Browse by

Publications

Results:
Category: JFQ

May 4, 2023

Leadership Decapitation: Strategic Targeting of Terrorist Organizations

Leadership decapitation has become increasingly popular as an efficient, economical, and effective counterterrorism option for advancing U.S. interests when dealing with organizations willing to kill civilians in pursuit of political ends. But does the removal of violent nonstate leaders actually yield demonstrably favorable results beyond the obvious: execution or apprehension of a target? Does it, in fact, weaken or bring about the demise of terrorist organizations? In Leadership Decapitation: Strategic Targeting of Terrorist Organizations, Jenna Jordan addresses such questions by offering a complex and nuanced discussion of the ways that leadership decapitation affects terrorist organizations and insurgencies that kill civilians.

May 4, 2023

Resourcing the National Security Enterprise: Connecting the Ends and Means of U.S. National Security

Books on strategy are often aspirational or theoretical, considering high-level questions, first principles, and general trends without delving deeply into the mechanics of implementation. Similarly, a parallel vein of literature focuses on a narrow range of tactical platforms or concepts in the implicit hope that someone somewhere will use these clever tools to build a future force from the bottom up. Resourcing the National Security Enterprise: Connecting the Ends and Means of U.S. National Security fits squarely between these two attractive yet unsatisfying poles; it is a practitioner’s guide to programming and budgeting that aims to demystify the “invisible but very real web of processes and authorities [that] constitute the ‘rules of the game’ for the bureaucracy”—“rules which often forestall the ‘obvious solution’” to government workers’ problems.

May 4, 2023

Cyber Persistence Theory: Redefining National Security in Cyberspace

Few books have been written in the recent past whose stated intent has been to influence and shape the perceptions of foreign and defense policymakers. In the spirit of the famed Stanford University political scientist Alexander George, who wrote Bridging the Gap: Theory and Policy in Foreign Policy, the authors of Cyber Persistence Theory: Redefining National Security in Cyberspace have successfully bridged the gap with a thought-provoking, accessible academic analysis. Cyber Persistence Theory holistically examines the current cyberspace environment in a way that is sure to be useful to U.S. cyberspace policymakers and operators.

May 4, 2023

A Framework for Mission Analysis in the Space Planning Process

The U.S. Space Force (USSF) has a joint integration problem. It provides capabilities that give the military and its partners decisive advantages in combat. In this way, many USSF missions are inherently “joint.” However, the Space Force is unprepared to contribute to planning for true joint operations—operations with a significant space nexus where the main effort could easily transition between space and other domains. In such an environment, adversary space systems will be high-value targets that drive action, and friendly space systems will be critical assets that require protection. Although the Space Force has made significant progress toward establishing Service components at the combatant commands, putting Guardians in a position to support joint force commanders (JFCs), the Service has not yet armed those Guardians with a process to bring space system considerations into joint planning.

May 4, 2023

A More Perfect Union: Black Soldiers and the Promise of America

The path for African American Soldiers—officer and enlisted—has been a long and arduous one. This article chronicles elements of that journey from its beginning with the American Revolutionary War through to the present day. It highlights the challenges, progress, and ever-present threats of regression encountered along the path of service. The aspirations of current diversity, equity, and inclusion (DEI) efforts will require awareness, intentionality, and commitment to bring to fruition. While the Army boasts of its “tradition as a global leader in DEI,”3 the focus must be on “Deeds, Not Words."

May 4, 2023

Intermediate Force Capabilities: Nonlethal Weapons and Related Military Capabilities

The U.S. military has a history of fighting wars and winning battles through the overwhelming use of force. In today’s strategic environment, the battle is often one of competition below the threshold of armed conflict. Our adversaries are gaining the advantage by exploiting the predictable joint force responses, either showing force through military presence or employing lethal force. Both of these extremes are often ineffective against adversary competition. Yet neither doctrine nor training prepares the joint force to employ force between these extremes. To protect current and future national political and military interests, the U.S. military must modify its mindset and tactics to gain the necessary tools for strategic competition, or the Nation risks losing its competitive advantage.

May 4, 2023

The New “Cyber” Space Race: Integrating the Private Sector Into U.S. Cyber Strategy

The impact of Russia’s rise as a cyberpower and the Kremlin’s use of cyber warfare as an instrument of power have not gone unnoticed by U.S. Government and military leaders. The questions remain, however: What can the United States learn from Russia, and how has the United States adapted its national strategy for cyberpower to this integrated, whole-of-society approach to international competition and conflict?

May 4, 2023

General George Washington: First in War, First in Peace, First in National Security Strategy

On July 4, 1776, American leaders at the Second Continental Congress terminated the strategy they had been executing against Great Britain for over a year. They wanted political, military, and economic independence for the 13 colonies. To achieve that end, they relied on all four instruments of national power—diplomatic, informational, military, and economic. But while many of the founders understood one or perhaps two of these instruments, General George Washington was the first American to execute a strategy using all four to achieve his ends—all while operating in a joint, interagency, intergovernmental, and multinational (JIIM) environment, as complicated in its time as ours is today.

May 4, 2023

Cyber Deterrence Is Dead! Long Live “Integrated Deterrence”!

The demands that Congress, some strategists, and many academics make of cyberspace deterrence are unrealistic in the extreme.1 Many want the Department of Defense (DOD) to freeze adversary military or influence operations or the theft of American intellectual property (IP) entirely through the simple threat of interfering with adversary computer code, presumably imperiling the function of either adversary military systems or civilian infrastructure. Such strategic thinking is hopelessly naïve because such threats are insufficiently credible to deter malicious cyberspace activities, which generally fall below the level of armed conflict.2

May 4, 2023

A Mission Assurance Assessment of Threats to Missions and Force Protection Planning

After the Cold War, the United States enjoyed such an uncontested or dominant superiority in every domain that the Department of Defense (DOD) could deploy forces when it wanted, assemble them where it wanted, and operate them as it wanted. Perhaps because of this history, combined with the objectives in the 2018 National Defense Strategy (NDS), DOD components have focused on the development of new offensive and lethal capabilities and concepts with the unstated assumption that, once developed, these capabilities would be available. The following scenario describes how these assumptions can adversely affect DOD force projection capabilities.