Tag Archives: topic week

The Threat, Defense, and Control of Cyber Warfare

NAFAC Week

By Lin Yang Kang

The Internet has grown phenomenally since the 1990s and currently has about 3.5 billion users who make up 47 percent of the world population.1 Out of the 201 countries surveyed, 38 percent have a penetration rate of at least 80 percent of its population.2 The ubiquity and reliance on cyberspace to improve the efficiency and capability of government, military, and civilian sectors lead to the Internet of Things (IOT) for day-to-day operations and in this pervasiveness of the use of Internet lies the potential for devastating cyber-attacks.

This paper seeks to discuss the crippling effects and dangers of cyber-attacks and outline the defensive responses against and control of cyber warfare.

The lethality, and hence appeal of cyber warfare, lies in its asymmetric3 and stealthy nature. Little resource, such as teams of experienced hackers, is required to render a disproportional amount of devastating damage to the core and day-to-day operations of both the government as well as the military. Unlike conventional warfare where a military build-up and transportation of resources are tell-tale signs of preparation, cyber-attacks can be conducted without warning. In this regard, it is akin to covert operations, such as the use of Special Forces or submarines, with added advantage of not exposing soldiers to the risk of harm. Coupled with the inherent difficulty in pinpointing attribution,4 subjects of a cyber-attack are left with the choice of either doing nothing except to try to recover or to retaliate against the suspected attacker without concrete proof and lose moral high ground, neither of which is optimal.

An example of a well-coordinated attack demonstrating the covert nature of cyber warfare occurred in 2007 when the Estonian government and government-related web-services were disabled.5 Though no physical damage was inflicted, it created widespread disruption for Estonian citizens. While Russia was the suspected perpetrator, it was never proven or acknowledged. In 2010, it was discovered that Iranian nuclear centrifuges that are responsible for enriching uranium gas had been infected and crippled by a malware, codenamed “Stuxnet.”This successful insertion of this malware effectively set the Iranian nuclear program back for a few years and demonstrated an effective and non-attributable way7 to pressurize if not exert will without the use of military might as it achieved what the United Nations Security Council (UNSC) had hitherto failed to do, i.e., curtail the development of nuclear weapons by Iran.

The above examples illustrate the potential damage of small-scale and limited cyber-attacks. Extrapolating from these examples, it is conceivable that the damage from a successful large-scale cyber-attack on a well-connected country that relies heavily on IOT can range from disruption of essential services, crippling confusion and even operational paralysis of both government and the military. For the government, a cyber-attack across every essential means and aspects of daily living including but not limited to destruction of financial data, records and transactions, forms of travel, communication means, and national power grid create chaos and confusion resulting in psychological shock that will in turn sap the will and resilience of the citizens. For the military, the irony is that the more modern and advanced a military is with its concomitant reliance on technology and network centric warfare, the more vulnerable it is to a potential cyber Pearl Harbor attack that will render its technological superiority over its adversary impotent. Given the symbiotic relation between the government and the military, a successful simultaneous cyber-attack on both government and the military can achieve Sun Tze’s axiom that the supreme art of war is to subdue the enemy without fighting.

Given its unique nature and unmatched demonstrated potential for lethality, it is understandable the attractiveness of cyber warfare as an instrument of choice for all players, both state and non-state actors and even individuals. As with all other forms of warfare, the need for defense against should be proportional to the threat. It is a game of cat and mouse,8 where hackers seek to find security vulnerabilities while defenders attempt to patch them up as soon as they are exploited and redirect the attackers to digital traps, preventing them from obtaining crucial information or cause damages. Specialized cyber warfare military branches have been formed in many countries, and extensive cyber defensive measures and contingency plans are being developed by government, military, and civil sectors of states. Through inter-cooperation, potential attacks could be resolved in the shortest time possible and minimize disruption, while preventing future attacks. As the world begins to witness the increasing use of cyber warfare as a weapon, cyber-attacks may not be as easy to conduct as before as states that understand the lethality of such attacks seek to safeguard their nation.9

Beyond defense at the national level, there is a lack of well-defined norms on the rules of cyber warfare as the international law community is still interpreting how current law of war can apply to cyber warfare. Recently, Tallinn Manual 2.0 was published by NATO’s Cooperative Cyber Defence Centre of Excellence (CCDOE) and is to date the most detailed study of how existing international laws can govern cyber operations.10 However, it currently serves as a reference and is non-binding. It is crucial for nations to iron out the rules for cyber warfare together and abide by it, ensuring that it will not affect the lives of civilians and minimize potential damages to non-military installations by cyber-attacks and cyber warfare.

Cyber warfare is a real and growing threat which has the potential to create disruption that the world has yet to witness. As nations become even more reliant on cyberspace as it ventures into automation and smart cities, they need to invest adequately in cyber defense and ensure that this new frontier is well-guarded. Apart from dealing with it domestically, on an international level, rules of cyber warfare need to be clarified and be abided by the international community to safeguard civilians. Cyber warfare may be threatening, but if the international community abides by clarified rules of cyber warfare and has sufficient cyber defensive measures established, the potential devastation caused by cyber-attacks could be minimized.

Yang Kang is a naval officer from the Republic of Singapore and a freshman at the Nanyang Technological University (NTU) in Singapore currently studying Electrical and Electronics Engineering. Before attending NTU, Yang Kang underwent midshipman training in Midshipman Wing, Officer Cadet School of the Singapore Armed Forces and was appointed Midshipman Engineering Commanding Officer during the Advanced Naval Term, his final phase of training.

Bibliography

Barker, Colin. “Hackers and defenders continue cybersecurity game of cat and mouse.” ZDNet. February 04, 2016. Accessed March 28, 2017. http://www.zdnet.com/article/hackers-and-defenders-continue-cyber-security-game-of-cat-and-mouse/.

Davis, Joshua. “Hackers Take Down the Most Wired Country in Europe.” Wired. August 21, 2007. Accessed March 21, 2017. https://www.wired.com/2007/08/ff-estonia/.

Geers, Kenneth. Strategic cyber security. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence, 2011.

Zetter, Kim. “An Unprecedented Look at Stuxnet, the World’s First Digital Weapon.” Wired. November 03, 2014. Accessed March 21, 2017. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/.

“Cyber Warfare Integral Part of Modern Politics, New Analysis Reaffirms.” NATO Cooperative Cyber Defence Centre of Excellence. December 01, 2015. Accessed March 15, 2017. https://ccdcoe.org/cyber-warfare-integral-part-modern-politics-new-analysis-reaffirms.html.

“Global Cybersecurity Index & Cyberwellness Profiles Report.” April 2015. Accessed March 23, 2017. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf.

“NATO presents the Tallinn Manual 2.0 on International Law Applicable to cyberspace.” Security Affairs. February 05, 2017. Accessed March 25, 2017. http://securityaffairs.co/wordpress/56004/cyber-warfare-2/nato-tallinn-manual-2-0.html.

“Internet Users by Country (2016).” Internet Users by Country (2016) – Internet Live Stats. Accessed March 20, 2017. http://www.internetlivestats.com/internet-users-by-country/.

“Internet Users.” Number of Internet Users (2016) – Internet Live Stats. Accessed March 20, 2017. http://www.internetlivestats.com/internet-users/.

“The Asymmetric Nature of Cyber Warfare.” USNI News. February 05, 2013. Accessed March 20, 2017. https://news.usni.org/2012/10/14/asymmetric-nature-cyber-warfare.

“The Attribution Problem in Cyber Attacks.” InfoSec Resources. July 19, 2013. Accessed March 25, 2017. http://resources.infosecinstitute.com/attribution-problem-in-cyber-attacks/#gref.

1. “Internet Users.” Number of Internet Users (2016) – Internet Live Stats. Accessed March 20, 2017. http://www.internetlivestats.com/internet-users/.

2. “Internet Users by Country (2016).” Internet Users by Country (2016) – Internet Live Stats. Accessed March 20, 2017. http://www.internetlivestats.com/internet-users-by-country/.

3. “The Asymmetric Nature of Cyber Warfare.” USNI News. February 05, 2013. Accessed March 20, 2017. https://news.usni.org/2012/10/14/asymmetric-nature-cyber-warfare.

4. “The Attribution Problem in Cyber Attacks.” InfoSec Resources. July 19, 2013. Accessed March 25, 2017. http://resources.infosecinstitute.com/attribution-problem-in-cyber-attacks/#gref.

5. Davis, Joshua. “Hackers Take Down the Most Wired Country in Europe.” Wired. August 21, 2007. Accessed March 21, 2017. https://www.wired.com/2007/08/ff-estonia/.

6. Zetter, Kim. “An Unprecedented Look at Stuxnet, the World’s First Digital Weapon.” Wired. November 03, 2014. Accessed March 21, 2017. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/.

7. The United States and Israel were allegedly responsible for this cyber attacked but as with the Estonian example, it was never proven or acknowledged.

8. Barker, Colin. “Hackers and defenders continue cybersecurity game of cat and mouse.” ZDNet. February 04, 2016. Accessed March 28, 2017. http://www.zdnet.com/article/hackers-and-defenders-continue-cyber-security-game-of-cat-and-mouse/.

9. “Global Cybersecurity Index & Cyberwellness Profiles Report.” April 2015. Accessed March 23, 2017. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf.

10. “NATO presents the Tallinn Manual 2.0 on International Law Applicable to cyberspace.” Security Affairs. February 05, 2017. Accessed March 25, 2017. http://securityaffairs.co/wordpress/56004/cyber-warfare-2/nato-tallinn-manual-2-0.html.

Featured Image: U.S. sailors assigned to Navy Cyber Defense Operations Command man their stations at Joint Expeditionary Base Little Creek-Fort Story, Va., Aug. 4, 2010. NCDOC sailors monitor, analyze, detect and respond to unauthorized activity within U.S. Navy information systems and computer networks. (U.S. Navy photo by Petty Officer 2nd Class Joshua J. Wahl)  

Science Diplomacy in the Arctic

NAFAC Week

By Jackie Faselt

As icecaps melt and access to natural gas and oil reserves increase, the Arctic rises in importance on the geopolitical stage. In addition to the various groups of indigenous people who reside in the Arctic, eight countries Russia, Finland, Sweden, Norway, Iceland, Denmark, Canada, and the United States have claimed interest in the Arctic. Diplomacy between the different groups is required for cooperation and organization in the complicated region. Due to its importance in environmental security, sizable natural resource reserves, and remote location, the Arctic incentivizes cooperation through science diplomacy.

Science diplomacy is defined by the Royal Society and American Association for the Advancement of Science as threefold: “Informing foreign policy objectives with scientific advice, facilitating international science cooperation, [and] using science cooperation to improve international relations between countries.”1 Science diplomacy has accomplished much in the past, both between allied nations, and in situations when traditional lines of cooperation were fraught. For example, the warming of relations with China during the Nixon administration and cooperation in the International Space Station both resulted, or were sustained in part due to science diplomacy.2 It should be noted, however, that there are barriers to science diplomacy. Policymakers and scientists alike can be confused about how this type of diplomacy is different from general scientific cooperation and additionally, “after generations of colonialism and geopolitical maneuvering, developing nations may be wary of science engagement with the North.”3 The Arctic region has existing channels of successful science diplomacy, which hopefully can be sustained into the future.

In 1909 Robert Peary, and American explorer, reached the North Pole and claimed it for the President of the United States. Since then, Russia, Finland, Sweden, Norway, Iceland, Denmark, and Canada have all made claims or asserted influence in the region.4 The first international agreement regarding the Arctic came from the United Nations Convention on the Continental Shelf, which was signed in 1958 and allowed for coastal states to explore resources on their continental shelf.5 It was superseded by the UN Convention on the Law of the Sea, which “grants coastal states a 200-nautical-mile exclusive economic zone and allows them to assert control over territory beyond that limit if they can prove, geologically, that the seabed is an extension of their continental shelf.”6 However, it is notable that the United States did not sign the agreement until 2013 and still has yet to ratify it.

International agreements and organizations in the Arctic specific to the scientific community began gaining ground over 30 years ago. In 1990, the International Arctic Science Committee (IASC) was created, and the following year the Arctic Environmental Protection Strategy agreement was adopted by the eight arctic states as well as some indigenous communities.7 These international organizations and agreements provide a base not only for scientific cooperation, but also science diplomacy. For example, the mission statement of the IASC contains all three components of science diplomacy as stated by the American Association for the Advancement of Science: informing policy, promoting cooperation, and using that cooperation to progress international relations. The mission statement includes the following objectives:

  • “Provides objective and independent scientific advice on issues of science in the Arctic and communicates scientific information to the public;
  • Initiates, coordinates and promotes scientific activities at a circumarctic or international level;
  • Promotes international access to all geographic areas and the sharing of knowledge, logistics and other resources;”8

The Arctic Council was formed in 1996 with all the arctic states, as well as six groups of indigenous peoples, serving as members. It houses six scientific working groups: Arctic Contaminants Action Program, The Arctic Monitoring and Assessment Program, Conservation of Arctic Flora and Fauna Working Group, Emergency Prevention, Preparedness and Response Working Group, Protection of the Arctic Marine Environment, and the Sustainable Development Working Group.9 As the Arctic becomes increasingly more important for environmental security, these institutions can act as the foundation for increased science diplomacy.

Global climate change has brought the Arctic closer to the forefront of the international stage. The Arctic Ocean is currently warming at double the rate of any other place on our planet.10 As ice caps melt, the region has become more accessible to both countries and private corporations to drill for oil and gas in large, untouched reserves.11 Both the environmental and the resource importance of the region requires the involvement of scientists and technologists at the Arctic. Due to the remoteness of the region and the harshness of the environment, cooperation has been incentivized for cost sharing of logistic and facility resources.12 There are enough common interests among the Arctic states to incentivize cooperation. These de-facto partnerships can be used as a foundation on which to build further collaboration, through traditional and science diplomacy channels.

While there are existing structures to promote science diplomacy in the Arctic, improvements can be made. Recommendations for improved science diplomacy include increasing partnerships between the government, the private sector, universities, and NGOs, as well as involving youth in scientific diplomacy efforts.13 There has also been efforts to promote, “greater scientific expertise within the Foreign Service and the State Departments,” in order to institutionalize scientific diplomacy channels.14  The countries that have created official positions of Science & Technology Advisors to Foreign Ministers are New Zealand, Oman, Poland, Senegal, Japan, the United Kingdom, and the United States.15 If more Arctic states follow suit, science diplomacy can continue to grow in the Arctic.

The foundation of science diplomacy has been established in the Arctic and can be sustained and expanded if the Arctic states decide to follow the incentives of cooperation that is inherent in the unique region. The Arctic states should capitalize on this opportunity and push for expanded science diplomacy efforts. 

Jackie Faselt is a senior at Tufts University interested in international security and technology policy. On campus, she is involved in Alliance Linking Leaders in Education and the Services (ALLIES), a civil-military relations club. She has interned at the National Defense University in the Center for Technology and National Security Policy, as well as at the Consortium for Gender, Security, and Human Rights.

Bibliography 

“About Us – Arctic Council.” Arctic Council, May 23, 2016. http://arctic-council.org/index.php/en/about-us.

Berkman, Paul. “Stability and Peace in the Arctic Ocean through Science Diplomacy.” Science & Diplomacy 3, no. 2 (June 2014). http://www.sciencediplomacy.org/perspective/2014/stability-and-peace-in-arctic-ocean-through-science-diplomacy.

McCormick, TY. “Arctic Sovereignty: A Short History.” Foreign Policy, May 7, 2014. https://foreignpolicy.com/2014/05/07/arctic-sovereignty-a-short-history/.

National Research Council (U.S.), and National Research Council (U.S.), eds. U.S. and International Perspectives on Global Science Policy and Science Diplomacy: Report of a Workshop. Washington, D.C: National Academies Press, 2012.

“New Frontiers in Science Diplomacy: Navigating the Changing Balance of Power.” The Royal Society, January 2010. https://www.aaas.org/sites/default/files/New_Frontiers.pdf.

“Science & Technology Advisors to Foreign Ministers Panel Dialogue.” Tufts Fletcher School, February 19, 2017. http://fletcher.tufts.edu/Calendar/2017/02/19/Science-Technology-Advisors-to-Foreign-Ministers-Panel-Dialogue-.aspx.

The International Arctic Science Committee. “About IASC – International Arctic Science Committee.” Accessed March 17, 2017. http://iasc.info/iasc/about-iasc.

“The Power of Science Diplomacy: A View from the South.” NEWSLETTER A PUBLICATION OF THE WORLD ACADEMY OF SCIENCES, 2014.

“United Nations Convention on the Continental Shelf.” Council on Foreign Relations. Accessed March 17, 2017. http://www.cfr.org/world/united-nations-convention-continental-shelf/p21071.

1. National Research Council (U.S.), eds., U.S. and International Perspectives on Global Science Policy and Science Diplomacy: Report of a Workshop (Washington, D.C: National Academies Press, 2012), 27.

2. “The Power of Science Diplomacy: A View from the South,” NEWSLETTER A PUBLICATION OF THE WORLD ACADEMY OF SCIENCES, 2014, 2.

3. “The Power of Science Diplomacy: A View from the South”, 7.

4. TY McCormick, “Arctic Sovereignty: A Short History,” Foreign Policy, May 7, 2014, https://foreignpolicy.com/2014/05/07/arctic-sovereignty-a-short-history/.

5. “United Nations Convention on the Continental Shelf,” Council on Foreign Relations, accessed March 17, 2017, http://www.cfr.org/world/united-nations-convention-continental-shelf/p21071.

6. TY McCormick

7. Paul Berkman, “Stability and Peace in the Arctic Ocean through Science Diplomacy,” Science & Diplomacy 3, no. 2 (June 2014), http://www.sciencediplomacy.org/perspective/2014/stability-and-peace-in-arctic-ocean-through-science-diplomacy.

8. The International Arctic Science Committee, “About IASC – International Arctic Science Committee,” accessed March 17, 2017, http://iasc.info/iasc/about-iasc.

9. “About Us – Arctic Council,” Arctic Council, May 23, 2016, http://arctic-council.org/index.php/en/about-us.

10. Paul Berkman

11. ibid

12. “New Frontiers in Science Diplomacy: Navigating the Changing Balance of Power” (The Royal Society, January 2010), https://www.aaas.org/sites/default/files/New_Frontiers.pdf., 25

13. National Research Council (U.S.), eds., U.S. and International Perspectives on Global Science Policy and Science Diplomacy: Report of a Workshop, 38-39.

14. ibid

15. “Science & Technology Advisors to Foreign Ministers Panel Dialogue,” Tufts Fletcher School, February 19, 2017, http://fletcher.tufts.edu/Calendar/2017/02/19/Science-Technology-Advisors-to-Foreign-Ministers-Panel-Dialogue-.aspx.

Featured Image: ICESCAPE scientist and Clark geography Professor Karen Frey takes optical measurements in a melt pond, with the U.S. Coast Guard Cutter Healy in the background. (NASA’s Goddard Space Flight Center/Kathryn Hansen)

NAFAC Week Kicks Off on CIMSEC

By Dmitry Filipoff

This week CIMSEC will publish essays selected from the 16 round tables from the 57th Naval Academy Foreign Affairs Conference (NAFAC) held last week that focused on great power competition. Read the list of the round tables’ topics here. Below is a list of the publications as they will feature. We appreciate NAFAC’s partnership in helping us publish these excellent student essays.

Science Diplomacy in the Arctic by Jackie Faselt
The Threat, Defense and Control of Cyber Warfare by Lin Yang Kang
Understanding Systems of International Order by Kimmie Ross
Saving the Lives of Maritime Passageways: The Coast Guard and Maritime Chokepoints by Victoria Castleberry

India’s Bid for Global Power in a Multi-Polar System During Development by Corey Bolyard
Great Power Cooperation and the Role of International Organizations by Emil Krauch
Iran and Saudi Arabia’s Proxy War in Yemen by Rose Cote
Multinational Corporations in the Oil Industry by Monica Sullivan
A Balancing Act: U.S. and the Cross-Strait Relation by Jenny Chau Vuong

The Middle Way: A Balanced Approach to Growing America’s Navy by Riley Jones
The Reawakening of the Russian Bear by Jared Russel
The Beijing Consensus: A Threat of our own Creation by Jhana Gottlieb
The Unfriendly Scramble for Everywhere: Investment’s Role in Foreign Policy by Phillip Bass
Assessing the United States’ Bioterrorism Preparation by Samuel Klein
The Next Great Space Race: From a Sprint to a Marathon by Madison Fox
Understanding the Role of Hybrid Warfare and U.S. Strategy for Future Conflicts by Rebecca Farrar

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at [email protected]

Featured Image: U.S. Naval Academy (Wikimedia Commons)

European Maritime Security Week Wraps Up on CIMSEC

By Dmitry Filipoff

Last week CIMSEC published articles analyzing European maritime security submitted in response to our Call for Articles. Submissions discussed various topics including but not limited to high-end and hybrid warfighting challenges in the Baltic, humanitarian operations in the Mediterranean, and strategic thinking on maritime arenas far from the European continent. We thank our authors for their excellent contributions, listed below.

The Case for a Constant NATO CSG Presence in the Mediterranean by Jason Chuma

“NATO should maintain a continuous Carrier Strike Group (CSG) presence in the Mediterranean. A CSG patrolling the Mediterranean, especially in the eastern Mediterranean near Tartus, would be an overt display to Russia that NATO has not forgotten about the Mediterranean.”

Integrating Maritime Security Operations in the Mediterranean by Evmorfia-Chrysovalantou Seiti

“This work will analyze the external actors present in the Mediterranean and the schemes of cooperation for preventing a spillover effect, which can not only impact the European continent but global affairs.”

Russia’s Black Sea Fleet Buildup and Modernization by Alex Schneider

“An enlarged and more advanced Black Sea Fleet has the potential to provoke substantial tension with the United States and NATO, especially in the Mediterranean Sea. Nevertheless, it also has the potential to act as a security partner for the Alliance for operations against regional—and cross-regional—terrorism, trafficking, and piracy.”

The Baltic: Grey-Zone Threats on NATO’s Northern Flank by Martin N. Murphy, PhD and Gary Schaub, Jr. PhD

“NATO’s leadership termed Russian strategy ‘hybrid warfare,’ defining it as warfare in which “a wide range of overt and covert military, paramilitary, and civilian measures are employed in a highly integrated design.”  Questions were raised immediately about the suitability of the designation, as the label NATO adopted fails to adequately capture the reality of what Russia inflicted on Ukraine—and may inflict on states in the Baltic Sea Region (BSR) in the near future.”

The Asia Pacific and Europe’s Maritime Security Strategy by Dave Andre

“The importance of the region for European trade and business, global economic stability, and international maritime security necessitates that the EU maintain more than just an economic and diplomatic presence in the region. Adding a dedicated maritime presence to the region will involve a balancing act between the competing interests of individual EU members while advancing a comprehensive and unified stance—this goes beyond simple matters of naval capability and capacity.”

An Adequate NATO Maritime Posture: The Missing Element For Deterring Russia by Ian Sundstrom

“Through its invasions of Georgia and Ukraine, its intervention in Syria, and its continued bellicosity at sea and in the air, Russia has proven itself to be a threat to European security once again. NATO has taken actions to deter aggression against its members, but its efforts at sea have been inadequate.”

European Answers for African Questions? by Dirk Siebels

“Africa matters, not only because of migrants boarding rickety boats in Libya to embark on a dangerous trip to Europe. At the same time, European and African governments often have different agendas, underlined by the many challenges to maritime security emanating from the African coastline.”

French Maritime Strategic Thought on the Indo-Pacific by David Scott

“In Europe, France is distinctive in claiming that its boundaries actually extend outside Europe into the Indian Ocean and Pacific Ocean, i.e. the ‘Indo-Pacific,’ through its overseas departments (département d’outre-mer), and overseas territories (territoire d’outre-mer), which are considered integral parts of France, and indeed thereby of the European Union. These Indo-Pacific possessions also have large Exclusive Economic Zones (EEZs). These give France important maritime interests to be maintained, and if need be defended, by the French Navy.”

Resources, Limited Capabilities Challenge Baltic Navies As Russia Threat Grows by Jeremiah Cushman

“The focus on land threats, expense of naval combat platforms, and limited resources have so far prevented the countries from acquiring or maintaining significant naval capabilities. What follows is an analysis of each Baltic State’s respective naval capabilities followed by trends in their combined missions and activities.”

The Role of the Black Sea in Russia’s Strategic Calculus by Byron Chong

“For Russia to achieve these long-term objectives, its supremacy in the Black Sea is a critically enabling factor. The unique geography of the region confers several geopolitical advantages to Russia in its confrontation with the West. As such, the Kremlin has sought measures to strengthen its hold over the region.”

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at [email protected]

Featured Image:Kiel, Germany. 25th June, 2015. German naval soldiers from the frigate ‘Hamburg’ march to a ceremony for the transfer of command over the permanent NATO force in the Mediterranean (Standing NATO Maritime Group 2) in Kiel, Germany, 25 June 2015. (Carsten Rehder/dpa/Alamy Live News