Publications

May 14, 2019

Unity of Command: Authority and Responsibility over Military Justice

Military justice has been undergoing constant change recently, as a stream of legislation continues to modify the procedures through which we achieve justice in the military. This period of flux is now coming to an end, as the most sweeping reforms in thirty years passed Congress in 2016. Perhaps the most important outcome is not what has changed, but what stayed the same: the role of the commander in the military justice process. This article examines the commander’s historical role in the military justice process, and the challenges of maintaining authority and responsibility.

May 14, 2019

A Model for Tactical Readiness Through Strategic Opportunity

Theater Security Cooperation Programs (TSCP) are often viewed as burdens and distractions. However, if managed correctly TSCPs can significantly increase unit readiness. This article provides a model based on the authors’ experience in Operation Garuda Shield 17, which placed tactical leaders at strategic points of friction to communicate up and down the chain of command. TSCPs should be viewed as readiness opportunities rather than burdens because they provide opportunity for increased resources, unique experiences, as well as deployment and training readiness. Exercise planners and their partner-nation equivalents are the key audience, say the authors, to influence and ensure success.

May 14, 2019

The Acquisition and Cross Servicing Agreement: An Old Tool for the Modern Military

This article builds on a recent contribution from General Votel and Colonel Keravuori (in JFQ 89) who showed how the BWT approach promotes sustainable multi-national, regional and local defense institutions. Using a simple exchange of supplies and materials by via Acquisition and Cross Servicing Agreement transactions, the Joint Force can simultaneously build partner capacity and increase logistical interoperability. This simple but effective tool, says the author, allows service members to function in ambiguous, complex and volatile environments. Given the demands of future operations, the Joint Force must utilize all resources available to be leaner, faster and more mobile.

May 14, 2019

Military Medicine: The Gender Gap in Trauma Training

There are systemic problems preventing women from receiving the same emergency medical treatment as men, says author Daniel McGarrah of the US Army who wrote this essay as a student at the College of International Security Affairs. The Department of Defense (DOD) has made it clear that women will serve in combat, so women’s survivability should be equal to men. DOD policy supports training, medical treatment and research to ensure women have equal opportunity to survive combat trauma. This essay won the Strategic Research Paper category of the 2018 Chairman of the Joint Chiefs of Staff Strategic Essay Competition.

May 14, 2019

Warrior Women: 3,000 Years in the Fight

Women in combat is not a new idea, though there is still skepticism in the U.S. military about women participating in combat. However, there are numerous historical examples of female combatants performing on an equal footing with their male counterparts, which should overcome this skepticism. Military leaders should consider studying these examples to support gender equitability in the military and dispel harmful myths. Meanwhile, war colleges and service schools should use historical examples of women in war to develop curriculum, and the demographics in the classrooms should reflect an equitable ratio of men and women.

May 7, 2019

Augmenting Bloom for Education in the Cognitive Domain

Bloom’s Taxonomy (named for educational psychologist Benjamin Bloom) is a system to classify learning objectives according to their level of complexity. In Professional Military Education (PME) Bloom’s Taxonomy is used to differentiate learning levels and create sequential learning objectives. This approach makes sense for most PME students but not everyone. Thus, the authors propose a stratified systems theory as a complementary framework that can be used to meet the contextual need across all PME educational systems. Implementing this recommendation, say the authors, will enhance PME and better prepare graduates to face the challenges associated with a dynamic, uncertain future.

May 7, 2019

Covert Action as an Intelligence Subcomponent of the Information Instrument

Covert Action consists of methods to influence political, economic and military conditions abroad where the government’s role is neither readily apparent nor publicly acknowledged. Because oversight of Covert Action is the responsibility of congressional intelligence committees and because the fundamental purpose is to manipulate information (and conceal knowledge about the actors involved) these methods belong to the information instrument of the DIME typology of diplomatic, information, military and economic instruments of power. Strategists and educators should keep this in mind in order to balance the costs, risks and benefits in support of national security and foreign policy objectives.

May 7, 2019

From DOPMA to Google: Cyber as a Case Study in Talent Management

How should we manage cyber talent in the information age? How do we use the military’s existing systems of talent management to optimize recruitment, employment and retention of the cyber force? Although we live in an age of increasing availability of information and integration of artificial intelligence, cyber warfare remains a human endeavor. To ensure the U.S. maintains its qualitative edge in the cyber domain, the Joint Force must attract, develop and retain the right people. This means borrowing good ideas from the private sector, say the authors, encouraging creativity, allowing flexibility and developing future leaders who understand their craft.

May 7, 2019

Tactical Maneuver in the Cyber Domain: Dominating the Enemy

Imagine the possibilities if tactical teams could plan a raid that integrated air and ground support, and on-call fires in the cyber domain. This article argues that our national defense organizations invest in capabilities, tactics and training to successfully conduct tactical maneuver in the cyber domain. The Joint Force must be able to visualize and integrate the cyber domain with other domains to achieve strategic military and national objectives. The ability to dominate the enemy in cyberspace as part of combined arms all-domain operations, says the author, is an essential requirement for the Joint Force.

May 2, 2019

"Untapped Resources" for Building Security from the Ground Up

What are the implications of expanding the U.S. Military's role beyond armed conflict? The author answers with a case study showing how the U.S. Army Special Operations Command forged a successful alliance with business in Honduras. Working by-with-through (BWT) the private sector and the University of Notre Dame Business on the Frontlines program, the U.S. Military overcame bureaucratic resistance to create a powerful and self-sustaining force to enhance security. The result is an unconventional partnership with American and Honduran business leaders, and a creative approach to theater security planning which redefines the concept of jointness.