Due to a lapse in federal funding, this website is not being actively updated or monitored. See OPM status.

April 12, 2018

Laying the Foundation for a Strategic By-With-Through Approach

Logistics interoperability is critical to the future success of global operations responding to transregional threats, but it requires dedicated efforts in logistics security cooperation to build the foundation for a strategic BWT approach.

April 12, 2018

Sacrifice, Ownership, Legitimacy: Winning Wars By, With, and Through Host-Nation Security Forces

Speed and tactical efficiency do not win civil conflict; host-nation legitimacy combined with eventual tactical victory does. These facts necessitate a conditions-based approach.

April 12, 2018

Fighting the Islamic State By, With, and Through: How Mattered as Much as What

In January 2017, the 2nd Brigade Combat Team, 82nd Airborne Division, deployed to bolster the Iraqi Security Forces (ISF) in the campaign to annihilate the so-called Islamic State. How we advised ISF commanders was as important as what we advised them to do in order to win.

April 12, 2018

The By-With-Through Approach: An Army Component Perspective

Land forces in U.S. Central Command have adopted an operational approach of “by, with, and through” (BWT) to achieve this endstate. This article provides the USARCENT perspective on how it accomplishes its mission with BWT as the operational approach and demonstrates the need for the joint force to come to a common understanding of what executing operations within a BWT operational approach, and all associated terms, means.

April 12, 2018

The By-With-Through Operational Approach

The U.S. military must organize, resource, and train the joint force to operate by, with, and through with greater efficiency and effectiveness with various types of partners and whole-of-government involvement. Executing this approach in current and future multipolar and resource-constrained environments requires common understanding and the development of joint force doctrine.

April 12, 2018

From the Chairman: The Character of War and Strategic Landscape Have Changed

Over the past two decades, the strategic landscape has changed dramatically. While the fundamental nature of war has not changed, the pace of change and modern technology, coupled with shifts in the nature of geopolitical competition, have altered the character of war in the 21st century. To keep pace with the changing character of war, we must globally integrate the way we plan, employ the force, and design the force of the future.

April 12, 2018

Outmatched Shortfalls in Countering Threat Networks

Understanding how adversaries use threat networks globally to compete with us below the threshold of traditional armed conflict is a critical first step to identifying opportunities to exploit, disrupt, or degrade threat networks. However, the increasing convergence of legitimate and illicit networks complicates our ability to gain the level of understanding required to do this effectively.

April 12, 2018

Moore’s Law and the Challenge of Counter-sUAS Doctrine

In 1965, Gordon Moore, co-founder of the Intel Corporation, made his now famous prediction that the “number of transistors incorporated in a chip will approximately double every 24 months.” More than 50 years later, his prediction has not only held true, but also the implications of what is now called Moore’s Law define the combat environment for the joint force. The continual miniaturization, mass production, proliferation, and improvement of integrated circuits and microprocessors have introduced powerful computing technology into every aspect of modern life.

April 11, 2018

The Practical Implications of Information as a Joint Function

The integration of the Information as a Joint Function (IJF) with the other six joint functions offers new opportunities for developing and conducting operational art and design. IJF will result in the development of executable plans to deal with future conflicts that are TMM in nature. The ultimate result will be that joint force commanders are able to dominate the informational aspect of their operating environment (the IE) the same way they dominate land, sea, air space, and cyberspace.

April 11, 2018

Introducing Information as a Joint Function

In July 2017, the Chairman of the Joint Chiefs of Staff issued a change to Joint Publication (JP) 1, Doctrine for the Armed Forces of the United States, introducing information as a new and seventh joint function. This issuance portends significant changes in how the joint force will plan and execute transregional, multidomain, and multifunctional operations. As such, it represents an opportunity to reimagine what “combined arms” means in 21st-century warfare.

April 11, 2018

Executive Summary

What kind of force does the United States need in order to meet its mission of protecting the Nation? How do we preserve our working relationships with allies and partners? What about the ongoing issue of readiness needs versus force modernization? No matter how the future turns out, the United States and the joint force will continue to be central elements of how the world is shaped.

March 1, 2018

Technology and National Security: The United States at a Critical Crossroads

Globalization of science and technology, emerging and unpredictable threats (both manmade and natural), conventional and emerging weapons of mass destruction, and an inversion of technology flow from the private to public sectors all present challenges to our national security.

Feb. 1, 2018

Low-Cost Access to Space: Military Opportunities and Challenges

Space activity is critical to the American way of war. The commercialization of space has potentially radical implications for U.S. national security through its impact on a range of military and intelligence functions and on the ability of the nation to effectively project power around the globe.

Jan. 10, 2018

Joint Doctrine Update

Joint Doctrine Update.

Jan. 10, 2018

Born Multinational: Capability Solutions for Joint, Multinational, and Coalition Operations

U.S. military operations are conducted in a multinational environment. Given the Chairman of the Joint Chiefs of Staff’s emphasis on working with allies and other international partners, there are many advantages to certain capabilities being born multinational. A multinational development team offers the benefits of both inherent interoperability and a broad set of perspectives, insights, and knowledge sources.

Jan. 10, 2018

Department of Defense Terminology Program

The Department of Defense (DOD) Terminology Program was formalized in 2009 by the Office of the Secretary of Defense (OSD) and falls under the responsibility of the Chairman of the Joint Chiefs of Staff (CJCS).1 The program is overseen by the director of Joint Force Development (DJ7) to improve communications and mutual understanding through the standardization of military and associated terminology within DOD, with other U.S. Government departments and agencies, and between the United States and international partners. It includes U.S. participation in North Atlantic Treaty Organization (NATO) terminology development as well as other terminology forums.

Jan. 10, 2018

A COG Concept for Winning More Than Just Battles

While current U.S. doctrine makes the center of gravity (COG) concept the centerpiece in operational planning, there is a broad call for either revising or killing the concept. However, if the COG concept is to remain the centerpiece in military planning, it must not only help link actions, effects, and objectives but also link the JFC level of command with the national strategic level of command.

Jan. 10, 2018

Social Science Goes to War: The Human Terrain System in Iraq and Afghanistan

The gap between academia and the military has existed at least since the early 1960s, when Project Camelot crystallized political opposition to the American military/security apparatus by activist academicians. As a result, the military/security community established its own think tanks, designed to replicate social and hard science capabilities, reducing the political noise and fallout inherent in the engagement with a potentially hostile academic community. On the other side of the divide, many academics reacted with anger to social scientists engaged in military activity, political beliefs fusing with concerns of academic freedom and fanned with the flames of opposition to the Vietnam War in what they saw as colonialism and rampant militarization of American society.

Jan. 10, 2018

Elite Warriors: Special Operations Forces from Around the World

Special operations forces (SOF) have existed in some form and played roles in warfare since the advent of conventional military operations. For example, in biblical times, King David had a special forces platoon. World War II brought growth, greater recognition, and prestige for special forces like the British Commandos, Special Air Service, and the American Office of Strategic Services. The last two decades have witnessed explosive growth in various forms of unconventional or SOF.

Jan. 10, 2018

Unwinnable: Britain’s War in Afghanistan, 2001–2014

For years, the British enjoyed a reputation of counterinsurgency excellence. Their campaigns—Malaya, Kenya, Oman, Northern Ireland—were hailed as successes in this difficult form of war. Afghanistan, however, turned out to be painful for the British. They committed a peak of over 9,500 troops, eventually drawing down to a few hundred by the end of 2014. They faced numerous battlefield reverses. Eventual successes were overshadowed by the arrival of 20,000 U.S. Marines. Britain’s counterinsurgency reputation came out of the campaign tarnished.

Jan. 10, 2018

Implementing Guidance for Security Cooperation: Overcoming Obstacles to U.S. Africa Command’s Efforts

U.S. Africa Command’s lack of operationalization of its security cooperation processes, combined with the sheer size of its area of responsibility and the significant changes with the new NDAA, create unique challenges. This article outlines four main areas where USAFRICOM can improve its efforts to operationalize and synchronize its security cooperation efforts.

Jan. 10, 2018

Achieving Secrecy and Surprise in a Ubiquitous ISR Environment

As foreign and commercial intelligence, surveillance, and reconnaissance capabilities proliferate, our ability to leverage secrecy and surprise for battlefield advantage is in danger of being severely degraded or lost altogether. We must take prudent near-term steps to address this concern.

Jan. 10, 2018

Joint Integrated Air and Missile Defense: Simplifying an Increasingly Complex Problem

As the complexity of air, cruise, and ballistic missile threats quickly evolves over the next 10 to 20 years, DOD must find a less complicated way to rapidly develop and integrate the Services’ integrated air and missile defense capabilities and employ them across the combatant commands boundaries.

Jan. 10, 2018

Geographic Component Network Analysis: A Methodology for Deliberately Targeting a Hybrid Adversary

As the nature of the adversaries the U.S. military engages on the battlefield changes, so must our thinking on how to systematically analyze and degrade their centers of gravity. Geographic component network analysis (GCNA) enables more rapid analysis of a hybrid enemy in a focused, systematic manner to degrade the adversary’s capability to effectively govern and project combat power from defined territorial strongholds.

Jan. 10, 2018

Scipio Africanus and the Second Punic War: Joint Lessons for Center of Gravity Analysis

Scipio Africanus’s European and African campaigns during the Second Punic War serve as timeless lessons for joint force planners on how to conduct center of gravity (COG) analysis in support of theater and national military planning.

Jan. 10, 2018

The Need for an Innovative Joint Psychological Warfare Force Structure

There has never been a greater historical need and better opportunity to create a strategic joint influence organization and subsequent total joint influence force structure. A unified joint influence force would be able to support and defend the Nation’s strategic interests against all propaganda efforts coming from the likes of adversarial states and nonstate actors well into the foreseeable future.

Jan. 10, 2018

Multidomain Battle: Converging Concepts Toward a Joint Solution

As advancements in cyber continue to accelerate and proliferate across multiple domains, and as our potential adversaries adjust their strategies by utilizing these advancements asymmetrically in order to counter our strengths, we can no longer develop domain-specific solutions that require time and effort to synchronize and federate.

Jan. 9, 2018

The Bureaucratization of the U.S. Military Decisionmaking Process

Is risk management overemphasized in the decisionmaking process? Is caution more valued than boldness in action?

Jan. 9, 2018

Surfing the Chaos: Warfighting in a Contested Cyberspace Environment

To win in the new cyber-contested battles of the future, a combatant must still command, but let go of control and surf the chaos.

Jan. 9, 2018

The Power of Partnership: Security Cooperation and Globally Integrated Logistics

Logistics ought to be substantially integrated into security cooperation efforts, and security cooperation ought to be thoughtfully integrated into the discipline of logistics. While this premise may seem obvious, it is too often overlooked or misunderstood.

Jan. 9, 2018

Multidomain Battle: Time for a Campaign of Joint Experimentation

Concepts on the scale of multidomain battle (MDB) require a campaign of experimentation that provides compelling evidence for the concept by fleshing out its operational and institutional contexts.

Jan. 9, 2018

The Future Is Plural: Multiple Futures for Tomorrow's Joint Force

Multidimensional challenges cannot rely on dartboards or algorithms fed by Big Data. The central question for senior leaders in defense is improving their assessment of risk in ambiguous contexts.

Jan. 9, 2018

Executive Summary

War exacts a toll over time unlike any other human experience. And meeting the demands of combat takes more than one individual’s effort, budget, and ideas to succeed. The joint force has to adapt, adjust, acquire, repurpose, retrain, recruit, and perform a whole range of other functions to continue to meet the mission of protecting our Nation, allies, and partners around the world.

Dec. 21, 2017

Battlefield Geometry in our Digital Age: From Flash to Bang in 22 Milliseconds

This year has been tough for cybersecurity programs. Every month in the first six months of 2017, the world experienced a major cyber event. Open-source attacks included attacks on critical infrastructure, banks, intelligence services, and significant commercial and government entities. Indeed, reflecting on the scope and depth of most publically acknowledged compromises, uncovers the reality of the tremendous and growing risks the country faces nearly two decades into the 21st century. Everything seems to have changed. Virtually every organization within the Department of Defense (DOD) has, sometimes reluctantly, come to embrace digital age technology, to the point that they are completely dependent on it. The result is a shocking degree of paralysis when our access to the services we now rely upon is disrupted.

Dec. 21, 2017

How is NATO Meeting the Challenge of Cyberspace

Historians of international relations are familiar with the hinge-year concept when trends that previously had been largely subterranean suddenly crystallize into a clear and immediate danger, forcing policymakers to wake up and take action. When it comes to cyberspace, the past year has certainly smashed any complacency about our ability to anticipate and counter the growing sophistication of cyberattacks. As fast as we have tried to catch up, the speed and global impact of these attacks continue to outrun us. 2016 witnessed the first major attack via the Internet of Things when a DynCorp server in the United States was hacked through video surveillance cameras. We also saw the first attacks driven by artificial intelligence, and increasing evidence of collusion between state intelligence services and organized crime networks.

Dec. 21, 2017

Power Projection in the Digital Age

Logistics is the lifeblood of the Joint Force. It requires an effective distribution network as its heart, moving and sustaining the force at the right place and at the right time—all the time. U.S. Transportation Command (USTRANSCOM) delivers that decisive force, projecting American power globally through the robust Joint Deployment and Distribution Enterprise (JDDE) and leveraging the expertise of more than 140,000 professionals. No other nation in the world can compete with the United States in conventional warfare because we plan, secure, and distribute combat capability so well. As a result, many military planners are now value-programmed to believe that a soldier or bullet will always be where it needs to be, when it needs to be there—on demand.

Dec. 21, 2017

A National Security Enterprise Response - Digital Dimension Disruption

The digital dimension is simultaneously enhancing and disrupting the fabric of life in every society where modern, informatized technology is present. The slow-motion collapse of parts of the 20th century’s legacy is now accelerating in ways that likely will usher in a monumental realignment of societal institutions, methods of business, and fundamental ideas about national security. This realignment will, of necessity, change the frameworks within which America provides for its security, including how it acquires the goods and services it uses in that effort.

Dec. 21, 2017

A Cyber Federal Deposit Insurance Corporation: Achieving Enhanced National Security

Of the emerging man-made risks affecting U.S. national security, cyber threats have enjoyed the most attention and resources from national security leaders and policymakers. And yet, cyber threats remain one of the most complex risks to address given their amorphous, highly fluid, and extra-territorial nature. This makes it difficult if not impossible to quantify the national state of readiness and, in these fiscally constrained times, the return on investment from the billions spent each year on cybersecurity. Five gaps conspire to make achieving a state of enhanced cyber resilience complex if not impossible. These include a yawning talent gap to the tune of millions of people; a technological gap predicated on managing a risk that evolves according to Moore’s law; a financial and economic gap leaving trillions in value at risk with no generally accepted way to measure this value; an alignment gap in terms of policy harmonization and cooperation inside the United States and around the world; and, finally, a gap in patience and the speed of markets. This article delves into the evolving cyber threat landscape and outlines ways of understanding and bridging these critical gaps.

Dec. 21, 2017

Bridging the Cyberspace Gap - Washington and Silicon Valley

One of the defining characteristics of the cyber domain is the dominance of the private sector. The majority of critical networks are privately owned and operated; more than 90 percent of American military and intelligence communications travel over privately owned backbone telecommunications networks. Many of the most talented hackers are in the private sector, and private security firms such as CrowdStrike, FireEye, and Cylance have taken an increasingly large public role in tracing cyberattacks to nation-states and other perpetrators. In addition, Alphabet, Amazon, Apple, Cisco, Facebook, IBM, Intel, and other companies drive innovation and the deployment of new technologies, especially in cutting-edge areas like artificial intelligence. For these reasons, strong ties to the technology sector are central to the U.S. Government’s (USG) pursuit of its economic, diplomatic, and military strategic interests in cyberspace.

Dec. 21, 2017

Cyber Gray Space Deterrence

During the past few years, adversaries of the United States have begun to use their militaries to test U.S. resolve through innovative methods designed to bypass deterrent threats and avoid direct challenges. These “gray space campaigns” are specifically designed to allow adversaries to achieve their goals without triggering escalation by making retaliation difficult. China demonstrated this with its attempt to seize control of the South China Sea through its island building program, as did Russia with its effort to foment insurgency in eastern Ukraine through the use of “little green men.”

Dec. 21, 2017

Cyberdeterrence by Engagement and Surprise

The conventional deterrence strategies of denial and punishment do not factor in the unique characteristics of the man-made cyber domain. This domain needs a new and holistic deterrence strategy that involves prompt and direct cyber responses that are sudden, dynamic, stealthy, and random so that adversaries can be defeated mentally and virtually. This article offers such an approach that I refer to as “deterrence by engagement and surprise.”

Dec. 21, 2017

A Three-Perspective Theory of Cyber Sovereignty

The cybercrime and cyber terrorism raging today are the most visible symptoms of a more pervasive problem concerning cyber security. How to establish a fair and just governance regime in cyberspace and establish international rules spark a storm of controversy. The controversy reflects the competing interests and demands of three distinct cyberspace actors: the state, the citizen, and the international community. By focusing only on one’s own interests, each actor ignores the interests of the other two, resulting in the current situation in which each sticks to its own argument and refuses to reconcile. The establishment of a new order in cyberspace requires a comprehensive review from the perspective of all three major actors. This article proposes a “three-perspectives” theory based on the three actors. It divides cyberspace into three levels; the base level, the application level, and the core level. Treating each level differently, it seeks to identify the largest common ground, and transcends the single perspective vulnerability of interpreting everything in terms of binary opposition. Three-perspective thinking makes it possible to deal with the binary opposition of exclusivity and transferability with respect to state sovereignty.

Dec. 21, 2017

An Interview with Marina Kaljurand, former Minister of Foreign Affairs of Estonia

Those were the first explicitly political cyberattacks against an independent, sovereign state in history. If put into today’s context, the attacks were not very sophisticated—even primitive. But back then, they were very disturbing. By that time, Estonia already had widely established internet and e-services, and an e-lifestyle; when those services were interrupted—mainly in the banking sector—it was highly disruptive. As to the effects of the attacks? They did not kill anybody, they were not destructive. They were highly disruptive to our lives though.

Dec. 21, 2017

Warnings Finding Cassandras to Stop Catastrophes

Every day we hear warnings—from parents concerned about the personal safety and good health of their children, to government officials worried about protecting the citizenry from external adversaries and the forces of nature. Distinguishing serious warnings of impending catastrophe from those that are frivolous may mean the difference between life and death, success and failure, freedom and oppression.

Dec. 21, 2017

International Conflict and Cyberspace Superiority: Theory and Practice

Cyberspace Superiority is a compelling mix of advanced technological know-how and easy-to-understand writing. Bryant, a Lieutenant Colonel who is a career fighter pilot and earned his Ph.D. in military strategy, first examines whether cyberspace is a “global common”—i.e. a shared resource like the oceans, atmosphere, space, and Antarctica. The answer may well determine the future nature of cyber hostilities but, with the issue as yet unsettled, Bryant posits a far more pressing question—is superiority in cyberspace “a useful construct for thinking about and planning for nation-state conflict in cyberspace?”

Dec. 21, 2017

Cyberspace in Peace and War

Martin Libicki has been a prolific writer in the field of information warfare since the mid-1990s. In this newer work, published by the Naval Institute Press, he aggregates his thinking during the past several decades into a single book. Cyberspace in Peace and War draws from work performed at RAND, both solely and with colleagues, and from lecture interactions with his students at various universities, to present a streamlined and consolidated overview of activities within and enabled by information technologies.

Dec. 21, 2017

Prologue

Nearly a half century ago in October 1969, computer programmers at the University of California, Los Angeles used a primitive Department of Defense computer network called ARPANET to send the first messages to computers at Stanford Research Institute. This quiet event, considered by some to be the birth of the internet, ignited a technological movement within the computer and information industries that eventually transformed the world into a globally connected society utterly dependent on instant access to information, yet increasingly vulnerable to network intrusions by those who seek to steal sensitive data or disrupt cyber infrastructure.

Oct. 1, 2017

Toxic Culture: Enabling Incivility in the U.S. Military and What to Do About It

Core values are the heart and soul of U.S. military Services and their cultures. Military organizational, strategic, operational, and tactical strength lies in the degree to which the Services’ systems, processes, and behaviors of personnel align with their stated core values, the collective practice of which creates organizational culture. Yet even with the emphasis on core values such as respect and selfless service, the Department of Defense (DOD) continues to experience toxic and counterproductive behaviors that sabotage culture and values, as well as performance, productivity, force protection, health, readiness, and actions of personnel.1 Although DOD has not conducted comprehensive research on toxic behavior, there is extensive private-sector research regarding the impact, cost, tolerance, enabling, and reduction of toxicity. This article applies private-sector research to assess DOD policies and practices and to recommend courses of action. Although the implications and cost of toxicity are beyond the scope of this article, a brief discussion is relevant for demonstrating its significance. Private-sector research has identified relationships between toxic behaviors and adverse effects on mental and physical health (including suicide, stress-related illness, and post-traumatic stress), increasing demands on an already overburdened healthcare system; job satisfaction and commitment; individual and collective performance (cognition and collaboration); employee turnover; and the creation of an organizational culture that tolerates other inappropriate behaviors including sexual harassment and discrimination.2 In addition to the impact on direct targets of toxicity, research has identified the transmission of adverse effects to bystanders and family members.3

Oct. 1, 2017

Increasing Partner-Nation Capacity Through Global Health Engagement

Why the Department of Defense (DOD) and international military sector writ large engage in global health is well documented.1 How DOD conducts global health engagement (GHE) in a systematic way is not. While pundits representing the Office of the Secretary of Defense, Joint Staff, combatant commands, Service components, and other organizations codify DOD policy for GHE, individuals and units implementing this broad guidance from 2013 to today continue to do so in a patchwork manner.2 Using the Indo-Asia Pacific region as a case study, this article presents the background regarding the current state of GHE in the region, develops a standardized GHE approach for engagement, and informs a partner-nation 5-year strategy.

Oct. 1, 2017

Human Terrain at the Crossroads

The U.S. Army’s Human Terrain System (HTS) was created in 2007 amid fears of defeat in Iraq and Afghanistan. Responding to clear needs expressed by military leadership, HTS was offered as an experimental effort to embed academic social scientists with Army and Marine Corps units to dramatically increase local sociocultural knowledge on the battlefield.1