Browse by

Jan. 26, 2017

Searching for Digital Hilltops: A Doctrinal Approach to Identifying Key Terrain in Cyberspace

During the 1991 Gulf War, the U.S. military delivered a crushing defeat to the Iraqi army in one of the most one-sided battles in history.1 A concept known as net-centric warfare was partially responsible for this victory and marked the first real integration of information technology (IT) into combat systems on a large-scale basis. Net-centric warfare is characterized by the integration of computer and networking technologies into every functional area of operations, which can increase performance, enhance intelligence, and improve efficiencies in order to greatly increase combat power.2 While still in its infancy, net-centric warfare increased commanders’ situational awareness and enhanced their ability to deliver overwhelming combat power to decisive points on the battlefield. However, the pervasive introduction of IT into combat systems has created both opportunities and vulnerabilities. The need to defend or exploit these systems eventually led the Department of Defense (DOD) to designate cyberspace as a new warfighting domain through which combatants are able to conduct a new breed of military operations.

Jan. 26, 2017

Trust: The Sine Qua Non of Effective Joint Operations

Merriam-Webster defines trust as the “assured reliance on the character, ability, strength, or truth of someone or something.” Within academic literature, trust is often defined as “the willingness to be vulnerable.”1 One functional definition that captures the uncertainty of military operations calls it “a state involving confident predictions about another’s motives with respect to oneself in situations entailing risk.”2 These definitions offer a starting point to examine trust within the context of joint operations.

Jan. 26, 2017

An Interview with Robert O. Work

Essentially what we are trying to do is reestablish our overall deterrent position. The Nation aspires to achieve comprehensive strategic stability in which the likelihood of a major war between large state powers or a destabilization of the global system is avoided. To do so our strategy must be comprehensive from top to bottom.

Jan. 26, 2017

Executive Summary

In my view, our Constitution and the Bill of Rights are two of the most important contributions to our collective human experience. The men who debated and wrestled, word by word, over the contents of these two founding documents used great imagination and creativity. Over the following 228 years since the Constitutional Convention that constructed these works, they have been tested and, when found weak, amended, or in the case of the Civil War, fought over or adapted by our Federal system of laws in which our three branches of government all play important roles. While the exact meaning of the Constitution remains in the eye of each citizen to debate and seek change as needed, I doubt even the most cynical citizen would wish the Constitution did not exist.

Jan. 26, 2017

From the Chairman: The Pace of Change

The ability of the Joint Force to anticipate, recognize, and adapt to change—and to innovate within a rapidly changing environment—is absolutely critical to mission success.

Jan. 1, 2017

Joint Force Quarterly 84 (1st Quarter 2017)

This issue of JFQ brings you the best new ideas from and for the Joint Force.

Dec. 12, 2016

Contributors

Contributors.

Dec. 12, 2016

Chapter 15 | Latin America

U.S. national security interests in Latin America are undermined by two key threats: transnational criminal organizations, which exploit weak levels of governance across the majority of countries in the region, and extra-regional actors, which fill the vacuum of U.S. distraction and inattention to its neighborhood. The United States must acknowledge the deeply rooted causes of poor governance and engage with greater attention and presence, while recognizing its limitations for helping to resolve those weaknesses in the short term. Limited resources will constrain U.S. efforts, so the United States must prioritize support to select strategic partners.

Dec. 12, 2016

Chapter 16 | Central Asia

After a decade of competition for influence in Central Asia, the region’s future path is now clearly tied to China. While Russia retains influence in the region, the trend toward China is likely to continue unless strongly contested. The United States has important energy and security interests in Central Asia that are best advanced by politically stable, economically prosperous Central Asian states that incline toward cooperation with the West. Though an “economy of force” region, the stakes are nonetheless highly significant. U.S. engagement will be required going forward to foster these important relationships.

Dec. 12, 2016

Chapter 17 | The High North

When it comes to security policy, there are three distinct Arctic subregions: North America, the North Atlantic and Europe, and Russia. As Arctic ice melts from climate change, the security of the United States and its allies will be increasingly challenged in the Atlantic and European Arctic subregion. Russian behavior is becoming more aggressive, the Arctic states have different priorities and approaches to regional issues, and the region lacks an international forum to resolve hard-power disputes. This chapter advances four initiatives to manage Arctic relations in light of these developments: amending the 2013 U.S. Arctic strategy to account for regional changes, creating a regional forum for security and economic discussions, initiating a Western security organization in the European Arctic subregion to complement the North Atlantic Treaty Organization, and improving U.S. capabilities to operate across the Arctic. Each initiative supports U.S. regional interests at a relatively low cost.