Browse by

Publications

Results:
Category: Joint Force Quarterly

July 1, 2015

Detangling the Web: A Screenshot of U.S. Government Cyber Activity

Blackouts. School testing. Electrical grids. Insurance. These all have one major thing in common: they have all been targets for cyber attacks in a period of two weeks during March 2015. The United States faces thousands of cyber assaults every day. States, state-sponsored organizations, other groups and individuals all combine to incessantly probe, spy on, and attack public and private organizations as well as denizens of the United States. These ongoing problems require a U.S. Government response, so it adopted a bureaucratic approach that has resulted in a complex system that is constantly evolving as new problems are recognized. This article provides a comprehensive look at how the United States has organized to address these challenges. Although U.S. Government efforts seem sizable, private use of the Internet dwarfs government usage.

July 1, 2015

Understanding the Indications and Warning Efforts of U.S. Ballistic Missile Defense

The critical mission of defending the U.S. homeland—homeland defense—requires a fully integrated capability to identify, categorize, and fuse strategic and tactical indications and warnings (I&W) by U.S. Strategic Command (USSTRATCOM), North American Aerospace Defense Command (NORAD), U.S. Northern Command (USNORTHCOM), and U.S. Pacific Command (USPACOM). Today’s fiscally constrained environment may encourage decisionmakers to eliminate perceived I&W “redundancies” and create an I&W stovepipe for weapons release authorities (WRAs). In a mission area where time is of the essence and failure would result in grave damage to national security, such an arrangement would create an unacceptable risk to homeland defense.

July 1, 2015

The Limits of Airpower or the Limits of Strategy: The Air Wars in Vietnam and Their Legacies

For most of the world’s population, America’s air wars in Vietnam are now ancient history. The first U.S. bombing raids against North Vietnam, conducted in response to attacks by North Vietnamese patrol boats on the destroyer USS Maddox in the Tonkin Gulf, occurred a half-century ago this August. Seven months later, America began its longest sustained “strategic bombing” campaign, Operation Rolling Thunder, against the North. That effort, and the Linebacker campaigns that followed, dropped a million tons of bombs on North Vietnam. Three million more tons fell on Laos and Cambodia—supposedly “neutral” countries in the conflict. Four million tons fell on South Vietnam—America’s ally in the war against communist aggression. When the last raid by B-52s over Cambodia on August 15, 1973, culminated American bombing in Southeast Asia, the United States had dropped more than 8 million tons of bombs in 9 years. Less than 2 years later, Cambodia, Laos, and South Vietnam were communist countries.

April 1, 2015

Letter

In response to “Opportunities in Understanding China’s Approach to the Senkaku/Diaoyu Islands” by Lieutenant Colonel Bradford John Davis, USA (Joint Force Quarterly 74 (4th Quarter 2014), I must argue against his proposal for joint patrols/resource development.

April 1, 2015

The Defense Innovation Initiative: The Importance of Capability Prototyping

The recently unveiled Defense Innovation Initiative aims to “pursue innovative ways to sustain and advance our military superiority for the 21st Century” by finding “new and creative ways to sustain, and in some areas expand, our advantages even as we deal with more limited resources.”

April 1, 2015

The Quantum Leap into Computing and Communication: A Chinese Perspective

For a few decades, nations have been relying on encryption systems to protect a wide variety of computerized transmissions ranging from commerce to government to military communications. While today’s encryption systems are considered reasonably secure, the possibilities of quantum cryptography and quantum computing offer a whole new dimension and threat to computerized secrecy.

April 1, 2015

Writing Faculty Papers for Joint Professional Military Education

In joint professional military education (JPME), there is no tool more powerful than the written word. Whether in the form of books, journal articles, opinion pieces, or course papers, students and faculty members demand high levels of intellectual rigor and reflection in both the products they read and the ones they produce.

April 1, 2015

After the First Shots: Managing Escalation in Northeast Asia

The United States has never fought a conventional war against a nuclear-armed adversary. Yet the United States and its allies must prepare for a range of military contingencies with both North Korea and China, and avoiding nuclear escalation would be a U.S. objective in all of them. Developing strategies for managing escalation will be an essential part of U.S. efforts to extend deterrence and assure its allies in Northeast Asia.

April 1, 2015

Fighting More Fires with Less Water: Phase Zero and Modified Operational Design

Imagine that you are the fire chief for a mid-sized community. The city council informs you that it is reducing your budget this year by 30 percent. It is redirecting these funds for community outreach and fire-prevention education programs. Ironically, the council has also instructed you to organize and conduct these programs. In every previous year, you have used the entire budget to train and equip your firefighters and to respond to fire emergencies in the city. You know that outreach is important and may indeed help to lower the incidence of fires in the city—assuming, of course, that your city is not rife with arsonists. However, will you now have sufficient resources to accomplish your primary mission? Put another way, is putting out fires or preventing them a better use of your resources?

Dec. 30, 2014

Bringing Space Crisis Stability Down to Earth

Tensions in the South and East China seas have been elevated during the last year. Territorial disputes in these areas flare periodically, but historically the brinkmanship has largely been confined to encounters at sea, with maritime law enforcement vessels confronting fishing fleets as traditional naval forces lurk just over the horizon. Given that the objects of these political disputes are islands, shoals, and the vast resources around and beneath them, it is only natural that the armed instruments of power brought to bear would operate in close proximity to the territory in question.