-
The Army Role in Achieving Deterrence in Cyberspace
Jeffrey L. Caton
In 2015, the Department of Defense (DoD) released the DoD Cyber Strategy which explicitly calls for a comprehensive strategy to provide credible deterrence in cyberspace against threats from key state and nonstate actors. To be effective, such activities must be coordinated with ongoing deterrence efforts in the physical realm, especially those of near-peers impacting critical global regions such as China in the Asia-Pacific region and Russia in Europe. It is important for the U.S. Army to identify and plan for any unique roles that they may provide to these endeavors. This study explores the evolving concept of deterrence in cyberspace in three major areas:
• First, the monograph addresses the question: What is the current U.S. deterrence posture for cyberspace? The discussion includes an assessment of relevant current national and DoD policies and concepts as well as an examination of key issues for cyber deterrence found in professional literature.
• Second, it examines the question: What are the Army’s roles in cyberspace deterrence? This section provides background information on how Army cyber forces operate and examines the potential contributions of these forces to the deterrence efforts in cyberspace as well as in the broader context of strategic deterrence. The section also addresses how the priority of these contributions may change with escalating levels of conflict.
• Third, the monograph provides recommendations for changing or adapting the DoD and Army responsibilities to better define and implement the evolving concepts and actions supporting deterrence in the dynamic domain of cyberspace. -
Conventional Deterrence and Landpower in Northeastern Europe
Alexander Lanoszka Dr. and Michael A. Hunzeker Dr.
The United States and the North Atlantic Treaty Organization (NATO) face daunting challenges in the Baltic region. Russia is behaving aggressively. Its military is more capable than it has been at any point since the end of the Cold War. More importantly, Russia is finding creative ways to subvert the status quo and to sow discord without triggering Article 5 of NATO, which declares that an attack against one member is an attack against all.These problems are formidable, but we have reason to be optimistic. Far from shattering NATO’s cohesion and undermining its resolve, Russian aggression has reinvigorated the alliance. Nor is Russia an unstoppable adversary. It has many weaknesses. Indeed, Russian fears over those vulnerabilities might be driving its aggressive foreign policy. Even if this is not the case and Russia is indeed a relentless predator, it is nevertheless a vulnerable one.
The United States and its NATO allies can take advantage of these vulnerabilities. After assessing Russian intentions, capabilities, and limitation, this monograph recommends a hedging strategy to improve early detection capabilities, enhance deterrence in unprovocative ways, and improve regional defenses against a hybrid threat. Achieving these goals should help the United States deter Russia and reassure regional allies more effectively while managing our own worst fears.
-
What Next for Russia’s Front-Line States?
Keir Giles Mr.
Russia’s annexation of Crimea and intervention in Eastern Ukraine in 2014, alarmed not only Western-leaning states in Central Europe and the Baltic but also Moscow’s traditional allies. These events signaled that Moscow is now willing and capable of using direct military force against perceived strategic threats in its self-proclaimed region of vested interests. With the exception of Ukraine and the Baltic States, this Letort Paper examines how Russia’s front-line states have adjusted their foreign policy posture since 2014. Belarus, Moldova, the states of Central Asia and the South Caucasus calculate the benefits and risks in their relationship with Moscow and either make concessions or strengthen their defenses accordingly to avoid triggering a Russian reaction. This Letort Paper provides a range of policy recommendations intended to maximize the opportunities of a new alignment with the West for these states while minimizing the risk of Russia, using again, those capabilities it has demonstrated in Ukraine and Syria. -
Implications of Service Cyberspace Component Commands for Army Cyberspace Operations
Jeffrey L. Caton
The first 7 years of U.S. Cyber Command operations are paved with milestones that mark the steady operationalization of modern cyberspace as the newest domain of military conflict as well as a realm of international power. The creation of the Cyber Mission Force and Joint Force Headquarters-Cyber are significant steps toward improving the timeliness and effectiveness of cyberspace operations that directly support combatant commands and the whole-of-government responses to cyberspace threats. It focuses on the central question: “What is the context in which different military services approach cyberspace component operations internally as well as with the Department of Defense?” -
Contemporary Chemical Weapons Use in Syria and Iraq by the Assad Regime and the Islamic State
Robert J. Bunker Dr.
This monograph focuses on an understudied, but yet a critically important and timely component of land warfare, related to the battlefield use of chemical weapons by contemporary threat forces. It will do so by focusing on two case studies related to chemical weapons use in Syria and Iraq by the Assad regime and the Islamic State. Initially, the monograph provides an overview of the chemical warfare capabilities of these two entities; discusses selected incidents of chemical weapons use each has perpetrated; provides analysis and lessons learned concerning these chemical weapons incidents, their programs, and the capabilities of the Assad regime and the Islamic State; and then presents U.S. Army policy and planning considerations on this topical areas of focus. Ultimately, such considerations must be considered vis-à-vis U.S. Army support of Joint Force implementation of National Command Authority guidance.
-
Examining the Roles of Army Reserve Component Forces in Military Cyberspace Operations
Jeffrey L. Caton
Cyberspace operations have become pervasive in the United States, and they enable many aspects of modern life for the average citizen, such as entertainment, communication, education, transportation, banking, and voting. The continuing development of the U.S. Army and Department of Defense (DoD) Reserve component cyberspace units can leverage the capabilities and experience of industry and academia to help protect critical information infrastructure and enhance national security. What opportunities and challenges surround the integration of these forces into a still-evolving joint cyberspace force? -
Scenario Planning and Strategy in the Pentagon
Michael Fitzsimmons Dr.
Scenario planning should be one of the Pentagon’s most important tools for developing strategy for an uncertain future. However, the formalized joint scenario planning process to support strategy and force development—Support for Strategic Analysis—has faced many challenges over the past 2 decades, and has ultimately proven less influential than intended on strategic decision-making. Explaining why is the main purpose of this monograph. It argues that scenario analysis has been most effective in supporting capability and program development, while it has fallen short in shaping strategy and force structure. The reasons for this are numerous and are rooted in intrinsic, structural characteristics of decision-making in large organizations. The monograph concludes with several recommendations for rejuvenating scenario planning in the Pentagon.
-
The U.S. Army in the Iraq War – Volume 1: Invasion – Insurgency – Civil War, 2003-2006
Joel D. Rayburn COL and Frank K. Sobchak COL
The Iraq War has been the costliest U.S. conflict since the Vietnam War. To date, few official studies have been conducted to review what happened, why it happened, and what lessons should be drawn. The U.S. Army in the Iraq War is the Army’s initial operational level analysis of this conflict, written in narrative format, with assessments and lessons embedded throughout the work. This study reviews the conflict from a Landpower perspective and includes the contributions of coalition allies, the U.S. Marine Corps, and special operations forces. Presented principally from the point of view of the commanders in Baghdad, the narrative examines the interaction of the operational and strategic levels, as well as the creation of theater level strategy and its implementation at the tactical level. Volume 1 begins in the truce tent at Safwan Airfield in southern Iraq at the end of Operation DESERT STORM and briefly examines actions by U.S. and Iraqi forces during the interwar years. The narrative continues by examining the road to war, the initially successful invasion, and the rise of Iraqi insurgent groups before exploring the country’s slide toward civil war. This volume concludes with a review of the decision by the George W. Bush administration to “surge” additional forces to Iraq, placing the conduct of the “surge” and its aftermath in the second volume.
This study was constructed over a span of 4 years and relied on nearly 30,000 pages of hand-picked declassified documents, hundreds of hours of original interviews, and thousands of hours of previously unavailable interviews. Original interviews conducted by the team included President George W. Bush, Secretary of State Condoleezza Rice, Secretaries of Defense Leon Panetta and Robert Gates, Chairmen of the Joint Chiefs of Staff, and every theater commander for the war, among many others. With its release, this publication, The U.S. Army in the Iraq War, represents the U.S. Government’s longest and most detailed study of the Iraq conflict thus far.
NOTICE: Due to the high cost of printing, only a limited numbers of hard copies of The U.S. Army in the Iraq War will be produced. These copies will be distributed primarily to military educational institutions across the Joint force. Hardcopies of the study can be acquired through the Government Printing Office Bookstore. Organizations and individuals will be able to order printed copies. Both volumes of The U.S. Army in the Iraq War are available for pre-order through the GPO Bookstore. Volume 1 can be found here. And Volume 2 can be found here.
ADDENDUM: The U.S. Army Heritage and Education Center (USAHEC) has no archive of declassified documents except for the declassified documents from U.S. Central Command (USCENTCOM) posted online here. USAHEC does not have the authority to declassify or to review OIF sources for release.
-
US Army in the Iraq War Volume 2 Surge and Withdrawal
Jeanne F. Godfroy, James S. Powell, Matthew D. Morton, and Matthew M. Zais Joel D. Rayburn and Frank K. Sobchak
-
Maneuvering the Saudi-Iranian Rivalry in the Middle East: How the United States Can Preserve and Protect Its Long-Term Interests in the Region
Gregory Aftandilian Mr.
This monograph examines the conflicts in the Middle East region between Saudi Arabia and Iran and the so-called proxy wars that are being fought between them, and discusses ways that the United States needs to maneuver carefully in this struggle to preserve its long-term interests in the area. Although Washington has political, economic, and strategic equities with Riyadh, it needs to think carefully about being perceived as engaging in sectarian strife that would alienate Shia allies in Iraq, show bias in its human rights policy, and anger millions of Iranian young people who want better relations with the United States.
-
Creating Great Expectations: Strategic Communications and American Airpower
Conrad C. Crane Dr.
Americans have always been uniquely attracted to airpower, a fact that has been successfully exploited by generations of U.S. Air Force leaders in information campaigns. But as a result, the nation has often entered conflicts with exorbitant expectations about what airpower could actually accomplish, creating unique challenges in strategic communications when promises did not match reality, especially in recent conflicts. Adaptive enemies have also become very adept at using their own carefully crafted information campaigns to counter what is America’s greatest asymmetric advantage on the battlefield.
-
Silent Partners: Organized Crime, Irregular Groups, and Nation-States
Shima D. Keene Dr.
The U.S. Army increasingly faces adversaries that are difficult to define. The threat landscape is further complicated by the silent partnership between criminal organizations, irregular groups, and nation-states. This collaboration, whatever its exact nature, is problematic, because it confounds understanding of the adversary, making existing countermeasures less effective, and thus directly challenging U.S. national security interests. Military action taken without full appreciation of the dynamics of the nature of these relationships is likely to be ineffective at best or suffer unintended consequences. This monograph provides a comprehensive assessment of the threat to U.S. national security interests posed by the silent partners, as well as how the vulnerabilities of the relationships could be exploited to the advantage of the U.S. Army.
-
Assessing the Collective Security Treaty Organization: Capabilities and Vulnerabilities
Richard Weitz Dr.
Russia has strengthened its military position in Central Asia and the South Caucasus through a combination of bilateral and multilateral initiatives. The Collective Security Treaty Organization (CSTO) has become the most important multilateral defense structure in the former Soviet Union and is an essential instrument in Russia’s resurgence. The CSTO has expanded its missions, authorities, and capabilities. However, it faces both internal and external challenges, especially debilitating divisions among its members. -
Maintaining Information Dominance in Complex Environments
John A. S. Ardis Dr. and Shima D. Keene Dr.
There are many risks to the U.S. Army’s command and control (C2) operations and to its intelligence and information warfare (IW) capabilities. The challenges include: significant uncertainty; sudden unexpected events; high noise and clutter levels in intelligence pictures; basic and complex deceptions exercised through a variety of channels; the actions of hidden malign actors; and novel forms of attack on U.S. and allied command, control, communications, computers, information/intelligence, surveillance, targeting acquisition, and reconnaissance (C4ISTAR) systems. If the U.S. Army is to secure and maintain information dominance in all environments, it must exploit complexity and uncertainty in the battlespace and not simply seek to overcome it. Innovation requires that new ideas are considered, and that old ideas should be robustly challenged. To achieve and maintain information dominance, the U.S. Army will also require a significant injection of innovation, a robust and resilient C2 and intelligence capability, novel technologies and an accelerated information operations capability development program that is broad, deep, sustained and well-coordinated. Furthermore, once information dominance is achieved, maintaining it will demand continuous change and development.
-
The Relevance of the European Union and the North Atlantic Treaty Organization for the United States in the 21st Century
Joel R. Hillison Dr.
The “America First” approach to foreign policy seems to call into question the value of institutions like the North Atlantic Treaty Organization (NATO) and the European Union (EU). However, in a more competitive and uncertain strategic environment, NATO and the EU remain vital to promoting U.S. interests.
-
Exit Strategy: Rule of Law and the U.S. Army
Shima D. Keene Dr.
Establishing the rule of law is a key goal and end state in counterinsurgency (COIN) operations and is a critical aspect of securing peace and preventing future conflict. However, recent experience in theaters such as Afghanistan has shown that establishing effective rule of law institutions and practices is not a straightforward task. Consequently, considerations as to how and when rule of law institutions can start to be developed and integrated into the stability transition process must not only be planned in advance, but also form part of the U.S. Army’s strategy from the start of any military intervention. The analysis provided in this monograph will assist the U.S. Army, and more broadly the Departments of Defense and State, in better facilitating a seamless rebalancing from military to police functions in post-conflict environments, and to ensure that sustainable and effective rule of law interventions are delivered as part of an exit strategy.
-
The Dual-System Problem in Complex Conflicts
Robert D. Lamb Dr. and Melissa R. Gregg Ms.
Conflict and fragile environments are increasingly complex and unpredictable, but the U.S. policy system itself is much more complex and unpredictable than most leaders appreciate. In this monograph, the authors argue that until we get a grasp on this “dual-system problem,” the United States will fall further and further behind in its strategic ambitions.
-
A Security Role for the United States in a Post-ISIS Syria?
Gregory Aftandilian Mr.
Syria has become one of the most vexing and complex problems for U.S. strategic planners in recent times. Currently, the United States has about 2,000 troops in the northeastern part of the country whose primary mission has been to aid the Syrian Democratic Forces (SDF), made up primarily of Kurds and some Arab tribesmen, to fight ISIS. The near total defeat of ISIS in Syria, especially with the fall of its so-called caliphate capital in Raqqa in October 2017, might seem to suggest that the military mission is coming to an end and, therefore, the United States should pull out its troops. Indeed, President Donald Trump stated publicly in late March 2018, that he wanted these troops to come home “very soon.” However, since that time, the U.S. President has backtracked from this statement after receiving advice from several of his top military advisers, including Defense Secretary James Mattis, some foreign leaders like French President Emanuel Macron and Israeli Prime Minister Benjamin Netanyahu, and influential members of Congress, such as Senator Lindsey Graham, all of whom have recommended that the President keep these troops in Syria.
-
Impacts of Anti-Access/Area Denial Measures on Space Systems: Issues and Implications for Army and Joint Forces
Jeffrey L. Caton
The 2018 National Defense Strategy and National Space Strategy both reaffirm the vital interests that the United States has in the domain of space. However, space remains an inherently hostile environment that has become congested, contested, and competitive among the nations. What are ways for the U.S. Army to assure the success of its space-dependent warfighting functions in an anti-access/area denial (A2/AD) environment where space systems are degraded for significant periods of time?
-
Radical Islamist English-Language Online Magazines: Research Guide, Strategic Insights, and Policy Response
Robert J. Bunker Dr. and Pamela L. Bunnker
Radical Islamist online magazines first appeared in November 2003 with the publication of Sawt al-Jihad (Voice of Jihad) in Arabic. This magazine discontinued publication in April 2005 after 29 issues, having been shut down by the Saudi security services. The magazine was produced by the Saudi branch of al-Qaeda that later evolved into al-Qaeda in the Arabian Peninsula (AQAP). It called upon other al-Qaeda groups to develop and franchise their own magazines. Besides the plethora of radical Islamist online magazines in Arabic that has been produced since 2003—along with those in many other languages including Urdu, Russian, German, French, and Turkish—English-language editions have been in existence since April-May 2007. There have been a number of these magazines published at varying dates and for varying periods of time. Some, such as Al Rashideen and Ihya-e-Khilafat, were initiated but fell by the wayside, victim to a lack of audience, the capture or death of an editor, or their initiating group’s evolution. In the cases of al-Qaeda’s Inspire and Islamic State’s Dabiq magazines, the publications have been ongoing—until very recently with the demise of Dabiq—with over a dozen issues each, and have notably been cited in relation to terrorism cases by law enforcement. Beyond their propaganda potentials, each magazine can be said to promote a specific jihadi culture, to be embraced in total by followers of the particular group in question in order to achieve its desired utopian vision. Toward that end, components of these online magazines address the group’s successes and legitimacy, offer a vision of a desirable end state, encourage recruitment into their ranks, direct violent action against stated enemies, xiv and provide instructional materials and advice with regards to its enaction.
-
New Directions in Just-War Theory
J. Toby Reiner Dr.
One of the major developments in international law since World War II is the growth of human rights law dedicated to ensuring the protection of individuals from violence wherever they are, including from their own state. Tracking such changes, in recent decades, just-war theory has evolved from its traditional focus on state sovereignty in the direction of a rights-based approach that treats just wars as a form of global law enforcement. This monograph provides a survey of these developments, focusing on the increased scope for humanitarian intervention, principles of justice after war, and on the question of the responsibility of combatants for assessing the justice of their military's cause. It concludes by considering the call for strengthening international institutions and training programs in military ethics.
-
Friendly Force Dilemmas in Europe: Challenges Within and Among Intergovernmental Organizations and the Implications for the U.S. Army
Jose Luis Calvo Albero Colonel, Angus McAfee Colonel, Stefano Messina Colonel, and Kirk Gallinger Colonel
After a period of stability, the transatlantic community is facing considerable challenges in maintaining European security. Russia’s efforts to destabilize Europe, terrorism, climate change, energy insecurity, migration, fracturing European identity, and the reemergence of nationalist populism challenge the ability of European institutions to perform their central functions. Different visions for Europe’s future and the lack of a shared threat perception add to these dilemmas.
The U.S. military can help to shape these “friendly force dilemmas” by influencing European actors and institutions, promoting positive change through the U.S. interagency, and providing capabilities to tackle the theater-specific challenges. -
Robotics and Military Operations
William G. Braun Prof., Stéfanie von Hlatky Dr., and Kim Richard Nossal Dr.
In the wake of two extended wars, Western militaries find themselves looking to the future while confronting amorphous nonstate threats and shrinking defense budgets. The 2015 Kingston Conference on International Security (KCIS) examined how robotics and autonomous systems that enhance soldier effectiveness may offer attractive investment opportunities for developing a more efficient force capable of operating effectively in the future environment. This monograph offers 3 chapters derived from the KCIS and explores the drivers influencing strategic choices associated with these technologies and offers preliminary policy recommendations geared to advance a comprehensive technology investment strategy. In addition, the publication offers insight into the ethical challenges and potential positive moral implications of using robots on the modern battlefield.
Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.