History
Paragraphs

This is the fourth and final volume in a pioneering series on the Chinese military. It begins with an examination of Chinese military culture and history, with special attention to the transition from Mao Zedong's revolutionary doctrine and the conflict with Moscow to Beijing's preoccupation with Taiwanese separatism and preparations for war to thwart it. Because such a war might involve the United States, the Chinese have concentrated on measures to deter American intervention. Part II focuses on the military and decisionmaking, first in the National Command Authority and then in the People's Liberation Army's command-and-control prioritizing system. Part III provides a detailed study of the Second Artillery, China's strategic rocket forces. Based in part on interviews, the book provides an unprecedented look at its history, operational structure, modernization, and strategy. This is followed by a historical account of the air force's long effort to modernize and its role in joint operations and air defense. The book concludes with the transformation of military strategy and shows how it is being tested in military exercises with Taiwan and the United States as "imagined enemies."

A Chinese translation by Litai Xue was published by Mirror Books, Hong Kong, in 2007.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Stanford University Press
Authors
Paragraphs

The emerging schism between the West and the Islamic world makes America's relationship with Turkey--a Western-oriented, democratizing Muslim country--more important than ever. Unfortunately, despite the long history of close collaboration, U.S.-Turkish relations have deteriorated markedly over the last three years. The U.S. invasion of Iraq--and the potential consequences for Turkey with its large Kurdish population--is the primary issue that divides Washington and Ankara, but there are also differences regarding Cyprus, Syria, Iran, Israel, and Hamas, as well as a rising tide of anti-Americanism in Turkey. To repair this important alliance relationship, Washington should establish a regular trilateral dialogue involving the United States, Turkey, and Iraqi Kurds; play a leading role in seeking a settlement to the long-standing dispute over Cyprus; be more active in supporting Ankara's bid for EU membership; and work to create a U.S.-Turkey Cooperation Commission that would meet on a biannual basis to provide a structured forum for government agencies, NGOs, and private sector leaders from both countries to discuss matters of mutual concern.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
Council on Foreign Relations
Authors
Authors
News Type
Commentary
Date
Paragraphs
In the war on terror, the United States has become a military theater of operations. At stake, writes CISAC fellow Laura K. Donohue, is the long-held "principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement."

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All News button
1
-

Professor Li Shian is a Professor of History and Director of American and European Studies at Beijing's Renmin University. He is the Chief Editor of the journal World History and is a Council Member of the China Society for Human Rights Studies, which he has represented at several international human rights conferences. A former Chairman of the History Department at Renmin University, Dr. Li was awarded his doctorate at the University of Birmingham in 1989, and did post-graduate work at Stanford University from July 1990 to October 1992. He is the author of several books, including A Study of American Human Rights History and A History of the Development of Western Capitalism.

Professor Li will deliver remarks on the role human rights plays in US-China relations, from a Chinese perspective. He will begin with an exposition of human rights in traditional and post-1949 China, and drawing on this, review US-China exchanges on human rights post-June 4, 1989. He will discuss different approaches for addressing what Chinese and Americans both recognize as a central if contentious issue in their relations: respect for international laws as they protect both individual and collective freedoms.

Philippines Conference Room

Li Shian Professor of History and Director of American and European Studies Speaker Beijing's Renmin University
Seminars
Paragraphs

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
-

The United Nations Secretariat--the main part of the UN bureaucracy directly under the Secretary-General--has arguably changed or been challenged more than any other part of the UN system in recent years, with more and more mandates and rising expectations. Though much attention has been given to the reform of the Security Council, and though Washington has made UN 'management reform' a core pillar of its UN policy since the Oil-for-Food scandal, the UN Secretariat has nevertheless proved singularly impervious to even the common sense suggestions for improvement. In many ways, there is a greater gap today than at any time in the past between what the Secretariat does, what it's meant to do, and the capacity it has. Why has improvement been so difficult and what have been the recurrent mistakes of UN reform efforts? With the election of a new Secretary-General due in late 2006, can we think about the UN bureaucracy in a different and more practical way?

Thant Myint-U is a visiting senior fellow at the International Peace Academy. He is also a senior advisor to the Conflict Prevention and Peace Forum at the Social Science Research Council and a Fellow of the Cambridge University Centre for History and Economics.

From 2000-2006 he worked in the United Nations Secretariat, first for the Office for the Coordination of Humanitarian Affairs (OCHA) and then for the Department of Political Affairs (DPA). From 2004-5 he was Chief of DPA's Policy Planning Unit of the Department of Political and in 2005-6 he was a Senior Political Officer in the Executive Office of the Secretary-General. In 2004 he was also a member of the Secretariat of the Secretary-General's High Level Panel on Threats, Challenges and Change.

Thant Myint-U has also served on three United Nations peacekeeping operations, with UNTAC in Cambodia in 1992-3 and with UNPROFOR and UNMIBH in the former Yugoslavia from 1994-6. In 1994 he was the UN's senior spokesman in Sarajavo.

From 1994-1999 Thant Myint-U was a fellow of Trinity College Cambridge, where he researched and taught Asian and British imperial history. He received his bachelor's degree from Harvard University in 1988, his master's degree in international relations from the Johns Hopkins School of Advanced International Studies in 1992 and his PhD in history from Cambridge University in 1996.

He is the author of several published and broadcast works, including two books: The Making of Modern Burma (Cambridge University Press, 2000) and The River of Lost Footsteps: Remembering Burma's Past (Farrar, Strauss and Giroux, 2006 forthcoming).

Reuben W. Hills Conference Room

Thant Myint-U Senior Visiting Fellow Speaker International Peace Academy
Seminars
Authors
News Type
Commentary
Date
Paragraphs
One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken. Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? CISAC science fellow Jonathan Farley, writing in the San Francisco Chronicle, suggests they can.

Imagine a land where bombs explode almost daily and children are killed by terrorists without conscience. On one side we find a people who suffered through the horror of slave-labor death camps; on the other side a people who suffered through a terrible war -- which they began when what they felt was their property was seized from them -- a terrible defeat and (for them) a terrible occupation. Now imagine those same peoples 15 years later, living side by side, peacefully.

This sounds like a pipe dream: The Middle East could never be this way, we think. But we do not need to imagine this land.

We are living in it.

One century after America's Civil War, the descendants of slaves daily faced the twin terrors of homicide and arson. Yet only 15 years after the rise of the Rev. Martin Luther King Jr., the back of segregation and neo-Confederate violence had been broken.

Can Palestinians likewise mount a successful, nonviolent movement toward peaceful co-existence with their former adversaries? In short, can history repeat itself?

How expensive would it be for us if it did not? America spends an estimated $3 billion a year in support of Israel. This support is justified because Israel is a democracy and our main ally in the region. Yet we also spend $2 billion supporting Israel's nondemocratic neighbor, Egypt. Billions more have been spent maintaining bases in Saudi Arabia, Kuwait and now Iraq. We justify these expenditures by surrendering to the serpentine excuses of realpolitik: We need the support of key figures and families in the region, we say, and so we have to work with them. Just as we once said of the Dixiecrats and other segregationist politicians in the American South.

We can transform this paradigm, as we did then, and at little cost to ourselves. We can utilize the experience of the civil rights movement -- which Secretary of State Condoleezza Rice knows all too well (her childhood friend was killed by an improvised explosive device in segregated Birmingham) -- to assist Palestinians in their stride toward peace. What we need is a Muslim Martin Luther King.

Many believe that leaders are born, not made, but programs to cultivate leadership and promote good will among men have been used successfully for generations. Oxford's Rhodes Scholarship is one such example. Its idea is to bring the best and brightest from the British Commonwealth (and beyond) to build strong ties among English-speaking peoples, and stronger ties to England. Founder Cecil Rhodes, pirate though he was, wished for there to be "an understanding between the three great powers" -- America, Britain and Germany -- that "will render war impossible."

What we recommend is a sister program for the Middle East. One could hold a competition for the 30 best young orators in the Palestinian diaspora. (King first gained prominence at age 26, and the Rhodes Scholarship is only for men and women under that age.) Send them to an American institution such as Stanford University, where they could study for the doctorate under Professor Clayborne Carson, director of the Martin Luther King Jr. Papers Project and historian of the civil rights movement and the Student Non-Violent Coordinating Committee. Then, after they have spent several years studying the African American experience with special courses and lecturers, focusing especially on the efficacy of nonviolent direct action, send them back to their native lands.

This is no program of indoctrination. Indeed, it would be detrimental if American spy organizations were to infiltrate or interfere with the King scholars in any way: the scholars would lose all credibility at home. Just as King spoke out against Southern injustice (and American injustice in Vietnam), the King scholars must be free to criticize America and, it is to be expected, the occupation. They would not be able to lead the Arab street otherwise.

By bringing young leaders from the region, we would avoid disasters like the U.S. Army's flirtation with mathematician Ahmed Chalabi, a man who had no real roots in Iraq, but whom America still wished to enthrone as a new shah. The Chalabi experiment blew up in America's face like a roadside bomb.

The King scholarship program might cost only $2 million per year -- an endowment of perhaps $20 million could put it on its feet indefinitely. And, coupled with the application of "soft power," the export of American culture -- notably, hip-hop music, which serves both as a mechanism for promoting intercultural understanding and as a nonviolent channel for youthful aggression -- one could reasonably expect to see the flower of peace bloom in the desert of despair.

Two specific aspects of the civil rights movement would be most effective in resolving the Israeli-Palestinian conflict: first, the proper utilization of legal instruments as a way to wage a nonviolent campaign; second, the utilization of mosques to mobilize a nonviolent grassroots struggle. Mosques in the West Bank and Gaza can be used to promote peace over violence and terrorism, and the African American experience can teach Palestinians how to do this.

In "The Trial" by Franz Kafka, at one point two men stand outside a gate. One seeks to enter; the other seeks to prevent him from entering. Both men wait there for their entire lives. Though one is guard and the other the one guarded, both men are prisoners.

In game theory, the branch of mathematics made famous by "A Beautiful Mind," there is a paradox called the Prisoners' Dilemma. Each of two prisoners may believe it is in his best interests to harm the other, but one can mathematically prove that both men would be better off if they cooperated. A King scholars program might help us resolve the prisoners' dilemma that is the Middle East.

This is a utopian dream, perhaps. But another man dreamed, once, and we all know what became of that man's dream.

We are living it.

All News button
1
-

Alla Kassianova has spent most of her professional life at Tomsk State University in Russia where she received an undergraduate degree in history and a PhD in historiography. She now teaches at the university's Department of International Relations. She is interested in Russia's foreign policy and security policy. Currently, Kassianova's research focuses on the defense industrial dimension of international security relationships.

Reuben W. Hills Conference Room

Alla Kassianova CISAC Affiliate and Fellow, Stanford Humanities Center Speaker Stanford University
Seminars
-

Philip Coyle is a recognized expert on U.S. and worldwide military research, development and testing, on operational military matters, and on national security policy and defense spending, including defense acquisition reform and defense procurement. He also has extensive background in missile defense, in military space systems, and in high-technology weapons, such as high power lasers and other directed-energy weapons.

From Sept. 29, 1994, through Jan. 20 2001, Coyle was assistant secretary of defense and director of Operational Test and Evaluation, in the Department of Defense, and he is the longest serving director in the 20-year history of the office. In this capacity, he was the principal advisor to the secretary of defense on test and evaluation at DoD.

Appointed by President George W. Bush to serve on the 2005 Defense Base Realignment and Closure Commission, Coyle is currently serving on that commission, and was nominated for this position by House Minority Leader Nancy Pelosi. Coyle has 40 years experience in research, development, and testing matters. From 1959 to 1979, and again from 1981 to 1993, he worked at the Lawrence Livermore National Laboratory in Livermore, California. From 1987 to 1993, he served as laboratory associate director and deputy to the laboratory director. In recognition of his 33 years service to the laboratory and to the University of California, the university named him laboratory associate director emeritus.

Coyle graduated from Dartmouth College with an MS in mechanical engineering (1957) and a BA (1956). His wife, Dr. Martha Krebs, was assistant secretary of energy and director of the office of science from 1993 to 2000, and was the founding director of the new California NanoSystems Institute, a research partnership between UCLA and U.C. Santa Barbara. They have four grown children and four grandchildren, and live in Los Angeles.

Reuben W. Hills Conference Room

Philip Coyle Former Assistant Secretary of Defense for Operational Tests and Evaluation Speaker
Seminars
-

Matthew Rojansky is a JD candidate at Stanford Law School and a CISAC predoctoral fellow. His research focuses on international law and security, counter-terrorism and counter-proliferation. He is currently conducting a study of UN Security Council legitimacy in the global counter-terrorism context, and developing a theory of network-based attribution for internationally wrongful acts. He has worked for the U.S. Department of Justice's Office of Special Investigations, the National Democratic Institute for International Affairs, the Israel Ministry of Foreign Affairs, and private law firms, where he has worked on international trade and IP litigation.

He received an AB in Soviet history from Harvard University. Next year, he will serve as a clerk for the United States Court of Appeals for the Armed Forces.

Reuben W. Hills Conference Room

Matthew Rojansky Speaker
Seminars
Subscribe to History