Strategic Studies Quarterly

Volume 10 Issue 4 - Winter 2016

  • Published
  • Strategic Studies Quarterly, Air University, Maxwell AFB, AL
Commentary


NASA in the Second Space Age: Exploration, Partnering, and Security

Todd Harrison and Nahmyo Thomas

The next administration should set a new space exploration strategy for NASA by pushing the boundaries of human knowledge, bringing new partners into the club of responsible, spacefaring nations, and extending US leadership in space.

FEATURE ARTICLE


Why Washington Doesn’t Debate Grand Strategy

Benjamin H. Friedman and Justin Logan

Debate over grand strategy is nearly absent in US politics. The elite consensus in favor of primacy saps political demand for critical analysis or alternative grand strategies. Washington think tank analysts and public intellectuals have no incentive to buck the conventional line and question primacy 

PERSPECTIVES

Liberating Cyber Offense

James E. McGhee

Offensive cyber operations are increasingly an important part of our national defense. However, they are not as simple as pushing a button on a keyboard. Four problem areas exist, but certain changes can assist operators and commanders to more efficiently conduct cyber operations. 

Does China Have a Monroe Doctrine? Evidence for Regional Exclusion
Steven F. Jackson

China specifically denies having a Monroe Doctrine excluding other countries from the Asia-Pacific region. However, its current behavior, and declarations point toward development of a regional exclusion doctrine. 

Prohibiting Interference with Space-Based Position, Navigation, and Timing
Jonty Kasku-Jackson

The United States must lead the way in establishing a norm prohibiting interference with satellites and control segments of space-based PNT systems. Concerns could be minimized by certain transparency and confidence-building measures. 

Managing Decentralized Cyber Governance: The Responsibility to Troubleshoot
Mark Raymond

There is no guarantee the future evolution of the cyber-regime complex will occur in a manner conducive to Internet stability and interoperability. The “responsibility to troubleshoot” (R2T) is an important hedge against the significant costs associated with cyber disruption.

DOWNLOAD FULL EDITION
 Download in PDF Format Download in IBook Format   Download in Nook Format Download in Kindle Format 

Join the Strategic Conversation

Visit the Air University Press on FacebookFacebook Logoand Join the Strategic Conversation.

What are your thoughts on SSQ?

Air University Press Logo