Results:
Category: Joint Force Quarterly

March 29, 2016

If We Fight Joint, Shouldn't Our History Reflect That?

American forces are fighting joint as never before in conjunction with the armed forces of allied nations. Joint and combined operations in Afghanistan and Iraq and current operations over Iraq and Syria have demonstrated conclusively that the Goldwater-Nichols Department of Defense Reorganization Act of 1986 came at the right time and has subsequently produced impressive results.

Jan. 1, 2016

The Future of Department of Defense Global Health Engagement

The term global health has come into common usage in recent years and encompasses various matters relevant to health, including diseases that cross international borders, factors that affect public health globally, and the interconnectedness of health matters around the globe. Diseases that have been unevenly distributed across the world have been of concern to militaries for centuries, perhaps throughout history. Historians record that the decimation of Napoleon’s army during his invasion of Russia was the result of starvation, severe weather, and disease, the most important of which was typhus, which killed over 80,000 troops.1 His retreating army then spread typhus throughout Europe. Likewise, typhoid fever was a serious problem in World War I and the American Civil War.2 Spanish troops were severely affected by yellow fever during the Spanish-American War, and Spanish influenza had disproportionate and decisive effects during World War I.3 Colonization of Africa, Asia, and Latin America by Western powers led to increased awareness of diseases that were generally exotic to the imposing country, motivating interest in developing means of prevention and control of diseases. Examples of efforts emanating from such interest include the work of Walter Reed and William C. Gorgas in defining the transmission and prevention of yellow fever, research regarding cholera and diarrhea in Bangladesh, and the establishment of research laboratories (for example, the Pasteur Institute and Medical Research Council laboratories in Africa). Conversely, the invasion and colonization of foreign lands has also long been known to result in the introduction of exotic disease into the occupied lands, with the importation of smallpox and syphilis into North America by colonists as outstanding examples.

Jan. 1, 2016

The Aegis Warship: Joint Force Linchpin for IAMD and Access Control

Under defense strategic guidance, U.S. combatant commanders have been rebalancing joint forces along the Asia-Pacific Rim with recalibrated capabilities to shape the regional security environments in their areas of responsibility. The mission of what the 2012 guidance calls “Joint Force in 2020” is to project stabilizing force to support our allies and partners, and to help maintain the free flow of commerce along sea lines of communication in the globalized economic system.

Oct. 1, 2015

Strategic Development of Special Warfare in Cyberspace

How does the United States develop a strategic cyber-enabled special warfare capability? Why are regional powers such as Iran and Russia better prepared for cyber-enabled special warfare operations than the United States?

Oct. 1, 2015

Transforming Defense Analysis

The Defense Intelligence Enterprise is on the precipice of tremendous change. The global environment is experiencing a mind-numbing quantity and diversity of challenging crises.

July 1, 2015

Rapid Regeneration of Irregular Warfare Capacity

There is widespread agreement among the public and in the foreign and defense communities that the United States should avoid “another Iraq” or “another Afghanistan”—that is, another large-scale, long-term, and highly costly stability operation. President Obama’s reluctance to put “boots on the ground” in Iraq is but the most recent example of this reaction against the high costs and questionable outcomes of the conflicts in those two countries.

July 1, 2015

Detangling the Web: A Screenshot of U.S. Government Cyber Activity

Blackouts. School testing. Electrical grids. Insurance. These all have one major thing in common: they have all been targets for cyber attacks in a period of two weeks during March 2015. The United States faces thousands of cyber assaults every day. States, state-sponsored organizations, other groups and individuals all combine to incessantly probe, spy on, and attack public and private organizations as well as denizens of the United States. These ongoing problems require a U.S. Government response, so it adopted a bureaucratic approach that has resulted in a complex system that is constantly evolving as new problems are recognized. This article provides a comprehensive look at how the United States has organized to address these challenges. Although U.S. Government efforts seem sizable, private use of the Internet dwarfs government usage.

July 1, 2015

Understanding the Indications and Warning Efforts of U.S. Ballistic Missile Defense

The critical mission of defending the U.S. homeland—homeland defense—requires a fully integrated capability to identify, categorize, and fuse strategic and tactical indications and warnings (I&W) by U.S. Strategic Command (USSTRATCOM), North American Aerospace Defense Command (NORAD), U.S. Northern Command (USNORTHCOM), and U.S. Pacific Command (USPACOM). Today’s fiscally constrained environment may encourage decisionmakers to eliminate perceived I&W “redundancies” and create an I&W stovepipe for weapons release authorities (WRAs). In a mission area where time is of the essence and failure would result in grave damage to national security, such an arrangement would create an unacceptable risk to homeland defense.

July 1, 2015

The Limits of Airpower or the Limits of Strategy: The Air Wars in Vietnam and Their Legacies

For most of the world’s population, America’s air wars in Vietnam are now ancient history. The first U.S. bombing raids against North Vietnam, conducted in response to attacks by North Vietnamese patrol boats on the destroyer USS Maddox in the Tonkin Gulf, occurred a half-century ago this August. Seven months later, America began its longest sustained “strategic bombing” campaign, Operation Rolling Thunder, against the North. That effort, and the Linebacker campaigns that followed, dropped a million tons of bombs on North Vietnam. Three million more tons fell on Laos and Cambodia—supposedly “neutral” countries in the conflict. Four million tons fell on South Vietnam—America’s ally in the war against communist aggression. When the last raid by B-52s over Cambodia on August 15, 1973, culminated American bombing in Southeast Asia, the United States had dropped more than 8 million tons of bombs in 9 years. Less than 2 years later, Cambodia, Laos, and South Vietnam were communist countries.

April 1, 2015

Letter

In response to “Opportunities in Understanding China’s Approach to the Senkaku/Diaoyu Islands” by Lieutenant Colonel Bradford John Davis, USA (Joint Force Quarterly 74 (4th Quarter 2014), I must argue against his proposal for joint patrols/resource development.

April 1, 2015

The Defense Innovation Initiative: The Importance of Capability Prototyping

The recently unveiled Defense Innovation Initiative aims to “pursue innovative ways to sustain and advance our military superiority for the 21st Century” by finding “new and creative ways to sustain, and in some areas expand, our advantages even as we deal with more limited resources.”

April 1, 2015

The Quantum Leap into Computing and Communication: A Chinese Perspective

For a few decades, nations have been relying on encryption systems to protect a wide variety of computerized transmissions ranging from commerce to government to military communications. While today’s encryption systems are considered reasonably secure, the possibilities of quantum cryptography and quantum computing offer a whole new dimension and threat to computerized secrecy.

April 1, 2015

Writing Faculty Papers for Joint Professional Military Education

In joint professional military education (JPME), there is no tool more powerful than the written word. Whether in the form of books, journal articles, opinion pieces, or course papers, students and faculty members demand high levels of intellectual rigor and reflection in both the products they read and the ones they produce.

April 1, 2015

After the First Shots: Managing Escalation in Northeast Asia

The United States has never fought a conventional war against a nuclear-armed adversary. Yet the United States and its allies must prepare for a range of military contingencies with both North Korea and China, and avoiding nuclear escalation would be a U.S. objective in all of them. Developing strategies for managing escalation will be an essential part of U.S. efforts to extend deterrence and assure its allies in Northeast Asia.

April 1, 2015

Fighting More Fires with Less Water: Phase Zero and Modified Operational Design

Imagine that you are the fire chief for a mid-sized community. The city council informs you that it is reducing your budget this year by 30 percent. It is redirecting these funds for community outreach and fire-prevention education programs. Ironically, the council has also instructed you to organize and conduct these programs. In every previous year, you have used the entire budget to train and equip your firefighters and to respond to fire emergencies in the city. You know that outreach is important and may indeed help to lower the incidence of fires in the city—assuming, of course, that your city is not rife with arsonists. However, will you now have sufficient resources to accomplish your primary mission? Put another way, is putting out fires or preventing them a better use of your resources?

Dec. 30, 2014

Bringing Space Crisis Stability Down to Earth

Tensions in the South and East China seas have been elevated during the last year. Territorial disputes in these areas flare periodically, but historically the brinkmanship has largely been confined to encounters at sea, with maritime law enforcement vessels confronting fishing fleets as traditional naval forces lurk just over the horizon. Given that the objects of these political disputes are islands, shoals, and the vast resources around and beneath them, it is only natural that the armed instruments of power brought to bear would operate in close proximity to the territory in question.

Dec. 30, 2014

Refocusing the U.S. Strategic Security Perspective

Since the early days of Cold War rivalry between the United States and Soviet Union, policymakers have recognized that low-intensity conflict and limited wars often occur in spite of deterrence—that is, using the threat of military force or coercion to change an adversary’s behavior. Because of this shortcoming and risk of escalation, the United States has applied deterrence haphazardly in its relationship with China. Yet U.S. policymakers have failed to identify an alternative approach for chronic disputes that are not readily shaped by military posturing. This deficiency is overlooked at the expense of muddling through commonplace confrontations with China over fishing rights, maritime borders, and cyberspace rather than establishing consistent mechanisms to reduce tension and prevent escalation. Some analysts, such as Richard K. Betts, see only two stark choices to address this dilemma: “accept China’s full claims as a superpower when it becomes one or draw clear redlines before a crisis comes.” However, we do not need to limit our options to deterrence or acceptance. Rather, we should complement deterrence with a more flexible, strategic framework focused on conflict management.

Dec. 30, 2014

Seeing 2020: America's New Vision for Integrated Air and Missile Defense

On December 5, 2013, with the stroke of a pen, Chairman of the Joint Chiefs of Staff General Martin E. Dempsey profoundly altered the U.S. approach to the pressing problem of air and missile defense. On that date—coincidentally, 70 years to the day after the U.S. Army Air Corps began Operation Crossbow, the Anglo-American bombing campaign against Adolf Hitler’s V-1 and V-2 missile forces and a missile defense milestone—General Dempsey signed the Joint Integrated Air and Missile Defense: Vision 2020.1 This seminal document for air and missile defense (AMD) outlines the Chairman’s guidance to the joint force and, by extension, to all the stakeholders that contribute to the air and missile defense of the U.S. homeland and its regional forces, partners, and allies. What makes the new vision both exceptionally timely and highly relevant is that it accounts for the volatility and reality of 21st-century strategic and threat environments characterized more often than not by rapid, enigmatic change.

Dec. 30, 2014

Letter

As I read Rebecca Patterson and Jodi Vittori’s article titled “Why Military Officers Should Study Political Economy” in Joint Force Quarterly 75 (4th Quarter 2014), I reconsidered my own understanding of the term political economy. At one time I was admittedly unsure of its precise meaning, although I could make some informed guesses, and thankfully the authors do a good job of giving readers many opportunities to understand what it means based on context in various passages.

Sept. 30, 2014

Deterrence with China: Avoiding Nuclear Miscalculation

As China rises and the United States seeks to maintain its global dominance, the world is faced with a new historical phenomenon: a dramatic shift in power between two nuclear-capable nations. As the relative power of each nation nears parity, tension is inevitable and the character of the evolving Sino-U.S. relationship poses a risk of nuclear miscalculation. Nuclear use between China and the United States would be a catastrophe, but China is an independent actor, and the United States can only influence, but not control, the crossing of the nuclear threshold. If U.S. policymakers neglect this risk, miscalculation is more likely.

Sept. 30, 2014

The Limits of Cyberspace Deterrence

As a concept, deterrence has been part of the military vernacular since antiquity. In his History of the Peloponnesian War, Thucydides quotes Hermocrates as stating, “Nobody is driven into war by ignorance, and no one who thinks that he will gain anything from it is deterred by fear.”2 In the 2,400 years since then, the domains for the conduct of military affairs have expanded from the original land and maritime domains to air, space, and now cyberspace. As warfighting expanded its scope, strategic theory did as well. Today, U.S. doctrine declares that the fundamental purpose of the military is to deter or wage war in support of national policy.3 Therefore, military strategists and planners have a responsibility to assess how adversaries may be deterred in any warfighting domain. Through the joint planning process, planners, working through the interagency process, consider deterrent options for every instrument of national power—diplomatic, informational, military, and economic—across all phases of military operations.4 However, most of the thought and analysis in deterrence has revolved around the use of conventional and nuclear weapons.

Sept. 30, 2014

Opportunities in Understanding China’s Approach to the Senkaku/Diaoyu Islands

In 2010, two Japanese coast guard vessels and a Chinese fishing boat collided in the disputed waters near the Senkaku/Diaoyu Islands, sparking increasingly confrontational behavior by both China and Japan. The pattern of escalation continued in 2012 when Japan nationalized several of the disputed islands by purchasing them from the private owner. China promptly responded by sending warships to the area in a show of force. Although escalation to the point of war is unlikely, these incidents underscore the destabilizing regional effects of the disputed islands and associated maritime boundaries. China’s territorial claims are rooted in historical context, nationalism, national security, and economic interests.3 By understanding China’s perspectives, motives, and approaches to resolving this dispute, the United States can anticipate the current pattern of escalation, forecast future Chinese behavior, and identify opportunities for conflict management and eventual de-escalation to improve strategic stability in the region.

Sept. 30, 2014

A Potent Vector: Assessing Chinese Cruise Missile Developments

The numerous, increasingly advanced cruise missiles being developed and deployed by the People’s Republic of China (PRC) have largely flown under the public’s radar. This article surveys PRC cruise missile programs and assesses their implications for broader People’s Liberation Army (PLA) capabilities, especially in a Taiwan scenario.

Sept. 30, 2014

Understanding the Enemy: The Enduring Value of Technical and Forensic Exploitation

The escalation of improvised explosive device (IED) incidents and related casualties during Operations Iraqi Freedom and Enduring Freedom led to a new intelligence field related to technical intelligence (TECHINT) called weapons technical intelligence (WTI), which combined technical and forensic IED exploitation techniques to link persons, places, things, and events. WTI operationalizes technical and forensic activities by fusing the technical, forensic, and biometric disciplines to produce actionable intelligence for countering threat networks. It is an especially powerful tool against terrorist organizations that rely on IEDs as a primary weapon in their arsenals. Given the enduring nature of the IED problem, careful consideration is required to ensure that we have the necessary counter-IED capability and capacity to meet future threats across the range of military operations. Across this range and at each level of war from tactical to strategic, TECHINT and WTI make critical contributions to joint warfare and military decisionmaking.

July 1, 2014

Tailored Deterrence: Strategic Context to Guide Joint Force 2020

U.S. deterrence is neutered by not clearly defining national security threats and aligning resources accordingly, as in favoring offensive Air-Sea Battle against China against defensive A2/AD capabilities with partners, or preparing sufficiently against regional players such as North Korea and Syria. Plans must accord with actual defense policies and dangers.

July 1, 2014

The Role of U.S. Land Forces in the Asia-Pacific

Washington must not yield to fiscal pressures that erode its legitimacy as a global leader. Its forces must remain capable across the spectrum from the smallest to the largest security challenges and control procurement accordingly, using existing resources and allies in a flexible approach the Army will continue to pursue.

July 1, 2014

Resilient Command and Control: The Need for Distributed Control

Centralized control and decentralized execution has been a fundamental principle of Air Force power projection. It will remain seminal as the Service combines a single commander who weighs strategy and tactics for optimal force employment with Airmen empowered to use imagination and initiative.

July 1, 2014

Defense Strategic Guidance: Thoughtful Choices and Security Cooperation

DOD aids such as amalgamating strategic guidance, Secretarial reviews of campaign and contingency plans, and steady-state activities within theaters will help seal enduring gaps and help planners watch for unintended damage to our security cooperation partners as well as engendering further dialogue in DOD, the combatant commands, and the embassies.

April 1, 2014

Airpower and Globalization Effects: Rethinking the Five Rings

The Five Rings theory may not provide quick wins against large countries with modern air defense systems, but an escalatory strategic interdiction strategy relying on capable air and navel forces to affect the most critical and vulnerable elements would apply to many crises with its nonlethal and reversible options.

April 1, 2014

Sun Tzu in Contemporary Chinese Strategy

Sun Tzu’s The Art of War cuts both ways. Its tenets work against enemies but can also strike against China. Using the general’s maxims, we can uncover inconsistencies in the grandly moral stance assumed by Chinese leaders. For instance, claims made for public consumption can be juxtaposed with demonstrable fact.

Jan. 1, 2014

Biometric-Enabled Intelligence in Regional Command-East

Biometric-enabled Intelligence (BEI) has established its value throughout Regional Command–East even though the full potential of biometrics-related collections and applications remains unknown. Importantly, the concept has gained traction at the general government level as well as locally, where Afghan National Security Forces and allies and adversaries are seeing the forensic footprints insurgents leave behind being exploited to erase insurgent anonymity, which has served as a traditional hiding place. Arrests and warrants are up, and BEI operations have impacted insurgents' ability to lead their movement and lower-level cells' ability to function. The pressure grows as coalition and Afghan forces employ biometrically developed watch lists and "be on the lookout" messages as part of focused hunts for offenders.

Jan. 1, 2014

"Gallantry and Intrepidity": Valor Decorations in Current and Past Conflicts

The Nation and its military appear to be growing less generous with decorations for valor. Seventeen Medals of Honor were awarded for the 17 days of the Battle of Chosin Reservoir, while 11 have been awarded over the 11-year span of U.S. combat in Iraq and Afghanistan. No single factor accounts for the 20-fold reduction in the number of valor decorations in current operations. The most popular reasoning focuses on the changing nature of warfare and military culture, but that leaves gaps. The awards process is kept from public scrutiny, but some evidence suggests changes since Vietnam. The effects of the factors that can be isolated need further analysis to enable today's warriors to be awarded the decorations they earn.

Jan. 1, 2014

From the Chairman

The Joint Force remains unrivaled. We deter threats, assure partners, and defeat adversaries. We are strong—and our nation is secure—because we commit to being the best led, best trained, and best equipped force as our non-negotiable imperative. You, the men and women of the Joint Force—all volunteers—are the Nation’s qualitative military edge. We are who we are because of your commitment and determination. The world is not getting any safer, but we are becoming more adaptable.

Jan. 1, 2014

Executive Summary

There was a time when “jointness” had no champions. There was a time when professional military education at the Service colleges offered little in the way of joint content. Joint military operations often revealed a lack of basic coordination, much less cooperation or cohesion. Despite examples in World War II of joint coordination in various operations, after the war, Army Chief of Staff General Dwight D. Eisenhower and Chief of Naval Operations Admiral Chester Nimitz committed their respective Services to work together to establish a joint military education effort 40 years before the Goldwater-Nichols Department of Defense Reorganization Act of 1986 required it.

Jan. 1, 2014

The Role of Professional Military Education in Mission Command

The military's new command system, known as mission command, requires that subordinate leaders at all levels are at once aggressive and disciplined in accomplishing the mission. Accordingly, the Chairman's "conduct of military operations through decentralized execution based upon mission type orders" calls for commensurate professional military education (PME), but the emphasis on relative autonomy has not been as pronounced as needed. Among areas where PME is found wanting is not allowing students time to think about what they are learning. Implanting civilian instructors with more experience in building in time for research and reflection, and requiring writing—an operations order a week is suggested—will help develop the critical thinking mission command demands.

Jan. 1, 2014

The Pen and the Sword: Faculty Management Challenges in the Mixed Cultural Environment of a War College

While the war colleges each Service maintains bow to their Services' cultures, and the National War College and Eisenhower School are joint, these institutions share certain commonalities in preparing lieutenant colonels and colonels and their Navy equivalents for the next level of responsibility. Seen from the perspective of an administrator, the war colleges should aim to be "intellectual centers of excellence with a mix of the best and brightest military and civilian faculty members." Properly resourced and staffed, the schools could serve as percolators for new and even counterintuitive thinking egged on by incisive research on impactful areas, and also as launching pads for the sorts of inquiring and innovative officers needed to confront the challenges of a fast-paced age.

Jan. 1, 2014

Putting "A Cooperative Strategy for 21st Century Sea Power" to Work: A Wargaming Perspective

Combatant commanders and their subordinates will need to act with allied forces under the umbrella of the Chairman's mission command system, meaning a commander's intent must be transparent to multinational forces. Interoperability between U.S. and UK forces, for instance, can be streamlined through resolution of cultural, doctrinal, and communication/information systems. Immediate steps include continuing exchange officer placement, combined training exercises, and standardized rules of engagement. NATO Allies and other partners can be drawn in as needed, and the Naval War College should continue to take the lead in following this Chief of Naval Operations directive.

Jan. 1, 2014

Godzilla Methodology: Means for Determining Center of Gravity

Commanders unable to decide what constitutes the enemy center of gravity may find deliverance in the Godzilla Methodology. This fabulous creature symbolizes which force must be neutralized to achieve the objective. Godzilla dispatches each force from the list of critical strengths until deletion of a particular force prevents the objective from being achieved. The methodology is simple and effective, and identification of the center of gravity allows friendly forces to proceed with dismantling resistance by removing those forces that most decisively frustrate achievement of friendly political/military objectives. Moreover, friendly centers of gravity can be identified and protected and perhaps enhanced.

Jan. 1, 2014

Improving DOD Adaptability and Capability to Survive Black Swan Events

Black swan events have no historical precedent to warn us to be prepared; yet, as seen in the 9/11 attacks, they are not entirely unforeseen and general preparation is possible even though their rarity makes it difficult to gather widespread support. Military culture is particularly inoculated against accepting that anything cannot be prepared for, or if it does catch us by surprise, that it cannot be recovered from. Yet even the military is awakening to the growing probability of such events as chemical or biological or other attacks. Low-cost and adaptive measures must not be overlooked as DOD strives to be ready to respond to a broad range of possibilities rather than keying in on anything specific.

Jan. 1, 2014

The Joint Stealth Task Force: An Operational Concept for Air-Sea Battle

Overcoming antiaccess/area-denial (A2/AD) requires having sensor and weapons density at range without relying on forward bases or carriers, which urges a return to Air-Sea Battle basics. What is called a joint stealth task force concept is emblematic of the new pluralism regarding platforms. Budget and research agility are needed to address such deficiencies as inadequate range capacity in the air capability, undersea payload capacity, and insufficient development of unmanned systems and hypersonic research. Networking technology is in a comparatively good position to support the concept discussed here. Warfighters need to consider, debate, wargame, and jointly test the stealthy airborne and undersea platforms and the new technologies and operational concepts needed to defeat A2/AD and achieve Air-Sea Battle objectives.

Jan. 1, 2014

Unifying Our Vision: Joint ISR Coordination and the NATO Joint ISR Initiative

As revealed by Unified Vision 2012, joint intelligence, surveillance, and reconnaissance (JISR) must fill a number of operationally applicable needs. JISR integration requires the technical linking of data sources, operational integration, command and control, and optimal tactical employment of ISR capabilities, which cannot be done without mature doctrine, refined tactics, techniques, and procedures, and training for operators. The NATO Allies must have an accessible and dependable apparatus for finding and striking targets that are often mobile and asymmetric; and the Alliance must be able to deploy it despite reduced U.S. financial and other inputs. JISR operators must be organized, trained, and equipped to interface with all allied assets using the appropriate tactics, techniques, and procedures.

Jan. 1, 2014

Cut Defense Pork, Revive Presidential Impoundment

Congress builds unnecessary costs into the defense budget by considering employment and contract issues in congressional districts ahead of actual needs. In the face of expenditures beyond what DOD requests, the President should aggressively reenter the fray by jumpstarting the contest between "the powers of the purse versus that of impoundment." There are steps the President can take to "revive his impoundment authority" within constitutional bounds. If a legislative compromise is unobtainable, the President might select a salient example such as the 280 M1 tanks that were produced without being requested and are now candidates for cold storage. With Supreme Court and congressional support, the Commander in Chief may be able to block wasteful or strategically unsound procurement.

Jan. 1, 2014

Strategic Implications of the Afghan Mother Lode and China's Emerging Role

China has the technology, know-how, and capital to exploit Afghanistan's mineral resources and capitalize on its location, which could make it a transportation hub; concurrently, Beijing sees the risks of dealing with a country with corruption at all levels and with the further problems of primitive infrastructure, low education and expertise levels, potentially hostile neighbors, scarcity of water, and forbidding terrain. Afghan analysts themselves see the need to build economic and social stability as trumping other security and military needs. Meantime, U.S. and NATO forces are spending trillions to prepare Afghanistan for China and other countries to reap the benefits. This outcome, while controversial, may be the easiest way for Kabul to rise above its disorder and poverty.

Jan. 1, 2014

Improving Safety in the U.S. Arctic

The Arctic's resources and transportation possibilities are drawing increased activity from many nations, and Washington should act at once to bolster what the Coast Guard can do. The lead agency will be the Department of Homeland Security with the Coast Guard as its operational arm, ideally with adequate funding and a seasonal search-and-rescue base at Barrow, Alaska, and at least two new icebreakers to maintain an Arctic presence, protect safety interests from cruise ships and other activities, and respond to environmental calamities.

Jan. 1, 2014

Forging a 21st Century Military Strategy: Leveraging Challenges

Exercises are helping determine optimal military capabilities for the future. The Bold Alligator series saw the Navy–Marine Corps team leading a joint and coalition attempt to shape a flexible insertion force and identify the kind of command and control, and intelligence, surveillance, and reconnaissance resources that will be most helpful going forward. The exercise revealed the importance of the ability of coalition forces to "craft greater capability to transfer the deconfliction of air tasks to integrated data systems." Deconflicting strike and air assets/tasks will call for greater coordination and automation and determining the appropriate nuclear tip. Finding the right policy agenda requires understanding the interactive nature of warfare and anticipating tomorrow's needs rather than relying on outmoded technologies.

Jan. 1, 2014

Learning and Adapting: Billy Mitchell in World War I

Aviation guru Billy Mitchell could have seen any number of reversals as dismal failures, but each setback seemed to place him at the right place and time. Apparent demotions were actually opportunities to step back to think, write, and learn. Accordingly, when the American Expeditionary Force (AEF) was swinging into action, even his long-time rival Benjamin Foulois admitted Mitchell was the best candidate to command the AEF's final operations. Mitchell frequently did not see advantages in the making as he was clubbed into less prestigious assignments; yet he persisted, and however mean his assignments were, he processed his experience by writing and analyzing them daily, enabling him to develop an aerial expertise far in advance of his American peers.

Jan. 1, 2014

The Tender Soldier: A True Story of War and Sacrifice

On November 4, 2008, Paula Loyd, a social scientist with a relatively new U.S. Army program, the Human Terrain System (HTS) and its deployed Human Terrain Teams, was on task in Maiwand, Afghanistan. Deployed to study the sociocultural nuances of the Afghan people and help commanders better understand the host population, this day would lead to Loyd’s death. The Tender Soldier: A True Story of War and Sacrifice, by journalist and Columbia University Graduate School of Journalism Professor Vanessa M. Gezari, is a well-researched and deeply personal narrative of the events of that day and the controversies surrounding the program that deployed Loyd into the field.

Jan. 1, 2014

Security Cooperation: How It All Fits

Joint Publication (JP) 3-XX, Security Cooperation, will most likely deal with the terms and programs supporting U.S. foreign policy and how they relate. The anticipated updating of JP 3-22, Foreign Internal Defense, should be synchronized with it and present expanded discussion of U.S. combat operations to include major counterinsurgency and counterterrorism operations in support of host countries. Joint Doctrine Note 1-13,Security Force Assistance, will also help provide commanders a doctrinal foundation for identifying tools and resources to assist other militaries. Language redundancies and confusing definitions should not be allowed to impede military ventures—hence the need for doctrine as the fundamental principles guiding force employment toward common objectives. Future joint doctrine must explain the relationship of security cooperation terms.