J. Toby Reiner Dr.
One of the major developments in international law since World War II is the growth of human rights law dedicated to ensuring the protection of individuals from violence wherever they are, including from their own state. Tracking such changes, in recent decades, just-war theory has evolved from its traditional focus on state sovereignty in the direction of a rights-based approach that treats just wars as a form of global law enforcement. This monograph provides a survey of these developments, focusing on the increased scope for humanitarian intervention, principles of justice after war, and on the question of the responsibility of combatants for assessing the justice of their military's cause. It concludes by considering the call for strengthening international institutions and training programs in military ethics.
Friendly Force Dilemmas in Europe: Challenges Within and Among Intergovernmental Organizations and the Implications for the U.S. Army
Jose Luis Calvo Albero Colonel, Angus McAfee Colonel, Stefano Messina Colonel, and Kirk Gallinger Colonel
After a period of stability, the transatlantic community is facing considerable challenges in maintaining European security. Russia’s efforts to destabilize Europe, terrorism, climate change, energy insecurity, migration, fracturing European identity, and the reemergence of nationalist populism challenge the ability of European institutions to perform their central functions. Different visions for Europe’s future and the lack of a shared threat perception add to these dilemmas.
The U.S. military can help to shape these “friendly force dilemmas” by influencing European actors and institutions, promoting positive change through the U.S. interagency, and providing capabilities to tackle the theater-specific challenges.
William G. Braun Prof., Stéfanie von Hlatky Dr., and Kim Richard Nossal Dr.
In the wake of two extended wars, Western militaries find themselves looking to the future while confronting amorphous nonstate threats and shrinking defense budgets. The 2015 Kingston Conference on International Security (KCIS) examined how robotics and autonomous systems that enhance soldier effectiveness may offer attractive investment opportunities for developing a more efficient force capable of operating effectively in the future environment. This monograph offers 3 chapters derived from the KCIS and explores the drivers influencing strategic choices associated with these technologies and offers preliminary policy recommendations geared to advance a comprehensive technology investment strategy. In addition, the publication offers insight into the ethical challenges and potential positive moral implications of using robots on the modern battlefield.
The Land, Space, and Cyberspace Nexus: Evolution of the Oldest Military Operations in the Newest Military Domains
Jeffrey L. Caton
Over the last century, the domains of air, space, and cyberspace have joined the traditional warfighting domains of land and sea. While the doctrine for land operations is relatively mature, the doctrine for space and cyberspace continue to evolve, often in an unstructured manner. This monograph examines the relationships among these domains and how they apply to U.S. Army and joint warfighting. It concentrates on the central question: How are U.S. military operations in the newest domains of space and cyberspace being integrated with operations in the traditional domain of land? This inquiry is divided into three major sections:
• Existing Doctrine: This section presents an overview of the current state of joint and U.S. Army doctrinal development
for each of the domains of land, space, and cyberspace.
• Operations in Multiple Domains: This section examines the concept of cross-domain synergy and its ability to enhance
globally integrated operations.
• Future Operations: This section explores probable future operating environments as well as the resulting implications for
U.S. Army and joint force development. It includes recommendations for policymakers and senior leaders regarding the future
development and integration of space and cyberspace doctrine.
Anticipated future trends favor the decreased emphasis on traditional large-scale land operations and increased frequency and intensity of conflict in space and cyberspace, perhaps even where these newer domains may become preeminent for a given operation. The joint staff’s pursuit of achieving cross-domain synergy in planning and operations offers a credible method to face some of the challenges of the future joint force, but this will likely remain an evolutionary vice revolutionary endeavor.
The pivot to Asia is over, suggested Susan Thornton, Acting Assistant Secretary of State, Bureau of East Asian and Pacific Affairs, on the eve of Secretary of State Rex Tillerson’s first visit to Asia on March 14, 2017.1 This statement, though expected, begs many questions: Is this just a repeal of the bumper sticker “Strategic Rebalance,” typical of administration change? If so, what is its replacement? Moreover, if this change is just in name but not in substance, will President Donald Trump stay the course? If not, what will be Trump’s policy toward the Asia-Pacific? What should be the new focus and priorities? In short, given the enduring U.S. interests in the Asia-Pacific, what should be a sound and forward-looking U.S. strategy toward this region? This research project began with two questions on the future of the U.S. rebalance to the Asia-Pacific: Was it the right thing to do, and have we done it right? Given the enormous expected growth in the region and thus the expected impacts in the world, the answer to the first question is a resounding yes. The answer to the second question is less clear. On the one hand, there have been several successes, not the least of which was the public pronouncement of the Obama administration’s directive to pivot attention to the region and increase significant travel and engagement in the region by former President Obama and his senior officials. On the other hand, there have been limited effects in world affairs and murky plans for future U.S. endeavors in the region, complicated by growing financial and political challenges inside the United States. Perhaps the best answer to the second question is that there was a great start with xiv an unclear follow-up. With the Trump administration now guiding U.S. foreign policy, it is time to move forward from the rebalance to a revitalized strategy and approach to the Asia-Pacific for the third decade of the 21st century
Steven J. Condly, Arthur T. Coumbe Dr., and William L. Skimmyhorn Lieutenant Colonel
Still Soldiers and Scholars? sheds light on a neglected aspect of talent management, namely, officer accessions testing and evaluation. It does so by tracing the history of officer testing since 1900, identifying and analyzing key developments in the assessment process, and then offering recommendations about how the Army should revise its approach to officer testing. This book supplements a series of monographs written by the Army’s Office of Economic and Manpower Analysis (OEMA) and published by the Strategic Studies Institute (SSI) in 2009 and 2010. In those monographs, the authors proposed an officer corps strategy based on the theory of talent management. This book is a necessary first step in reforming the Army’s officer accessions effort in order to better align it with the Army’s talent-based approach to officer management.
Robert J. Bunker Dr.
Armed robotic systems—drones and droids—now emerging on the battlefield portend new strategic realities not only for U.S. forces but also for our allies and future potential belligerents. Numerous questions of immediate warfighting importance come to mind with the fielding of these drones and droids that are viewed as still being in their experimental and entrepreneurial stage of development. By drawing upon historical weapons systems life cycles case studies, focusing on the early 9th through the mid-16th-century knight, the mid-19th through the later 20th-century battleship, and the early 20th through the early 21st-century tank, the monograph provides military historical context related to their emergence, and better allows both for questions related to warfighting to be addressed, and policy recommendations related to them to be initially provided.
Jeffrey L. Caton
In 2011, the Department of Defense (DoD) released its Strategy for Operating in Cyberspace, which officially recognized cyberspace as an operational domain akin to the traditional military domains of land, sea, air, and space. This monograph examines the 2015 DoD Cyber Strategy to evaluate how well its five strategic goals and associated implementation objectives define an actionable strategy to achieve three primary missions in cyberspace: defend the DoD network, defend the United States and its interests, and develop cyber capabilities to support military operations. This monograph focuses on events and documents from the period of about 1 year before and 1 year after the 2015 strategy was released. This allows sufficient time to examine the key policies and guidance that influenced the development of the strategy as well as follow-on activities for the impacts from the strategy. This inquiry has five major sections that utilize different frameworks of analysis to assess the strategy:
1. Prima Facie Analysis: What is its stated purpose and key messages?
2. Historical Context Analysis: What unique contributions does it introduce into the evolution of national security cyberspace activities?
3. Traditional Strategy Analysis: Does it properly address specific DoD needs as well as broader U.S. ends in a way that is appropriate and actionable?
4. Analysis of Subsequent DoD Action: How are major military cyberspace components—joint and Service—planning to implement these goals and objectives?
5. Whole of U.S. Government Analysis: Does it integrate with the cyberspace-related activities of other U.S. Government departments and agencies?
The monograph concludes with a section that integrates the individual section findings and offers recommendations to improve future cyberspace strategic planning documents.
Joseph Guido Lieutenant Colonel
The idea to deny sanctuary to terrorist groups lies at the heart of contemporary U.S. counterterrorism strategy. Violent extremist organizations in North Africa, most notably the group al-Qaeda in the Islamic Maghreb (AQIM), have used remote and sparsely populated areas in the Sahara for protection from security forces to perform a range of activities such as training, planning, and logistics in order to conduct terrorist operations like kidnapping, murder, and bombing. Even after 16 years since the September 11 attacks and the resources dedicated to efforts to deny sanctuary, the concept of sanctuary remains largely unexplored. To deny sanctuary requires an understanding of what sanctuary is as an object and how sanctuary is used by terrorist organizations. This monograph proposes a functional understanding of sanctuary and offers fresh ideas to control sanctuary using a detailed case study of the most notorious of the North African terrorists, Mokhtar Belmokhtar, from his arrival to Mali in the late 1990s until the French intervention in early 2012. This multi-disciplinary inquiry utilizes a wide range of open-source documents as well as anthropological, sociological, and political science research, including interviews with one-time Belmokhtar hostage, Ambassador Robert Fowler, in order to construct a picture of what a day in the life of sanctuary-seeking terrorists is like. Belmokhtar and other violent groups remain active and at large in the Sahara in spite of a large French military presence, a small U.S. military presence, and local security forces conducting counterterrorism and counterinsurgency operations. Additionally, the Islamic State movement could be viewed as the emergence of mega sanctuaries for terrorists and other violent extremist organizations. These threats require a new strategy to isolate, contain, or defeat terrorists and violent extremists in their sanctuary areas.
Samuel R. White
The Defense Innovation Initiative (DII), begun in November 2014 by former Secretary of Defense Chuck Hagel, is intended to ensure U.S. military superiority throughout the 21st century. The DII seeks broad-based innovation across the spectrum of concepts, research and development, capabilities, leader development, wargaming, and business practices. An essential component of the DII is the Third Offset Strategy—a plan for overcoming (offsetting) adversary parity or advantage, reduced military force structure, and declining technological superiority in an era of great power competition.
This study explored the implications for the Army of Third Offset innovations and breakthrough capabilities for the operating environment of 2035-2050. It focused less on debating the merits or feasibility of individual technologies and more on understanding the implications—the second and third order effects on the Army that must be anticipated ahead of the breakthrough.
Mary Manjikian Dr.
Many different actors oppose the use of unmanned autonomous weapons (UAV’s) from adversary states, to international governmental organizations to policymakers and academics. However, the basis for their opposition varies, as do the assumptions behind their arguments. This Letort Paper lays out distinctions between arguments about technology, arguments about policy, and arguments about strategy.
Jean-Loup Samaan Dr.
Although collective security in the Gulf is the topic of numerous policy publications, most of the available literature focuses on the political environment without considering the operational requirements of this scenario. This monograph offers an evaluation of Gulf defense cooperation programs in order to stir the discussion on the future of the Gulf Cooperation Council (GCC) as the “NATO of the Gulf.”
Roman Muzalevsky Mr.
A series of megatrends will present a major challenge to the United States in the coming decades, exposing it to crises and opportunities on the battlefield and in the market. The U.S. military should stand ready to harness these dynamics to retain its edge in an operational environment marked by increased complexity, speed, and intensity of global developments.
Daniel Maurer Major
This monograph reimagines war’s fundamental nature, extending Clausewitz’s theory of its political origin and “Trinitarian” elements in a way that embraces alternative, sociological explanations like that of John Keegan. Ultimately, it proposes a new way to visualize the complexities of war’s intrinsic elements, operating at any scale, and expresses war with a completely new and universal definition.
Frank L. Jones Dr.
The fiscal year (FY) 2017 National Defense Authorization Act, which includes a title to reform the Department of Defense (DoD) security cooperation, has far-reaching implications for U.S. defense interests in Africa. As the Chairman of the House Armed Services Committee notes, “the Department of Defense continues to place greater emphasis on security cooperation, to include building partner capacity.” The term “building partner capacity” (BPC) widens the focus of security cooperation as a whole-of-government effort, and makes clear congressional interest in treating security cooperation as a defense institution building endeavor. In response to the law, this book examines and recommends specific steps the DoD can take to build partner capacity successfully in Africa and meet congressional direction.
Rotational Deployments vs. Forward Stationing: How Can the Army Achieve Assurance and Deterrence Efficiently and Effectively?
John R. Deni Dr.
The Army’s force posture is out of balance, with a greater percentage of troops stationed in the United States than at any time since the late 1940s. This has forced an over-reliance on lengthy, continuous rotational deployments to achieve deterrence and assurance in theaters such as northeast Asia and Europe. This finding is based on a 9-month study assessing the costs and benefits of rotational deployments and forward stationing. The analysis reveals that in terms of fiscal cost, training readiness, morale and family readiness, and diplomatic factors, the United States could likely achieve deterrence and assurance objectives more efficiently and more effectively with increased forward stationing. The recommendations address what kinds of units would be best suited for forward stationing, where forward stationing would be most efficacious, and how the Department of Defense should go about rebalancing Army force posture.
Rotational Deployments vs. Forward Stationing: How Can the Army Achieve Assurance and Deterrence Efficiently and Effectively?
John R. Deni
The Department of Defense can achieve deterrence and assurance objectives more effectively and efficiently through a rebalancing of its force posture. The Army should reverse the trend of the last 2 decades and forward station additional heavy units in Europe and on the Korean Peninsula, while ending lengthy, heel-to-toe rotational noncombat deployments.
Colin S. Gray Dr.
Does history repeat itself? This monograph clearly answers “no,” firmly. However, it does not argue that an absence of repetition in the sense of analogy means that history can have no utility for the soldier today. This monograph argues for a “historical parallelism,” in place of shaky or false analogy. The past, even the distant and ancient past, provides evidence of the potency of lasting virtues of good conduct. This monograph concludes by offering four recommendations: 1) Behave prudently. 2) Remember the concept of the great stream of time. 3) Do not forget that war nearly always is a gamble. 4) War should only be waged with strategic sense.
Jeffrey Record Dr.
The author examines the Axis defeat in World War II and concludes that the two main causes were resource inferiority (after 1941) and strategic incompetence—i.e., pursuit of imperial ambitions beyond the reach of its actual power. Until 1941 Axis military fortunes thrived, but the addition in that year of the Soviet Union and the United States to the list of Axis enemies condemned the Axis to ultimate strategic defeat. Germany, Italy, and Japan all attempted to bite off more than they could chew and subsequently choked to death.
Clarence J. Bouchat (USAF, Ret.) Lieutenant Colonel
U.S. landpower is an essential, but often overlooked, element of national power in semi-enclosed maritime environments like the South China Sea. This monograph gives U.S. policymakers a better understanding of the role of the U.S. Army, Marine Corps, and Special Operations Forces (SOF) in the region through potential combat operations employing wide area defense and maneuver; deterrence through forward presence and peacetime operations; and security engagement with landpower-dominant allies, partners, and competitors in the region. Landpower’s capabilities are also essential for direct support of the air and sea services and other government organization’s success when operating in this theater in direct support of U.S. national interests.
Nathan P. Freier Mr., Christopher M. Bado Colonel (Ret.), Christopher J. Bolan Dr., and Robert S. Hume Colonel (Ret.)
The U.S. Department of Defense (DoD) faces persistent fundamental change in its strategic and operating environments. This report suggests this reality is the product of the United States entering or being in the midst of a new, more competitive, post-U.S. primacy environment. Post-primacy conditions promise far-reaching impacts on U.S. national security and defense strategy. Consequently, there is an urgent requirement for DoD to examine and adapt how it develops strategy and describes, identifies, assesses, and communicates corporate-level risk. This report takes on the latter risk challenge. It argues for a new post-primacy risk concept and its four governing principles of diversity, dynamism, persistent dialogue, and adaptation. The authors suggest that this approach is critical to maintaining U.S. military advantage into the future. Absent change in current risk convention, the report suggests DoD exposes current and future military performance to potential failure or gross under-performance.
Thomas C. Graves Brigadier General
This monograph will answer the question: Can the U.S. Army apply to the current “prototype brigade” the lessons that were learned during the development and experimentation of the 11th Air Assault Division (Test)? Having established that the criteria of DTLOMS is a valuable tool for evaluating change in military systems, the next step is to apply those criteria to evaluate the changes that occurred in the formation of the 11th Air Assault Division (Test) from 1963 to 1965. In order to accomplish this, a study of the separate elements of DTLOMS will be conducted in order to determine how the 11th Air Assault Division reorganized itself and conducted operations during that period. The benchmark for studying the elements of DTLOMS will be the use of air mobility during the Ia Drang campaign of November 1965. Specifically, this monograph will attempt to answer the following six questions: 1. How did the division develop doctrine to support the transition to airmobile warfare? 2. How did the division determine the proper organization to facilitate warfighting with the airmobile division? 3. How did the division train leaders to support the new doctrine and organization? 4. How did the division conduct field training to certify its soldiers and units in the new tactics? 5. Did building a new force require any specific soldier skills; and if so, how were those skills cultivated? 6. How did the division adopt and recommend changes to material and equipment to support the new methods of fighting? Each of these questions addresses one aspect of the DTLOMS and will be used to measure change in the 11th Air Assault (Test) Division from the beginning in 1963 to the redesignation to the 1st Cavalry Division in 1965. Finally, this study will synthesize these changes and determine which lessons learned can be applied to ongoing experimentation in the U.S. Army of the 21st century.
Tarek N. Saadawi Dr. and John D. Colwell LTC
Despite leaps in technological advancements made in computing system hardware and software areas, we still hear about massive cyberattacks that result in enormous data losses. Cyberattacks in 2015 included: sophisticated attacks that targeted Ashley Madison, the U.S. Office of Personnel Management (OPM), the White House, and Anthem; and in 2014, cyberattacks were directed at Sony Pictures Entertainment, Home Depot, J.P. Morgan Chase, a German steel factory, a South Korean nuclear plant, eBay, and others. These attacks and many others highlight the continued vulnerability of various cyber infrastructures and the critical need for strong cyber infrastructure protection (CIP). This book addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks.
Richard Weitz Dr.
The U.S.-Indian security relationship has markedly improved since the Cold War with increased cooperation in a range of areas. The two countries have established stronger military, economic, and political ties based on mutual interests in combating terrorism, promoting democracy, preventing weapons of mass destruction (WMD) proliferation, and addressing China’s rise. Their bilateral defense engagements now include a range of dialogues, exercises, educational exchanges, and joint training opportunities. The partnership benefits both countries, enabling them to realize their core security goals. Yet, U.S. and Indian national security leaders must take new steps to ensure that the relationship realizes its potential.
Printing is not supported at the primary Gallery Thumbnail page. Please first navigate to a specific Image before printing.