Browse by

Publications

April 1, 2014

Executive Summary

A seemingly incomprehensible set of events is occurring as I write this column: the People’s Republic of China is asserting its desire to extend an air defense zone in the Pacific, the Syrian crisis continues unabated, violence in nations transitioning from one form of government to another is the norm from Iraq to Egypt to Libya, Iran seems to be yielding to international pressure to control its nuclear ambitions, Venezuela seems poised for an economic collapse, bombings and other violence in Pakistan continue, and the Russian Federation has annexed Crimea triggering a possible response from the North Atlantic Treaty Organization (NATO). This particular situation seems to have been taken from a script of an early post–Cold War NATO exercise.

April 1, 2014

The Joint Force Commander’s Guide to Cyberspace Operations

Cyberspace can be leveraged by first, finding a theory to express and teach the constantly changing vagaries of that domain, including a suitable lexicon, and second, overcoming assorted turf wars and adequately resourcing the study, manning, equipping, and training of the cyberspace force so it can integrate with other domains.

April 1, 2014

Achieving Accountability in Cyberspace: Revolution or Evolution?

Cyberspace considerations are irreversibly proliferating, and five core ideas will help commanders fight a perpetual cyberwar: education and training, a clear chain of custody, explicit processes and procedures and guidance, advanced methods of controlling access to networks and information, and a formal cyberspace mishap investigation process throughout the Defense Department.

April 1, 2014

Combined Effects Power

The Combined Effects Power (CEP) construct does not eliminate the combined arms warfare (CAW) concept, but CEP seeks to overcome CAW’s anomalies by accommodating the behavior of both cyber domain and soft power participants from the natural domains to offset the dangers springing from the information revolution.

April 1, 2014

Information-Sharing with the Private Sector

The Obama administration’s Executive Order 13636 and Presidential Policy Directive 21 are a beginning, but establishing public-private information sharing requires matching cyber security legislation to fill in the gaps found in the 2003 National Strategy to Secure Cyberspace, address a multitude of contentious issues, and achieve a unified cyberspace focus.

April 1, 2014

Green Peace: Can Biofuels Accelerate Energy Security?

Interagency/Navy efforts to develop and test biofuels to reduce U.S. dependence on foreign sources and protect the military from energy price shocks have been disappointing, and research into military application and feasibility suggests that biofuels will be neither cost competitive nor available in sufficient quantities to enhance energy security.

April 1, 2014

Shaping a 21st-Century Defense Strategy: Reconciling Military Roles

The military’s ability to shape the security environment can be substantially improved by adopting multiple simultaneous stimulants, most prominently the national security strategy shift from deterrence and containment to cooperation and engagement. These capabilities must be sufficiently resourced so Washington’s interests can be pursued short of armed conflict where possible.

April 1, 2014

Targeting the JIIM Way: A More Inclusive Approach

Joint doctrine, where it inadequately addresses incorporating Joint, Interagency, Intergovernmental, and Multinational (JIIM) organizations into the military planning process, must be revised to give JIIM engagement its due. Moreover, greater cross-organizational exposure among partners should increase understanding and trust and get partners more fully synchronized in both planning and execution.

April 1, 2014

Airpower and Globalization Effects: Rethinking the Five Rings

The Five Rings theory may not provide quick wins against large countries with modern air defense systems, but an escalatory strategic interdiction strategy relying on capable air and navel forces to affect the most critical and vulnerable elements would apply to many crises with its nonlethal and reversible options.

April 1, 2014

Sun Tzu in Contemporary Chinese Strategy

Sun Tzu’s The Art of War cuts both ways. Its tenets work against enemies but can also strike against China. Using the general’s maxims, we can uncover inconsistencies in the grandly moral stance assumed by Chinese leaders. For instance, claims made for public consumption can be juxtaposed with demonstrable fact.