Browse by

Publications

Results:
Category: JFQ

July 7, 2023

Cutting the Chaff: Overlooked Lessons of Military UAP Sightings for Joint Force and Interagency Coordination

The Mantell incident and other military UAP sightings make it clear that misidentification remains a common problem in complex operating environments. They demonstrate how distinguishing one’s joint force and interagency partners (or their assets) from an enemy force, from civilians and other noncombatants, or even from environmental phenomena can be a challenge in the best of circumstances. Misidentification of friendly (or nonhostile) airborne assets can lead to expensive or even fatal accidents in the field.

July 7, 2023

A Framework for Lethal Autonomous Weapons Systems Deterrence

As nations around the world continue to pursue lethal autonomous platforms for use on the battlefield, the lack of a commonly understood framework for their employment increases the risk of inadvertent or accidental escalation due to miscommunication or misinterpretation of deterrent signals in competition and crisis.

July 7, 2023

Strategic Inflection Point: The Most Historically Significant and Fundamental Change in the Character of War Is Happening Now—While the Future Is Clouded in Mist and Uncertainty

Geostrategic competition and rapidly advancing technology are driving fundamental changes to the character of war. Our opportunity to ensure that we maintain an enduring competitive advantage is fleeting. We must modernize the Joint Force to deter our adversaries, defend the United States, ensure future military advantage, and, if necessary, prevail in conflict.

July 7, 2023

Letter to the Editor

The April 2023 issue of Joint Force Quarterly features a positive review of our book, "Cyber Persistence Theory: Redefining National Security in Cyberspace" by Stafford Ward, alongside an article on cyber and deterrence by James Van de Velde. Both pieces present discordant views on U.S. Cyber Command's approach to persistent engagement and how it fits with a strategy of deterrence and the more recent concept of integrated deterrence. As theorists and a practitioner in persistent engagement, we offer some clarification.

May 4, 2023

When Dragons Watch Bears: Information Warfare Trends and Implications for the Joint Force

Over the past decade, the People’s Republic of China (PRC) has watched Russia’s employment of information warfare (IW) with great interest. The parallels between these two Great Powers and their associated aggression toward breakaway republics present an opportunity for the United States and the joint force to map the contours of an evolving Chinese information warfare strategy to build a more comprehensive U.S. response prior to a future conflict in the region. Thwarting Chinese information confrontation tactics during crisis and conflict will require a comprehensive approach, one that boldly marshals increased unity of effort from across the whole of government. To compete and win in the 21st-century information environment, the Department of Defense (DOD), in partnership with the interagency community, should endeavor to lead three initiatives across upcoming joint force time horizons.

May 4, 2023

Mind the Gap: Space Resiliency Advantages of High-Altitude Capabilities

This article argues that the joint force must develop high-altitude capabilities and integrate them into joint operations to improve space mission resiliency. High-altitude capabilities ensure that warfighting mission requirements are met and will enable the joint force to achieve its objectives in a conflict when adversaries attempt to heavily contest both air and space. The following section recommends a joint definition for the high-altitude region, continues with a historical review of the development and importance of high-altitude capabilities, describes how their use will improve space mission resiliency, and concludes with recommendations for ways the joint force should develop and budget for these important high-altitude capabilities as it prepares for the next conflict.

May 4, 2023

Echoes of the Past: The Burma Campaign and Future Operational Design in the Indo-Pacific Region

This article is organized into three parts. First, a historical narrative of the Burma campaign highlights the struggles of 1942–1943, then details the second Arakan operation, the second Chindit operation, the battle of Imphal-Kohima, and the final Allied operation to retake Burma. Second, inferences are drawn from the historical narrative applied to modern warfare. Finally, implications for future joint force operational design in the Indo-Pacific derive from these inferences, indicating lessons contemporary joint force commanders and staffs can learn from the Burma campaign.

May 4, 2023

Leadership Decapitation: Strategic Targeting of Terrorist Organizations

Leadership decapitation has become increasingly popular as an efficient, economical, and effective counterterrorism option for advancing U.S. interests when dealing with organizations willing to kill civilians in pursuit of political ends. But does the removal of violent nonstate leaders actually yield demonstrably favorable results beyond the obvious: execution or apprehension of a target? Does it, in fact, weaken or bring about the demise of terrorist organizations? In Leadership Decapitation: Strategic Targeting of Terrorist Organizations, Jenna Jordan addresses such questions by offering a complex and nuanced discussion of the ways that leadership decapitation affects terrorist organizations and insurgencies that kill civilians.

May 4, 2023

Resourcing the National Security Enterprise: Connecting the Ends and Means of U.S. National Security

Books on strategy are often aspirational or theoretical, considering high-level questions, first principles, and general trends without delving deeply into the mechanics of implementation. Similarly, a parallel vein of literature focuses on a narrow range of tactical platforms or concepts in the implicit hope that someone somewhere will use these clever tools to build a future force from the bottom up. Resourcing the National Security Enterprise: Connecting the Ends and Means of U.S. National Security fits squarely between these two attractive yet unsatisfying poles; it is a practitioner’s guide to programming and budgeting that aims to demystify the “invisible but very real web of processes and authorities [that] constitute the ‘rules of the game’ for the bureaucracy”—“rules which often forestall the ‘obvious solution’” to government workers’ problems.

May 4, 2023

Cyber Persistence Theory: Redefining National Security in Cyberspace

Few books have been written in the recent past whose stated intent has been to influence and shape the perceptions of foreign and defense policymakers. In the spirit of the famed Stanford University political scientist Alexander George, who wrote Bridging the Gap: Theory and Policy in Foreign Policy, the authors of Cyber Persistence Theory: Redefining National Security in Cyberspace have successfully bridged the gap with a thought-provoking, accessible academic analysis. Cyber Persistence Theory holistically examines the current cyberspace environment in a way that is sure to be useful to U.S. cyberspace policymakers and operators.