<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:Penn State-Brandywine &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/penn-state-brandywine/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/penn-state-brandywine/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Mon, 20 Jan 2025 13:08:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:Penn State-Brandywine &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/penn-state-brandywine/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>An Uncertain Future for Arms Control</title>
		<link>https://globalsecurityreview.com/an-uncertain-future-for-arms-control/</link>
					<comments>https://globalsecurityreview.com/an-uncertain-future-for-arms-control/#respond</comments>
		
		<dc:creator><![CDATA[Stephen Cimbala]]></dc:creator>
		<pubDate>Mon, 20 Jan 2025 13:08:23 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[American interests]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[bilateral agreements]]></category>
		<category><![CDATA[Budapest Memorandum]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[codes of conduct]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[disarmament]]></category>
		<category><![CDATA[force posture]]></category>
		<category><![CDATA[hostilities]]></category>
		<category><![CDATA[implementation]]></category>
		<category><![CDATA[inspections]]></category>
		<category><![CDATA[Iranian regime change]]></category>
		<category><![CDATA[multilateral agreements]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[NATO Committee on Proliferation]]></category>
		<category><![CDATA[Negative Security Assurances]]></category>
		<category><![CDATA[non-nuclear-weapon Iran]]></category>
		<category><![CDATA[norms]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear deterrent]]></category>
		<category><![CDATA[Nuclear Planning Group]]></category>
		<category><![CDATA[operational decision-makers]]></category>
		<category><![CDATA[opportunities]]></category>
		<category><![CDATA[Penn State-Brandywine]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Stephen Cimbala]]></category>
		<category><![CDATA[sunset period]]></category>
		<category><![CDATA[sustainment]]></category>
		<category><![CDATA[treaties]]></category>
		<category><![CDATA[unilateral declarations]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29846</guid>

					<description><![CDATA[<p>A strong nuclear deterrent reduces risks to the United States and the North Atlantic Treaty Organization (NATO). Such is the view of many within the nuclear enterprise. Arms control and disarmament advocates differ with this view, seeing the deterrent as a risk that must be reduced in size and function via various forms of diplomacy [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/an-uncertain-future-for-arms-control/">An Uncertain Future for Arms Control</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">A strong nuclear deterrent reduces risks to the United States and the North Atlantic Treaty Organization (NATO). Such is the view of many within the nuclear enterprise. </span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Arms control and disarmament advocates differ with this view, seeing the deterrent as a risk that must be reduced in size and function via various forms of </span><a href="https://tnsr.org/2023/03/the-role-of-u-s-diplomacy-in-countering-russias-nuclear-threats-and-misbehavior/">diplomacy</a><span class="normaltextrun"> that range from one-party declarations and codes of conduct to formal arms control agreements. These sorts of undertakings are currently </span><a href="https://www.newparadigmsforum.com/leveraging-strength-into-peace-arms-control-isnt-quite-dead-and-heres-how-to-revive-it">moribund within officialdom</a><span class="normaltextrun">, though enjoying an eternal spring of hope among the single-issue think tanks, academics, and commentators who strive to sway government.</span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Paradoxically the current surge in hostilities between the United States and the axis of autocracy (China, North Korea, and Russia) could furnish the spark that revives official efforts at both improving deterrence and renewed arms control. For instance, an updated Budapest Memorandum might form one component of a settlement or freezing of the Russian invasion of Ukraine. An Iranian “regime change” may also offer a path for a true and verifiable non-nuclear-weapon Iran.</span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">The modality of any future arms control arrangement could vary greatly. Not all arms control arrangements are treaties. Given the current international situation among nuclear-armed states, treaties might indeed be the least likely of modalities. Some modalities that future arms control arrangements could take</span><span class="eop"> include </span>unilateral American declarations, American-backed codes of conduct, American-backed norms, agreement within NATO (such as the Committee on Proliferation or the Nuclear Planning Group), unilateral American renewal of earlier Negative Security Assurances (such as those deposited with the United Nations), bilateral or multilateral statements, bilateral or multilateral memorandum or other agreed instrument short of a treaty, and/or bilateral or multilateral treaties.</p>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><b>The Process of Arms Control</b></p>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><b> </b></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">All these arms control approaches present challenges to American and NATO forces. They also present opportunities to refine force posture and employment options. Three concrete steps are useful in ensuring American and alliance leadership receives constant feedback with operational decision-makers. </span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">First, it is important to sustain collaboration. As government and American allies contemplate arms control arrangements, nuclear-force commanders should offer information on the challenges and opportunities that various permutations of an arrangement present to force posture and operations. Not all ideas are operationally possible. </span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Second, highlight the challenges that an arrangement poses to fielded forces. As part of any discussions, commanders should relate how they would adjust operations as nascent arrangements move toward implementation. This would likely be a stepwise evolution of operations in reaction to implementation of disclosures and intrusion that could accompany various forms of arms control measures. Policymakers rarely understand what their aspirational objectives mean for operational forces.</span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Third, highlight opportunities an arrangement creates for forces. Similarly, commanders should monitor the evolution of arms control arrangements and be on the lookout for arrangements that permit gleaning information about adversary forces—information that is useful in crafting the best force posture, plans, and operational tactics.</span></p>
<p class="paragraph" style="margin: 0in; text-indent: .25in; vertical-align: baseline;"><span class="normaltextrun">These feedback loops would evolve in phases over the time that an arms control arrangement is contemplated, refined, and implemented (or rejected). </span></p>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span class="normaltextrun"> </span></p>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span class="normaltextrun"><b>The Phases of Arms Control</b></span></p>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span class="normaltextrun"><b> </b></span></p>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span class="normaltextrun">Any future arms control agreement should have six phases:</span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Phase 1 takes place during internal American contemplation of potential arms control arrangements. Classified analysis of changes to operations that an arrangement might necessitate are discussed. When inspections are proposed, any detrimental effects to operations from various forms of inspection are discussed. Discussing the benefits of inspecting adversary installations is also an important consideration.</span><span class="eop"> </span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Phase 2 occurs during outreach with adversaries and third-country parties. Internal “food-for-thought” papers from the operational community are prepared for negotiators and strategic-communications personnel. Deliberate public statements such as editorials and conference presentations serve a useful purpose in explaining American interests. </span><span class="eop"> </span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Phase 3 takes place during formalization of an arms control arrangement.</span><span class="eop"> W</span><span class="normaltextrun">hen requested by the Department of Defense, Department of State, National Security Council, the president, or other officials, public statements are made for adversary consumption.</span><span class="eop"> </span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Phase 4 is the implementation phase. This is the period in which an arms control arrangement comes into effect by treaty agreement or as a unilateral/bilateral/multilateral action. Classified reports on implementation progress of the new arrangement are prepared. When inspections are part of the arrangement, coordination between government agencies occurs. </span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Phase 5 is focused on sustainment. During this period an arms control arrangement is in effect. Classified reports address difficulties from the arrangement.</span><span class="eop"> </span></p>
<p class="paragraph" style="margin: 0in; text-indent: .5in; vertical-align: baseline;"><span class="normaltextrun">Phase 6 is the sunset period. This is when the arms control arrangement ends or appears to be faltering. Analysis of the operational steps, timeline, costs, equipment, and personnel necessary to terminate the arms control arrangement is conducted. Classified reports on progress toward ceasing any earlier changes to operations and capabilities, necessitated by the arrangement, are conducted. </span></p>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span class="normaltextrun"> </span></p>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span class="normaltextrun"><b>Conclusion</b></span></p>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span class="normaltextrun"><b> </b></span></p>
<p class="xdefault" style="margin: 0in; text-indent: .5in;">Arms control for the sake of arms control was always a bad idea. The United States is no longer in a position where it can enter into arms control agreements because it furthers an idealist ambition to promote peace. Today, arms control is only useful if it furthers American interests.</p>
<p class="xdefault" style="margin: 0in; text-indent: .5in;">Taking a hard-nosed look at arms control in its various forms is necessary, but it must be acceptable for the answer to be no. The United States is no longer in a position to act altruistically. Russia is a superior nuclear power, and China may reach a similar status within a decade. The world has changed and American leaders must accept that its adversaries are no longer willing to follow America’s lead.</p>
<p class="xdefault" style="margin: 0in;"><i><br />
Professor Stephen Cimbala, PhD, is a professor at Penn State-Brandywine. Views expressed are his own.</i></p>
<p>&nbsp;</p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/01/Prepare-for-the-arms-control-zombies-to-awaken.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png" alt="" width="231" height="64" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w" sizes="(max-width: 231px) 100vw, 231px" /></a></p>
<p><a href="https://globalsecurityreview.com/an-uncertain-future-for-arms-control/">An Uncertain Future for Arms Control</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/an-uncertain-future-for-arms-control/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Drones on the Loose</title>
		<link>https://globalsecurityreview.com/drones-on-the-loose/</link>
					<comments>https://globalsecurityreview.com/drones-on-the-loose/#respond</comments>
		
		<dc:creator><![CDATA[Stephen Cimbala]]></dc:creator>
		<pubDate>Wed, 18 Dec 2024 12:41:16 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Chinese Ministry of Defense]]></category>
		<category><![CDATA[citizens]]></category>
		<category><![CDATA[congress]]></category>
		<category><![CDATA[conspiracy theories]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[environmentalists]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[hawks]]></category>
		<category><![CDATA[Hollywood]]></category>
		<category><![CDATA[intelligence community]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[local government]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[National Institute for Deterrence Studies. ​]]></category>
		<category><![CDATA[New Jersey]]></category>
		<category><![CDATA[New York]]></category>
		<category><![CDATA[Penn State-Brandywine]]></category>
		<category><![CDATA[Pennsylvania tourists]]></category>
		<category><![CDATA[Russian Security Council]]></category>
		<category><![CDATA[sea gulls]]></category>
		<category><![CDATA[shore communities]]></category>
		<category><![CDATA[state department]]></category>
		<category><![CDATA[state government]]></category>
		<category><![CDATA[Steve Cimbala]]></category>
		<category><![CDATA[traffic circles]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29652</guid>

					<description><![CDATA[<p>The state of New Jersey is apparently facing an invasion by unstoppable drones. This development is creating demands for investigation on the part of federal, state, and local governments. Citizens are concerned and media curiosity is at fever pitch. Contacts with foreign sources were not very informative. The Chinese Ministry of Defense denied any use [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/drones-on-the-loose/">Drones on the Loose</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The state of New Jersey is apparently facing an invasion by unstoppable drones. This development is creating demands for investigation on the part of federal, state, and local governments. Citizens are concerned and media curiosity is at fever pitch.</p>
<p>Contacts with foreign sources were not very informative. The Chinese Ministry of Defense denied any use of drones over American or other territory, and their spokesperson added, “We get all the information we need from hacking into US government and industry sources.” They referred Americans to the Russians.</p>
<p>The Russian Security Council denied any involvement in flying drones over the East Coast. “Iran provides most of our drones, go talk to them,” was the only response we could get from officials. They added that President Putin has his own personal drone for use when he is hunting while riding bare chested in the Far East.</p>
<p>Iran’s Foreign Ministry was no more helpful on the issue saying, “Any drones we have will be used for surveillance of Israel or sent to the Russians for the Ukrainians to shoot down.”</p>
<p>Having exhausted foreign sources, Americans turned to domestic agencies. The Department of Homeland Security had no information about drones. “We are fully challenged to cope with unprecedented illegal border crossings, a meltdown of the Secret Service, and a FEMA fiasco in North Carolina to worry about drones,” said one agency official, on background.</p>
<p>The Department of Defense was not any more helpful. They denied having any information about drones, other than to say that there was no evidence of aliens being connected to drone activity in the United States. On the other hand, there was no evidence that the drones were not connected to aliens. They referred Americans to past episodes of <em>The X Files</em>.</p>
<p>The State Department reported that they had no contact with drones other than some foreign ambassadors who were posted to the United States and predictably uninformed about their activities.</p>
<p>The intelligence community said they did not necessarily know anything about drones, but even if they did, it would be classified and could not be shared with the media. This was an understandable reply.</p>
<p>A Republican member of Congress from New Jersey claimed that Iran had launched drones from a “mother ship” somewhere off the coast of the United States and that this information came from highly classified sources. This was corroborated by some boardwalk vendors of pizza in Ocean City and Wildwood, New Jersey. Their credibility was not challenged.</p>
<p>Some residents of New Jersey thought that tourists from Pennsylvania who visit New Jersey beaches during the summer are retaliating for exorbitant rental charges paid in previous years. Given prices, this is certainly an option worth exploring.</p>
<p>Others claimed that the drones were the work of environmentalists angered by shore communities’ wars against sea gulls, including the importation of hawks to chase gulls away from their natural habitats. Recent destruction of irreplicable works of art by environmentalists makes the illicit flying of drones over New Jersey easily conceivable.</p>
<p>Residents of New York suggested that New Jersey was seeking publicity to compensate for its comparative insignificance in national and regional affairs. “New Jersey is simply a suburb of New York and otherwise has no reason to attract news coverage,” was the explanation provided by one New Yorker.</p>
<p>But a New Jersey native came to her state’s defense. New Jersey residents, she said, were mentally exhausted from driving around in their infamous traffic circles until their brains boiled over; aliens or foreign enemies would be a welcome distraction.</p>
<p>An expert in artificial intelligence (AI) suggested that the drone swarms might be the result of an AI experiment gone awry, given the widespread use of “deepfakes” pervasive in social media and other sources. “The Jersey drone swarm could be the opening scene in the next Hollywood spectacular mixing fictitious events (alien invasions) with real events (military drone attacks) in order to smash box office records,” he noted.</p>
<p>Whatever the case may be is still undetermined. Needless to say, the longer it takes to find an answer, the more numerous the conspiracy theories will become. They will also grow increasingly more interesting for sure.</p>
<p><em>Professor Steve Cimbala, PhD, is a Senior Fellow at the National Institute for Deterrence Studies and Professor of Political Science at Penn State-Brandywine.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/12/Drones-on-the-Loose.pdf"><img decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/drones-on-the-loose/">Drones on the Loose</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/drones-on-the-loose/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
