Due to a lapse in federal funding, this website is not being actively updated or monitored. See OPM status.

Sept. 30, 2014

Challenges in Coalition Unconventional Warfare: The Allied Campaign in Yugoslavia, 1941–1945

During World War II, operatives and military advisors of the British Special Operations Executive (SOE) and the American Office of Strategic Services (OSS), which was a precursor to both the current Central Intelligence Agency and U.S. Special Forces, conducted a challenging unconventional warfare (UW) campaign against the Axis forces with and through guerrilla resistance elements in Yugoslavia. The resistance movement effectively fixed in place 35 German and Italian divisions, consisting of roughly 660,000 soldiers in the western Balkan region during 1941–1945.1 This campaign rendered them strategically irrelevant by preventing their use in other theaters. The combined United Kingdom (UK)–United States (U.S.) contingent achieved this effect with never more than 100 Allied personnel on the ground in the denied area. The number of Axis personnel killed in the Balkans is estimated at 450,000.2 This extremely favorable force ratio and its associated effects commend UW as a low-cost, high-reward method of warfare.

Sept. 30, 2014

Book Review: You Cannot Surge Trust

You Cannot Surge Trust is a valuable review of the unique relationships that bind the U.S. Navy and its British, Canadian, and Australian counterparts. Edited by Sandra Doyle of the Naval History and Heritage Command, the book is a collection of essays by naval historians from the United States, Australia, Canada, and United Kingdom (UK) that provide insights drawn from common experiences derived from combined peace support operations between 1991 and 2003. These insights offer useful pointers for the U.S. Navy leadership as it seeks to establish close cooperative arrangements with other navies around the world.

Sept. 30, 2014

Book Review: Engineers of Victory

Best-selling author and historian Paul Kennedy, the Dilworth Professor of History and Director of International Security Studies at Yale University, has written a stimulating book about the middle—the middle years of World War II, the middle or operational level of war, and the middlemen, problem-solvers, and midlevel commanders that made victory possible. In doing so, he focuses attention on a largely unexplored portion of the war’s history and provides professional historians and general readers a deeper understanding of how and why the Allies won World War II.

Sept. 30, 2014

Book Review: Next-Generation Homeland Security

The threats to U.S. national security have evolved, but the means to respond to them lag far behind. After 9/11, Hurricane Katrina, and countless other natural and unnatural disasters, now is the time to rethink U.S. security strategy. John Fass Morton’s Next-Generation Homeland Security could not be timelier in proposing an overhaul of the Cold War–era system. Policy change, he argues, will not be enough; we must change the structure of national security governance because the Cold War structures reflect only the strategic conditions that were relevant at that time. The United States can no longer rely on the forces that made it powerful in the second half of the 20th century, as the international system has changed, so too must our national security system. As globalization has reshaped the meaning of sovereignty, nations are no longer the only important actors. In today’s strategic environment, states play a co-equal role in policy development and strategy formation, and so they must also play a co-equal role in national security governance.

Sept. 30, 2014

Implementing Joint Operational Access: From Concept to Joint Force Development

Strategic guidance issued to the U.S. military over the past 5 years explicitly cites the emerging challenge to what has been a significant advantage for American and partner forces for decades: the unfettered ability to project military force into an operational area with sufficient freedom of action to accomplish a designated mission. In some instances this ability includes access to sovereign territory, but in all cases it requires access to the global commons. Potential enemies are developing antiaccess/area-denial (A2/AD) capabilities that could threaten access and jeopardize missions. Concept development, as the bridging mechanism from strategic guidance to operational capabilities, has played a key role in the past few years to guide joint and Service force development activities in this area. The Joint Operational Access Concept (JOAC) and the recently signed Joint Concept for Entry Operations are examples of where strategic guidance to overcome A2/AD challenges is translated into operational concepts intended to guide how the U.S. military is organized, trained, equipped, and employed.

Sept. 30, 2014

Dealing with Corruption: Hard Lessons Learned in Afghanistan

Operation Enduring Freedom has exacted a tremendous cost on the United States in terms of both blood and treasure. By the end of fiscal year 2013, the financial toll had reached $645 billion. While we have made a significant investment in rebuilding Afghanistan, certain actors have seen our sacrifice as an opportunity to enrich themselves by stealing money and materiel intended to aid in the rebuilding of the country.

Sept. 30, 2014

Joint Doctrine Update

DOWNLOAD PDFJoint Publications (JPs) Under Revision (to be signed within 6 months)JP 3-02, Amphibious OperationsJP 3-02.1, Amphibious Embarkation and DebarkationJP 3-09.3, Close Air SupportJP 3-10, Joint Security Operations in TheaterJP 3-13.2, Military Information Support OperationsJP 3-26, CounterterrorismJP 3-40, Countering Weapons of Mass

Sept. 12, 2014

DTP 106: Policy Challenges of Accelerating Technological Change: Security Policy and Strategy Implications of Parallel Scientific Revolutions

This paper examines policy, legal, ethical, and strategy implications for national security of the accelerating science, technology, and engineering (ST&E) revolutions underway in five broad areas: biology, robotics, information, nanotechnology, and energy (BRINE), with a particular emphasis on how they are interacting. The paper considers the timeframe between now and 2030 but emphasizes policy and related choices that need to be made in the next few years to shape the future competitive space favorably, and focuses on those decisions that are within U.S. Department of Defense’s (DOD) purview. The pace and complexity of technological change mean that linear predictions of current needs cannot be the basis for effective guidance or management for the future. These are issues for policymakers and commanders, not just technical specialists.

Sept. 1, 2014

The Rising Terrorist Threat in Tanzania: Domestic Islamist Militancy and Regional Threats

Despite its reputation for peace and stability in a troubled region, the East African country of Tanzania is experiencing a rising number of militant Islamist attacks that have targeted local Christian leaders and foreign tourists, as well as popular bars and restaurants. These attacks, which began in 2012, rarely make the headlines of international media. However, they should serve as a wake-up call for U.S. policymakers to increase short-term engagement with Tanzanian officials and support for Tanzanian security agencies to preempt the emergence of a more significant threat to U.S. and international interests in East Africa.

Aug. 22, 2014

DTP 105: A Strategic Vision and a New Management Approach for the Department of the Navy’s Research, Development, Test and Evaluation (RDT&E) Portfolio

This paper considers the Department of the Navy Research, Development, Test, and Evaluation (RDT&E) program holistically. The underlying premise, that will be expanded on here, is that the Department is not doing a good enough job of strategically managing its RDT&E portfolio and that, at least partly as a result, the Department is spending too much and taking too long in getting new technology-driven capabilities into the hands of our warfighters. The goal of this paper is to identify a workable RDT&E process that better enables the Department of the Navy to identify, develop, and maintain the capabilities of our warfighters as notably the most advanced in the world.

July 1, 2014

Investing in the Minds of Future Leaders

As the Joint Force prepares for the challenges and opportunities of tomorrow, our focus is not simply on military power and platforms. We are laser-focused on leadership. It is the all-volunteer force and its leaders—our people—who remain our greatest strategic asset and the best example of the values we represent to the world.

July 1, 2014

Executive Summary

In a recent meeting I had with a senior military leader, the discussion turned to an assessment of where the Armed Forces are today. His view was that while we are ending a long period of combat that has engaged all the Services to varying degrees, we are not likely to return to any kind of peacetime period as in the past. We are more likely to see a far smaller force that is surging while in Phase Zero, or preconflict operations. Many see the Services, running on a wartime footing for longer than any period in U.S. history, as worn out both materially and psychologically to varying degrees—with the Army being in the poorest shape. Yet the remaining force remains highly active in terms of operations to maintain the Nation’s defense. Now with continuing budgetary pressures and declining resources from Congress, the Services are making hard choices about what they must do to preserve and evolve the military instrument of power.

July 1, 2014

An Interview with Mark A. Welsh III

General Mark A. Welsh III is Chief of Staff of the U.S. Air Force. As Chief, he serves as the senior uniformed Air Force officer responsible for the organization, training, and equipping of 690,000 Active-duty, Guard, Reserve, and civilian forces serving in the United States and overseas. As members of the Joint Chiefs of Staff, General Welsh and the other Service chiefs function as military advisors to the Secretary of Defense, National Security Council, and the President.

July 1, 2014

Contexts of Future Conflict and War

The Chairman has emphasized that our forces must be versatile, responsive, and decisive and at the same time affordable. Five proposed contexts of future conflict will help achieve both what is desired and what can be paid for, a planning process that must occur since the force will inevitably change.

July 1, 2014

Tailored Deterrence: Strategic Context to Guide Joint Force 2020

U.S. deterrence is neutered by not clearly defining national security threats and aligning resources accordingly, as in favoring offensive Air-Sea Battle against China against defensive A2/AD capabilities with partners, or preparing sufficiently against regional players such as North Korea and Syria. Plans must accord with actual defense policies and dangers.

July 1, 2014

The Role of U.S. Land Forces in the Asia-Pacific

Washington must not yield to fiscal pressures that erode its legitimacy as a global leader. Its forces must remain capable across the spectrum from the smallest to the largest security challenges and control procurement accordingly, using existing resources and allies in a flexible approach the Army will continue to pursue.

July 1, 2014

Resilient Command and Control: The Need for Distributed Control

Centralized control and decentralized execution has been a fundamental principle of Air Force power projection. It will remain seminal as the Service combines a single commander who weighs strategy and tactics for optimal force employment with Airmen empowered to use imagination and initiative.

July 1, 2014

Conducting Operations in a Mission Partner Environment

Global effectiveness requires the joint force to partner, which in turn requires it to adopt a Mission Partner Environment (MPE) in place of exclusionary SIPRNET security measures. MPE will aid in attaining the Chairman's goal of seamless allied, coalition, interagency, volunteer, private sector, and intergovernmental initiatives based on solid commonalities.

July 1, 2014

Strengthening PME at the Senior Level: The Case of the U.S. Army War College

Adopting the Army Chief of Staff's vision of officers intellectually capable of solving the most cryptic problems at the strategic level, and reflecting the belief that enhanced human capital is the answer to slashed budgets, the U.S. Army War College is undergoing a renaissance in faculty, curriculum, students, and integration.

July 1, 2014

Joint PME: Closing the Gap for Junior Officers

Junior officers have been increasingly responsible for joint duties without the joint professional military education that has helped commanders and joint planners through over a decade of combat. Low impact solutions will help bridge this educational gap so an understanding of joint force employment will exist at the tactical level.

July 1, 2014

Defense Strategic Guidance: Thoughtful Choices and Security Cooperation

DOD aids such as amalgamating strategic guidance, Secretarial reviews of campaign and contingency plans, and steady-state activities within theaters will help seal enduring gaps and help planners watch for unintended damage to our security cooperation partners as well as engendering further dialogue in DOD, the combatant commands, and the embassies.

July 1, 2014

Strategic Planning: A "How-to-Guide"

Strategic planning is both short on manuals and complex. It draws on an array of participants and stakeholders, who must know their views and needs are considered if their approval and expertise are to be present throughout planning. Free communication will indicate transparency and a desire for completeness and excellence.

July 1, 2014

Targeted Killing of Terrorists

Targeted killing has detractors, yet it has assisted the Nation in combatting terrorism with minimal U.S. casualties and collateral damage. It thus need not be cast off, but it must continue to be used legally and wisely, and strategists must assess all possible ramifications to retain domestic and international support.

July 1, 2014

Cyber Power in 21st-Century Joint Warfare

Used militarily, cyberspace superiority should ensure the capability to conduct cyber interdiction, thus assisting in kinetic operations, especially air. It could also defeat enemy cyber attacks and neutralize enemy surveillance and finally suppress enemy cyber defense measures and data fusion centers, forcing adversary miscalculation and obtaining a decisionmaking advantage.

July 1, 2014

Defining and Regulating the Weaponization of Space

The weaponization of space can be partially controlled by a trustworthy and empowered standing committee, perhaps under the United Nations, aided by the economic deterrence and enforcement capacity found in the World Trade Organization. With these bodies in place, compliance with international norms is not exclusively a matter of diplomacy.

July 1, 2014

Book Review: War Front to Store Front

Like most junior officers, I prefer my professional military education (PME) action packed and relevant to my immediate Military Occupational Specialty. With that predilection, I assumed that War Front to Store Front would be a slog. I thought I should be spending my time reading stories of lieutenants leading understrength platoons on hills surrounded by ruthless enemies, lone aviators on important missions, or the memoirs of a salty and sage veteran of Vietnam or Okinawa.

July 1, 2014

Book Review: Consider

Consider succinctly articulates the need for senior leaders to create “think time” and to reflect in their personal schedules and organizational processes. Forrester firmly believes that “embracing think time and reflection as habits and organizational capabilities will determine success or rapid failure in the twenty-first century.” He supports this perspective through interviews with 55 successful people with varied experiences and identifies these individuals in the acknowledgments section. They include business and military leaders, musicians and designers, academics and economists, and advisors and diplomats.

July 1, 2014

Book Review: Leadership in the New Normal

Leadership in the New Normal is a short course in leadership in which the author traces good to great leadership attributes in such forefathers as George Washington and Abraham Lincoln, and by doing so he really describes the nature of leadership itself. Lieutenant General Honoré, USA (Ret.), postulates that we won our freedom because of leadership during the critical times in our history, such as Valley Forge and the Civil War, and leadership will continue to help us as we transition to the next “new normal” period.

July 1, 2014

Book Review: Killing Without Heart

The United States faces a stark decision on how to prosecute and conduct future warfare. Accordingly, every national policymaker and decisionmaker should read Killing Without Heart to be better informed on the morality of unmanned and autonomous weapons systems. With advancements in technology, the Nation has the capability to continue down the path toward a military of unmanned and autonomous robots on the battlefield. Continuing on this path will isolate the men and women in uniform from the dangers of the modern battlefield, calling into question the morality of how we fight and whether we can achieve national endstates without sending actual people into combat.

July 1, 2014

Overcoming Joint Interoperability Challenges

A growing array of ground, surface, and air platforms with Tactical Data Link (TDL) capabilities account for ever-greater demand for TDL interoperability training for joint, allied, and coalition forces. The TDLs forming the Multi-TDL Network (MTN) have improved situational awareness concurrently with reducing targeting and decisionmaking timelines for maritime and aviation component commanders and aircrews and, more recently, tactical air control players. Examining the concepts and technologies and their applications leading to today's TDL and MTN capabilities will help planners and practitioners get a handle on interoperability issues and training needs, invaluable as technological advances enhance weapons range and mobility, decrease the time to detect and decide, and lead toward real-time command and control from beyond the line of sight.

July 1, 2014

The Indian Jihadist Movement: Evolution and Dynamics

The Indian jihadist movement remains motivated primarily by domestic grievances rather than India-Pakistan dynamics. However, it is far more lethal than it otherwise would have been without external support from the Pakistani state, Pakistani and Bangladeshi jihadist groups, and the ability to leverage Bangladesh, Nepal, and certain Persian Gulf countries for sanctuary and as staging grounds for attacks in India. External support for the Indian mujahideen (IM) from the Pakistani Inter-Services Intelligence and Pakistan-based militant groups such as Lashkar-e-Taiba (LeT) persists, but the question of command and control is more difficult to discern. The IM is best viewed as an LeT associate rather than an LeT affiliate.

June 1, 2014

The U.S. “Rebalance” and Europe: Convergent Strategies Open Doors to Improved Cooperation

European concerns regarding U.S. disengagement have dissipated but not entirely disappeared over the past 2 years. Still, U.S. readiness to lead politically and militarily in Europe— for example, in response to the ongoing crisis involving Russia and Ukraine—and adjoining regions remains under close scrutiny. Furthermore, while many Europeans agree in principle that renewed American focus on Asia-Pacific issues should encourage Europeans to assume a greater share of security-related responsibilities in their neighborhood, there is little evidence to date of a sea change in European attitudes toward defense spending and overseas military deployments.

June 1, 2014

The Future of Weapons of Mass Destruction: Their Nature and Role in 2030

The longstanding efforts of the international community writ large to exclude weapons of mass destruction (WMD) from international competition and conflict could be undermined in 2030. The proliferation of these weapons is likely to be harder to prevent and thus potentially more prevalent. Nuclear weapons are likely to play a more significant role in the international security environment, and current constraints on the proliferation and use of chemical and biological weapons could diminish. There will be greater scope for WMD terrorism, though it is not possible to predict the frequency or severity of any future employment of WMD. New forms of WMD—beyond chemical, biological, radiological, and nuclear weapons—are unlikely to emerge by 2030, but cyber weapons will probably be capable of inflicting such widespread disruption that the United States may become as reliant on the threat to impose unacceptable costs to deter large-scale cyber attack as it currently is to deter the use of WMD. The definition of weapons of mass destruction will remain uncertain and controversial in 2030, and its value as an analytic category will be increasingly open to question.

May 21, 2014

JFQ 70 | From the Chairman

DOWNLOAD PDFPREVIOUS |  NEXTThere are as many reasons to serve the Nation as there are Servicemembers. Some join for honor, some for a challenge, and some for more concrete reasons. I once knew a Soldier who signed up on a dare.Regardless of why we join, most Soldiers, Sailors, Marines, Airmen, and Coastguardsmen continue to serve because of the

May 1, 2014

Strategy and Force Planning in a Time of Austerity

On February 13, 1989, General Colin Powell, who was in a transition between National Security Advisor and Commander of U.S. Army Forces Command, addressed the reality of strategy: “All of the sophisticated talk about grand strategy is helpful, but show me your budgets and I will tell you what your strategy is.” What General Powell meant is that the definition of the U.S. role in the world and its strategic goals flow from budgets, not the other way around. This paper fleshes out General Powell’s observation by focusing on the means part of the ends, ways, and means of strategy in order to explain how austerity affects force planning and strategy. By first examining budget reductions as a general matter, the paper describes today’s austere U.S. budgetary environment. It concludes with the current strategic options that will likely characterize the contemporary discussion of strategy and force planning.

April 1, 2014

Letter

I write in response to Derek S. Reveron and James L. Cook’s article “From National to Theater: Developing Strategy” that appeared in Joint Force Quarterly 70 (3rd Quarter 2013). I agree wholeheartedly with the authors on their position that only “vital” national interests are worth dying for. However, I caution against accepting their idea that national interests that are (merely) “important” are necessarily worth killing for.

April 1, 2014

Ike Skelton, 1931-2013: Champion of Military Education

Education is persistently undervalued in most military institutions. This lack of attention is based on two realities of military life: education engenders the habit of questioning, while sound discipline, particularly in combat, requires unhesitating obedience; furthermore, education requires reflection, but war demands action. Thus, the military Services tend to draw broad lines of demarcation between their thinkers and their fighters.

April 1, 2014

From the Chairman

Representing Servicemembers who make up today’s Joint Force is my greatest honor as Chairman. As the principal military advisor to the President of the United States, Secretary of Defense, and the National Security Council, I work to develop a shared understanding of our capabilities and the Nation’s needs in order to provide sound advice and to represent the views of the Joint Chiefs of Staff. To be effective, I must build relationships of trust with those elected to make decisions about the use of military force. But I did not begin to establish relationships with civilian leaders only when I became Chairman.

April 1, 2014

Are We Really Ever Off Duty?

As we in the U.S. military continue to renew our commitment to the Profession of Arms, the title of this article asks a compelling question for everyone who wears the cloth of the Nation. While I believe the question has an easy answer, let us not downplay the significance of asking it at every level of professional development. Most serving in the Armed Forces understand the deeper meaning of the question, as well as the commitment to the profession and the American people that goes along with it. Therefore, most military professionals would provide the short answer: “No, we are never really off duty.”

April 1, 2014

The Joint Force Commander’s Guide to Cyberspace Operations

Cyberspace can be leveraged by first, finding a theory to express and teach the constantly changing vagaries of that domain, including a suitable lexicon, and second, overcoming assorted turf wars and adequately resourcing the study, manning, equipping, and training of the cyberspace force so it can integrate with other domains.

April 1, 2014

Achieving Accountability in Cyberspace: Revolution or Evolution?

Cyberspace considerations are irreversibly proliferating, and five core ideas will help commanders fight a perpetual cyberwar: education and training, a clear chain of custody, explicit processes and procedures and guidance, advanced methods of controlling access to networks and information, and a formal cyberspace mishap investigation process throughout the Defense Department.

April 1, 2014

Combined Effects Power

The Combined Effects Power (CEP) construct does not eliminate the combined arms warfare (CAW) concept, but CEP seeks to overcome CAW’s anomalies by accommodating the behavior of both cyber domain and soft power participants from the natural domains to offset the dangers springing from the information revolution.

April 1, 2014

Information-Sharing with the Private Sector

The Obama administration’s Executive Order 13636 and Presidential Policy Directive 21 are a beginning, but establishing public-private information sharing requires matching cyber security legislation to fill in the gaps found in the 2003 National Strategy to Secure Cyberspace, address a multitude of contentious issues, and achieve a unified cyberspace focus.

April 1, 2014

Shaping a 21st-Century Defense Strategy: Reconciling Military Roles

The military’s ability to shape the security environment can be substantially improved by adopting multiple simultaneous stimulants, most prominently the national security strategy shift from deterrence and containment to cooperation and engagement. These capabilities must be sufficiently resourced so Washington’s interests can be pursued short of armed conflict where possible.

April 1, 2014

Targeting the JIIM Way: A More Inclusive Approach

Joint doctrine, where it inadequately addresses incorporating Joint, Interagency, Intergovernmental, and Multinational (JIIM) organizations into the military planning process, must be revised to give JIIM engagement its due. Moreover, greater cross-organizational exposure among partners should increase understanding and trust and get partners more fully synchronized in both planning and execution.

April 1, 2014

Airpower and Globalization Effects: Rethinking the Five Rings

The Five Rings theory may not provide quick wins against large countries with modern air defense systems, but an escalatory strategic interdiction strategy relying on capable air and navel forces to affect the most critical and vulnerable elements would apply to many crises with its nonlethal and reversible options.

April 1, 2014

Sun Tzu in Contemporary Chinese Strategy

Sun Tzu’s The Art of War cuts both ways. Its tenets work against enemies but can also strike against China. Using the general’s maxims, we can uncover inconsistencies in the grandly moral stance assumed by Chinese leaders. For instance, claims made for public consumption can be juxtaposed with demonstrable fact.

April 1, 2014

Geography Matters in Maintaining Global Mobility

Geography impacts global mobility, and USTRANSCOM works with the components, the Defense Logistics Agency, and commercial partners to overcome vast distances and to subdue the burdens of time and cost. Crises evolve rapidly and the United States must maintain its unique ability to project power anywhere, any time.

April 1, 2014

Reflections on Operation Unified Protector

Committed people accounted for the success of Operation Unified Protector in Libya. NATO and partner participants in the air-heavy campaign arrived in haste and had to find fast solutions to endless challenges and shifting capabilities requirements. Skillful leadership enabled unity to survive as the center of gravity.

April 1, 2014

Silent Watch: The Role of Army Air and Missile Defense

The Army’s G-3/5/7 represents Army air and missile defense (AMD) interests and understands that threats that have evolved in capability, complexity, and capacity; a defense strategy and policy that rely on an enduring deterrence capability; and an increasing need to maintain joint operational access to distant regions ensure its importance.

April 1, 2014

Leveraging U.S. Civilian Capabilities in Africa

Washington should pass its domestic emergency response capability along to improve the governance and economics of African nations. The “National Response Platform” (NRP) and “National Response Force” (NRF) concepts will encourage a more impactful whole-of-nation approach, helping African states become contributors to stability and economic growth and maintaining U.S. leadership.

April 1, 2014

The Case for the Junior Joint Logistics Officer Training Program

Redundancies in the training of junior logisticians could be eliminated without sacrificing the different ranks, tasks, and courses each Service utilizes. A cross-Service study suggests the need for a comprehensive and unified approach to training from entry level on through the Junior Joint Logistics Officer Training program.

April 1, 2014

Dieppe All Over Again: The Quandaries of Combined Joint Operations

The 1942 raid on Dieppe remains enshrouded in questions yet is a treasure of information to the astute student of warfare who can penetrate the ten charges most often leveled at its failure and the overall blaming frenzy, providing insight into the Western mindset and the perpetual facts of war.

April 1, 2014

Bolívar

Any U.S. military officer or civil servant yearning to earn the sobriquet “grand strategist” must understand the ethos of the countries of Latin America. While many bodies of water are of great interest to the people of the United States and its government, the Rio Grande River is a vital interest. A worthy way to expand one’s knowledge of the states south of that long river is to read Marie Arana’s sound and solid biography Bolívar: American Liberator.

April 1, 2014

Intelligence Collection

In this companion piece to the authors’ 2010 work, Intelligence Analysis: How to Think in Complex Environments, Wayne Hall and Gary Citrenbaum have brought forth a superior forum by which to consider the challenges associated with intelligence collection in complex environments. Each author brings with him a lengthy résumé of credible service in the intelligence field. Hall is a retired U.S. Army officer with over 30 years of intelligence experience, and he has remained active within the intelligence field by participating in numerous seminars on intelligence training and intelligence transformation. Citrenbaum is actively involved in issues associated with intelligence transformation. Accordingly, both speak with authority on the issues they raise.

April 1, 2014

The Revenge of Geography

Ever since the rise of Hitler and the Second World War, international events and circumstances have led to periodic revivals of interest in the ideas and concepts of classical geopolitical theorists. As the Wehrmacht surged into the vast expanses of Soviet Russia and Imperial Japan sought to carve out a greater East Asia and Pacific empire, Western strategists and even popular media outlets such as Time magazine “discovered” the “Heartland” theory first propounded by British geographer Halford Mackinder in his 1904 address to the Royal Geographical Society entitled “The Geographical Pivot of History,” revised and expanded in his 1919 masterpiece Democratic Ideals and Reality, and further revised and updated in a 1943 Foreign Affairs article, “The Round World and the Winning of the Peace.”

April 1, 2014

Cross-Domain Synergy: Advancing Jointness

Modern technology has vastly increased available capabilities, which are rarely controlled exclusively by any single Service or nation-state. Keeping the U.S. advantage in cross-domain synergy calls for enhanced understanding of jointness and a shift from Service centrism to holism that expands ownership of capabilities.

April 1, 2014

A Low-Visibility Force Multiplier: Assessing China’s Cruise Missile Ambitions

China’s military modernization is focused on building modern ground, naval, air, and missile forces capable of fighting and winning local wars under informationized conditions. The principal planning scenario has been a military campaign against Taiwan, which would require the People’s Liberation Army (PLA) to deter or defeat U.S. intervention. The PLA has sought to acquire asymmetric “assassin’s mace” technologies and systems to overcome a superior adversary and couple them to the command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) systems necessary for swift and precise execution of short-duration, high-intensity wars.

March 1, 2014

The Bosnian Train and Equip Program: A Lesson in Interagency Integration of Hard and Soft Power

DOWNLOAD PDFExecutive Summary Military assistance to Bosnian forces was part of a complex plan to resolve what one former Secretary of State called “the problem from hell.” When Yugoslavia began to disintegrate in the early 1990s following the Soviet Union’s demise, it released a mix of nationalist and ethnic movements that led to civil war.

March 1, 2014

Targeted Killing of Terrorists

The struggle against terrorism—more specifically, the effort to prevent terrorist attacks—has raised difficult legal and policy issues including so-called targeted killing, or the killing of specific individuals because of their involvement in terrorist organizations and operations. As we shall see, this form of targeted killing involves domestic and international legal authorities and policy and prudential issues. A substantial number of countries confronting what they consider to be terrorist attacks and threats engage in targeted killings. Each has to resolve questions about authorities and prudence because, while terrorists are always criminals, they also may be lawful military targets. The dual character of terrorists leads to the conclusion that, as a matter of policy, a state should weigh the totality of the circumstances and conclude that no other action is reasonable to prevent a terrorist attack before engaging in the targeted killing. Careful analysis in advance may preempt problems later.

March 1, 2014

The Nightmare Years to Come?

We have entered a particularly dangerous era in the Near East and South Asia— that is, the Greater Middle East. The context of today’s situation is more alarming than respective current crises—as bad as they may be. Rather, there is an increasingly radicalized and violent sectarian environment made up of crosscutting crises occurring in the midst of proliferation; precision weapons; cyber war; increased ungoverned territory vulnerable to global, regional, and local jihadist exploitation; majoritarian authoritarianism; uncompromising sectarianism; ethnic, tribal, and sectarian-driven civil wars; massive popular anger and frustration over the lack of essential services and a diminishing quality of life, particularly in areas such as water, electricity, health, education, employment, and economic collapse; water wars and environmental endangerment; and the vulnerability of sensitive infrastructure targeted by state and nonstate actors, or an empowered lone wolf in the service of a state or nonstate actors.

Jan. 1, 2014

Backbone of the Armed Forces

It was December 17, 1777, and General George Washington’s Continental Army had just returned to winter quarters in Valley Forge, Pennsylvania. They were exhausted and had gained minimal success in their fight against the British army. But this period in Valley Forge proved critical for the fledgling army and led General Washington to recruit former Prussian officer Baron Friedrich Wilhelm von Steuben. His new title: Inspector General. His mission:strengthen the professionalism of the Continental Army.

Jan. 1, 2014

Letter

In Joint Force Quarterly 71 (4th Quarter 2013), Karen Kaya offers a number of perspectives on the North Atlantic Treaty Organization’s (NATO’s) evolving missile defense project, in particular those shaping Turkey’s calculations as it works to define its role. Ms. Kaya makes a numbers of observations that merit comment.

Jan. 1, 2014

Biometric-Enabled Intelligence in Regional Command-East

Biometric-enabled Intelligence (BEI) has established its value throughout Regional Command–East even though the full potential of biometrics-related collections and applications remains unknown. Importantly, the concept has gained traction at the general government level as well as locally, where Afghan National Security Forces and allies and adversaries are seeing the forensic footprints insurgents leave behind being exploited to erase insurgent anonymity, which has served as a traditional hiding place. Arrests and warrants are up, and BEI operations have impacted insurgents' ability to lead their movement and lower-level cells' ability to function. The pressure grows as coalition and Afghan forces employ biometrically developed watch lists and "be on the lookout" messages as part of focused hunts for offenders.

Jan. 1, 2014

"Gallantry and Intrepidity": Valor Decorations in Current and Past Conflicts

The Nation and its military appear to be growing less generous with decorations for valor. Seventeen Medals of Honor were awarded for the 17 days of the Battle of Chosin Reservoir, while 11 have been awarded over the 11-year span of U.S. combat in Iraq and Afghanistan. No single factor accounts for the 20-fold reduction in the number of valor decorations in current operations. The most popular reasoning focuses on the changing nature of warfare and military culture, but that leaves gaps. The awards process is kept from public scrutiny, but some evidence suggests changes since Vietnam. The effects of the factors that can be isolated need further analysis to enable today's warriors to be awarded the decorations they earn.

Jan. 1, 2014

In Memoriam

Volunteering for the Army Air Corps shortly after Pearl Harbor, General Jones received his commission and pilot wings in early 1943. During the Korean War, General Jones flew more than 300 hours on combat missions against North Korea. In 1969, he served in the Republic of Vietnam as Deputy Commander for Operations and then as Vice Commander of the Seventh Air Force.

Jan. 1, 2014

From the Chairman

The Joint Force remains unrivaled. We deter threats, assure partners, and defeat adversaries. We are strong—and our nation is secure—because we commit to being the best led, best trained, and best equipped force as our non-negotiable imperative. You, the men and women of the Joint Force—all volunteers—are the Nation’s qualitative military edge. We are who we are because of your commitment and determination. The world is not getting any safer, but we are becoming more adaptable.

Jan. 1, 2014

Executive Summary

There was a time when “jointness” had no champions. There was a time when professional military education at the Service colleges offered little in the way of joint content. Joint military operations often revealed a lack of basic coordination, much less cooperation or cohesion. Despite examples in World War II of joint coordination in various operations, after the war, Army Chief of Staff General Dwight D. Eisenhower and Chief of Naval Operations Admiral Chester Nimitz committed their respective Services to work together to establish a joint military education effort 40 years before the Goldwater-Nichols Department of Defense Reorganization Act of 1986 required it.

Jan. 1, 2014

The Role of Professional Military Education in Mission Command

The military's new command system, known as mission command, requires that subordinate leaders at all levels are at once aggressive and disciplined in accomplishing the mission. Accordingly, the Chairman's "conduct of military operations through decentralized execution based upon mission type orders" calls for commensurate professional military education (PME), but the emphasis on relative autonomy has not been as pronounced as needed. Among areas where PME is found wanting is not allowing students time to think about what they are learning. Implanting civilian instructors with more experience in building in time for research and reflection, and requiring writing—an operations order a week is suggested—will help develop the critical thinking mission command demands.

Jan. 1, 2014

The Pen and the Sword: Faculty Management Challenges in the Mixed Cultural Environment of a War College

While the war colleges each Service maintains bow to their Services' cultures, and the National War College and Eisenhower School are joint, these institutions share certain commonalities in preparing lieutenant colonels and colonels and their Navy equivalents for the next level of responsibility. Seen from the perspective of an administrator, the war colleges should aim to be "intellectual centers of excellence with a mix of the best and brightest military and civilian faculty members." Properly resourced and staffed, the schools could serve as percolators for new and even counterintuitive thinking egged on by incisive research on impactful areas, and also as launching pads for the sorts of inquiring and innovative officers needed to confront the challenges of a fast-paced age.

Jan. 1, 2014

Putting "A Cooperative Strategy for 21st Century Sea Power" to Work: A Wargaming Perspective

Combatant commanders and their subordinates will need to act with allied forces under the umbrella of the Chairman's mission command system, meaning a commander's intent must be transparent to multinational forces. Interoperability between U.S. and UK forces, for instance, can be streamlined through resolution of cultural, doctrinal, and communication/information systems. Immediate steps include continuing exchange officer placement, combined training exercises, and standardized rules of engagement. NATO Allies and other partners can be drawn in as needed, and the Naval War College should continue to take the lead in following this Chief of Naval Operations directive.

Jan. 1, 2014

Godzilla Methodology: Means for Determining Center of Gravity

Commanders unable to decide what constitutes the enemy center of gravity may find deliverance in the Godzilla Methodology. This fabulous creature symbolizes which force must be neutralized to achieve the objective. Godzilla dispatches each force from the list of critical strengths until deletion of a particular force prevents the objective from being achieved. The methodology is simple and effective, and identification of the center of gravity allows friendly forces to proceed with dismantling resistance by removing those forces that most decisively frustrate achievement of friendly political/military objectives. Moreover, friendly centers of gravity can be identified and protected and perhaps enhanced.

Jan. 1, 2014

Improving DOD Adaptability and Capability to Survive Black Swan Events

Black swan events have no historical precedent to warn us to be prepared; yet, as seen in the 9/11 attacks, they are not entirely unforeseen and general preparation is possible even though their rarity makes it difficult to gather widespread support. Military culture is particularly inoculated against accepting that anything cannot be prepared for, or if it does catch us by surprise, that it cannot be recovered from. Yet even the military is awakening to the growing probability of such events as chemical or biological or other attacks. Low-cost and adaptive measures must not be overlooked as DOD strives to be ready to respond to a broad range of possibilities rather than keying in on anything specific.

Jan. 1, 2014

Strategy for Intelligence, Surveillance, and Reconnaissance

Intelligence, Surveillance, and Reconnaissance (ISR) is reassuring to its customers and accordingly leads to competition over resources. Yet successful ISR strategy demands trust and collaboration among organizations. ISR strategy should therefore focus attention on optimal directions and create a common context that entices ISR initiatives more toward problem-solving than production. CJCS correctly asserts that clearly expressing intent is the right way to go about it. Says the author, "Intent must guide the enterprise and joint force toward achieving specific ISR objectives that support campaign goals." Intelligence and operations must be integrated to balance ends, ways, and means. Joint ISR doctrine must evolve accordingly and reflect that ISR should be led rather than managed or it will fail in battle.

Jan. 1, 2014

The Joint Stealth Task Force: An Operational Concept for Air-Sea Battle

Overcoming antiaccess/area-denial (A2/AD) requires having sensor and weapons density at range without relying on forward bases or carriers, which urges a return to Air-Sea Battle basics. What is called a joint stealth task force concept is emblematic of the new pluralism regarding platforms. Budget and research agility are needed to address such deficiencies as inadequate range capacity in the air capability, undersea payload capacity, and insufficient development of unmanned systems and hypersonic research. Networking technology is in a comparatively good position to support the concept discussed here. Warfighters need to consider, debate, wargame, and jointly test the stealthy airborne and undersea platforms and the new technologies and operational concepts needed to defeat A2/AD and achieve Air-Sea Battle objectives.

Jan. 1, 2014

Unifying Our Vision: Joint ISR Coordination and the NATO Joint ISR Initiative

As revealed by Unified Vision 2012, joint intelligence, surveillance, and reconnaissance (JISR) must fill a number of operationally applicable needs. JISR integration requires the technical linking of data sources, operational integration, command and control, and optimal tactical employment of ISR capabilities, which cannot be done without mature doctrine, refined tactics, techniques, and procedures, and training for operators. The NATO Allies must have an accessible and dependable apparatus for finding and striking targets that are often mobile and asymmetric; and the Alliance must be able to deploy it despite reduced U.S. financial and other inputs. JISR operators must be organized, trained, and equipped to interface with all allied assets using the appropriate tactics, techniques, and procedures.

Jan. 1, 2014

Cut Defense Pork, Revive Presidential Impoundment

Congress builds unnecessary costs into the defense budget by considering employment and contract issues in congressional districts ahead of actual needs. In the face of expenditures beyond what DOD requests, the President should aggressively reenter the fray by jumpstarting the contest between "the powers of the purse versus that of impoundment." There are steps the President can take to "revive his impoundment authority" within constitutional bounds. If a legislative compromise is unobtainable, the President might select a salient example such as the 280 M1 tanks that were produced without being requested and are now candidates for cold storage. With Supreme Court and congressional support, the Commander in Chief may be able to block wasteful or strategically unsound procurement.

Jan. 1, 2014

Strategic Implications of the Afghan Mother Lode and China's Emerging Role

China has the technology, know-how, and capital to exploit Afghanistan's mineral resources and capitalize on its location, which could make it a transportation hub; concurrently, Beijing sees the risks of dealing with a country with corruption at all levels and with the further problems of primitive infrastructure, low education and expertise levels, potentially hostile neighbors, scarcity of water, and forbidding terrain. Afghan analysts themselves see the need to build economic and social stability as trumping other security and military needs. Meantime, U.S. and NATO forces are spending trillions to prepare Afghanistan for China and other countries to reap the benefits. This outcome, while controversial, may be the easiest way for Kabul to rise above its disorder and poverty.

Jan. 1, 2014

Improving Safety in the U.S. Arctic

The Arctic's resources and transportation possibilities are drawing increased activity from many nations, and Washington should act at once to bolster what the Coast Guard can do. The lead agency will be the Department of Homeland Security with the Coast Guard as its operational arm, ideally with adequate funding and a seasonal search-and-rescue base at Barrow, Alaska, and at least two new icebreakers to maintain an Arctic presence, protect safety interests from cruise ships and other activities, and respond to environmental calamities.

Jan. 1, 2014

Forging a 21st Century Military Strategy: Leveraging Challenges

Exercises are helping determine optimal military capabilities for the future. The Bold Alligator series saw the Navy–Marine Corps team leading a joint and coalition attempt to shape a flexible insertion force and identify the kind of command and control, and intelligence, surveillance, and reconnaissance resources that will be most helpful going forward. The exercise revealed the importance of the ability of coalition forces to "craft greater capability to transfer the deconfliction of air tasks to integrated data systems." Deconflicting strike and air assets/tasks will call for greater coordination and automation and determining the appropriate nuclear tip. Finding the right policy agenda requires understanding the interactive nature of warfare and anticipating tomorrow's needs rather than relying on outmoded technologies.

Jan. 1, 2014

Learning and Adapting: Billy Mitchell in World War I

Aviation guru Billy Mitchell could have seen any number of reversals as dismal failures, but each setback seemed to place him at the right place and time. Apparent demotions were actually opportunities to step back to think, write, and learn. Accordingly, when the American Expeditionary Force (AEF) was swinging into action, even his long-time rival Benjamin Foulois admitted Mitchell was the best candidate to command the AEF's final operations. Mitchell frequently did not see advantages in the making as he was clubbed into less prestigious assignments; yet he persisted, and however mean his assignments were, he processed his experience by writing and analyzing them daily, enabling him to develop an aerial expertise far in advance of his American peers.

Jan. 1, 2014

Foreign Powers and Intervention in Armed Conflicts

The book is best read by political science, international relations, international political economic, and security studies scholars. It may also be of interest to military historians, foreign policy designers, and those generally interested in why and how states get involved in the armed conflicts of others.

Jan. 1, 2014

The Tender Soldier: A True Story of War and Sacrifice

On November 4, 2008, Paula Loyd, a social scientist with a relatively new U.S. Army program, the Human Terrain System (HTS) and its deployed Human Terrain Teams, was on task in Maiwand, Afghanistan. Deployed to study the sociocultural nuances of the Afghan people and help commanders better understand the host population, this day would lead to Loyd’s death. The Tender Soldier: A True Story of War and Sacrifice, by journalist and Columbia University Graduate School of Journalism Professor Vanessa M. Gezari, is a well-researched and deeply personal narrative of the events of that day and the controversies surrounding the program that deployed Loyd into the field.

Jan. 1, 2014

Security Cooperation: How It All Fits

Joint Publication (JP) 3-XX, Security Cooperation, will most likely deal with the terms and programs supporting U.S. foreign policy and how they relate. The anticipated updating of JP 3-22, Foreign Internal Defense, should be synchronized with it and present expanded discussion of U.S. combat operations to include major counterinsurgency and counterterrorism operations in support of host countries. Joint Doctrine Note 1-13,Security Force Assistance, will also help provide commanders a doctrinal foundation for identifying tools and resources to assist other militaries. Language redundancies and confusing definitions should not be allowed to impede military ventures—hence the need for doctrine as the fundamental principles guiding force employment toward common objectives. Future joint doctrine must explain the relationship of security cooperation terms.

Jan. 1, 2014

The Flawed Strategic Debate on Syria

Dating from Bashar al-Asad’s first suppression of mass demonstrations in April 2011, the war in Syria is now 3 years old, has killed more than 130,000 Syrians, and displaced nine million Syrians, two million as refugees into neighboring countries. Foreign intervention has increasingly shaped the course of the fighting and will continue to have substantial regional consequences. The complexity of this bitter, nominally internal struggle has dampened American enthusiasm for joining the fray or even paying much attention to Syria, notwithstanding the chemical weapon attacks on Gouta, east of Damascus, last August, which captured the attention of the American people, media, and policy community. With an international taboo broken and a Presidential redline crossed, public debate spiked in August–September 2013 over U.S. interests in Syria and the limits on what we will do to secure them. Debate did not result in a consensus for action.

Jan. 1, 2014

The Defense Acquisition Trilemma: The Case of Brazil

Brazil is a puzzling new player in the global system. Emerging as a complex international actor, it has come to be seen as a significant economic competitor and dynamic force in world politics. But transformational changes in the economic and political realms have not been accompanied by advances in military power. While Brazil has entered the world stage as an agile soft power exercising influence in setting global agendas and earning a seat at the economic table of policymakers, its military capacity lags. The national security strategy announced under President Luiz Inácio Lula da Silva in 2008 intended to redress this power gap. President Dilma Rousseff ’s 2011 White Paper—so detailed that it is called a “White Book”—provides the conceptual roadmap to achieve a new military balance. But military modernization is still a work in progress.

Dec. 1, 2013

The Noncommissioned Officer and Petty Officer: Backbone of the Armed Forces

A first of its kind, this book—of, by, and for the noncommissioned officer and petty officer—is a comprehensive explanation of the enlisted leader across the U.S. Armed Services. It complements The Armed Forces Officer, the latest edition of which was published by NDU Press in 2007, as well as the Services’ NCO/PO manuals and handbooks. Written by a team of Active, Reserve, and retired senior enlisted leaders from all Service branches, this book defines and describes how NCOs/POs fit into an organization, centers them in the Profession of Arms, explains their dual roles of complementing the officer and enabling the force, and exposes their international engagement. As Chairman of the Joint Chiefs of Staff General Martin E. Dempsey writes in his foreword to the book, “We know noncommissioned officers and petty officers to have exceptional competence, professional character, and soldierly grit—they are exemplars of our Profession of Arms.”

Dec. 1, 2013

Next Steps in Syria

Nearly 3 years since the start of the Syrian civil war, no clear winner is in sight. Assassinations and defections of civilian and military loyalists close to President Bashar al-Asad, rebel success in parts of Aleppo and other key towns, and the spread of violence to Damascus itself suggest that the regime is losing ground to its opposition. The tenacity of government forces in retaking territory lost to rebel factions, such as the key town of Qusayr, and attacks on Turkish and Lebanese military targets indicate, however, that the regime can win because of superior military equipment, especially airpower and missiles, and help from Iran and Hizballah.

Nov. 1, 2013

Crisis Stability and Nuclear Exchange Risks on the Subcontinent: Major Trends and the Iran Factor

Crisis stability—the probability that political tensions and low-level conflict will not erupt into a major war between India and Pakistan—is less certain in 2013 than at any time since their sequential nuclear weapons tests of 1998. India’s vast and growing spending on large conventional military forces, at least in part as a means to dissuade Pakistan’s tolerance of (or support for) insurgent and terrorist activity against India, coupled with Pakistan’s post- 2006 accelerated pursuit of tactical nuclear weapons as a means to offset this Indian initiative, have greatly increased the risk of a future Indo-Pakistani military clash or terrorist incident escalating to nuclear exchange. America’s limited abilities to prevent the escalation of an Indo-Pakistani crisis toward major war are best served by continuing a significant military and political presence in Afghanistan and diplomatic and military-to-military dialogue with Pakistan well beyond 2014.

Oct. 28, 2013

Strategic Shift: Appraising Recent Changes in U.S. Defense Plans and Priorities

This paper examines major changes in U.S. defense plans and priorities that the Department of Defense (DOD) has issued through high level strategy and other guidance documents during 2012 and the beginning of 2013. It recommends that DOD “double down” in its pursuit of globally integrated operations through joint force integration in the context of the Capstone Concept for Joint Operations and the cross-domain synergy needed to operate effectively in the face of sophisticated adversaries.

Sept. 1, 2013

DTP-103: Critical Technology Events (CTEs) that Support the Rationale for Army Laboratories Based on Science and Technology Functions Performed

This report, part of the “Project Hindsight Revisited” series of DTP publications, provides a retrospective look at 58 Critical Technology Events (CTEs) in DoD R&D investment, logically divided across 10 separate categories. The authors demonstrate the continuing relevance of Army laboratories in the development of critical weapons systems. Using specific examples, the study articulates the importance of maintaining quality staff and managers, ensuring the relevance of S&T program investments, and integrating servicemen and women with the larger scientific community to forecast technology trends.

Sept. 1, 2013

DTP-104: External Collaboration in Army Science and Technology: The Army’s Research Alliances

In this study, the authors examine the decision for Army Research Laboratories to engage in external, formal collaborations such as collaborative alliances. They go on to assess ARL Collaborative Technology Alliances (CTAs), Collaborative Research Alliances (CRAs), and Information Technology Alliance (ITAs). The report concludes by examining the effectiveness of the examples given above, and a recommendation for formulating a set of assessment questions for Army managers considering collaboration in the future.

Sept. 1, 2013

Transitional Justice for Syria

Transitional justice is the provision of justice in the transition from one form of government, often perceived as illegitimate, unjust, and tyrannical, or an anarchic society, to one that observes the rule of law and administers justice. It also is about choices: how to allocate scarce prosecutorial, judicial, police, and prison resources. The goal is to make the rule of law ordinary.

Aug. 30, 2013

DTP-102: “Chance favors only the prepared mind:” The Proper Role for U.S. Department of Defense Science and Engineering Workforce

This publication provides critical recommendations for managing the DoD’s 130,000 person Science and Technology workforce through a period of growing fiscal and geopolitical ambiguity. The report outlines a strategy that: prioritizes lessons learned through hands-on experience; cultivates practices that identify and support the most promising trends in technology and research; promotes advocacy for worthy programs, and; develops a process for ensuring competent “third parties” determine a fair price for acquisition and development. It concludes by urging the DoD return to a prudently managed, conservative S&T strategy that emphasizes workforce recruitment and training, adequate funding for research and development, and increased engagement with colleges and universities.

Aug. 1, 2013

The Future Can’t Wait

In Spring of 2011 USAID’s Science and Technology Office and NDU agreed to co-host a symposium on future development challenges. USAID and NDU agreed to collaborate on a follow-up publication to the symposium.

Aug. 1, 2013

The Rebalance to Asia: U.S.-China Relations and Regional Security

Upon taking office in January 2009, Obama administration officials proclaimed a U.S. “return to Asia.” This pronouncement was backed with more frequent travel to the region by senior officials (Secretary of State Hillary Clinton’s first trip was to Asia) and increased U.S. participation in regional multilateral meetings, culminating in the decision to sign the Association of Southeast Asian Nations (ASEAN) Treaty of Amity and Cooperation and to participate in the East Asia Summit (EAS) at the head-of-state level. The strategic “rebalance to Asia” announced in November 2011 builds on these earlier actions to deepen and institutionalize U.S. commitment to the Asia-Pacific region.

July 1, 2013

Valued Sustainable Services: Building Partnership Capacity Through Collaborating Approaches

The Valued Sustainable Services (ValSServ) concept is an approach to building the capacity of local populations. It emphasizes the interdependency among telecommunications, reliable power, and information-sharing support, and encourages projects to be developed in integrated packages rather than in stove-piped lines of effort. ValSServ focuses on bottom-up projects in complex civil-military operations that can be funded, planned, and executed at local levels, while being consistent with top-down national and theater strategies. It takes a system-of-systems approach, recognizing that successful projects can generate positive ripple effects in local environments and throughout extended networks. This paper focuses on ValSServ within the wide range of U.S. Department of Defense operating environments, such as capacity-building to help shape peacetime conditions in partner nations, post-disaster recovery, and helping to move from the “hold” to the “build” phases in counterinsurgency operations.

July 1, 2013

Sharing to Succeed: Lessons from Open Information-sharing Projects in Afghanistan

The sharing of information in complex civil-military operations is important, yet actors rarely do it well. U.S. and allied military forces must be able to communicate, collaborate, and exchange information effectively with the local populations they seek to influence, or they cannot achieve the goals for which they have been committed. Nonetheless, experience from stability operations in Afghanistan and Iraq, numerous humanitarian assistance/disaster relief missions, and efforts to build the capacity of foreign partners suggest that effective information-sharing is much harder than might be expected. This paper sheds light on the difficulties of setting up and sustaining projects to share information in such situations and suggests ways to do better in the future.

July 1, 2013

Valued Sustainable Services: Building Partnership Capacity Through Collaborating Approaches

The Valued Sustainable Services (ValSServ) concept is an approach to building the capacity of local populations. It emphasizes the interdependency among telecommunications, reliable power, and information-sharing support, and encourages projects to be developed in integrated packages rather than in stovepiped lines of effort. ValSServ focuses on bottom-up projects in complex civil-military operations2 that can be funded, planned, and executed at local levels, while being consistent with top-down national and theater strategies. It takes a system-of-systems approach, recognizing that successful projects can generate positive ripple effects in local environments and throughout extended networks. This paper focuses on ValSServ within the wide range of U.S. Department of Defense operating environments, such as capacity-building to help shape peacetime conditions in partner nations, post-disaster recovery, and helping to move from the “hold” to the “build” phases in counterinsurgency operations.

June 1, 2013

DTP-101: Organizational Analysis of the TIDES Project and the STAR-TIDES Network using the 7-S Framework

DTP 101 gives an in-depth organizational analysis of STAR-TIDES, a special project of CTNSP. STAR-TIDES is an open-network, global organization, a form that is increasingly common in the digital age. This report identifies the core “7-S” factors in STAR-TIDES (Strategy, Structure, Systems, Staffing, Skills, Style, and Shared values), with recommendations for improved performance. Results provide a template for how to conduct a 7-S organizational analysis.