Nov. 5, 2018

On Grand Strategy

John Lewis Gaddis, deemed the “Dean of Cold War Historians” by a New York Times reviewer, has published yet another book, at least the 14th in a long and productive career. The latest, On Grand Strategy, however, will disappoint those hoping for another learned exposition on the American role in the post–World War II era. Rather, Gaddis, the Robert A. Lovett Professor of Military and Naval History and Director of the Brady Johnson Program in Grand Strategy at Yale University, has written a wide-ranging essay on strategic thinking that begins with the dawn of recorded history and concludes with the momentous challenges facing American leaders during World War II. As such, On Grand Strategy will bring joy to those whose professions depend on strategizing and anyone wanting to rummage through history seeking insights into how past strategists practiced their craft.

Nov. 5, 2018

Air Force Strategic Bombing and Its Counterpoints from World War I to Vietnam

Strategic bombing has dominated US Air Force doctrine for sixty years despite the broader use of air power during this period. What factors led to this? The author finds that in wartime, the Air Force adapts to the needs of the conflict, but in peacetime returns to a more narrow view of air power in national defense. If the last sixty years teaches anything, it’s that every conflict involves new challenges, which means senior leaders and strategists must train for core missions, anticipate the most deadly threats, and be ready at all times for more surprises.

Nov. 5, 2018

Military Transformation: Applying the Kotter Eight-Step Methodology for Change in the U.S. Armed Services

The Joint Force can transform itself and attain its long-term objectives for modernization, says the author, by following a process of change management adapted from John Kotter’s eight step methodology. The author demonstrates the applicability and utility of Kotter’s methodology with a case study of the Navy’s conversion to nuclear propulsion led by the father of the nuclear Navy, Admiral Hyman Rickover. By emulating Rickover’s example building organizational standards, recruiting top talent and improving officer management systems to support the Navy’s nuclear conversion, the Joint Force may successfully execute contemporary transformation efforts.

Nov. 5, 2018

A Smarter Approach to Cyber Attack Authorities

Restricted cyberattack authority enables operational commanders to attack effectively while simultaneously minimizing the risk of unintended consequences. Because operational commanders face adversaries capable of degrading and destroying our military capabilities, commanders should be armed with as many weapons as possible to employ against an adversary in the event of a crisis. A coherent system of nationally pre-approved cyberattack methods combined with delegation of limited authority, says the author, would offer important advantages. Such a system would increase the menu of options, keep military operations in alignment with the national interest, and ensure that national authorities remain in control.

Nov. 5, 2018

Beyond the Gray Zone: Special Operations in Multidomain Battle

The joint operational approach known as Multi-Domain Battle is the subject of this feature article. The demands of the future battlefield will be characterized by increased lethality, complexity and the loss of traditional US supremacy, and thus test the tactical skill and strategic acumen of Special Forces. Employment of Special Forces can give the Joint Force commander an advantage over conventional land, air and maritime forces in combat. To maximize their effectiveness in the Multi-Domain Battle environment, however, commanders must accept a greater level of risk than has been customary during recent operations.

Nov. 5, 2018

Additive Manufacturing: Shaping the Sustainment Battlespace

The proliferation of 3D Printing technologies, also known as additive manufacturing is the subject of this essay. The authors explain the amazing possibilities of this emergent technology to shorten supply chains, produce hard-to-source parts, and deliver spare parts on demand, such as printed food and even printed human organs. There is no doubt that 3D Printing will expand into other fields, increasing flexibility and significantly shortening supply chains. However, there are still major hurdles to overcome before 3D Printing is fully implemented in a way that best supports the joint war fighter.

Nov. 5, 2018

The U.S. Air Force and Army in Korea: How Army Decisions Limited Airpower Effectiveness

The US Air Force was key to halting the North Korean invasion and rescuing US Army forces during the Korean War. Unfortunately, US Army commanders made decisions that limited the effectiveness of US air power, says the author, which made the Korean War more costly than necessary. This historical analysis offers important lessons for the Joint Force. First is that joint doctrine must recognize the need to design ground maneuvers to enhance the effectiveness of air interdiction. And second is that each service has its own unique paradigm of war to achieve national security objectives.

Oct. 31, 2018

Peacekeepers in the Donbas

The ongoing conflict in Eastern Ukraine between Ukrainian forces and separatists backed by Russia has the potential for peaceful settlement. Russian President Vladimir Putin surprised many observers when he proposed introducing peacekeepers in Eastern Ukraine. Putin’s proposal may be disingenuous, says the author, but may also be a real opportunity for peace. This essay tied for first place in the Strategy Article category of the 2018 Chairman of the Joint Chiefs of Staff Strategic Essay Competition. The author, Lieutenant Colonel Michael P. Wagner of the US Army wrote this as a student at the US Army War College.

Oct. 31, 2018

Political Warfare with Other Means: 2017 Cyber Attacks on Qatar

Qatar’s state news agency falsely reported in 2017 that a Qatari Emir supported Hamas, Hezbollah, Iran and Israel. Although this cyberattack was ultimately unsuccessful, the author says we can and should learn from these events, and take a pre-emptive approach to prevent the spread of false and misleading information. This essay tied for first place in the Strategy Article category of the 2018 Chairman of the Joint Chiefs of Staff Strategic Essay Competition. The author, Major Edwin Y. Chua of the Singapore Army wrote this as a student at the Marine Corps Command and Staff College.

Oct. 30, 2018

Coercive Gradualism Through Gray Zone Statecraft in the South China Seas: China’s Strategy and Potential U.S. Options

Coercive Gradualism is the incremental employment of coercive instruments of national power in a synchronized and integrated fashion below the threshold of military conflict. In response to aggressive regional challenges, such as China’s use of Coercive Gradualism in the South China Sea, the US needs to develop and implement a coherent strategy utilizing all diplomatic, informational, military and economic options. This essay won the 2018 Secretary of Defense National Security Essay Competition. The author, Captain Kapil Bhatia of the Indian Navy wrote this as a student at the US Naval War College.

Oct. 30, 2018

Beyond the Third Offset: Matching Plans for Innovation to a Theory of Victory

The Third Offset Strategy was introduced by Defense Secretary Chuck Hagel in 2014, which drew from previous offset strategies and focused on innovative ways to sustain the US’s power projection capabilities. In its current formulation, says the author, the Third Offset is essentially a technology strategy which offers no enduring competitive advantage. Therefore, we should simplify the meaning of offset strategy to focus on nullifying an adversary’s advantage by imposing costs that would dissuade them from turning into enemies. Based on this, military strategists should contemplate organizational and doctrinal changes rather than rely on uncertain technologies.

Oct. 30, 2018

Complementary Engagement: An American-Led Response to Rising Regional Rivals

The concept of Complementary Engagement emphasizes capacity-building among US allies and partners while proposing a revised military structure and posture. The goal is to counter aspiring regional hegemons who have expanded their ambitions and capabilities, particularly China, Iran and Russia. Although these regional hegemons cannot match the global reach of the former Soviet Union, they still pose a threat. Therefore, says the author, the US should invest in ballistic missile defense, long range strike capabilities and nuclear weapons, and rebalance our alliances to encourage a more equitable sharing of the defense burden.

Oct. 30, 2018

Executive Summary

Editor-in Chief Bill Eliason asks what kind of leaders does the military need. Our authors have answers from across the Joint Force. Our essay competition winners cover topics from China’s expansion in the South China Sea to Russia’s peacekeeping offer in the Ukraine to the rules of engagement and the risks of misinformation cyber warfare. Throughout this issue, we deal with hot topics: Special Forces in multi-domain battle, the long-term transformation of the Joint Force, air power during the Korean War, the doctrine of strategic airpower as it continues to evolve, and newly revised joint logistics doctrine.

Oct. 17, 2018

United Nations Peacekeeping Operations: Environmental Sustainability

United Nations Peacekeeping Operations (UNPKO) are deployed to create, maintain, and secure peace in countries and regions struggling with violence and war. The environmental sustainability of UNPKO mission sites is not essential to the purpose of each deployment, but good sustainability practices can benefit the mission, host nation, troop-contributing countries, and the global environment. As a major contributor to UNPKO efforts, the United States has a direct interest in improving the sustainability and cost-effectiveness of each mission. This paper identifies gaps in sustainability practices at local and organizational levels and recommends an increased focus on sustainability practices that can benefit the mission, host nation, troopcontributing countries, and the environment.

Oct. 2, 2018

China's Strategic Support Force: A Force for a New Era

In late 2015, the People’s Liberation Army (PLA) initiated reforms that have brought dramatic changes to its structure, model of warfighting, and organizational culture, including the creation of a Strategic Support Force (SSF) that centralizes most PLA space, cyber, electronic, and psychological warfare capabilities. The reforms come at an inflection point as the PLA seeks to pivot from land-based territorial defense to extended power projection to protect Chinese interests in the “strategic frontiers” of space, cyberspace, and the far seas. Understanding the new strategic roles of the SSF is essential to understanding how the PLA plans to fight and win informationized wars and how it will conduct information operations.

Aug. 13, 2018

Joint Force Quarterly 90 (3rd Quarter, July 2018)

The newest issue of Joint Force Quarterly is now online. With this issue your JFQ team completes our 90th edition and prepares to celebrate the journal’s 25th anniversary this fall, all thanks to our readers, authors, and the veterans of NDU Press, who have kept this great idea of General Colin Powell moving forward in support of the joint force. Join us in supporting what the general called “the cool yet lively interplay among some of the finest minds committed to the profession of arms.”

July 11, 2018

Enhancing Global Security Through Security Force Assistance

This commentary advocates for renewed emphasis on activities that support the capacity and capability of foreign security forces and their supporting institutions, also known as Security Force Assistance (SFA). SFA creates a framework for improved partnerships and stronger alliances, and encourages our global partners to carry a greater share of the security burden. The author calls for improvements to interoperability between current and future coalition forces and additional training of senior-level ministerial advisors among other initiatives. With continued focus and determination, SFA can help build more capable partners and facilitate peace, security and stability.

July 5, 2018

Don’t Shoot the Messenger: Demosthenes, Churchill, and the Consensus Delusion

In this feature article, the author compares the experiences of ancient Greek philosopher Demosthenes and British Prime Minister Winston Churchill. Though separated by two thousand years, both advocated for rearmament, both were called warmongers, and both were sidelined as a result. Far from provoking conflict, Demosthenes and Churchill sought to avoid war by strengthening military readiness and reinforcing support for their allies to make war less appealing to their adversaries. The lessons of Demosthenes and Churchill are still relevant as the Joint Force struggles with its own challenges in the midst of growing threats from actors across multiple domains.

July 5, 2018

Reverse Engineering Goldwater-Nichols: China’s Joint Force Reforms

This feature article examines the modernization of the People’s Liberation Army, particularly its operational capability within the People’s Republic of China and recent efforts to develop its capability as an expeditionary force. While the U.S. military has been reorganizing since the Goldwater-Nichols Act of 1986, China has paid close attention and taken significant steps, for example, in the creation of new joint warfighting commands, reorganization of its department system, and creation of new military services. These reform efforts have not been entirely successful, however, due to entrenched bureaucratic interests and the lack of recent combat operations.

July 5, 2018

Bombs, Not Broadcasts: U.S. Preference for Kinetic Strategy in Asymmetric Conflict

In this feature article, the author explores reasons why U.S. strategy in asymmetric conflict has focused so heavily on kinetic operations while conceding the information domain to weaker adversaries. This scenario is a consistent feature of every asymmetric conflict the U.S. has been involved in over the past several decades. In order for the U.S. military to be more successful in asymmetric wars, it needs to give company and battalion commanders authority to conduct information operations, move away from the mentality of treating messages like munitions, and create an organizational culture that fully appreciates the importance of information operations.

July 5, 2018

Defense of the West (Book Review)

In this timely book, one of the most seasoned observers of Atlantic security affairs, Stanley Sloan, offers insights about the future of the North Atlantic Treaty Organization (NATO). These insights are linked to a detailed examination of the Alliance’s origins and development. Sloan pinpoints three key alliance drivers—national interests, common values, and political leadership—and offers a carefully circumscribed optimistic conclusion: common national interests and values are strong, but political leadership is volatile and in need of constructive and effective management.

July 5, 2018

The Logic of American Nuclear Strategy (Book Review)

Famously, Henry Kissinger once wondered out loud, “What in the name of God is strategic superiority? . . . What do you do with it?” Over 40 years later, the questions still resonate, and Georgetown University professor Matthew Kroenig aims to tackle Kissinger’s quandary. The Logic of American Nuclear Strategy begins with a puzzle: if the basic premise of U.S. nuclear deterrence strategy is supposed to be that the United States can survive a massive nuclear attack and retaliate with great force (so-called assured destruction), why have successive Presidents maintained nuclear capabilities that go well beyond what is required for this goal?

July 5, 2018

The Forgotten Front (Book Review)

This is an important book for theorists and practitioners of counterinsurgency alike. Ladwig, who teaches at King’s College London, begins by pointing out that most U.S. counterinsurgency thinking errs in assuming that the United States will share common goals, interests, and priorities with the local government that it is supporting. As recent experiences in Iraq, Afghanistan, and Pakistan indicate, that assumption should not be taken for granted. In fact, many U.S. elements of strategy applied in counterinsurgency—ending political and military corruption, bolstering political legitimacy by addressing the public’s concerns, engaging in economic reform—may appear just as threatening to the local government’s interests as the insurgency itself. Some local governments’ political and other interests simply do not coincide with those of the United States, and that can lead to tremendous difficulty in convincing them to adopt U.S.-backed reforms. Indeed, Ladwig’s central argument is that the “forgotten front” in these conflicts—the relationship between the United States and local government it is trying to aid—is just as important.

July 5, 2018

Joint Doctrine Update

Joint Doctrine Updates.

July 5, 2018

The U.S. Government’s Approach to Economic Security

This article discusses the importance of economic security, which is the ability to protect and advance U.S. economic interests, shape international interests to suit U.S. policy, and deter non-economic challenges. Because of our increasing dependence on the flow of goods, services, people, capital, information and technology across borders, economic security is vital to U.S. national security. The author argues that combatant commanders and the Joint Force must support whole-of-government efforts by integrating economic security into planning, preparation and training to influence adversarial behavior, maintain order, prepare for relief, and relieve economic insecurity in potential operational areas.

July 5, 2018

Defending the AEF: Combat Adaptation and Jointness in the Skies over France

This article recalls how an untrained cadre of men modified existing French equipment and doctrine to build a small but effective anti-aircraft force during WWI. This history of the A.E.F. Antiaircraft Service highlights how the U.S. military responded to a threat that did not exist a mere decade earlier. In many respects, this type of challenge is familiar to contemporary observers who have watched the Joint Force struggle with intra-service parochialism and the unwillingness to learn from others. Nevertheless, this case history shows what can happen when leaders encourage innovation and adaptation at all levels, top-down, middle-out and bottom-up.

July 3, 2018

Cooking Shows, Corollas, and Innovation on a Budget

This commentary explains how the effects of globalization and rapid advancements in technology have changed the geopolitical power balance. Advances in military technology and the introduction of hybrid threat capabilities have obscured traditional categories of warfare and increased the difficulty of matching capabilities to meet contemporary challenges. For the U.S. to maintain preeminence, says the author, it must develop innovative technological solutions without neglecting other aspects of innovation. For example, the U.S. should invest widely in technology and science, but also create more flexible and adaptive organizations and cultivate leaders prepared to innovate and accept the inherent risk.

July 3, 2018

U.S. Special Operations Command’s Future, by Design

This commentary introduces a new approach to problem-solving developed by the U.S. Special Operations Command (USSOCOM). The USSOCOM Design Way is a fusion of design thinking and military planning, which promotes creativity, critical thinking and innovation, and emphasizes divergent perspectives across the Joint Force. The USSOCOM Design Way goes beyond operations planning and has proven successful dealing with the complexities of resourcing, policy, acquisitions, as well as joint planning and programming. As the authors suggest, this approach has demonstrated appeal across the Joint Force, from the commander to the action officer, in response to a wide range of complex challenges.

July 3, 2018

The Case for Joint Force Acquisition Reform

This article calls attention to the flaws in the Defense Acquisition System (DAS) which promote competition rather than cooperation. The authors argue that the Services are motivated by parochial incentives which do not align with the combatant command structure despite the jointness imposed by the Goldwater-Nichols Act of 1986. In order to empower Combatant Commanders and the Joint Staff with early and direct influence over materiel development, the DAS must be reformed. The Services must act as agents working in alignment with the combatant command structure, and Service procurement budgets must allow for greater flexibility to promote Joint Force development.

July 3, 2018

Transregional Capstone Exercise: Training for Tomorrow’s Fight

This article proposes a Transregional Capstone Exercise to address shortfalls in Joint Force training against potential challenges from Russia, China, Iran, North Korea and others. This article proposes four training objectives and a concise framework for regular exercises to help fulfill the Chairman’s vision for the Joint Force, and satisfy the need for all combatant commanders to anticipate transregional, multifunctional, and multi-domain conflict in a global scenario. Despite the logistical challenges and lack of transregional doctrine, these exercises would set the Joint Force on a trajectory to defend the U.S. against the transregional threats of tomorrow.

July 3, 2018

568 Balls in the Air: Planning for the Loss of Space Capabilities

This article explores the integration of space capabilities and explains the strategic, operational and tactical risks the U.S. military has assumed as a result. The authors recommend that joint warfighters of the future begin to prepare now, with continuity plans when space is denied, degraded or disrupted. Failure to consider such risk factors could lead to severe degradation of U.S. military capability with disastrous results. Measured in terms of lives lost, such a failure would be reminiscent of wars fought in the pre-digital age. However, losses on this scale are simply unacceptable, especially when this risk can be mitigated.

July 3, 2018

The Future of the Aircraft Carrier and the Carrier Air Wing

What is the future of the aircraft carrier for the U.S. Navy? Based on a variety of threats ranging from computer systems vulnerable to hacking, China’s latest ballistic missiles, the proliferation of quiet attack submarines and the spread of nuclear weapons, you could argue the carrier may someday become obsolete. Others predict that carriers will continue to perform many of the same missions as they’ve always done. In any case, the U.S. Navy should rethink joint warfighting concepts in strategic as well as technological terms and figure out what this means for the carrier fleet and associated carrier wings.

July 3, 2018

Strategic Shaping: Expanding the Competitive Space

This article presents a new concept called Strategic Shaping, an integrated whole-of-government approach which targets an adversary’s strategic intentions, disrupts their political calculus, and thus deters them from military action. The idea is to present multiple, complex dilemmas to an adversary’s leadership and remove their sense of control over the situation. Strategic Shaping will help the U.S. defense establishment maintain military advantage prior to or during a crisis with major competitors such as China and Russia, both of whom have recently exploited advantages below the threshold of armed conflict to accomplish their strategic objectives.

July 3, 2018

Intelligence in a Data-Driven Age

In this article, the authors explore alternative methods to create long-term competitive advantage by increasing collaboration between the intelligence community and machines, with an emphasis on artificial intelligence and machine learning. The intelligence community is battle-trained if overworked as a result of continuous operations since 2001, and its technological advantage may be at risk because intelligence systems are collecting data in too many disconnected and diverse formats, and relying on systems that are disconnected, non-standard or inaccessible. Nonetheless, artificial intelligence and machine learning will be instrumental to increase the effectiveness of future intelligence analysts and to sustain our competitive advantage.

July 3, 2018

Executive Summary

How well does the U.S. military transform? When are the best time and circumstances to change how the joint force does business? In search of some answers, I came across a short but powerful article written a few years ago by two consultants to the United Kingdom Ministry of Defence, David Chinn and John Dowdy. They conducted a survey in December 2014 of “almost 1,000 leaders and senior employees in more than 30 U.S. Government agencies and found that only 40 percent believed that their transformation programs succeeded.” Even though these results do not seem heartening to those “change agents” among us, their research suggests how to change one’s military even in a period of budgetary pressure, as was recently experienced in Europe and the United States. In fact, as of this writing, the Budgetary Control Act (or so-called sequestration) is still in force, but the Department of Defense budgetary outlook is fairly bright. So, if we needed to do some thinking when money was tight, should these suggestions not be applied as the situation improves? Let’s take a minute to see if this is the case.

May 18, 2018

Improving Our CWMD Capabilities: Who Will Lead?

The current DOD CWMD strategy positions the Department to meet national policy objectives for which it is not resourced, reflecting a failure at the national level to scope the challenge as something other than a technical issue and to oversee the execution of WMD-related tasks throughout the whole-of-government. In part, this is because the term “WMD,” which once had specificity in the arms control community, has been reduced to a political buzzword. This further reflects the need to define what DOD sees as important CWMD activities.

May 15, 2018

An Interview with Congressman James R. Langevin

When I first came into Congress, we were still in that transition phase of going from a relatively calm and stable, bipolar world with the United States and the Soviet Union as chief adversaries. We were just entering the multi-polar world in which we live and the world became much more paradoxically unstable and the threats became more involved and grew. I came in around 2000—before 9/11—and none of us could have anticipated how the world would change so dramatically, on that date in particular, and later morph into other threats and challenges.

May 15, 2018

The Darkest Sides of Politics, II: State Terrorism, "Weapons of Mass Destruction," Religious Extremism, and Organized Crime (Book Review)

In this companion to his first volume on Postwar Facism, Covert Operations, and Terrorism, Jeffrey Bale explores the influence of some of the world’s most pressing security concerns through a review of global case studies on weapons of mass destruction (WMD), violent extremism, and organized crime. Bale is thorough in his selection and treatment of the cases, using primary sources whenever available and delivering an “intentionally robust” text to provide an alternative to what he describes in the volume’s preface as often unqualified opinions taking the guise of academic works. Based on decades of research in violent extremism, Bale reviews select works and either updates their findings, or acknowledges their currency. State Terrorism, "Weapons of Mass Destruction," Religious Extremism, and Organized Crime is dense with explanations and structured expositions, but the volume offers a good model for how to convey conclusions that are framed by evidence.

May 15, 2018

The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes (Book Review)

Nathan E. Busch and Joseph F. Pilat in their book The Politics of Weapons Inspections: Assessing WMD Monitoring and Verification Regimes draw attention to the important role that politics can play within weapons of mass destruction (WMD) verification, but the title promises more than the authors deliver. The authors analyze three cases of disarmament using inspections (South Africa, Iraq, and Libya); examine how the verification of global nuclear disarmament might or might not work; and apply the book’s lessons to what they term difficult cases, which may be subject to future inspections (North Korea, Iran, and Syria). The studies provide a useful survey and side-by-side comparison of the successes, pitfalls, and likely future challenges of efforts to verify individual state compliance with WMD agreements. The authors on occasion fail to place the case studies within a broader geopolitical context, leaving important gaps in their analysis, which makes for an uneven read. As an example, the authors point to shortfalls in multilateral verification regimes without fully assessing how these regimes are limited and sometimes hamstrung by the external and internal politics of sovereign states.

May 15, 2018

The CWMD Strategy Gap

During the past 15 years, countering–WMD (CWMD) has been a top priority as expressed throughout multiple national and department-level strategy and policy documents, to include the National Security Strategy (NSS); the National Military Strategy (NMS); the National Defense Strategy (NDS); the Defense Strategic Guidance (DSG); and Quadrennial Defense Review (QDR). While a prevention strategy is laudable and important, the disparity between strategy and the required operational capabilities and capacities needed for securing, interdicting, and eliminating WMD reveals potential gaps that must be recognized and accounted for to ensure a credible deterrent posture. Future threats, especially biological, are likely to be more complicated than current or past conceptions.

May 15, 2018

North Korea's CBW Program: How to Contend with Imperfectly Understood Capabilities

Biological weapons programs tend to be among the most closely guarded weapons programs in a country’s arsenal. By contrast, extensive documentation and histories of nuclear weapons programs exist for virtually all the known weapons states as well as those that abandoned such programs. In recent years, while North Korea (formally the Democratic People’s Republic of Korea or DPRK) has gone to great lengths to demonstrate to the world its nuclear and missile programs, the country has hidden whatever CBW it may possess. As the international community grapples with how to reduce tension on the Peninsula, re-assessing what is known about North Korea’s CBW program and considering options to minimize their role in the regime’s security calculous is an important addition to the complex set of issues that U.S. civilian and military leaders must consider. This article attempts to put in context what little is known about North Korea’s capabilities and offer some measures that might be taken to help curtail those capabilities.

May 15, 2018

"The Irreducible Minimum" An Evaluation of Counterterrorism Operations in Iraq

Surprise is a constant in war. But the surprise experienced by TF–714 in Iraq proved to be a major challenge even for an organization comprised of units that excelled at tactical adaptation. Consequently, TF–714’s initial response was to do more of what it already did extremely well. “The initial response,” explained General McChrystal in a 2014 interview, was that “we will just do more of what we are already very good at and then we would have done our part.” What became evident to the task force leadership, however, was that a “more of the same” response was not going to have a meaningful impact on AQI. To be sure, those operations that TF–714 executed were highly successful. The problem was there were not enough of them. They had, at best, only a limited impact on AQI’s operational tempo. The Task Force was facing an enemy it had never envisaged and could not degrade through its existing ways of operating.

May 15, 2018

The State of the Art in Contemporary CWMD Thinking

To effectively counter-WMD networks, the USG must bring to bear its full arsenal of capabilities, authorities, and permissions in a coordinated manner. As A.Q. Khan's story and September 11 demonstrate, exclusive use of the old tools—analysis, planning, functionally-organized sector-based agencies—in a complex environment has proven not only inadequate, but dangerous.

May 15, 2018

The Forensic Challenge

The suspected use of chemical, biological, radiological, and nuclear (CBRN) weapons or materials adds complexity to any international or internal conflict. It is critical that responses to such use are based on good information. The relatively new field of CBRN forensics, which is emerging out of domestic terrorism investigations, seeks to establish scientific facts through analysis of rigorously collected evidence. CBRN forensics are important to establishing actual facts, but are inherently difficult for a variety of reasons. The question of whether military forces, particularly Special Operations Forces (SOF), can conduct CBRN forensics in an adequate fashion is debatable; however, there are numerous pathways to improve the status quo.

May 15, 2018

WMD Terrorism: The Once and Future Threat

The specter of terrorists and other violent non-state actors acquiring weapons of mass destruction is perhaps an even greater concern than acquisition of weapons of mass destruction (WMD) by states. This over-magnification, however, ignores the hurdles inherent in such malignant enterprises. Despite clear interest on the part of some non-state adversaries, a true WMD is at present likely out of their reach in all but a select set of scenarios. Changes in technology, however, could augur a dramatic shift in the WMD terrorism threat picture.

May 15, 2018

Nuclear Terrorism: Did We Beat the Odds or Change Them?

Preventive actions taken since 2004, both in counterterrorism and in counterproliferation, have been extraordinary. From the decimation of al-Qaeda to the Iran Deal and the Nuclear Security Summits, difficult actions taken by courageous and hard-working Americans and others have prevented the future we feared. For all of these successes, however, there have been a matching number of failures and structural shifts that are increasing the risk of successful mega-terrorist attacks. To put it metaphorically, while there can be no doubt that we have been running faster, we have also been falling further behind. I still believe that the chance of an attack during the next decade is slightly greater than even. But there is a lengthy agenda of actions that the United States and other nations could take today to reduce this risk and even reverse trend lines moving in the wrong direction.

May 14, 2018

Dirty War: Rhodesia and Chemical Biological Warfare 1975-1980 (Book Review)

Glenn Cross’s Dirty War: Rhodesia and Chemical Biological Warfare 1975–1980 is a welcome addition to the small, but growing scholarly literature on the history of chemical and biological warfare. In 1965, the minority white community in the British territory of Rhodesia (officially Southern Rhodesia) rejected demands that it transfer political power to the majority black population. By the mid-1970s, white Rhodesians found it increasingly difficult to counter the growing power of native African nationalists fighting the government. As with many insurgencies, the guerrillas lacked the resources to defeat government security forces in direct combat, but Rhodesian forces were stretched too thin to suppress the insurgents, especially once they had established base camps in neighboring countries. Amidst the conflict, Rhodesian military and intelligence services employed what would now be considered chemical and biological agents against the guerillas with unknown results.

May 14, 2018

The Age of Lone Wolf Terrorism (Book Review)

The Age of Lone Wolf Terrorism by Mark S. Hamm and Ramon Spaaij provides the national security professional with an exceptional overview and appreciation of this growing problem facing the United States and its partners. Detailed in their compilation of the 123 incidents of lone wolf terrorism from 1940–2016, the authors examine the incidents against 20 variables to help identify trends in backgrounds, modus operandi, and motivations. Hamm and Spaaij, a professor of criminology and a sociologist respectfully, then devise a radicalization model that provides an evidence-based explanation for select case studies of lone wolf terror incidents.

May 9, 2018

Perils of the Gray Zone: Paradigms Lost, Paradoxes Regained

There is a world war under way, waged in hot, cold, and cool modes. The aggressors see no gray zone “between war and peace.” They see all as war. So must we.

April 25, 2018

Read the Latest Issue of Joint Force Quarterly From NDU Press

The newest issue of Joint Force Quarterly is now online. This edition brings a range of important articles from the Joint Staff and U.S. Central Command (USCENTCOM).

April 19, 2018

Paradigm Change: Operational Art and the Information Joint Function

The need for this addition to the joint functions has become increasingly obvious to military leaders over time. It reveals itself in the difficulty of addressing gray zone challenges. During a recent effort by the Joint Staff to update Joint Publication (JP) 3-13, Information Operations, leaders recognized that the joint force was already attempting to use information as a function and that the time to institutionalize information as a function was therefore overdue.

April 19, 2018

Globally Integrated Exercises: Optimizing Joint Force C2 Structure

The limitations in the Globally Integrated Exercise construct should not dissuade its utilization. Like any new concept, it requires the necessary time, space, and iterations to meet the Chairman’s intent. There is no shortage of recommendations for tackling the globally integrated operations challenges.

April 17, 2018

Preparing for Tomorrow’s Fight: Joint Concepts and Future Readiness

Military forces that quickly adapt to change usually prevail. It is difficult to adapt in the near term, more so when there is an extended time horizon, but not adapting can exact a heavy toll in blood and treasure. The high cost of not adjusting to new situations underlies the stereotypical conservatism of military organizations, and it is borne in their propensity to lean heavily on the lessons of the last war and eschew radical change. But those who do not try to anticipate change risk surrendering the initiative on the future battlefield.

April 17, 2018

A New Approach to Joint Concepts

The future operating environment will feature broad changes in the character of warfare. Driven by the rise of competent and competitive states; economic, social, and environmental challenges; and rapidly evolving technologies, these changes will necessitate innovation within the Department of Defense (DOD). Innovation must develop and employ new capabilities, organizational constructs, and approaches to warfighting to maintain competitive advantage over a broad range of potential adversaries.

April 13, 2018

Joint Doctrine Updates

Joint Doctrine Updates.

April 13, 2018

The U.S. Government’s Approach to Environmental Security: Focus on Campaign Activities

This article continues the discussion on human security’s1 seven relevant dimensions: economic, food, health, environmental, personal, community, and political.2 Complementing previous Joint Force Quarterly installments on health and food security,3 the following describes the U.S. Government’s approach to environmental security with a focus on combatant commander campaign activities.

April 13, 2018

Exploring the Future Operating Environment

As we move past the plan of the day, proceed outside of the budget cycle, and venture beyond the 10-year horizon of strategic planning efforts, significant ongoing changes in the security environment will alter the character of warfare beyond recognition.

April 13, 2018

America’s First General Staff (Book Review)

This trim book explains the full course of the U.S. Navy’s General Board, its institutional forum for innovation, during the period from 1900 to 1950. To remedy challenges identified during the Spanish-American War, Navy Secretary John D. Long established the board as an experiment. The Secretary realized he needed military advice, so he chose a mix of up-and-coming Navy officers, the head of the Bureau of Navigation that managed careers, and one Marine officer, all led by the redoubtable Admiral George Dewey, to offer it.

April 13, 2018

Anatomy of a Campaign (Book Review)

John Kiszely had an outstanding career in the British army. As a major, he won the Military Cross while leading his company of Scots Guards in the attack on Tumbledown Mountain in the last days of the Falklands War. During his career, he served in the bureaucracy in Whitehall as the Assistant Chief of the Defence Staff and served stints in British operations in Northern Ireland, Bosnia, and Iraq, finally retiring as a lieutenant general. He has seen war at both ends: the hard, sharp end of combat and the making and coordinating of policy and operations.

April 13, 2018

Illusions of Victory (Book Review)

In Enforcing the Peace: Learning from the Imperial Past (Columbia University Press, 2006), Kimberly Zisk Marten recounts the dismal record of Western military interventions that could achieve temporary stability but not foster any lasting political change. Her solution is to lower expectations while extending presence; outsiders cannot shape the course of internal political change but can maintain security for the lengthy period required for equilibrium to be restored after a society is disrupted.

April 12, 2018

Continuing the Big Data Ethics Debate: Enabling Senior Leader Decisionmaking

In the coming years, each Service will likely pursue a human capital data analytics solution set that best meets its needs. Regardless of each Service’s chosen path, the paramount requirement before us all is to create systems that balance the data analytic needs of leaders while strengthening the bond of trust with our Servicemembers.

April 12, 2018

Structuring Airpower to Win in 2030: Designing a Joint Division of Labor Between Land- and Sea-Based Combat Aviation

The lessons learned during nearly a decade of concept development must be translated into a joint force structure capable of defeating antiaccess/area-denial (A2/AD) and preserving America’s power projection advantage. However, such a force structure will only be effective if it is pursued through a joint approach to acquisitions.

April 12, 2018

Climate Change and Urbanization: Challenges to Global Security and Stability

Two global trends that present monumental new challenges for civil-military coordination in humanitarian crises are urbanization—the growth of cities across the world—and climate change. The following article explains how these two trends and their interactive effects will increasingly complicate and test civil-military coordination in humanitarian crises.

April 12, 2018

The Importance of Lessons Learned in Joint Force Development

The importance of gathering, developing, and disseminating joint lessons learned cannot be overemphasized. Today, we need real-world lessons learned by the deployed young officer who is experiencing what works, what does not, and what could—if certain changes were made. This is mission of the Joint Staff Joint Force Development Directorate’s Joint Lessons Learned Division (JLLD).

April 12, 2018

A Holistic Approach to Problem-Solving

Despite George Santayana’s warning—“Those who do not remember the past are condemned to repeat it”—we continue to forget what we have learned and fall into bad habits. Although we have already determined better ways to make decisions and solve problems, we tend to forget them.

April 12, 2018

Why Not a Joint Security Force Assistance Command?

The David L. Boren National Security Education Act of 1991 provides that the future national security and economic well-being of the United States will depend substantially on the ability of its citizens to communicate and compete by knowing the languages and cultures of other countries. Consistent with the law, implementation guidance over the years has been clear, and increasingly more urgent.

April 12, 2018

Laying the Foundation for a Strategic By-With-Through Approach

Logistics interoperability is critical to the future success of global operations responding to transregional threats, but it requires dedicated efforts in logistics security cooperation to build the foundation for a strategic BWT approach.

April 12, 2018

Sacrifice, Ownership, Legitimacy: Winning Wars By, With, and Through Host-Nation Security Forces

Speed and tactical efficiency do not win civil conflict; host-nation legitimacy combined with eventual tactical victory does. These facts necessitate a conditions-based approach.

April 12, 2018

Fighting the Islamic State By, With, and Through: How Mattered as Much as What

In January 2017, the 2nd Brigade Combat Team, 82nd Airborne Division, deployed to bolster the Iraqi Security Forces (ISF) in the campaign to annihilate the so-called Islamic State. How we advised ISF commanders was as important as what we advised them to do in order to win.

April 12, 2018

The By-With-Through Approach: An Army Component Perspective

Land forces in U.S. Central Command have adopted an operational approach of “by, with, and through” (BWT) to achieve this endstate. This article provides the USARCENT perspective on how it accomplishes its mission with BWT as the operational approach and demonstrates the need for the joint force to come to a common understanding of what executing operations within a BWT operational approach, and all associated terms, means.

April 12, 2018

The By-With-Through Operational Approach

The U.S. military must organize, resource, and train the joint force to operate by, with, and through with greater efficiency and effectiveness with various types of partners and whole-of-government involvement. Executing this approach in current and future multipolar and resource-constrained environments requires common understanding and the development of joint force doctrine.

April 12, 2018

From the Chairman: The Character of War and Strategic Landscape Have Changed

Over the past two decades, the strategic landscape has changed dramatically. While the fundamental nature of war has not changed, the pace of change and modern technology, coupled with shifts in the nature of geopolitical competition, have altered the character of war in the 21st century. To keep pace with the changing character of war, we must globally integrate the way we plan, employ the force, and design the force of the future.

April 12, 2018

Outmatched Shortfalls in Countering Threat Networks

Understanding how adversaries use threat networks globally to compete with us below the threshold of traditional armed conflict is a critical first step to identifying opportunities to exploit, disrupt, or degrade threat networks. However, the increasing convergence of legitimate and illicit networks complicates our ability to gain the level of understanding required to do this effectively.

April 12, 2018

Moore’s Law and the Challenge of Counter-sUAS Doctrine

In 1965, Gordon Moore, co-founder of the Intel Corporation, made his now famous prediction that the “number of transistors incorporated in a chip will approximately double every 24 months.” More than 50 years later, his prediction has not only held true, but also the implications of what is now called Moore’s Law define the combat environment for the joint force. The continual miniaturization, mass production, proliferation, and improvement of integrated circuits and microprocessors have introduced powerful computing technology into every aspect of modern life.

April 11, 2018

The Practical Implications of Information as a Joint Function

The integration of the Information as a Joint Function (IJF) with the other six joint functions offers new opportunities for developing and conducting operational art and design. IJF will result in the development of executable plans to deal with future conflicts that are TMM in nature. The ultimate result will be that joint force commanders are able to dominate the informational aspect of their operating environment (the IE) the same way they dominate land, sea, air space, and cyberspace.

April 11, 2018

Introducing Information as a Joint Function

In July 2017, the Chairman of the Joint Chiefs of Staff issued a change to Joint Publication (JP) 1, Doctrine for the Armed Forces of the United States, introducing information as a new and seventh joint function. This issuance portends significant changes in how the joint force will plan and execute transregional, multidomain, and multifunctional operations. As such, it represents an opportunity to reimagine what “combined arms” means in 21st-century warfare.

April 11, 2018

Executive Summary

What kind of force does the United States need in order to meet its mission of protecting the Nation? How do we preserve our working relationships with allies and partners? What about the ongoing issue of readiness needs versus force modernization? No matter how the future turns out, the United States and the joint force will continue to be central elements of how the world is shaped.

March 1, 2018

Technology and National Security: The United States at a Critical Crossroads

Globalization of science and technology, emerging and unpredictable threats (both manmade and natural), conventional and emerging weapons of mass destruction, and an inversion of technology flow from the private to public sectors all present challenges to our national security.

Feb. 1, 2018

Low-Cost Access to Space: Military Opportunities and Challenges

Space activity is critical to the American way of war. The commercialization of space has potentially radical implications for U.S. national security through its impact on a range of military and intelligence functions and on the ability of the nation to effectively project power around the globe.

Jan. 10, 2018

Joint Doctrine Update

Joint Doctrine Update.

Jan. 10, 2018

Born Multinational: Capability Solutions for Joint, Multinational, and Coalition Operations

U.S. military operations are conducted in a multinational environment. Given the Chairman of the Joint Chiefs of Staff’s emphasis on working with allies and other international partners, there are many advantages to certain capabilities being born multinational. A multinational development team offers the benefits of both inherent interoperability and a broad set of perspectives, insights, and knowledge sources.

Jan. 10, 2018

Department of Defense Terminology Program

The Department of Defense (DOD) Terminology Program was formalized in 2009 by the Office of the Secretary of Defense (OSD) and falls under the responsibility of the Chairman of the Joint Chiefs of Staff (CJCS).1 The program is overseen by the director of Joint Force Development (DJ7) to improve communications and mutual understanding through the standardization of military and associated terminology within DOD, with other U.S. Government departments and agencies, and between the United States and international partners. It includes U.S. participation in North Atlantic Treaty Organization (NATO) terminology development as well as other terminology forums.

Jan. 10, 2018

A COG Concept for Winning More Than Just Battles

While current U.S. doctrine makes the center of gravity (COG) concept the centerpiece in operational planning, there is a broad call for either revising or killing the concept. However, if the COG concept is to remain the centerpiece in military planning, it must not only help link actions, effects, and objectives but also link the JFC level of command with the national strategic level of command.

Jan. 10, 2018

Social Science Goes to War: The Human Terrain System in Iraq and Afghanistan

The gap between academia and the military has existed at least since the early 1960s, when Project Camelot crystallized political opposition to the American military/security apparatus by activist academicians. As a result, the military/security community established its own think tanks, designed to replicate social and hard science capabilities, reducing the political noise and fallout inherent in the engagement with a potentially hostile academic community. On the other side of the divide, many academics reacted with anger to social scientists engaged in military activity, political beliefs fusing with concerns of academic freedom and fanned with the flames of opposition to the Vietnam War in what they saw as colonialism and rampant militarization of American society.

Jan. 10, 2018

Elite Warriors: Special Operations Forces from Around the World

Special operations forces (SOF) have existed in some form and played roles in warfare since the advent of conventional military operations. For example, in biblical times, King David had a special forces platoon. World War II brought growth, greater recognition, and prestige for special forces like the British Commandos, Special Air Service, and the American Office of Strategic Services. The last two decades have witnessed explosive growth in various forms of unconventional or SOF.

Jan. 10, 2018

Unwinnable: Britain’s War in Afghanistan, 2001–2014

For years, the British enjoyed a reputation of counterinsurgency excellence. Their campaigns—Malaya, Kenya, Oman, Northern Ireland—were hailed as successes in this difficult form of war. Afghanistan, however, turned out to be painful for the British. They committed a peak of over 9,500 troops, eventually drawing down to a few hundred by the end of 2014. They faced numerous battlefield reverses. Eventual successes were overshadowed by the arrival of 20,000 U.S. Marines. Britain’s counterinsurgency reputation came out of the campaign tarnished.

Jan. 10, 2018

Implementing Guidance for Security Cooperation: Overcoming Obstacles to U.S. Africa Command’s Efforts

U.S. Africa Command’s lack of operationalization of its security cooperation processes, combined with the sheer size of its area of responsibility and the significant changes with the new NDAA, create unique challenges. This article outlines four main areas where USAFRICOM can improve its efforts to operationalize and synchronize its security cooperation efforts.

Jan. 10, 2018

Achieving Secrecy and Surprise in a Ubiquitous ISR Environment

As foreign and commercial intelligence, surveillance, and reconnaissance capabilities proliferate, our ability to leverage secrecy and surprise for battlefield advantage is in danger of being severely degraded or lost altogether. We must take prudent near-term steps to address this concern.

Jan. 10, 2018

Joint Integrated Air and Missile Defense: Simplifying an Increasingly Complex Problem

As the complexity of air, cruise, and ballistic missile threats quickly evolves over the next 10 to 20 years, DOD must find a less complicated way to rapidly develop and integrate the Services’ integrated air and missile defense capabilities and employ them across the combatant commands boundaries.

Jan. 10, 2018

Geographic Component Network Analysis: A Methodology for Deliberately Targeting a Hybrid Adversary

As the nature of the adversaries the U.S. military engages on the battlefield changes, so must our thinking on how to systematically analyze and degrade their centers of gravity. Geographic component network analysis (GCNA) enables more rapid analysis of a hybrid enemy in a focused, systematic manner to degrade the adversary’s capability to effectively govern and project combat power from defined territorial strongholds.

Jan. 10, 2018

Scipio Africanus and the Second Punic War: Joint Lessons for Center of Gravity Analysis

Scipio Africanus’s European and African campaigns during the Second Punic War serve as timeless lessons for joint force planners on how to conduct center of gravity (COG) analysis in support of theater and national military planning.

Jan. 10, 2018

The Need for an Innovative Joint Psychological Warfare Force Structure

There has never been a greater historical need and better opportunity to create a strategic joint influence organization and subsequent total joint influence force structure. A unified joint influence force would be able to support and defend the Nation’s strategic interests against all propaganda efforts coming from the likes of adversarial states and nonstate actors well into the foreseeable future.

Jan. 10, 2018

Multidomain Battle: Converging Concepts Toward a Joint Solution

As advancements in cyber continue to accelerate and proliferate across multiple domains, and as our potential adversaries adjust their strategies by utilizing these advancements asymmetrically in order to counter our strengths, we can no longer develop domain-specific solutions that require time and effort to synchronize and federate.

Jan. 9, 2018

The Bureaucratization of the U.S. Military Decisionmaking Process

Is risk management overemphasized in the decisionmaking process? Is caution more valued than boldness in action?

Jan. 9, 2018

Surfing the Chaos: Warfighting in a Contested Cyberspace Environment

To win in the new cyber-contested battles of the future, a combatant must still command, but let go of control and surf the chaos.

Jan. 9, 2018

The Power of Partnership: Security Cooperation and Globally Integrated Logistics

Logistics ought to be substantially integrated into security cooperation efforts, and security cooperation ought to be thoughtfully integrated into the discipline of logistics. While this premise may seem obvious, it is too often overlooked or misunderstood.

Jan. 9, 2018

Multidomain Battle: Time for a Campaign of Joint Experimentation

Concepts on the scale of multidomain battle (MDB) require a campaign of experimentation that provides compelling evidence for the concept by fleshing out its operational and institutional contexts.

Jan. 9, 2018

The Future Is Plural: Multiple Futures for Tomorrow's Joint Force

Multidimensional challenges cannot rely on dartboards or algorithms fed by Big Data. The central question for senior leaders in defense is improving their assessment of risk in ambiguous contexts.

Jan. 9, 2018

Executive Summary

War exacts a toll over time unlike any other human experience. And meeting the demands of combat takes more than one individual’s effort, budget, and ideas to succeed. The joint force has to adapt, adjust, acquire, repurpose, retrain, recruit, and perform a whole range of other functions to continue to meet the mission of protecting our Nation, allies, and partners around the world.

Dec. 21, 2017

Battlefield Geometry in our Digital Age: From Flash to Bang in 22 Milliseconds

This year has been tough for cybersecurity programs. Every month in the first six months of 2017, the world experienced a major cyber event. Open-source attacks included attacks on critical infrastructure, banks, intelligence services, and significant commercial and government entities. Indeed, reflecting on the scope and depth of most publically acknowledged compromises, uncovers the reality of the tremendous and growing risks the country faces nearly two decades into the 21st century. Everything seems to have changed. Virtually every organization within the Department of Defense (DOD) has, sometimes reluctantly, come to embrace digital age technology, to the point that they are completely dependent on it. The result is a shocking degree of paralysis when our access to the services we now rely upon is disrupted.