Publications

FILTER:
Joint Force Quarterly

Sept. 30, 2014

A Potent Vector: Assessing Chinese Cruise Missile Developments

The numerous, increasingly advanced cruise missiles being developed and deployed by the People’s Republic of China (PRC) have largely flown under the public’s radar. This article surveys PRC cruise missile programs and assesses their implications for broader People’s Liberation Army (PLA) capabilities, especially in a Taiwan scenario.

Sept. 30, 2014

Understanding the Enemy: The Enduring Value of Technical and Forensic Exploitation

The escalation of improvised explosive device (IED) incidents and related casualties during Operations Iraqi Freedom and Enduring Freedom led to a new intelligence field related to technical intelligence (TECHINT) called weapons technical intelligence (WTI), which combined technical and forensic IED exploitation techniques to link persons, places, things, and events. WTI operationalizes technical and forensic activities by fusing the technical, forensic, and biometric disciplines to produce actionable intelligence for countering threat networks. It is an especially powerful tool against terrorist organizations that rely on IEDs as a primary weapon in their arsenals. Given the enduring nature of the IED problem, careful consideration is required to ensure that we have the necessary counter-IED capability and capacity to meet future threats across the range of military operations. Across this range and at each level of war from tactical to strategic, TECHINT and WTI make critical contributions to joint warfare and military decisionmaking.

July 1, 2014

Tailored Deterrence: Strategic Context to Guide Joint Force 2020

U.S. deterrence is neutered by not clearly defining national security threats and aligning resources accordingly, as in favoring offensive Air-Sea Battle against China against defensive A2/AD capabilities with partners, or preparing sufficiently against regional players such as North Korea and Syria. Plans must accord with actual defense policies and dangers.

July 1, 2014

The Role of U.S. Land Forces in the Asia-Pacific

Washington must not yield to fiscal pressures that erode its legitimacy as a global leader. Its forces must remain capable across the spectrum from the smallest to the largest security challenges and control procurement accordingly, using existing resources and allies in a flexible approach the Army will continue to pursue.

July 1, 2014

Resilient Command and Control: The Need for Distributed Control

Centralized control and decentralized execution has been a fundamental principle of Air Force power projection. It will remain seminal as the Service combines a single commander who weighs strategy and tactics for optimal force employment with Airmen empowered to use imagination and initiative.

July 1, 2014

Defense Strategic Guidance: Thoughtful Choices and Security Cooperation

DOD aids such as amalgamating strategic guidance, Secretarial reviews of campaign and contingency plans, and steady-state activities within theaters will help seal enduring gaps and help planners watch for unintended damage to our security cooperation partners as well as engendering further dialogue in DOD, the combatant commands, and the embassies.

July 1, 2014

Sexual Assault and the Military Petri Dish

The military is just different enough from society at large that it should use its public trust, relative isolation, massive resources, autonomy, centralized control, and ability to act quickly to resolve the issue of sexual assault in its own ranks and help solve the problem for the rest of society.

April 1, 2014

Airpower and Globalization Effects: Rethinking the Five Rings

The Five Rings theory may not provide quick wins against large countries with modern air defense systems, but an escalatory strategic interdiction strategy relying on capable air and navel forces to affect the most critical and vulnerable elements would apply to many crises with its nonlethal and reversible options.

April 1, 2014

Sun Tzu in Contemporary Chinese Strategy

Sun Tzu’s The Art of War cuts both ways. Its tenets work against enemies but can also strike against China. Using the general’s maxims, we can uncover inconsistencies in the grandly moral stance assumed by Chinese leaders. For instance, claims made for public consumption can be juxtaposed with demonstrable fact.

Jan. 1, 2014

Biometric-Enabled Intelligence in Regional Command-East

Biometric-enabled Intelligence (BEI) has established its value throughout Regional Command–East even though the full potential of biometrics-related collections and applications remains unknown. Importantly, the concept has gained traction at the general government level as well as locally, where Afghan National Security Forces and allies and adversaries are seeing the forensic footprints insurgents leave behind being exploited to erase insurgent anonymity, which has served as a traditional hiding place. Arrests and warrants are up, and BEI operations have impacted insurgents' ability to lead their movement and lower-level cells' ability to function. The pressure grows as coalition and Afghan forces employ biometrically developed watch lists and "be on the lookout" messages as part of focused hunts for offenders.