Due to a lapse in federal funding, this website is not being actively updated or monitored. See OPM status.

Sept. 1, 2015

Annex C | Iraq Timeline

div.Basic-Text-Frame { border-style:solid; } h3{ font-size:18px; } p.A-head { font-size:13px; font-weight:600; margin-top:9px; text-align:left; text-decoration:none; text-indent:0; text-transform:none; } p.B-head { font-size:13px; font-weight:600; margin-top:9px; font-style:italic;

Sept. 1, 2015

Contributors

div.Basic-Text-Frame { border-style:solid; } h3{ font-size:18px; } p.A-head { font-size:13px; font-weight:600; margin-top:9px; text-align:left; text-decoration:none; text-indent:0; text-transform:none; } p.B-head { font-size:13px; font-weight:600; margin-top:9px; font-style:italic;

Aug. 1, 2015

An Empirical Analysis of Claimant Tactics in the South China Sea

China, Taiwan, Vietnam, the Philippines, Malaysia, and Brunei all claim some or all of the land features and maritime territory in the South China Sea. One notable aspect of the South China Sea dispute is that its advocates argue past one another with little reference to a common set of facts. Another is the absence of comprehensive data on the actions claimants have taken to advance or protect their claims. The Center for the Study of Chinese Military Affairs at the National Defense University (NDU) set out to create a comprehensive database documenting the various tactics pursued by South China Sea claimants over an 18-year timeframe (1995–2013). This paper draws upon that data to analyze what tactics South China Sea claimants are employing and to present some potential considerations for U.S. and allied policymakers.

July 1, 2015

The Arctic Domain: A Narrow Niche for Joint Special Operations Forces

Global climate change has catapulted the Arctic into the center of geopolitics, as melting Arctic ice transforms the region from one of primarily scientific interest into a maelstrom of competing commercial, national security and environmental concerns.

July 1, 2015

Executive Summary

Every so often we find ourselves in a place where we can take time to assess where we are, where we have been, and where we think we are going—and check it against where we think we should be ending up. This edition of JFQ offers two interviews that are assessments of events past, present, and future. Both are of stories not yet complete: one, the wars in Afghanistan and Iraq; the other, the production of the F-35 fighter aircraft.

July 1, 2015

Rapid Regeneration of Irregular Warfare Capacity

There is widespread agreement among the public and in the foreign and defense communities that the United States should avoid “another Iraq” or “another Afghanistan”—that is, another large-scale, long-term, and highly costly stability operation. President Obama’s reluctance to put “boots on the ground” in Iraq is but the most recent example of this reaction against the high costs and questionable outcomes of the conflicts in those two countries.

July 1, 2015

Quo Vadis? The Education of Senior Military Officers

This article considers approaches to teaching senior military officers at the U.S. Army War College (USAWC). It reviews the results of several studies and surveys from the employers of our graduates and from recent graduates themselves on how best to them prepare for future assignments in the volatile, uncertain, complex, and ambiguous strategic environment.

July 1, 2015

Waffles or Pancakes? Operational- versus Tactical-Level Wargaming

Many planners agree that operational level ‘war gaming’ using the Joint Operation Planning Process (JOPP) is different from tactical level war gaming using the Military Decision Making Process (MDMP) or the Marine Corps Decision Process (MCDP). But they struggle with understanding the differences because service and joint doctrine only describe their processes and do not compare or point out differences between the processes.

July 1, 2015

An Interview with Christopher C. Bogdan

On May 12, 2015, Dr. William T. Eliason, Editor in Chief of Joint Force Quarterly, interviewed Lieutenant General Christopher C. Bogdan, USAF, Program Executive Officer for the F-35 Lightning II Program, at Bogdan’s office in Arlington, Virginia.

July 1, 2015

Turnaround: The Untold Story of the Human Terrain System

The U.S. Army’s Human Terrain System (HTS), a program that embedded social scientists with deployed units, endured a rough start as it began deploying teams to Iraq and Afghanistan in 2007. These early experiences had a lasting impact on the program. Although critics have written extensively about HTS struggles with internal mismanagement, most accounts simply cataloged problems, yielded little insight into the organization’s progress over time, and ultimately gave the impression that HTS was never able to make needed corrections.

July 1, 2015

On Military Professionalism and Civilian Control

Recently, the subject of military “professionalism” has gripped the attention of top echelons of the Department of Defense (DOD) to a degree that is perhaps unprecedented. Most notably, Chairman of the Joint Chiefs of Staff (CJCS) General Martin E. Dempsey has directed each of the Services to review and rearticulate its understanding of the profession of arms in the context of its particular missions, traditions, and practices.

July 1, 2015

Detangling the Web: A Screenshot of U.S. Government Cyber Activity

Blackouts. School testing. Electrical grids. Insurance. These all have one major thing in common: they have all been targets for cyber attacks in a period of two weeks during March 2015. The United States faces thousands of cyber assaults every day. States, state-sponsored organizations, other groups and individuals all combine to incessantly probe, spy on, and attack public and private organizations as well as denizens of the United States. These ongoing problems require a U.S. Government response, so it adopted a bureaucratic approach that has resulted in a complex system that is constantly evolving as new problems are recognized. This article provides a comprehensive look at how the United States has organized to address these challenges. Although U.S. Government efforts seem sizable, private use of the Internet dwarfs government usage.

July 1, 2015

One Size Does Not Fit All: The Multifaceted Nature of Cyber Statecraft

To better evaluate the strategic implications of cyber as a domain in which to achieve national security objectives—from antiaccess/area denial to governance, democratization, and economic growth—policymakers need a rigorous, multifaceted framework that examines cyber statecraft not only as a military tool, but also as a more holistic form of statecraft. Such a framework is long overdue to help make sense of the great technological disruption that continues to shape the international political system. While the military component is essential, cyber statecraft is often viewed only through this coercive lens, when in fact it is much broader.

July 1, 2015

Understanding the Indications and Warning Efforts of U.S. Ballistic Missile Defense

The critical mission of defending the U.S. homeland—homeland defense—requires a fully integrated capability to identify, categorize, and fuse strategic and tactical indications and warnings (I&W) by U.S. Strategic Command (USSTRATCOM), North American Aerospace Defense Command (NORAD), U.S. Northern Command (USNORTHCOM), and U.S. Pacific Command (USPACOM). Today’s fiscally constrained environment may encourage decisionmakers to eliminate perceived I&W “redundancies” and create an I&W stovepipe for weapons release authorities (WRAs). In a mission area where time is of the essence and failure would result in grave damage to national security, such an arrangement would create an unacceptable risk to homeland defense.

July 1, 2015

Spinning the Top: American Land Power and the Ground Campaigns of a Korean Crisis

Gashed from the yellow earth and scarred by lacerating wire bound to steel posts, the moment Korea’s Demilitarized Zone (DMZ) comes into view, you cannot avoid the impression that you are witness to a crime. In a way, you are. The DMZ is an ominous wound from an unfinished conflict dividing the Korean Peninsula and serving as a boundary between incarceration and freedom. It carves its way between Korea’s sharp-sloped green hills only 20 short miles from the megacity of Seoul and its surrounding environs with its 25 million people who, after decades of economic development, are enjoying increasingly prosperous lives. The DMZ both signifies suffering already endured and foreshadows violence yet to come. It represents a status quo inter-bellum, which cannot endure. It is like no other place in the world. And the complex strategic and operational challenge that it poses to America’s joint force is likewise daunting.

July 1, 2015

Making Soup with Stones: JMTC Partnership and the NATO Connected Forces Initiative

First published in Europe in 1947 by Marcia Brown after World War II, many children have grown up reading a classic story titled “Stone Soup.” Most of us are probably familiar with this tale, based on French folklore, of three hungry and tired soldiers approaching a village where the peasants hid their meager rations of food upon learning of their approach. In a wily and enterprising solution, the soldiers begin boiling a large pot of water in the town square as they profess to make soup from three small stones. The people of the village, impressed by this notion, begin contributing bits and pieces of meat and vegetables to create a meal for everyone, thus highlighting the power and importance of cooperation and what small contributions by all can produce for the greater good.

July 1, 2015

The Limits of Airpower or the Limits of Strategy: The Air Wars in Vietnam and Their Legacies

For most of the world’s population, America’s air wars in Vietnam are now ancient history. The first U.S. bombing raids against North Vietnam, conducted in response to attacks by North Vietnamese patrol boats on the destroyer USS Maddox in the Tonkin Gulf, occurred a half-century ago this August. Seven months later, America began its longest sustained “strategic bombing” campaign, Operation Rolling Thunder, against the North. That effort, and the Linebacker campaigns that followed, dropped a million tons of bombs on North Vietnam. Three million more tons fell on Laos and Cambodia—supposedly “neutral” countries in the conflict. Four million tons fell on South Vietnam—America’s ally in the war against communist aggression. When the last raid by B-52s over Cambodia on August 15, 1973, culminated American bombing in Southeast Asia, the United States had dropped more than 8 million tons of bombs in 9 years. Less than 2 years later, Cambodia, Laos, and South Vietnam were communist countries.

July 1, 2015

Harlem's Rattlers and the Great War

In 1903, W.E.B. Du Bois, the eminent American sociologist, scholar, and leader, wrote that “the problem of the twentieth century is the problem of the color-line.” Recent events in Ferguson, Missouri; Staten Island, New York; Cleveland, Ohio; and North Charleston, South Carolina should make us realize that, despite America’s recent racial progress, the problem of the 21st century is still the color-line. Harlem’s Rattlers lays bare the bigotry that African-American citizens faced in the early 20th century and, more importantly, details the innumerable accomplishments by black American soldiers despite the racism propagated by the President of the United States, U.S. military, and bigoted American civilians.

July 1, 2015

Book Review: The Modern Mercenary

At their peak, contractors comprised more than 50 percent of U.S. personnel in Iraq and Afghanistan. Furthermore, despite complaints about contractor performance, the Pentagon has stated that contractors will make up half of any future U.S. force deployments. Why? Because they work. This reality requires defense professionals to seek a deeper understanding of what contractors do and the implications for future conflict—making Sean McFate’s The Modern Mercenary a very timely book. In it, he not only carefully examines contractors, but also describes the changing international environment in which they will operate.

July 1, 2015

Book Review: Meeting China Halfway

China is on the minds of many today. In fact, an informal term has been coined for the group of scholars and defense officials who spend most of their waking hours thinking, talking, and writing about China. They are so-called China Watchers. In no other foreign policy realm is a similar term used with such frequency. This alone should give everyone pause. Watching for what, exactly?

July 1, 2015

Joint Doctrine Update

Joint Publications (JPs) Under Revision (to be signed within 6 months)

July 1, 2015

Three Approaches to Center of Gravity Analysis: The Islamic State of Iraq and the Levant

Since the establishment of the center of gravity (COG) concept as a fundamental planning factor in joint military doctrine, its proper identification has been considered crucial in successful attainment of desired objectives. Joint Publication 5-0, Joint Operation Planning, states, “This process cannot be taken lightly, since a faulty conclusion resulting from a poor or hasty analysis can have very serious consequences, such as the inability to achieve strategic and operational objectives at an acceptable cost.”

July 1, 2015

China Moves Out: Stepping Stones Toward a New Maritime Strategy

Over the last decade, the People’s Liberation Army Navy (PLAN) has increased the frequency, duration, complexity, and distance from the mainland of its operations. Not only does China maintain a permanent counterpiracy escort flotilla in the Indian Ocean, it also now routinely conducts naval exercises and operations beyond the first island chain throughout the year. This normalization of PLAN operations in the Western Pacific and beyond is an important step toward an emerging new maritime strategy that will incorporate far seas defense.

July 1, 2015

Understanding Putin Through a Middle Eastern Looking Glass

The resurgence of Russian influence in the Middle East has surprised Moscow as much as any other capital. Russia has done better than the Kremlin and its Middle East experts feared when the Arab Spring began. Despite Moscow’s deep involvement in the Ukrainian crisis, Russia is now in a stronger position with national leaderships across the Middle East than it was in 2011, although its stock with Sunni Arab public opinion has been sinking.

May 6, 2015

DTP 107: Shifting Human Environment: How Trends in Human Geography Will Shape Future Military Operations

In January 2014 the Center for Technology and National Security Policy was asked to examine some major trends within the domain of human geography, developments that will have important influence on the type of environments future military forces will be operating in.

April 1, 2015

Letter

In response to “Opportunities in Understanding China’s Approach to the Senkaku/Diaoyu Islands” by Lieutenant Colonel Bradford John Davis, USA (Joint Force Quarterly 74 (4th Quarter 2014), I must argue against his proposal for joint patrols/resource development.

April 1, 2015

From the Chairman: Defining Duty

Throughout over 40 years of service, I have maintained a list of principles to judge my actions against. Chief among these principles is duty. I have reflected and written on this topic throughout my career, and I strongly believe the concept of duty is central to the Profession of Arms.

April 1, 2015

Executive Summary

A century and a half has passed since the end of the American Civil War and reminders both physical and cultural surround us, especially here in the Nation’s capital. So let us reflect on one important idea of that time that today all Americans should consider, one that President Abraham Lincoln himself held in the front of his mind throughout the war: the value of seeking unity from diverse opinions.

April 1, 2015

Rethinking the Cyber Domain and Deterrence

As the Department of Defense (DOD) formulates strategy and doctrine for operating in cyberspace, it is vital to understand the domain and how it relates to the traditional domains of land, sea, air, and space.

April 1, 2015

Framing the Big Data Ethics Debate for the Military

Big data is everywhere these days. It shows up in many realms of contemporary life, ranging from how people are guided to potential purchases as they shop online, to how political campaigns win elections, and even to when farmers plant crops and apply fertilizer to their fields.

April 1, 2015

Activity-Based Intelligence: Revolutionizing Military Intelligence Analysis

The vast amount of information that the Intelligence Community (IC) collects demands a transformation in the way the Department of Defense (DOD) intelligence enterprise processes, organizes, and presents data.

April 1, 2015

The Defense Innovation Initiative: The Importance of Capability Prototyping

The recently unveiled Defense Innovation Initiative aims to “pursue innovative ways to sustain and advance our military superiority for the 21st Century” by finding “new and creative ways to sustain, and in some areas expand, our advantages even as we deal with more limited resources.”

April 1, 2015

The Quantum Leap into Computing and Communication: A Chinese Perspective

For a few decades, nations have been relying on encryption systems to protect a wide variety of computerized transmissions ranging from commerce to government to military communications. While today’s encryption systems are considered reasonably secure, the possibilities of quantum cryptography and quantum computing offer a whole new dimension and threat to computerized secrecy.

April 1, 2015

Writing Faculty Papers for Joint Professional Military Education

In joint professional military education (JPME), there is no tool more powerful than the written word. Whether in the form of books, journal articles, opinion pieces, or course papers, students and faculty members demand high levels of intellectual rigor and reflection in both the products they read and the ones they produce.

April 1, 2015

Joint Professional Military Education: A Retrospective of the Skelton Panel

.center-image{ margin: 0px auto; padding: 5px; border: thin solid #999999; width:100%; }DOWNLOAD PDFUnprecedented levels of joint Service cooperation occurred during the Iraq and Afghanistan wars. This teamwork did not come about by serendipity, but by the vision of the 1989 Report of the Panel on Military Education of the One

April 1, 2015

Relying on the Kindness of Machines? The Security Threat of Artificial Agents

Modern technology is a daily part of our lives. It serves critical functions in defense, responding to natural disasters, and scientific research. Without technology, some of the most common human tasks would become laborious or, in many cases, impossible. Since we have become dependent on technology and its uses, and technology is becoming ever more capable, it is necessary that we consider the possibility of goal-driven, adaptive agents becoming an adversary instead of a tool.

April 1, 2015

Will Humans Matter in the Wars of 2030?

Much of the future-looking discussion in national security circles today focuses on autonomous systems and cyber weapons. Largely missing from this discussion is a place for humans on the battlefield. Do today’s emerging and potentially disruptive technologies mean that humans will no longer be important in future warfare? A look at historical military operations and current technologies suggests the proper response is that, to paraphrase Mark Twain, reports of man’s obsolescence have been exaggerated.

April 1, 2015

I Corps: U.S. Pacific Command's Newest Asset

In January 2012, the United States redefined its global security priorities with the words above. The changing global environment, signified by the rising political and economic power of Asia, necessitated an adjustment of national strategic goals. On the surface, little may appear changed in a region mostly covered with blue water. Army forces are still in Korea, Japan, and Hawaii. That surface view belies the strategic, operational, and tactical changes that have occurred as the Army’s direction has shifted to the Pacific, spearheaded operationally by I Corps.

April 1, 2015

After the First Shots: Managing Escalation in Northeast Asia

The United States has never fought a conventional war against a nuclear-armed adversary. Yet the United States and its allies must prepare for a range of military contingencies with both North Korea and China, and avoiding nuclear escalation would be a U.S. objective in all of them. Developing strategies for managing escalation will be an essential part of U.S. efforts to extend deterrence and assure its allies in Northeast Asia.

April 1, 2015

Fighting More Fires with Less Water: Phase Zero and Modified Operational Design

Imagine that you are the fire chief for a mid-sized community. The city council informs you that it is reducing your budget this year by 30 percent. It is redirecting these funds for community outreach and fire-prevention education programs. Ironically, the council has also instructed you to organize and conduct these programs. In every previous year, you have used the entire budget to train and equip your firefighters and to respond to fire emergencies in the city. You know that outreach is important and may indeed help to lower the incidence of fires in the city—assuming, of course, that your city is not rife with arsonists. However, will you now have sufficient resources to accomplish your primary mission? Put another way, is putting out fires or preventing them a better use of your resources?

April 1, 2015

Distributed Common Ground System–Future: Moving into the 22nd Century Today

While supporting a free medical clinic in western Afghanistan, U.S. and coalition forces question local villagers about an increase in recent enemy activity. They learn of unusual vehicle movements and a larger number of fighters in the village over the past several weeks. After returning to base, this information is passed to the unit intelligence officer who annotates it in an initial report that is made available through a shared intelligence database. Several hours later, a known enemy signal is intercepted not far from the village and is passed by way of secure joint chat rooms and product reports. At nearly the same time, advanced imaging data from a Navy Triton unmanned aerial vehicle (UAV) shows unusual disturbances in the same area. Shortly thereafter, an Army unit begins a patrol in the vicinity with a Shadow UAV performing overwatch. As the patrol reaches the area where the disturbances were noted, they are ambushed and take significant losses.

April 1, 2015

DOD Response Under the Stafford Act: A Call to Action

Hurricane Katrina revealed our nation’s lack of preparedness to respond to a complex catastrophe in a rapid, efficient, and effective manner.1 This catastrophe forced a reevaluation of how we plan for and respond to natural disasters and/or emergencies. Over the last 10 years, efforts have focused on new response frameworks and building capacity to respond to such events, but little consideration has been given to capitalizing on a process that would rapidly generate and deploy Title 10 Department of Defense (DOD) capabilities, especially the Reserve components. DOD needs to revise processes in the Adaptive Planning and Execution System (APEX) to recognize and capitalize on the inherent advantage of using Reserve forces in closest proximity to incidents. The current process is cumbersome, inefficient, and potentially leads to unnecessary loss of life and human suffering. History has illustrated over and over again that the first 72 hours of any catastrophe is the window in which we are most likely to save lives. Squandering time to run mobilization of Reserve units through the current force generation process is unacceptable.

April 1, 2015

The Military's Role in Rule of Law Development

As Operation Enduring Freedom in Afghanistan transitions to the Resolute Support Mission, many believe that military engagements abroad involving the United States will decrease and that the Nation will become a disengaged actor on the world stage. Given the complexity and volatility of relationships among nations, however, as well as the continual rise of hostile transnational groups, it appears the United States will remain substantially engaged on the international stage for the foreseeable future. As part of its future engagement strategy, the United States must consider and plan for conducting operations in states at risk of failure, in failed states where the central government is so weakened that the people have virtually returned to the natural state described by Thomas Hobbes in the Leviathan, in states emerging from long periods of conflict such as Afghanistan, and in states in peaceful postconflict rebuilding periods.

April 1, 2015

On Operational Leadership

Success of any military organization depends on the experience and good judgment of its leaders. Ideally, all commanders should have a high level of professional education and training in addition to some critically important character traits. Moreover, the higher the level of command, the more important it is that commanders and staff meet these requirements. Wars are not won or lost at the tactical level but at the operational and strategic levels. Hence, it is critically important that operational commanders are selected based solely on their proven or potential warfighting abilities and not their political connections or management skills. Operational commanders are not managers but should be first and foremost warfighters.

April 1, 2015

Union Success in the Civil War and Lessons for Strategic Leaders

On April 10, 1865, Robert E. Lee wrote a letter to the soldiers of his army that began, “After four years of arduous service, marked by unsurpassed courage and fortitude, the Army of Northern Virginia has been forced to yield to overwhelming numbers and resources.” At this moment, the Civil War essentially ended in victory for the Union, and the process of reuniting the United States of America began. Lee’s immediate view of the circumstances, that the Confederate armies had done everything possible but were overmatched by Northern numbers, provided a means by which his veterans could feel that they had served honorably, but it was challenged almost immediately by other Confederate military and political leaders who blamed instead such factors as incompetent government, social divisions, and political squabbling for their defeat. The Confederacy, many felt, would not have embarked on a war it could not win. Indeed, its success in repelling invasions over the first 2 years of the war led many to believe that the war had almost been won.

April 1, 2015

Book Review: World Order

Henry Kissinger, the scholar, statesman, and philosopher, writes a fascinating, insightful, and thought-provoking history of the concept of the state, statecraft, grand strategy, and international cooperation in the pursuit of order and stability among nations. Although no true universal arrangement among states has ever existed, he asserts the order that does exist is at risk because of developing forces beyond the control of states themselves. So we must ask whether collective state order can be achieved while maintaining individual state freedom in an increasingly intricate and turbulent global environment.

April 1, 2015

Russia and the Relationship Between Law and Power

Winston Churchill stated, “Russia is a riddle wrapped in a mystery inside an enigma.” James Terry patiently peels away each of those layers to hypothesize an unrelenting consistency and prevailing logic to Russian behavior as it seeks power, for myriad reasons, over those who dwell within and without its self-defined boundaries. The release of this compact yet intricate work by Dr. Terry, addressing the long and convoluted history of Russia and its recurrent international “habits,” could not be timelier in multiple contexts.

April 1, 2015

The Most Dangerous Man in America: The Making of Douglas MacArthur

Douglas MacArthur and Franklin Roosevelt first met in 1916 when both were involved in planning prewar mobilization for the Woodrow Wilson administration. Two years later, MacArthur was commanding the Rainbow Division in France where he earned seven Silver Stars for courage and bravery in leading his troops in battle against the Germans, while Roosevelt was serving as President Wilson’s assistant Secretary of the Navy. When Roosevelt became President in 1933, MacArthur was the Army’s chief of staff (having been appointed by President Herbert Hoover). Roosevelt, mainly for political reasons, extended MacArthur’s term as Army chief of staff, but the two repeatedly clashed over budget matters. During World War II, Roosevelt as commander in chief selected MacArthur to lead the U.S. war effort in the Southwest Pacific.

April 1, 2015

The Way Ahead for Joint Operations and Planning Doctrine

Two of joint doctrine’s keystone1 joint publications (JPs) have entered the window for revision—JP 3-0, Joint Operations, and JP 5-0, Joint Operation Planning. Both publications received comprehensive assessments in 2014, which generated a wide variety of recommended changes from combatant commands (CCMD), the Services, National Guard Bureau, Defense agencies, and the Joint Staff. This article describes the more significant of these.

April 1, 2015

Joint Doctrine Update

DOWNLOAD PDFJoint Publications (JPs) Under Revision (to be signed within 6 months)JP 1-0, Joint Personnel SupportJP 1-04, Legal Support to Military OperationsJP 3-05.1, Unconventional WarfareJP 3-13.3, Operations SecurityJP 3-15, Barriers, Obstacles, and Mine WarfareJP 3-50, Personnel RecoveryJP 3-61, Public AffairsJP 3-68, Noncombatant Evacuation

April 1, 2015

Five Examples of Big Data Analytics and the Future of ISR

.center-image{ margin: 0px auto; padding: 5px; border: thin solid #999999; width:100%; }DOWNLOAD PDFWhen we talk about U.S. Air Force intelligence, surveillance, and reconnaissance in 2023, we often depict it graphically as beginning with a global array of sensors that produces a variety of data absorbed in a cloud, from which

April 1, 2015

Global Knowledge Networking: Smart Strategies for Promoting Innovative Learning and Leader Development

Smart security builds on actionable knowledge. The North Atlantic Treaty Organization (NATO) Wales Summit in September 2014 highlighted the need to build on partnerships to prepare and operate together better. Building on the successes of past partnership initiatives and capabilities, this paper proposes new ways to embrace and extend techniques and relationships originally developed under successful Secretary of Defense (SECDEF)-level memoranda of understanding (MOUs) within NATO’s Partnership for Peace (PfP) program. The Global Knowledge Networking (GKN) initiative supports smart decisionmaking by educating and training tomorrow’s agile, resilient, and effective leaders. GKN is a network of people, ideas, and processes to make knowledge actionable and is focused on improving on U.S. and coalition interoperability through improvements in existing training and education capabilities. It has begun to convene strategic dialogues around key challenges and collectively owned opportunities. Its initial framing is globally relevant and focused on the Arabian Gulf region through a proposed test bed for collaboration with the member states of the Gulf Cooperation Council (GCC). This will allow new tools for interoperability to be explored and created together as enablers of joint capability. Drawing on the experiences of NATO’s Partnership for Peace, it will promote an innovative systems approach that could help cultivate and sustain more effective security partnerships around the globe.

April 1, 2015

Responding to Russia after the NATO Summit: Unmanned Aerial Systems Overmatch in the Black Sea

The Ukraine conflict poses unique and asymmetric challenges to the international community. Since the earliest days of the Crimean crisis, Russian support of “separatists” within Ukraine has ranged from plainclothes thugs to more traditional uniformed troops, munitions, and other forms of aid. Some of the individuals involved may have had links to the Russian military or its intelligence community. While much of the aid comes through the porous border between Russia and Ukraine, Russia also leverages the opportunity to use Black Sea smugglers as a way to supply ongoing rebellions or to initiate new revolts. Two Black Sea–bordering regions, Odessa and Transnistria, are home to active pro-Russian movements that could potentially evolve into a pro-Russian state. Worries of Russia supplying separatists via illicit movements on the Black Sea and generally advancing its Novorossyia claims should be matched to a general concern over Black Sea smuggling rings, which traffic humans, weapons, and nuclear materials into Europe via Odessa’s port.

March 1, 2015

The U.S.-Japan Alliance: Review of the Guidelines for Defense Cooperation

DOWNLOAD PDFExecutive Summary This paper is focused on the U.S.-Japan alliance as reflected in the evolution of the U.S.- Japan Guidelines for Defense Cooperation. It begins with consideration of the October 3, 2013, 2+2 Statement released by Secretary of State John Kerry, Secretary of Defense Chuck Hagel, Foreign Minister Fumio Kishida, and

March 1, 2015

Defense Partnerships: Documenting Trends and Emerging Topics for Action

Public-public and public-private and partnerships (P4s) are time-proven effective solutions for delivering public services at reasonable costs when deployed and managed properly. Various U.S. agencies and international organizations all have longstanding successful P4 initiatives and projects. Recently, Department of Defense (DOD) leaders have expressed increased interest in implementing P4s throughout their organizations. As DOD is faced with evolving roles and missions in an “unpredictable and complex world amid fiscal constraints, the expertise and involvement of the private sector and other public organizations will be essential.” P4s could be ideal tools intended to “further policy objectives, enhance U.S. operational capabilities, reduce costs, gain access to nonmilitary expertise or assets, or build greater capacity in partners.”

Jan. 1, 2015

Red China's "Capitalist Bomb": Inside the Chinese Neutron Bomb Program

DOWNLOAD PDFCenter for the Study of Chinese Military Affairs, Institute for National Strategic StudiesNational Defense University PressSeries Editor: Phillip C. SaundersExecutive SummaryThis paper examines why China developed an enhanced radiation weapon (ERW) but did not deploy it. ERWs, better known as “neutron bombs,” are specialized nuclear

Jan. 1, 2015

Red China’s “Capitalist Bomb”: Inside the Chinese Neutron Bomb Program

This paper examines why China developed an enhanced radiation weapon (ERW) but did not deploy it. ERWs, better known as “neutron bombs,” are specialized nuclear weapons with reduced blast effects and enhanced radiation, making them ideal tactical and antipersonnel weapons. Declassified U.S. intelligence and Chinese press reports indicate the People’s Republic of China (PRC) was interested in an ERW in 1977 and successfully tested a device on September 29, 1988. To date, however, these sources provide no evidence of deployment. This study exploits primary source documents to reconstruct the ERW program’s history, assesses drivers behind decisions throughout the program, and considers broader implications for PRC decisionmaking on weapons development. This case study suggests a model of a “technology reserve” in which China develops a weapons technology to match the capabilities of another state but defers deployment. This paper presents an analytic framework for examining how the technology reserve model might apply to China’s decisionmaking on ballistic missile defense (BMD), antisatellite (ASAT), and hypersonic glide vehicle (HGV) systems.

Dec. 30, 2014

From the Chairman: The Posture Paradigm

For the first half of my 40 years in the military, we were largely a readiness-focused force. We deployed for exercises and demonstrations to send signals to the Soviet Union and to reassure allies. Certainly, we had forces forward based in Europe and the Pacific. But mostly we trained our forces in the continental United States, building readiness in case we had to fight “the big one.”

Dec. 30, 2014

Executive Summary

.center-image{ margin: 0px auto; padding: 5px; width:100%; border: thin solid #999999; }DOWNLOAD PDFAs we reach the end of U.S. combat operations in Afghanistan, the American joint force is closing one chapter but seemingly opening another. The rapid change of events in Iraq and the ongoing civil war in Syria cannot help but make

Dec. 30, 2014

Navy Perspective on Joint Force Interdependence

Looking ahead to the Department of Defense’s (DOD’s) fiscal prospects and security challenges in the second half of this decade and beyond, the Services and their partners will have to find ever more ingenious ways to come together. It is time for us to think and act in a more ecumenical way as we build programs and capabilities. We should build stronger ties, streamline intelligently, innovate, and wisely use funds at our disposal. We need a broader conversation about how to capitalize on each Service’s strengths and “domain knowledge” to better integrate capabilities. Moving in this direction is not only about savings or cost avoidance; it is about better warfighting.

Dec. 30, 2014

Bringing Space Crisis Stability Down to Earth

Tensions in the South and East China seas have been elevated during the last year. Territorial disputes in these areas flare periodically, but historically the brinkmanship has largely been confined to encounters at sea, with maritime law enforcement vessels confronting fishing fleets as traditional naval forces lurk just over the horizon. Given that the objects of these political disputes are islands, shoals, and the vast resources around and beneath them, it is only natural that the armed instruments of power brought to bear would operate in close proximity to the territory in question.

Dec. 30, 2014

Debunking Technical Competency as the Sole Source of Innovation

Academic and governmental organizations have sounded the alarm that the United States is rapidly losing technical competence, and this decline places the Nation at risk. A 1983 National Science Foundation (NSF) report stated, “If an unfriendly foreign power had attempted to impose on America the mediocre educational performance that exists today, we might well view it as an act of war.” In 1999, Congress chartered the U.S. Commission on National Security/21st Century (also known as the Hart-Rudman Commission) to provide the most comprehensive Government-sponsored review of U.S. national security in 50 years. The report highlighted a lack of U.S. technical competence as a national security threat second only to the threat of weapons of mass destruction in the hands of terrorists. This article attempts to answer the question: “Does improving technical competency enhance innovation?”

Dec. 30, 2014

Should Military Officers Study Policy Analysis?

Recently, during a symposium with security studies faculty members from civilian institutions, the question arose as to how those of us who teach in the country’s professional military institutions approach the study and use of policy analysis in our classrooms. There was a certain degree of incredulity that places such as the Naval War College (and its sister institutions) would encourage their students—people bound by oath to faithfully execute the orders of the commander in chief—to probe and analyze decisions taken by the current and past Presidents as part of their academic experience. Indeed, many question whether military officers need to engage in the dissection and discussion of national security decisionmaking since, echoing Alfred Tennyson’s famous exhortation in his classic poem “The Charge of the Light Brigade,” “Theirs not to reason why/Theirs but to do and die.” Others take the view that, for military officers, ignorance may be bliss, following the advice popularly ascribed to the German chancellor Otto von Bismarck: “The less the people know about how sausages and laws are made, the better they sleep in the night.”

Dec. 30, 2014

Assessing Causality in a Complex Security Environment

In May 2014, I was moderating a Naval War College seminar on the topic of U.S. policy in the Middle East. The discussion involved President George W. Bush’s statement that a democratic Iraq would serve as a “beacon of democracy” in the Middle East, leading nations and peoples in that region to reappraise their systems of government and, perhaps, initiate democracy movements of their own. A student raised his hand.

Dec. 30, 2014

Next Steps for Transforming Education at National Defense University

National Defense University (NDU) is implementing major reforms in the graduate-level programs it provides senior military officers and other national security professionals. If all goes as planned, the result will be a transformation in the way the university educates senior national security leaders.1 This article does not review the status of current change initiatives. Instead, it looks beyond the changes under way for the 2014–2015 academic year and identifies future steps senior leaders might consider in order to maintain momentum for the transformation of joint professional military education.

Dec. 30, 2014

Revisioning Strategic Communication through Rhetoric and Discourse Analysis

Strategic communication is an important but contested issue, visible in continuing criticisms over the last 5 years. One critique is that the U.S. Department of Defense (DOD) definition of the term strategic communication is vague and idiosyncratic in relation to the definitions of other agencies. In turn, this argument runs, the lack of conceptual clarity and of shared, precise terminology hurts the implementation and further development of strategic communication. Additional concerns have been raised about the lack of both domestic interagency and foreign partner coordination and cooperation and the absence of credible expertise in strategic communication. Still, criticisms point to high-visibility failures in strategic communication—for example, the 2001 “Shared Values” campaign and the 2012 U.S. Presidential response to the “Innocence of Muslims” video—as evidence of both strategic communication conceptual flaws and implementation failures.

Dec. 30, 2014

A Theater-Level Perspective on Cyber

Most U.S. military cyber professionals will tell you that “defense is the main effort” and that providing secure and reliable communication is job one. In practice, however, most cyber discussions focus on sophisticated computer hackers conducting exploitation (espionage) or attack (sabotage) operations. The reasons for this seeming contradiction include cyber espionage intrusions, industrial-scale intellectual property theft, and denial-of-service attacks that cost millions of dollars and naturally capture headlines and the imagination. Likewise, the potential for cyber attacks to disrupt infrastructure with kineticlike consequences provides fodder for books and articles that bridge reality and science fiction, empowering armchair theorists to contemplate a new and different type of war and warrior.

Dec. 30, 2014

Refocusing the U.S. Strategic Security Perspective

Since the early days of Cold War rivalry between the United States and Soviet Union, policymakers have recognized that low-intensity conflict and limited wars often occur in spite of deterrence—that is, using the threat of military force or coercion to change an adversary’s behavior. Because of this shortcoming and risk of escalation, the United States has applied deterrence haphazardly in its relationship with China. Yet U.S. policymakers have failed to identify an alternative approach for chronic disputes that are not readily shaped by military posturing. This deficiency is overlooked at the expense of muddling through commonplace confrontations with China over fishing rights, maritime borders, and cyberspace rather than establishing consistent mechanisms to reduce tension and prevent escalation. Some analysts, such as Richard K. Betts, see only two stark choices to address this dilemma: “accept China’s full claims as a superpower when it becomes one or draw clear redlines before a crisis comes.” However, we do not need to limit our options to deterrence or acceptance. Rather, we should complement deterrence with a more flexible, strategic framework focused on conflict management.

Dec. 30, 2014

Nonlethal Weapons: A Technological Gap or Misdefined Requirements?

The internal and international conflicts that have taken place in the last few decades have significantly raised the issue of interacting with with civilian populations, a problem that has been worsened by urbanization. In the last few decades of the 20th century, a universal respect for human life became a crucial variable within the international community in general and Western societies in particular. In this new political reality, the military seeks new technologies that have “greater precision, shorter duration, less lethality, and reduced collateral damage . . . [as these technologies] may provide more effective power than their larger and more destructive, but also more inexact and crude, predecessors.” Nonlethal weapons (NLW) would seem to be the perfect answer for this military quest; however, observers point out that, to date, “few non-lethal weapons incorporating new technologies have actually been deployed on a large scale” and that “operational use of available non-lethal weapons by the military has been limited.” Despite the reasonable demand for the employment of less lethal military technologies on the battlefield, then, it seems that such technologies are still far from becoming a reality.

Dec. 30, 2014

Challenges to Improving Combat Casualty Survival on the Battlefield

The United States has achieved unprecedented survival rates (as high as 98 percent) for casualties arriving alive to a combat hospital.1 Official briefings, informal communications, and even television documentaries such as “CNN Presents Combat Hospital” highlight the remarkable surgical care taking place overseas. Military physicians, medics, corpsmen, and other providers of battlefield medical care are rightly proud of this achievement. Commanders and their troops can be confident that once a wounded Servicemember reaches the combat hospital, his or her care will be the best in the world.

Dec. 30, 2014

Mosquitos: A Viable 21st-Century Soft Power Tool

Militaries and soft power have been interlinked since Alexander the Great began assisting the populations his armies conquered by rebuilding infrastructures and distributing food and first aid. Humane gestures by armies were considered important to winning loyalties. During the Napoleonic wars, military altruism had become customary enough to be included in soldiers’ military science studies. Napoleon viewed humanitarian assistance as a form of philanthropy that helped change civil social order among those populations his troops defeated on the European continent. Over time, measures of humanitarian aid have shifted as the sizes, types, and durations of conflicts have changed. Military roles now involve functioning as relief agents, participating as surplus disposal entities for old or outdated materials and machines, acting as international peacekeeping forces or as liberators, and delivering organized and rapid natural disaster relief. The latest addition to these scenarios is the performance of long-term humanitarian roles in peaceful settings with nations that may have a future potential value as allies.

Dec. 30, 2014

Operation Cottage: A Cautionary Tale of Assumption and Perceptual Bias

In the summer of 1943, American and Canadian forces launched an amphibious assault on the north Pacific island of Kiska. Codenamed Cottage, the operation was intended to seize the last enemy stronghold on North American soil from Japanese occupiers. The assault began in the predawn hours of August 15 with a heavy coastal barrage by an armada of nearly 100 Allied warships. Intense fire support was followed by a chaotic but successful ship-to-shore movement of over 34,000 U.S. Army and Canadian combat infantrymen. For 2 long days, the invasion force slugged its way inland through thick fog and against the constant din of machinegun and artillery fire. By the time the island was declared secure, over 300 Allied soldiers lay dead or seriously wounded. Japanese casualties? There were none. The Japanese had abandoned the island almost 3 weeks prior.

Dec. 30, 2014

Book Review: The Roar of the Lion

Toye provides rich descriptions for readers to understand Churchill’s speeches through the political and informational environment existing at the time. Using research from a wide variety of sources, ranging from Gallup polls to diaries, Toye examines audience perceptions recorded immediately following speech delivery. Remarkably, some of Churchill’s most famous speeches were ill-received at the time while some of his lesser known speeches greatly influenced audiences. Toye explores an evolution of perception as contemporary audiences seemed to reinterpret over time some of Churchill’s speeches, ascribing to them mythic qualities that they did not possess when delivered. He explores this phenomenon resulting in a literary time capsule, which expertly describes this war of words over the will of a nation. Military and civilian leaders alike can learn much from this comprehensive discussion of strategic communication.

Dec. 30, 2014

Book Review: A Scrap of Paper

This centenary of the beginning of World War I has spawned divergent reconsiderations of the war. Why should these different views and the Great War itself be of interest to readers of Joint Force Quarterly? The reasons concern everything from the nature of peace to military operations and innovation. World War I has had such a profound impact on the structure of our world that it has even made the subject of human misery an area of enduring interest. Nationally, of course, the war represents America’s entrance onto the world stage, followed by a short, costly effort to retreat, followed by the continuing leading role since 1945 or, perhaps more accurately, since December 7, 1941.

Dec. 30, 2014

Joint Doctrine Update

DOWNLOAD PDFJoint Publications (JPs) Under Revision (to be signed within 6 months)JP 1-0, Joint Personnel SupportJP 1-04, Legal Support to Military OperationsJP 3-02.1, Amphibious Embarkation and DebarkationJP 3-09, Joint Fire SupportJP 3-09.3, Close Air SupportJP 3-13.2, Military Information Support OperationsJP 3-61, Public AffairsJP 6-0, Joint

Dec. 30, 2014

Seeing 2020: America's New Vision for Integrated Air and Missile Defense

On December 5, 2013, with the stroke of a pen, Chairman of the Joint Chiefs of Staff General Martin E. Dempsey profoundly altered the U.S. approach to the pressing problem of air and missile defense. On that date—coincidentally, 70 years to the day after the U.S. Army Air Corps began Operation Crossbow, the Anglo-American bombing campaign against Adolf Hitler’s V-1 and V-2 missile forces and a missile defense milestone—General Dempsey signed the Joint Integrated Air and Missile Defense: Vision 2020.1 This seminal document for air and missile defense (AMD) outlines the Chairman’s guidance to the joint force and, by extension, to all the stakeholders that contribute to the air and missile defense of the U.S. homeland and its regional forces, partners, and allies. What makes the new vision both exceptionally timely and highly relevant is that it accounts for the volatility and reality of 21st-century strategic and threat environments characterized more often than not by rapid, enigmatic change.

Dec. 30, 2014

Letter

As I read Rebecca Patterson and Jodi Vittori’s article titled “Why Military Officers Should Study Political Economy” in Joint Force Quarterly 75 (4th Quarter 2014), I reconsidered my own understanding of the term political economy. At one time I was admittedly unsure of its precise meaning, although I could make some informed guesses, and thankfully the authors do a good job of giving readers many opportunities to understand what it means based on context in various passages.

Dec. 30, 2014

Where Do We Find Such Men and Women?

The title of this article is a slightly edited sentence from James Michener’s 1953 novella The Bridges at Toko-Ri. On December 17, 1777, General George Washington recruited former Prussian officer Baron Friedrich Wilhelm Von Steuben to strengthen professionalism in the Colonial Army. Von Steuben then wrote a manual outlining the duties and responsibilities of the noncommissioned officer (NCO). In essence, this hallmark document was the creation of the NCO in the U.S. Armed Forces. This article is about one of those NCOs.

Dec. 30, 2014

Book Review: Brothers Armed: Military Aspects of the Crisis in Ukraine

Brothers Armed is an edited anthology comprising several essays detailing the history of Crimea, the post-Soviet history of the Russian and Ukrainian armed forces, and a detailed account of Russia’s annexation of Crimea in March 2014. This volume is timely, especially given the dearth of existing scholarly sources on some of the subjects covered. It provides great insights into the annexation, comprehensively analyzes the historical context as well as the existing military balance, and delivers a full accounting in an objective and dispassionate manner.

Oct. 1, 2014

“Not an Idea We Have to Shun”: Chinese Overseas Basing Requirements in the 21st Century

China’s expanding international economic interests are likely to generate increasing demands for its navy, the People’s Liberation Army Navy (PLAN), to operate out of area to protect Chinese citizens, investments, and sea lines of communication. The frequency, intensity, type, and location of such operations will determine the associated logistics support requirements, with distance from China, size and duration, and combat intensity being especially important drivers.

Oct. 1, 2014

The Grand Strategy of the United States

From the earliest days of the Republic, the outlines of an evolving American grand strategy have been evident in our foreign and domestic policy. Much of that history continues to inform our strategic conduct, and therefore American grand strategy rests today on traditional foundations. Despite a welter of theory and debate, grand strategy as a practical matter is remarkably consistent from decade to decade, with its means altering as technology advances and institutions evolve but its ends and ways showing marked continuity.

Sept. 30, 2014

From the Chairman: Commitment to Service

Representing America to the rest of the world is something that we all take great pride in. We know what a privilege it is to represent our country overseas. Of course, representing our nation is not an experience entirely unique to the military.

Sept. 30, 2014

True and Steady, Inspection Ready

The global security environment in which the U.S. Armed Forces must operate, manage, and influence presents many challenges to our all-volunteer force. Moreover, shifting societal norms (domestic and abroad) often compete directly and indirectly with the professional norms that shift over time. The effect of variances in societal and professional norms can and often does induce friction points and challenges us to stay on the right course, defined by the qualities of honor, respect, duty, service, courage, commitment, loyalty, and integrity, as well as the virtues of decency, fairness, honesty, humility, integrity, and valor through actions. The standards required to sustain the Profession of Arms must always be maintained.

Sept. 30, 2014

Executive Summary

As we mark this 75th issue of Joint Force Quarterly, I am reminded of the wisdom I gained some years ago when I was seeking to become a teacher. My faculty mentor at the time offered some advice as I took up the task of teaching history. I asked him, “Does history repeat itself?” His response was useful but not easily digested. “History does in fact repeat but not in detail or on a schedule,” he said. “We as teachers need to identify both the similarities and differences of events past and present in order to have our students learn.” Recent events that fit this model of the past repeating itself, but not in detail, include rioting in Missouri surrounding the violent death of an African American teenager, a failed special forces raid into Syria to rescue an American reporter held hostage, airliners shot down by military forces, mass migration of people seeking security in a foreign land, deadly disease spreading in Africa, and the withdrawal of U.S. combat forces from an unpopular war—to name a few in today’s headlines.

Sept. 30, 2014

An Interview with Raymond T. Odierno

We’re starting from an incredible position of strength because of the experience that the Army has. This is the first time after a long period of war that Army leaders are staying in the Service; they’re not leaving en masse to do other things. So we have an incredible force, and I want to build on that. We have a wealth of experiences from junior to senior officers that we’ve never had before, and we have to learn how to exploit the experiences gained in joint, multinational, interagency, and intergovernmental environments, and I think that’s key to the future.

Sept. 30, 2014

Theater Airlift Modernization: Options for Closing the Gap

America’s renewed strategic emphasis on state-on-state conflict highlights significant gaps in the country’s theater airlift capabilities, particularly in the Asia-Pacific region. Quantitatively, there likely will not be enough airlift capacity available to cover major conflict requirements. Qualitatively, the current program- of-record (POR) airlift fleet (what the Nation has and what it expects to acquire) presents serious shortfalls in the ability to maneuver land forces on the scale, to the destinations, or in the timeframes desired by Army planners. Air commanders also have reason for concern since the core aircraft of the theater fleet, the C-17 and C-130, pose capacity and operational risks in their abilities to support high-volume combat operations at forward bases when threatened or damaged by attack.

Sept. 30, 2014

The Afghanistan National Railway: A Plan of Opportunity

In support of the State Department’s “New Silk Road” initiative, U.S. Central Command (USCENTCOM) formed a planning team of subject matter experts spanning the Department of Defense (DOD), the interagency community, academia, and the U.S. railroad industry to provide recommendations that advance the development of a national railway system for the Government of the Islamic Republic of Afghanistan (GIRoA). The Afghanistan National Railway Plan (ANRP) was provided to the Afghanistan Railway Authority (ARA) in August 2013.

Sept. 30, 2014

The USCENTCOM Train: The Deployment and Distribution Operations Center Turns 10

On December 12, 2003, just months after the U.S. invasion of Iraq and on the cusp of transition to Operation Iraqi Freedom II, General John Abizaid, USA, accepted on behalf of U.S. Central Command (USCENTCOM) an invitation that would birth the first Deployment and Distribution Operations Center (DDOC). In an October 24, 2003, memorandum, General John Handy, USAF, commander of U.S. Transportation Command (USTRANSCOM), and General Paul Kern, commander of Army Materiel Command, had offered a “joint intermodal distribution team” led by a flag officer who “would have visibility and synchronization authority over all theater-level lift platforms.”1 With General Abizaid’s go-ahead, a team of 42 USTRANSCOM distribution experts began arriving at Camp Arifjan in Kuwait to establish initial operational capability and validate the emerging DDOC concept during the major muscle movements of the Iraqi Freedom II transition.

Sept. 30, 2014

2014 Winners

The NDU Foundation is proud to support the annual Secretary of Defense, Chairman of the Joint Chiefs of Staff, and Joint Force Quarterly essay competitions. NDU Press hosted the final round of judging on May 15–16, 2014, during which 23 faculty judges from 15 participating professional military education institutions selected the best entries in each category. The First Place winners in each of the three categories are published in the following pages.

Sept. 30, 2014

Deterrence with China: Avoiding Nuclear Miscalculation

As China rises and the United States seeks to maintain its global dominance, the world is faced with a new historical phenomenon: a dramatic shift in power between two nuclear-capable nations. As the relative power of each nation nears parity, tension is inevitable and the character of the evolving Sino-U.S. relationship poses a risk of nuclear miscalculation. Nuclear use between China and the United States would be a catastrophe, but China is an independent actor, and the United States can only influence, but not control, the crossing of the nuclear threshold. If U.S. policymakers neglect this risk, miscalculation is more likely.

Sept. 30, 2014

The Limits of Cyberspace Deterrence

As a concept, deterrence has been part of the military vernacular since antiquity. In his History of the Peloponnesian War, Thucydides quotes Hermocrates as stating, “Nobody is driven into war by ignorance, and no one who thinks that he will gain anything from it is deterred by fear.”2 In the 2,400 years since then, the domains for the conduct of military affairs have expanded from the original land and maritime domains to air, space, and now cyberspace. As warfighting expanded its scope, strategic theory did as well. Today, U.S. doctrine declares that the fundamental purpose of the military is to deter or wage war in support of national policy.3 Therefore, military strategists and planners have a responsibility to assess how adversaries may be deterred in any warfighting domain. Through the joint planning process, planners, working through the interagency process, consider deterrent options for every instrument of national power—diplomatic, informational, military, and economic—across all phases of military operations.4 However, most of the thought and analysis in deterrence has revolved around the use of conventional and nuclear weapons.

Sept. 30, 2014

Opportunities in Understanding China’s Approach to the Senkaku/Diaoyu Islands

In 2010, two Japanese coast guard vessels and a Chinese fishing boat collided in the disputed waters near the Senkaku/Diaoyu Islands, sparking increasingly confrontational behavior by both China and Japan. The pattern of escalation continued in 2012 when Japan nationalized several of the disputed islands by purchasing them from the private owner. China promptly responded by sending warships to the area in a show of force. Although escalation to the point of war is unlikely, these incidents underscore the destabilizing regional effects of the disputed islands and associated maritime boundaries. China’s territorial claims are rooted in historical context, nationalism, national security, and economic interests.3 By understanding China’s perspectives, motives, and approaches to resolving this dispute, the United States can anticipate the current pattern of escalation, forecast future Chinese behavior, and identify opportunities for conflict management and eventual de-escalation to improve strategic stability in the region.

Sept. 30, 2014

Cyber Security as a Field of Military Education and Study

Information and communication technologies are acknowledged as enablers and the core arsenal of military capabilities, functions, and operations. An increasing number of nations pursue improved fluency and agility of armed forces personnel in information and communication technology, its contemporary uses, and relevant defense and security implications. Underdeveloped terminology and concepts, combined with recognized functional needs and national ambitions to control the relatively new battlespace and domain, create ambiguity and even anxiety among the current generation of planners and leaders. Particularly challenging is the balance between technical in-depth knowledge requirements and strategic understanding of the cyber domain desirable for joint planners, field commanders, and senior decisionmakers.

Sept. 30, 2014

Low Cost, High Returns: Getting More from International Partnerships

Unbeknownst to most Americans, over 8,000 international military personnel are trained or educated annually in the United States at the invitation of the U.S. Government, studying every aspect of the military profession. The most select officers with future leadership potential are invited to participate in senior Professional Military Education (PME) courses alongside U.S. officers at schools such as National Defense University (NDU) and the Army, Naval, Air, and Marine Corps War Colleges. Many of these students are funded by the United States through security assistance programs such as the International Military Education and Training (IMET) program, which has an annual cost of over $100 million. This is a significant investment of time and treasure by the United States, and as we will show, the initial returns of these programs are high.

Sept. 30, 2014

Asymmetry Is Strategy, Strategy Is Asymmetry

Much of the strategic studies literature of the past two decades identifies profound novelty in the conduct and challenges of modern war, novelty that ultimately calls into question the nature and even existence of war. War has allegedly now been transformed from a regular, conventional, purportedly symmetric exercise into an irregular, unconventional, asymmetric event, which must be understood anew.

Sept. 30, 2014

Is Military Science “Scientific”?

The term military science generally describes the body of theories, concepts, and methods for employing armed forces. However, as an academic discipline it is ill defined, drawing from a patchwork of curricula including history, foreign affairs, security studies, leadership, operations management, and systems engineering, as well as other elements of the physical and social sciences. Notably, the Department of Defense dictionary does not even provide a definition. This vague categorization is somewhat reflective of the term’s diminished status from its 19th-century usage when Military Science was frequently capitalized and placed alongside Physics, Philosophy, and other well-established academic disciplines.

Sept. 30, 2014

The Best Man for the Job? Combatant Commanders and the Politics of Jointness

The U.S. military today fights jointly. A joint commander—reporting to the Secretary of Defense—commands all Service components during military operations. And as a key sign of this jointness, combatant commanders no longer come solely from a single Service as they once did. In fact, the combatant commanders and their control of operations are often considered the greatest expression of jointness.

Sept. 30, 2014

A Potent Vector: Assessing Chinese Cruise Missile Developments

The numerous, increasingly advanced cruise missiles being developed and deployed by the People’s Republic of China (PRC) have largely flown under the public’s radar. This article surveys PRC cruise missile programs and assesses their implications for broader People’s Liberation Army (PLA) capabilities, especially in a Taiwan scenario.

Sept. 30, 2014

Determining Hostile Intent in Cyberspace

According to the Joint Chiefs of Staff, hostile intent is defined as the threat of imminent use of force against the United States, U.S. forces, or other designated persons or property. It is the indication, the belief, a commander has that an adversary is about to attack. That belief provides the groundwork for “anticipatory self-defense,” an American legal concept that allows a commander to attack before being attacked.

Sept. 30, 2014

Understanding the Enemy: The Enduring Value of Technical and Forensic Exploitation

The escalation of improvised explosive device (IED) incidents and related casualties during Operations Iraqi Freedom and Enduring Freedom led to a new intelligence field related to technical intelligence (TECHINT) called weapons technical intelligence (WTI), which combined technical and forensic IED exploitation techniques to link persons, places, things, and events. WTI operationalizes technical and forensic activities by fusing the technical, forensic, and biometric disciplines to produce actionable intelligence for countering threat networks. It is an especially powerful tool against terrorist organizations that rely on IEDs as a primary weapon in their arsenals. Given the enduring nature of the IED problem, careful consideration is required to ensure that we have the necessary counter-IED capability and capacity to meet future threats across the range of military operations. Across this range and at each level of war from tactical to strategic, TECHINT and WTI make critical contributions to joint warfare and military decisionmaking.