructure improvements that might be needed. Several specific locations emerged consistently from our analysis as improving responsiveness. Minimal adjustments by upgrading these locations may have substantial impact for robustness and responsiveness. In Europe, Africa, and Southwest Asia, Djibouti and Cyprus are the most promising for consideration of greater Army forward basing. Within the greater Middle East area, Oman and UAE emerge as good choices. In East Asia, Guam and Australia offer advantages over current arrangements; Thailand is another possibility. New Army basing arrangements appear to be unnecessary in the Americas, although there are many good choices. Our analysis showed the importance of airlift and the capability to increase rapidly the MOG of austere airfields as APODs for short-warning missions. But surface lift is a good alternative to airlift for the bigger force packages associated with the more-demanding missions, especially for intraregional contingencies. In regions with highly developed road and rail transport infrastructures, surface lift has many advantages. For example, surface lift meets deterrence demands in Europe. Sealift offers advantages in East Asia and the western Pacific, particularly if we assume strategic warning and the ability to start the movement of sea-based prepositioned equipment prior to the actual crisis. (3PA: This is an excellent report, especially the appendices, for learning about the nuts-and-bolts of military interventions.)
  • United States
    Preventing Conflict in Cyberspace Triggered by Miscalculation
    What constitutes an act of war in cyberspace? What should be U.S. response options to a consequential cyberattack? These questions are repeatedly asked at Congressional hearings with U.S. officials struggling to provide satisfactory answers. Today, the Center for Preventive Action released a Contingency Planning Memorandum, “Strategic Risks of Ambiguity in Cyberspace,” which I am tremendously proud to say directly addresses these issues and much more. Written by Benjamin Brake, a CFR international affairs fellow and foreign affairs analyst in the Bureau of Intelligence and Research at the Department of State, this report details how the Obama administration can strengthen its ability to correctly and efficiently attribute an attack, reduce the likelihood of escalation, and mitigate the consequences of an ambiguous attack. This report does not reflect the position of the U.S. government, but tracks closely with how many officials and staffers in cyber-related agencies are thinking. Most recently, in a March hearing, Sen. John McCain (R-AZ) asked Adm. Mike Rogers, director of the National Security Agency, “Does this raise the issue…as to whether we have a policy or not as to what to do in the event of cyberattacks? Do we just spend our time trying to erect further defenses?...Or do we start devising ways to raise a price for those attacks?...Doesn’t that mean that we should start devising methods and capabilities to enact a price for these people to pay, whether they be nation states or rogue individuals or groups?” Rogers gave a nondescript response, as expected: “We not only need to continue to build on the defensive capability, but we have got to broaden our capabilities to provide policymakers and operational commanders with a broader range of options…We also need to think about how can we increase our capacity on the offensive side here, to get to that point of deterrence.” Brake writes that over the next twelve to eighteen months the United States could face several plausible contingencies in cyberspace that would be complicated by intentional or inadvertent ambiguity. Past actions of Iran and North Korea suggest they are the most willing to conduct destructive or disruptive cyberattacks, while attempting to conceal responsibility. Although U.S. officials accused North Korea of being responsible for the destructive cyberattack against Sony Pictures Entertainment, North Korean officials repeatedly denied the country’s role and will similarly obscure its involvement in future attacks. In other cases, ambiguity is inadvertent, but just as risky. “Due to the difficulty of determining whether certain activity is intended for espionage or preparation for an attack, cyber operations run the risk of triggering unintended escalation,” writes Brake. BlackEnergy, espionage malware found on U.S. critical infrastructure networks, could be considered “one update away from becoming an attack tool.” To remedy the risk of conflict stemming from ambiguity in cyberspace, Brake recommends a series of preventive and mitigating policy recommendations, including: • Congress should pass legislation that facilitates real-time information sharing within and between the private and public sectors. • The White House should issue warnings to adversaries of the potential consequences of violating cyberspace norms, such as “adjustments to network traffic, criminal sanctions, diplomatic condemnation, and U.S. Treasury actions.” • Congress should create a Department of State Bureau of Internet and Cyberspace Affairs, which would demonstrate that the United States gives as much weight to diplomatic policy options as it does military ones. It should also make the National Security Agency director a Senate-confirmed position eligible for civilians. Missions other than intelligence should be shifted to other appropriate entities, including U.S. Cyber Command and the combatant commands. • “When possible and appropriate, defense officials should highlight U.S. involvement in offensive cyber operations against states, terrorist groups, and other illicit actors to fortify the credibility of U.S. retaliatory capacity among potential adversaries.” If you are interested in how the United States should prepare for the most likely and consequential risks to cyberspace, please read Brake’s excellent memo.
  • Cybersecurity
    Strategic Risks of Ambiguity in Cyberspace
    Introduction As major powers increasingly rely on digital networks for critical services, the number of plausible network attacks, accidents, or failures that could trigger or exacerbate an international crisis will increase. The likelihood and severity of such a destabilizing event will also grow as long as norms of appropriate behavior in cyberspace are underdeveloped, timely and convincing attribution of attacks remains difficult, and the number of cyber-capable actors increases. Preparing for or responding to such a crisis is complicated by ambiguity in cyberspace, primarily regarding responsibility and intent. Ambiguity about who is responsible for a cyberattack exacerbates the risk that countries amid a geopolitical crisis will misattribute an attack, unduly retaliate or expand a crisis, or be unable to attribute an attack at all, thereby preventing or delaying a response and weakening their deterrence and credibility. Ambiguity of what is intended complicates a country’s ability to distinguish between espionage operations and activity conducted in preparation for a cyberattack. The United States has strategic interests in preventing and mitigating these risks, given its commitment to global security and overwhelming dependence on networked systems for national security missions, commerce, health care, and critical infrastructure. The longer it takes to implement preventive and mitigating steps, the greater the likelihood of unnecessary military conflict in and outside of the cyber domain. The Contingencies Cyberattacks are increasing in frequency, scale, sophistication, and severity of impact, including their capacity for physical destruction. China, Iran, North Korea, and Russia have demonstrated an ability to conduct destabilizing cyber activity. Such actions—whether for destructive purposes, intelligence collection, or economic espionage—are designed to evade network defenses and can involve various means of deception to thwart attribution. Recent incidents have shown that U.S. adversaries can no longer assume they will be able to conceal their identities in cyberspace, but cybersecurity experts still lack agreed-upon standards for attribution; evidence for a credible and convincing attribution can take a long time to compile; and malicious actors continue to develop new means of obscuring responsibility. Moreover, unlike many cyber operations designed to exfiltrate large amounts of data, destructive cyberattacks can be made to operate with limited communication between the malware and controller, offering fewer forensic details to establish responsibility. Even when an attacker can be identified, public attribution will remain as much a political challenge as a technical one, given that competing allegations of responsibility will likely follow any public accusation. Without corroborating signals or human intelligence—which, if it exists, officials may be reluctant or slow to disclose—computer forensic data may be incomplete or too ambiguous to convince a skeptical public. Should a major cyberattack occur over the next twelve to eighteen months, or even beyond that period if sufficient preventive and mitigating steps are not taken, public pressure to respond could outpace the time needed to credibly attribute responsibility and, if desired, build an effective coalition to support a response. Over the same time period, ambiguity regarding the intent of cyber operations will also remain a challenge, leaving policymakers uncertain about whether malware discovered on a sensitive system is designed for espionage or as a beachhead for a future attack. The United States could face several plausible crises over the next twelve to eighteen months that would be complicated by the risks of ambiguity in cyberspace. These include destructive insider threats, remote cyber operations that threaten trust in financial institutions, and cyberattacks by foreign nations or nonstate groups against critical infrastructure systems that cause widespread panic and loss of life, or similar attacks against a U.S. ally. National Security Agency (NSA) Director Admiral Michael Rogers warned in late 2014 that he expects U.S. critical infrastructure—assets essential to the function of a society and economy, such as water supply systems, electric grids, and transportation systems—to be attacked, noting that multiple foreign nations and groups already possess the ability to shut down a U.S. power grid and several others are investing in the capability. Attacks like the publicly unattributed January 2015 cyberattack that severely damaged a German steel mill suggest the ability to bring about physical destruction through cyber means may be proliferating quickly. Of particular concern would be the proliferation of these capabilities among terrorist groups, which currently possess limited technical skills but destructive intent. As the number of cyber-capable adversaries grows, so too does the number of critical targets, especially as industrial control systems move to web-based interfaces and more common operating systems and networking protocols. The implications of any crisis will depend on the current geopolitical context; the type of networks that fail; and the extent of economic damage, physical destruction, or human costs that result directly from network failure or its cascading effects on public health, communication and financial networks, and the economy. A successful cyberattack against one or more critical infrastructure systems could endanger thousands of lives, halt essential services, and cripple the U.S. economy for years. Two plausible factors that could exacerbate such a crisis are intentional and inadvertent ambiguity. Intentional Ambiguity Over the past two years, Iran and North Korea have appeared most willing to conduct destructive and disruptive cyberattacks against U.S. and foreign targets while attempting to conceal responsibility. Tactics have included data wipes, destruction of computer hardware, and denial-of-service attacks. Russia and China have exhibited some of the most advanced capabilities, and actors in both countries have been linked to disruptive attacks during regional tensions. Actors in South Asia and the Middle East have also conducted operations in regional conflicts that could quickly entangle U.S. interests. During a crisis involving the United States or an ally, any one of these countries could conduct cyber operations that risk further destabilization. As the rate of operations grows, so too could the challenge of attribution, with each incident exposing tools and techniques that can be repurposed. Cyber activities that could not be promptly attributed have already appeared in several conflicts. Though most have rarely elevated beyond nuisance, others have caused significant damage or threatened escalation. In 2008, Russia-based actors launched a wave of attacks against Georgian targets, and similar malware appeared in operations against Ukraine in 2014. Japanese networks are frequently targeted, including during heightened Sino-Japanese territorial tensions and sensitive anniversaries, with origins reportedly traced to China. North Korean cyber actors are suspected of having conducted destructive operations that compromised South Korea’s national identification system—damage that may cost more than $1 billion and over a decade to repair. In 2014, U.S. officials blamed North Korea for destructive attacks against Sony Pictures Entertainment, an American subsidiary of the Japanese company Sony. North Korean officials deny the country’s role in these attacks and will likely seek to similarly obscure their hand in attacks during future crises to deter or delay a potential American or South Korean response. U.S. officials suspect Iran’s involvement in a 2012 cyberattack against two energy firms, one in Saudi Arabia and another in Qatar, that destroyed data and crippled thirty thousand computers, possibly in retaliation for alleged U.S. cyber operations, and to demonstrate an ability to conduct similar attacks against U.S. targets. U.S. financial firms subsequently suffered tens of millions of dollars in losses resulting from Iranian denial-of-service attacks launched in retaliation for economic sanctions. In 2014, Iran became the first country to carry out a destructive cyberattack on U.S. soil when it damaged the network of Las Vegas Sands after its chairman advocated a nuclear strike against the country. Inadvertent Ambiguity Due to the difficulty of determining whether certain activity is intended for espionage or preparation for an attack, cyber operations run the risk of triggering unintended escalation. Espionage malware that could be reprogrammed to gain control of networks, such as BlackEnergy, which has been discovered on critical infrastructure networks, may be viewed by victims as one update away from becoming an attack tool capable of crippling energy supplies, water-distribution and -filtration systems, or financial transactions. Security scans of networks intensified amid heightened geopolitical tensions could reveal such malware and prompt fears of an imminent attack, even if the malware was implanted for espionage purposes long before the crisis began. The difficulty of predicting a cyber operation’s effects and the interdependency of networked systems increase the risks that an operation will inadvertently spill over onto sensitive systems or cause unintended effects. One example of ambiguity and the risk of misperception is the 2010 discovery on Nasdaq servers of malware similar to a cyber tool reportedly developed by Russia’s Federal Security Service. Initial assessments maintained that the malware was capable of wiping out the entire stock exchange. Only later was it shown to be less destructive, according to media accounts. Such ambiguities during periods of heightened geopolitical tensions pose significant escalatory risks. Information security experts have raised similar concerns about other Russia-linked activity and questioned whether aspects of the activity are intended to insert offensive capabilities into critical infrastructure systems for future use. Ambiguity also arises in the case of “worms”—self-replicating malware that seeks out other computers to infect. Worms can spread so pervasively that their origin and intent can be difficult to infer from known victims. One worm, Conficker, spread to millions of computers and disrupted military communications in several European countries. Its creator and purpose remain unknown. Warning Indicators Indicators of activity with the potential to create or exacerbate an international political crisis include leadership statements of an intent to conduct or permit computer network operations against foreign networks; evidence of that intent, including research and development, budgetary allocations, or organizational changes, such as the creation of offensive cyber forces; the express or tacit acceptance of parastatal hackers; and a demonstrated capability to conduct computer network operations, including cyber-espionage and cyber operations against domestic targets. Tactical warning indicators resemble traditional conflicts, such as changes in the alert status of military units and an increase in crisis-related rhetoric. Indicators unique to cyber operations include increased efforts to probe foreign networks and an uptick of activity in online hacker forums discussing foreign targets and tools, techniques, and procedures appropriate for operations against them. Implications for U.S. Interests First, cyberattacks will eventually be part of every nation’s military strategy. The United States depends on information communications technologies for critical military and civilian services far more than its strategic rivals or potential adversaries. U.S. officials have noted an increase in computer network operations targeting state, local, and privately operated critical infrastructure­­, some of which have the potential to cause considerable harm to operations, assets, and personnel. Second, ambiguity in cyberspace elevates the risk that a significant cyber event amid a geopolitical crisis will be misattributed or misperceived, prompting a disproportionate response or unnecessary expansion of the conflict. Such an escalation would impair the United States’ prominent role and interest in global security and its commitment to international law. Third, U.S. officials’ ability to respond swiftly and effectively to cyberattacks is complicated by the difficulty of timely public attribution and ambiguity over what type of cyberattack would trigger a right to self-defense or security commitments to strategic partners. A failure to confidently attribute an attack or determine whether such activity constituted an attack could limit U.S. response options. Such confusion, uncertainty, and delay could weaken deterrence and the credibility of U.S. assurances, trigger a misperception of U.S. commitment, and undermine a U.S.-led coalition. Preventive Options Unilateral and bilateral steps offer the most immediate path for preventing and mitigating risks of ambiguity. Diverse interests and challenges that inhibit verification limit the likelihood and effectiveness of a comprehensive international agreement in the near term. The United States has two broad sets of policy options. The United States could enhance deterrence by strengthening defenses, building and supporting more resilient networks, and bolstering the capacity and credibility of U.S. retaliatory threats. Improve cyber defenses, elevate the role of the private sector, and support research. Government agencies and the private sector, which owns and operates the majority of critical networks on which the United States relies, should be encouraged to build and operate better defenses. Congress has considered several competing pieces of legislation to establish a legal framework that would encourage sharing of best practices and vulnerabilities between the public and private sectors. The disclosure of significant cybersecurity failures would expand awareness of threats and successful defenses, reduce duplicative efforts, improve the quality of cybersecurity products, and support market mechanisms to develop network security, such as the cybersecurity insurance market. Intensify testing of national cyber defenses. The Department of Homeland Security, the intelligence community, and relevant state, local, and private actors could expand national training exercises to clarify responsibilities and demonstrate capabilities, such as the CyberStorm series. Cyber exercises can showcase resiliency and improve incident response, and should include disaster-response operators to simulate health and safety issues that could accompany a major attack. Improve real and perceived attribution. A credible retaliatory threat will depend on perceptions of U.S. attribution capabilities. To showcase this capability, U.S. officials could expand intelligence collection against potential adversary cyber programs and increase public or government-to-government disclosures of intrusions. Intelligence, defense, and law enforcement officials could develop standards of attribution confidence that can be used to recommend levers of national power, including judicial, economic, diplomatic, intelligence, and military tools, as well as network actions, such as slowing or blocking Internet traffic to and from U.S. and allied networks. Modeled on legal burdens of proof, these standards could shorten the time it takes for U.S. agencies to recommend response options. U.S. officials could also support efforts to reduce anonymity on the Internet, including adjustments to the design, distribution, and authentication of Internet protocol (IP) addresses, but such reforms would come at too great a cost to free expression. Clearly define and enhance the role of the Cyber Threat Intelligence Integration Center (CTIIC) to ensure effective planning, coordination, and assignment of cyber operations. Congress can enhance U.S. cyber posture by codifying CTIIC’s role in integrating intelligence for the director of national intelligence and serving as an interagency forum to coordinate roles and responsibilities. The special assistant to the president and cybersecurity coordinator essentially serves as an interagency coordinator, but his or her portfolio is expansive and staff is small. An enhanced CTIIC, on the other hand, could ensure united efforts and report operational issues directly to the White House; these measures could improve operational awareness and guard against inadvertent escalation. Promote greater public clarity on U.S. cyber strategy and doctrine. Uncertainty over what amounts to a use of force in cyberspace can weaken deterrence if potential adversaries misperceive thresholds for retaliation. National security officials can reduce risks of miscalculation by more clearly defining how the United States perceives “use of force,” “armed attacks,” “aggression,” and activity below those thresholds. Some uncertainty is unavoidable to ensure flexibility in the context of an attack, but more clarity would promote stability by shaping expectations of behavior. Make good on (and use of) retaliatory threats. U.S. deterrence rests on credible assurances that the United States will retaliate strongly against perpetrators—both in and outside of cyberspace. When responsibility can be established, the White House could inflict costs on the offender that also have a deterrent effect on other potential adversaries. This could include an expanded offensive cyber capacity that provides policymakers with a wider range of options, but because operations in cyberspace may be noticed only by adversary network operators, they will likely have greater effect as part of a broader campaign that includes responses outside of the cyber domain, including use of the recently announced sanctioning authority targeting malicious cyber actors. The United States could establish responsible cyber precedents and norms. Intensify ongoing diplomatic efforts to promote the development of shared norms and expectations. Consensus on controversial issues relating to how international law applies to state behavior in cyberspace is unlikely in the near term. The diversity of national interests and verification challenges makes efforts to build cyber norms through formal treaties especially challenging. Given the risk of inaccurate attribution in cyberspace, however, countries should recognize a high threshold for what merits a forceful retaliation and remain mindful that the benefits of international communications technology come with vulnerabilities and defensive burdens. U.S. efforts to build such a shared understanding could include operational restraint; continued diplomatic work in the UN Group of Governmental Experts on international information security; confidence-building measures, such as joint cyber exercises that standardize bilateral attribution, mitigation, and data-sharing procedures; and the expansion of bilateral consultative mechanisms. Further clarify roles and responsibilities in the cyber domain. Congress could take several steps to elevate the role of diplomacy in U.S. cyber policy, better integrate cyber capabilities into military strategy and doctrine, ensure effective oversight, and signal the important distinction between cyber espionage and other types of cyber operations. These steps include establishing an assistant secretary of state for Internet and cyberspace affairs and ending the current policy that places a single official in charge of both the NSA and U.S. Cyber Command. A reallocation of responsibilities would further distinguish Title 10 (national defense) and Title 50 (covert) operations and help generate precedents of responsible state practice for each. Enhance support for foreign efforts to combat cybercrime. International cooperation is essential to combat illicit cyber activity from nonstate actors, such as terrorist networks, criminal groups, and patriotic hackers. Greater resources for international programs of the Department of Justice (DOJ) and streamlining how foreign officials receive DOJ assistance in cyber investigations would reinforce the norm of mutual assistance and pressure foreign governments to do likewise. Mitigating Options Establish or use a crisis-management group with allies and countries hosting affected networks. The same elements of ambiguity that can trigger a crisis can also exacerbate one. Because defensive cyber operations, which may be appropriate during an ongoing attack, can involve activity on information networks located in other countries and appear offensive in nature, the public or private messaging of a U.S. response will be vital to prevent crisis escalation or expansion. Such crisis-management groups should include top national security and diplomatic officials, and cyber officials from other countries’ computer emergency response teams, to build a foundation of familiarity and trust among relevant actors that would be called on in the wake of a major attack. Work with potential adversaries to prevent misperception of U.S. cyber activity. Given varying structures of cyber forces within the security agencies of potential adversaries, a U.S. signal sent by cyber means during a crisis may not reach national leaders. U.S. national security officials could establish or expand bilateral crisis-communication channels with foreign counterparts to issue warnings, request assistance, or open a dialogue about state involvement in a perceived attack. Pressure states unwilling to stop or support investigations of cyberattacks. In cases where the United States cannot attribute a cyberattack, it has levers short of force both in and outside of the cyber domain. Countries whose networks are used in a multistage attack could be given notice that a failure to stop it or to support an investigation is a breach of state responsibility that could result in adjustments to network traffic, diplomatic condemnation, or other sanctions. Such threats increase incentives to conduct cooperative forensics, develop mitigation measures, and make their information infrastructure a less attractive path for hostile computer network operations.  Recommendations Prospects for a comprehensive international solution to the risks posed by ambiguity in cyberspace are limited at this time, and some technical fixes that would aid attribution by limiting anonymity online would come with too great a social cost. Instead, a strategy that focuses on fortifying U.S. networks, building a more credible deterrent, and demonstrating responsible state practice offers the best path forward. The United States should improve the security and resilience of its networks and fortify the credibility of retaliatory capacity. Congress should pass legislation that facilitates real-time information sharing within and between the private and public sectors. Implementation of this information-sharing program is expected to cost $20 million over five years, according to the Congressional Budget Office. Congress should build on the February 2015 executive order designed to promote information sharing among private actors by offering tax incentives or grants to companies that join and support the work of information-sharing and analysis organizations—sector- or region-specific hubs that facilitate the exchange of cyber-threat data and cybersecurity best practices. Congress should help reduce critical vulnerabilities by expanding support for the new National Cybersecurity Federally Funded Research and Development Center (FFRDC); creating or incentivizing bug bounty programs for critical systems; adjusting criminal and civil laws, such as the Digital Millennium Copyright Act and the Computer Fraud and Abuse Act, to enable and encourage responsible security research; and mandating robust cybersecurity requirements as a condition for federal-procurement eligibility to drive the commercial market for secure products. The Department of Defense (DOD) should expand efforts to improve cyber defense capabilities, information-assurance responsibilities, and research and development. DOD officials estimate this to cost $5.5 billion annually. Joint training exercises in the combatant commands ($456 million requested by DOD for 2016) should include cyber threats that could impede global access and operations to improve DOD mission resilience, support the development of best practices to share with critical infrastructure operators, and generate data to help avoid costly adjustments to hardware, firmware, and other fixes in later development stages. The Office of the Director of National Intelligence (ODNI) should expand signals and human intelligence collection against potential adversary cyber programs, as well as accelerate the intelligence community’s production and release of actionable cybersecurity information to vital information network and critical infrastructure operators. U.S. intelligence officials should also identify, in advance, types of classified data that could be shared publicly in the event of an incident to avoid a lengthy interagency declassification process that would delay a timely public attribution. When possible and appropriate, DOD officials should highlight U.S. involvement in offensive cyber operations against states, terrorist groups, and other illicit actors to fortify the credibility of U.S. retaliatory capacity among potential adversaries. Greater transparency into offensive cyber operations, as well as the doctrine underlying them, would also reinforce emerging norms in cyberspace by demonstrating responsible state practice and supporting U.S. efforts to overcome the skepticism of its commitments to shared interests and values in cyberspace that emerged in the wake of unauthorized disclosures of U.S. cyber activity. The United States should elevate diplomacy, clarify doctrine, and ensure clarity between intelligence and military cyber operations. Congress should create a Department of State (DOS) Bureau of Internet and Cyberspace Affairs to demonstrate that the United States gives as much attention to diplomatic policy options as it does military ones. The bureau should retain a direct reporting line to the secretary for threats, operations, and related strategic considerations. Congress should also make the NSA director a Senate-confirmed position eligible for civilians. Missions other than intelligence should be shifted to other appropriate entities, including U.S. Cyber Command and the combatant commands. ODNI should more frequently review intelligence priorities, operations, and targets to prevent unintended escalatory cyber events. The reviews should also clarify the chain of command and congressional oversight of Title 10 and Title 50 cyber operations. The director of CTIIC should facilitate reviews and broaden operational awareness among national security officials. DOD should further clarify doctrine related to cyber-effects operations to provide greater transparency into U.S. operations, reduce risks of miscalculation, and clarify response options. The United States should intensify diplomacy in concert with like-minded nations to promote the development of shared norms and expectations of appropriate behavior in cyberspace. DOS should expand formal dialogues with partners and potential adversaries to share views on appropriate behavior in cyberspace, including prohibitions against operations that damage critical infrastructure or computer emergency-response agencies, as well as affirmative norms, such as mutual assistance in investigations or efforts to counter ongoing attacks. The White House should publicly outline for less cooperative states the possible range of political-economic levers, including adjustments to network traffic, criminal sanctions, diplomatic condemnation, and U.S. Treasury actions that the United States could use to hold countries accountable for failing to stop harmful activity conducted from or through their networks. The United States should improve responsiveness to foreign requests for assistance in cyber investigations. Congress should increase support for the DOJ’s Computer Crime and Intellectual Property Section, National Security Division, Office of International Assistance, and Federal Bureau of Investigation to bolster prosecutorial efforts and keep pace with the growing number of foreign requests for support. DOJ estimates this to cost $722 million. Congress should support DOJ efforts to provide prompt support to cyber investigations including creating an online system to process requests. DOJ estimates this to cost $24.1 million. Conclusion Attacks against the diverse and growing number of vulnerabilities on critical U.S. networks will pose a significant risk of triggering or aggravating a crisis for years to come. Though the cyber threat cannot be eliminated, implementing the recommendations above would put the United States on a course to better manage its risks and promote stability. The United States should act now to enhance its cyber defense and deterrence, support the growth of shared norms, and improve the processes through which attacks are mitigated and investigated. The longer the United States delays taking these steps, the harder it will be to prevent and mitigate a crisis. Deterrence failures and misperceptions occur routinely in international relations, but a renewed focus now would significantly reduce the risk of an unnecessary crisis or escalation.
  • South Korea
    You Might Have Missed: Drone Strike Policies, North Korea, and Conflict Prevention
    Press Briefing by Press Secretary Josh Earnest, White House, April 23, 2015. John Earnest, White House Spokesperson:  I can tell you that Mr. Gadahn was not specifically targeted.  But in a fashion that was similar to the operation that we were discussing that resulted in the death of Dr. Weinstein and Mr. Lo Porto, the operation was against an al Qaeda compound.  So again, this is a scenario where U.S. officials had determined with near certainty that an operation could be carried out against an al Qaeda compound that was frequented, or at least where at least one al Qaeda leader was locatedAnd that operation did result in the death of Mr. Gadahn… What I would also readily admit to you is that in the aftermath of a situation like this, it raises legitimate questions about whether additional changes need to be made to those protocols. Again, to put it more bluntly, we have national security professionals who diligently follow those protocols based on everything that we know so far.  They follow those protocols, and yet it still resulted in this unintended but very tragic consequence.  And that’s why the President has directed his team to conduct a review of this particular operation to see if there are lessons learned, reforms that we can implement to this process. (3PA: This is the first time the White House has anthropomorphized a compound as being equal to an al-Qaeda leader. U.S. drone strike policy does not say that a “compound” can pose an imminent threat. Moreover, the tragic incident will result in a review of one counterterrorism operation in January 2015, but not of the thirteen-year drone program itself.) Jeremy Scahill, “Germany is the Tell-Tale Heart of America’s Drone War,” The Intercept, April 17, 2015. Amid fierce European criticism of America’s targeted killing program, U.S. and German government officials have long downplayed Ramstein’s role in lethal U.S. drone operations and have issued carefully phrased evasions when confronted with direct questions about the base. But the slides show that the facilities at Ramstein perform an essential function in lethal drone strikes conducted by the CIA and the U.S. military in the Middle East, Afghanistan and Africa… “Ramstein carries the signal to tell the drone what to do and it returns the display of what the drone sees. Without Ramstein, drones could not function, at least not as they do now,” the source said. The new evidence places German Chancellor Angela Merkel in an awkward position given Germany’s close diplomatic alliance with the United States. The German government has granted the U.S. the right to use the property, but only under the condition that the Americans do nothing there that violates German law. “U.S. Pacific Command and U.S. Forces Korea,” Senate Armed Services Committee, April 16, 2015. Sen. Lindsey Graham (R-SC): The likelihood of an armed conflict between South Korea and North Korea, how would you evaluate that on 1 to 10 scale, 1 being very unlikely, 10 being highly likely. Say in the next 10 years, general? Gen. Curtis M. Scaparrotti, commander, UN Command/Combined Forces Command/U.S. Forces Korea: Well, sir, I caveat by saying I think that if K.J.U. [Kim Jong-Un] knows that if he were to conduct a conventional attack on South Korea it’d be the end. So I don’t think that’s his purpose. I think it’s to maintain his regime. But I think over a 10-year period it’s above a 5. It’s a 6 probably.Military Cyber Programs and Posture,” Senate Committee on Armed Services, Subcommittee on Emerging Threats and Capabilities, April 14, 2015. Sen. Bill Nelson (D-FL): In your planning, do you plan to hit non-military targets? Eric Rosenbach, principal cyber advisor to the secretary of defense: Sir, I can talk about more detail in a close session, but yes, but in a very, very precise and confined way, they would always adhere to the law of war and all of the things we think about for collateral damage and other targeting. And I’m sure, General McLaughlin can speak more to that and in particular in a classified environment. Nelson: Such as if, for example, that you wanted to take out the enemy’s air defenses, you could go in and knock out power stations, the civilian stations. Rosenbach: Sir, you know, I think talking in a classified environment would be better for specifics and then I can go into great detail about things like that. Alon Ben-David, “Israel Learns About Close Air Support In Gaza,” Aviation Week & Space Technology, March 27, 2015. The fiercest fighting occurred as Israel’s Golani infantry brigade approached the Shejaiya neighborhood, east of Gaza City, where Hamas ordered the Palestinian population to stay put. After 4 hr. of combat, the Israelis suffered 13 casualties. Most of the Golani senior command was either killed or wounded. Under heavy fire and unable to pull back, the brigade begged for heavy air support. IAF [Israeli Air Force] commander Maj. Gen. Amir Eshel decided to act against all safety procedures and ordered the Golani forces to take cover in their armored vehicles. Then, the air force began dropping dozens of 2,000-lb. Joint Direct Attack Munitions on the building sheltering Palestinian combatants, within 100 meters of friendly forces. In 2 hr., Shejaiya absorbed more than 100 tons of explosives, which inflicted massive destruction on the neighborhood. Israeli forces were able to pull back and evacuate their casualties. Palestinians reported that 40 people, both combatants and civilians, were killed in the bombing. The following day, the Golani brigade reentered Shejaiya to complete its mission. Word about the extremely close air support that the brigade received quickly spread to other brigades, which then asked the air force to provide them with the same support. The air force did that at several other locations, practically destroying the first few rows of buildings on the outskirts of Palestinian urban areas. “Those days taught us that from now on, any ground maneuver into a dense urban area will have to be very closely supported from the air,” says an air force official, “and that the entry ticket into a serried [compact] urban area is 100‑200 tons of munitions.” Stephen Watts, “Identifying and Mitigating Risks in Security Sector Assistance for Africa’s Fragile State,” RAND Corporation, 2015, p. 29. DoD [Department of Defense] planners do not themselves, however, have formal processes designed to identify risks ahead of time and take steps to mitigate them. State Department personnel are highly sensitive to the potential political risks of such assistance, but they typically think about risk identification and mitigation in highly informal, intuitive ways—ways that at least some at the State Department contend are inadequate to the many challenges posed by SSA [security sector assistance]. Moreover, the State Department does not have adequate resources to oversee its current commitments, much less an expanded approach to risk identification and mitigation. Neither DoD nor the State Department, in other words, appears well positioned to identify and mitigate SSA risks. (3PA: This paragraph, which is based upon interviews with Pentagon and State Department staffers, makes clear why the U.S. government is so unable to identify and prevent conflict.)