Browse by

Jan. 9, 2018

The Bureaucratization of the U.S. Military Decisionmaking Process

Is risk management overemphasized in the decisionmaking process? Is caution more valued than boldness in action?

Jan. 9, 2018

Surfing the Chaos: Warfighting in a Contested Cyberspace Environment

To win in the new cyber-contested battles of the future, a combatant must still command, but let go of control and surf the chaos.

Jan. 9, 2018

The Power of Partnership: Security Cooperation and Globally Integrated Logistics

Logistics ought to be substantially integrated into security cooperation efforts, and security cooperation ought to be thoughtfully integrated into the discipline of logistics. While this premise may seem obvious, it is too often overlooked or misunderstood.

Jan. 9, 2018

Multidomain Battle: Time for a Campaign of Joint Experimentation

Concepts on the scale of multidomain battle (MDB) require a campaign of experimentation that provides compelling evidence for the concept by fleshing out its operational and institutional contexts.

Jan. 9, 2018

The Future Is Plural: Multiple Futures for Tomorrow's Joint Force

Multidimensional challenges cannot rely on dartboards or algorithms fed by Big Data. The central question for senior leaders in defense is improving their assessment of risk in ambiguous contexts.

Jan. 9, 2018

Executive Summary

War exacts a toll over time unlike any other human experience. And meeting the demands of combat takes more than one individual’s effort, budget, and ideas to succeed. The joint force has to adapt, adjust, acquire, repurpose, retrain, recruit, and perform a whole range of other functions to continue to meet the mission of protecting our Nation, allies, and partners around the world.

Dec. 21, 2017

Battlefield Geometry in our Digital Age: From Flash to Bang in 22 Milliseconds

This year has been tough for cybersecurity programs. Every month in the first six months of 2017, the world experienced a major cyber event. Open-source attacks included attacks on critical infrastructure, banks, intelligence services, and significant commercial and government entities. Indeed, reflecting on the scope and depth of most publically acknowledged compromises, uncovers the reality of the tremendous and growing risks the country faces nearly two decades into the 21st century. Everything seems to have changed. Virtually every organization within the Department of Defense (DOD) has, sometimes reluctantly, come to embrace digital age technology, to the point that they are completely dependent on it. The result is a shocking degree of paralysis when our access to the services we now rely upon is disrupted.

Dec. 21, 2017

How is NATO Meeting the Challenge of Cyberspace

Historians of international relations are familiar with the hinge-year concept when trends that previously had been largely subterranean suddenly crystallize into a clear and immediate danger, forcing policymakers to wake up and take action. When it comes to cyberspace, the past year has certainly smashed any complacency about our ability to anticipate and counter the growing sophistication of cyberattacks. As fast as we have tried to catch up, the speed and global impact of these attacks continue to outrun us. 2016 witnessed the first major attack via the Internet of Things when a DynCorp server in the United States was hacked through video surveillance cameras. We also saw the first attacks driven by artificial intelligence, and increasing evidence of collusion between state intelligence services and organized crime networks.

Dec. 21, 2017

Power Projection in the Digital Age

Logistics is the lifeblood of the Joint Force. It requires an effective distribution network as its heart, moving and sustaining the force at the right place and at the right time—all the time. U.S. Transportation Command (USTRANSCOM) delivers that decisive force, projecting American power globally through the robust Joint Deployment and Distribution Enterprise (JDDE) and leveraging the expertise of more than 140,000 professionals. No other nation in the world can compete with the United States in conventional warfare because we plan, secure, and distribute combat capability so well. As a result, many military planners are now value-programmed to believe that a soldier or bullet will always be where it needs to be, when it needs to be there—on demand.

Dec. 21, 2017

A National Security Enterprise Response - Digital Dimension Disruption

The digital dimension is simultaneously enhancing and disrupting the fabric of life in every society where modern, informatized technology is present. The slow-motion collapse of parts of the 20th century’s legacy is now accelerating in ways that likely will usher in a monumental realignment of societal institutions, methods of business, and fundamental ideas about national security. This realignment will, of necessity, change the frameworks within which America provides for its security, including how it acquires the goods and services it uses in that effort.